摘要 |
By a sequencing of programmed information, coupled with optical scanners, separated by a "Void' or "Gap', there is no possibility for a rogue virus to infiltrate the recipient's system. Additionally, by the inclusion in the base process of specially designated patterns of receipt of data, a basic level of security is automatically built in. This security can be enhanced by developing levels of identification encryption, which are proprietary to the recipient's system.
|