METHODS AND SYSTEMS FOR AUTHORIZING AN EFFECTOR COMMAND IN AN INTEGRATED MODULAR ENVIRONMENT
First Claim
1. A method for authorizing a command of an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors, the method comprising the steps of:
- determining a first identifier identifying a first partition of the plurality of partitions from which the command originated;
determining a second identifier identifying a first effector of the plurality of effectors for which the command is intended;
determining a third identifier using the second identifier, the third identifier identifying a second partition of the plurality of partitions that is responsible for controlling the first effector; and
comparing the first identifier and the third identifier to determine whether the first partition is the same as the second partition for authorization of the command.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided for authorizing a command of an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors is provided. A first identifier, a second identifier, and a third identifier are determined. The first identifier identifies a first partition of the plurality of partitions from which the command originated. The second identifier identifies a first effector of the plurality of effectors for which the command is intended. The third identifier identifies a second partition of the plurality of partitions that is responsible for controlling the first effector. The first identifier and the third identifier are compared to determine whether the first partition is the same as the second partition for authorization of the command.
25 Citations
20 Claims
-
1. A method for authorizing a command of an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors, the method comprising the steps of:
-
determining a first identifier identifying a first partition of the plurality of partitions from which the command originated; determining a second identifier identifying a first effector of the plurality of effectors for which the command is intended; determining a third identifier using the second identifier, the third identifier identifying a second partition of the plurality of partitions that is responsible for controlling the first effector; and comparing the first identifier and the third identifier to determine whether the first partition is the same as the second partition for authorization of the command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authorizing a command in an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors, the system comprising:
-
a memory configured to store a look-up table; and a controller coupled to the memory and configured to; determine a first identifier identifying a first partition of the plurality of partitions from which the command originated; determine a second identifier identifying a first effector of the plurality of effectors for which the command is intended; determine a third identifier using the second identifier and the look-up table, the third identifier identifying a second partition of the plurality of partitions that is responsible for controlling the first effector; and compare the first identifier and the third identifier to determine whether the first partition is the same as the second partition for authorization of the command. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system for authorizing a command in an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors, the system comprising:
-
a receiver configured to receive a command message, the command message comprising the command; and a controller coupled to the receiver and configured to; determine a first identifier identifying a first partition of the plurality of partitions from which the command originated; determine a second identifier using the command message, the second identifier identifying a first effector of the plurality of effectors for which the command is intended; determine a third identifier using the second identifier, the third identifier identifying a second partition of the plurality of partitions that is responsible for controlling the first effector; and compare the first identifier and the third identifier to determine whether the first partition is the same as the second partition for authorization of the command. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification