Methods and systems for authorizing an effector command in an integrated modular environment
First Claim
1. A method for authorizing a command of an integrated modular hardware environment in which a plurality of partitions control actions of a plurality of effectors, the method comprising the steps of:
- retrieving, from a memory of the integrated modular hardware environment, a first identifier identifying a first partition of the plurality of partitions from which the command originated;
receiving a command message, the command message including the command and a second identifier, the second identifier identifying a first effector of the plurality of effectors for which the command is intended;
retrieving, from the memory of the integrated modular hardware environment, a third identifier using the received second identifier via a look-up table stored in the memory of the integrated modular hardware environment following the receiving of the command message, the third identifier identifying a second partition of the plurality of partitions that is responsible for controlling the first effector; and
comparing the first identifier and the third identifier to determine whether the first partition is the same as the second partition for authorization of the command.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided for authorizing a command of an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors is provided. A first identifier, a second identifier, and a third identifier are determined. The first identifier identifies a first partition of the plurality of partitions from which the command originated. The second identifier identifies a first effector of the plurality of effectors for which the command is intended. The third identifier identifies a second partition of the plurality of partitions that is responsible for controlling the first effector. The first identifier and the third identifier are compared to determine whether the first partition is the same as the second partition for authorization of the command.
-
Citations
20 Claims
-
1. A method for authorizing a command of an integrated modular hardware environment in which a plurality of partitions control actions of a plurality of effectors, the method comprising the steps of:
-
retrieving, from a memory of the integrated modular hardware environment, a first identifier identifying a first partition of the plurality of partitions from which the command originated; receiving a command message, the command message including the command and a second identifier, the second identifier identifying a first effector of the plurality of effectors for which the command is intended; retrieving, from the memory of the integrated modular hardware environment, a third identifier using the received second identifier via a look-up table stored in the memory of the integrated modular hardware environment following the receiving of the command message, the third identifier identifying a second partition of the plurality of partitions that is responsible for controlling the first effector; and comparing the first identifier and the third identifier to determine whether the first partition is the same as the second partition for authorization of the command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authorizing a command in an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors, the system comprising:
-
a memory configured to store a look-up table; and a controller coupled to the memory and configured to; retrieve, from the memory, a first identifier identifying a first partition of the plurality of partitions from which the command originated; receive a command message that includes the command and a second identifier, the second identifier identifying a first effector of the plurality of effectors for which the command is intended; determine from the memory a third identifier using the received second identifier and the look-up table, the third identifier identifying a second partition of the plurality of partitions that is responsible for controlling the first effector; and compare the first identifier and the third identifier to determine whether the first partition is the same as the second partition for authorization of the command. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system for authorizing a command in an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors, the system comprising:
-
a memory; a receiver configured to receive a command message, the command message comprising the command and a second identifier, the second identifier identifying a first effector of the plurality of effectors for which the command is intended; and a hardware controller coupled to the receiver and configured to; retrieve, from the memory, a first identifier identifying a first partition of the plurality of partitions from which the command originated; retrieve from the memory a third identifier using the received second identifier via a look-up table stored in the memory, the third identifier identifying a second partition of the plurality of partitions that is responsible for controlling the first effector; and compare the first identifier and the third identifier to determine whether the first partition is the same as the second partition for authorization of the command. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification