Browse Prior Art Database

Ownership of System Elements

IP.com Disclosure Number: IPCOM000042306D
Original Publication Date: 1984-May-01
Included in the Prior Art Database: 2005-Feb-03
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Sutton, AJ: AUTHOR [+2]

Abstract

A Service Processor can be used to control the ownership of system elements. The Service Processor allocates elements of a system as being assigned to customer operation, to service, to maintenance, or not assigned. Customer operations can be multiple assignments if shared, as in a multi-processor system, or can be multiple systems operating two different control programs. The Service Processor contains algorithms describing the allowed configuration. Once ownership is assigned, a configuration will become fenced or unfenced to become part of a configuration. This ownership prevents deceptive actions resulting from either a System Control Program using Configuration Commands or from manual entry to a functional element not owned by the requester whose identity is verified by the Service Processor.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Ownership of System Elements

A Service Processor can be used to control the ownership of system elements. The Service Processor allocates elements of a system as being assigned to customer operation, to service, to maintenance, or not assigned. Customer operations can be multiple assignments if shared, as in a multi-processor system, or can be multiple systems operating two different control programs. The Service Processor contains algorithms describing the allowed configuration. Once ownership is assigned, a configuration will become fenced or unfenced to become part of a configuration. This ownership prevents deceptive actions resulting from either a System Control Program using Configuration Commands or from manual entry to a functional element not owned by the requester whose identity is verified by the Service Processor. The above can be implemented within the Service Processor or within the hardware elements of the configuration itself by setting triggers defining ownership. The hardware will then allow functions only if proper ownership is provided.

1