Ex parte LIEBL et al. - Page 2




          Appeal No. 1997-1207                                                        
          Application 08/272,590                                                      


          coordinating parallel accesses of a plurality of processors to              
          resource configurations.  Each resource is secured by a                     
          security number, whereby resources that belong to a common                  
          resource configuration all receive the same security number.                
          All security numbers are conferred via a central security                   
          table.  The access control is conferred on demand to a                      
          processor over an entire resource configuration when the                    
          security number belonging to this resource  configuration has               
          not been seized at this point in time by a different                        
          processor.  Thus, access to an entire resource configuration                
          comprising many individual resources is granted rather than to              
          the individual resources.  The invention is further                         
          illustrated by the following claim.                                         
               1.  A method for coordination of parallel accesses of a                
          plurality of processors to resource configurations that have                
          resources, comprising the steps of:                                         
               securing each resource by a security number from the                   
          plurality of security numbers, resources that belong to a                   
          common resource configuration having a common security number,              
          security numbers of the plurality of security numbers being                 
          forwarded to the resources via a central security table; and                
               assigning access control over an entire respective                     
          resource configuration on demand to a requesting processor,                 
          when a respective security number belonging to the respective               
          resource configuration has not been seized at this point in                 
          time by a different processor.                                              
                                          2                                           





Page:  Previous  1  2  3  4  5  6  7  8  9  10  Next 

Last modified: November 3, 2007