Methods and apparatus for verifying the installation of components in a system

ABSTRACT

A verification system for an interchangeable component configured to be mated with a receiving system. The system includes a key device supported by the interchangeable component. The key device includes a transmitter configured to transmit a signal comprising component identification characteristics. The system further includes a lock system having a signal receiver and a verification component. The signal receiver is configured to receive the signal from the key device transmitter and pass the signal to the verification component. The verification component is configured to use the signal to determine whether or not the component should be admitted to the receiving system, and to generate an authorization signal if the component should be admitted.

FIELD OF THE INVENTION

[0001] This invention pertains to removable components, particularlyelectronic and electrical components, which are supported within asystem, and methods and apparatus to reduce the likelihood that acomponent is incorrectly inserted into the system.

BACKGROUND OF THE INVENTION

[0002] Many systems include a plurality of modules configured to performdesignated functions within the system. The modules are supported in oneor more chassis, and the modules are interconnected in the system,typically through a central controller. While the modules are frequentlyelectronic modules, they can also include hydraulic and pneumaticmodules, as well as optical modules in a fiber optic system. One exampleof a system utilizing electronic modules is a mass computer memorystorage array. FIG. 1 depicts such a system 2, which includes a firstmemory array “A”, a second memory array “B”, and a central controller“C”. The system 2 depicted in FIG. 1 is a simplified diagram of a masscomputer memory storage system, and is used for illustrative purposesonly. The system 2 can, for example, be a computer server used to storeInternet content, in which case the controller “C” is configured to sendand receive large amounts of data to and from a telecommunicationscommunications network. Another example of a use of the system 2 of FIG.1 is to store large quantities of data used for analysis purposes, suchas in imaging complex structures. Array “A” of the system 2 is connectedto the controller “C” by cable 4, and array “B” is connected to thecontroller “C” by cable 18. Each array comprises a chassis (not shown)which supports the modules within the array. In one variation on thesystem depicted in FIG. 1, the system can comprises a single array “A”,and the control functions performed by the central controller can beincorporated within the cabinet 12 of array “A”. The system 2 can befurther expanded by adding more arrays in communication with the centralcontroller “C”.

[0003] The array “A” of FIG. 1 comprises a plurality of memory modules5, 6 and 7, as well as auxiliary modules 8, 9, 10 and 11, which cancomprise such things as power supplies, cooling fans, and local controlmodules. Array “B” of FIG. 1 can comprise similar modules, such asmemory modules 15, 16 and 17. The controller “C” is configured to directdata to, and retrieve data from, any of the modules within either array.Consequently, the controller “C” contains a computer readable “map” ofthe overall memory array system, which identifies to the centralcontroller the array and the module within the array where particulardata is stored. This “map” allows the central controller to accessstored data, to know where data can be stored without overwriting in-usesectors, and to “remember” where it has stored data. The specificmethods for configuring such large memory array systems for the storageand retrieval of data are generally well known in the art, and will notbe discussed further. However, some general features leading toshortcomings with the current state of the art will now be discussed.

[0004] The various modules in each array are removably supported withinslots in the array. Removability allows a module to be removed forservicing or upgrades, and allows an operator to reconfigure the systemby moving modules from one location to another. However, suchremovability introduces the opportunity for human error. For example, anoperator can accidentally remove the wrong module from an array, caninsert a module into the wrong slot within an array, or can insert amodule into the wrong array. Since some systems have thousands ofmodules placed in hundreds of arrays, the opportunity for inserting thewrong module into the wrong slot is not unlikely. In many systems aparticular slot in an array is dedicated to a particular module, whichreduces, but does not eliminate, the chance for human error. However, inmore advanced systems the central controller can be configured toautomatically select a slot within an array, or within any array in thesystem, to perform a particular function, or to receive a particularmodule. This variability allows the system greater flexibility andoperating efficiently, but greatly increases the opportunity foroperator error.

[0005] By way of example, typically memory modules are activelybacked-up using a dedicated module to back up two primary modules. Forexample, with respect to FIG. 1, a “data stripe” S1 can consist of twoprimary memory modules 5 and 6, and a back-up module 7. A single back-upmodule 7, when used in conjunction with a back-up algorithm and acomputer processor, can be used to back-up the contents of two primarymodules 5 and 6. For example, the back-up module 7 can store the binarysum of the modules 5 and 6. In this way, if memory is lost from module5, it can be restored merely by processing the contents of modules 6 and7 using the back-up algorithm to calculate the lost data in module 5. Ifone of the three modules is determined to be defective by a diagnosticprogram, a fourth available module can be put into service in thecapacity of a back-up or a primary module. After the defective modulehas been repaired, it can be replaced into the slot from which it wasremoved or into another slot configured to receive the module, and thefourth module put into other service. However, if an operator were toaccidentally reinstall the repaired module into the wrong slot, then anydata which is lost in the first or second module cannot be restored. Forexample, let us assume that module 7 in data stripe S1 is defective, andmodule 20 in data stripe S4 is defective. Both modules 7 and 20 are thenremoved for service and repaired. If module 7 is subsequently andaccidentally installed in an open slot not configured for back-upservice of modules 5 and 6, then loss of data can occur due to thesystem configuration.

[0006] The system can be further complicated by advances in memoryarrays, for example where the back-up module is selected by acontroller, rather than being the third module in a memory stripe. Inthis instance, the back-up module can be one of any of the modules inthe array in the system. Additionally, in some configurations the memorystripe consists of five or more memory modules, and so it is not alwaysobvious that the third module down is the back-up module.

[0007] In addition to the risk of accidentally installing a module inthe incorrect slot for that module, there is a risk that a defectivemodule can accidentally be re-installed into the system prior to havingbeen serviced, or having been improperly serviced. In this instance,using the defective module can lead to loss of data or other problems.

[0008] What is needed then is a way to decrease the risk that a modulein a system will be installed into the wrong position, or that themodule will be installed when it should not be.

SUMMARY OF THE INVENTION

[0009] The invention includes methods and apparatus for verifying that acomponent to be installed in a receiving system is acceptable to thesystem, and to the location in the system in which the component isbeing installed. One embodiment of the invention is an electronic keydevice for use in a component intended to be received within a system.The system has an electronic lock device configured to respond to theelectronic key device. The electronic key device comprises a readablememory containing an identification code and a signal transmitterconfigured to access the identification code from the readable memory.The signal transmitter is further configured to transmit theidentification code to the receiving system as an identification signal.The electronic key device can further comprise a power source and aninformation processing device. The readable memory can also contain ahistory of the component, which can be used as part of theidentification signal. The readable memory can further comprise userinput data useful to the receiving system in determining whether or notto receive the component.

[0010] A second embodiment of the invention is a verification system foran interchangeable component, wherein the component is configured to bemated with a receiving system. The verification system includes a keydevice supported by the interchangeable component. The key device isconfigured to transmit a signal comprising component identificationcharacteristics. The verification system also includes a lock systemhaving a signal receiver, a verification component, and a componentlock-out device. The signal receiver is configured to receive the signalfrom the key device and pass the signal to the verification component.The verification component is configured to use the signal to determinewhether or not the component should be admitted to the receiving system,and to generate an authorization signal if the component should beadmitted. The component lock-out device is configured to receive theauthorization signal from the verification component and to the providethe component access to the receiving system in response to receipt ofthe authorization signal.

[0011] A method in accordance with the present invention includes amethod for verifying whether or not a component should be received intoa receiving system. In the method, the component is at least partiallyinserted into the receiving system. An identification signal is thengenerated from the component which identifies the component to thereceiving system. The identification signal is analyzed to determinewhether or not to admit the component to the receiving system. If theanalysis determines that the component should be admitted to thereceiving system, an authorization signal is generated. If anauthorization signal is generated, the authorization signal is used toallow the component to be admitted to the system. The method can alsoprovide that if the analysis determines that the component should not beadmitted to the system, a signal to a user is generated indicating thatthe component is not admitted to the receiving system. The method canfurther include admitting the component to the receiving system, andperforming a diagnostic analysis of the component prior to placing thecomponent in service in the system.

[0012] An example of a component which can embody the verificationmethods and apparatus of the present invention is a module in a computersystem. The computer system can be, for example, a mass memory storagesystem.

DESCRIPTION OF THE DRAWINGS

[0013]FIG. 1 is an oblique diagram of a data array system of the priorart.

[0014]FIG. 2 is a side elevation sectional view of a module partiallyinserted into an array which employ a verification system in accordancewith the present invention.

[0015]FIG. 3 is a side elevation sectional view of the module depictedin FIG. 2, but with the module fully inserted into the array.

[0016]FIG. 4 is a side elevation sectional view of one embodiment of amodule lock-and key communication arrangement in accordance with thepresent invention.

[0017]FIG. 5 is a side elevation sectional view of a second embodimentof a module lock-and key communication arrangement in accordance withthe present invention.

[0018]FIG. 6 is a schematic diagram showing components which can bepresent in the key portion of a module lock-and key system in accordancewith the present invention.

[0019]FIG. 7 is a schematic diagram showing components which can bepresent in the lock portion of a module lock-and key system inaccordance with the present invention.

[0020]FIGS. 8A and 8B together depict a flow chart showing one processfor using a module lock-and key system in accordance with the presentinvention.

[0021]FIG. 9 is a schematic diagram of a computer system incorporating acomponent verification system in accordance with one embodiment of thepresent invention.

DETAILED DESCRIPTION OF THE INVENTION

[0022] The invention disclosed and described herein includes methods andapparatus for verifying that a component to be installed in a receivingsystem is acceptable to the system, and to the location in the system inwhich the component is being installed. An apparatus in accordance withthe present invention is an electronic key device for use in a componentintended to be received within an electronic system which has anelectronic lock device. The electronic lock device is configured torespond to the electronic key device.

[0023] A second apparatus in accordance with the present inventionprovides for a verification system for an interchangeable component,wherein the component is configured to be mated with a receiving system.The verification system includes a key device supported by theinterchangeable component. The key device is configured to transmit asignal comprising component identification characteristics. Theverification system also includes a lock system having a signalreceiver, a verification component, and a component lock-out device. Thesignal receiver, lock-out device and verification component act inconcert to admit or deny the component access to the receiving system,depending on whether or not the component is determined by the locksystem to be acceptable to the receiving system for the intended use andlocation within the receiving system.

[0024] The invention also includes a method for verifying whether or nota component should be received into a receiving system.

[0025] The invention will now be described by way of example, withrespect to the following discussion and the accompanying drawings. It isunderstood that the following detailed description does not include allpossible embodiments of the invention, but should be considered asproviding one skilled in the art with a sufficient understanding of theinvention such that any embodiment within the scope of the appendedclaims can be made and used.

[0026] In the following examples we will show how the invention can beused with a module which is intended to be received within a computerarray. However, the module should be understood as being one example ofa component which is intended to be received within a system. Likewise,the computer array is but one example of a receiving system intended toreceive a component, such as a module. The system can be an electronicsystem, such as a computer system, or an optical fiber system, ahydraulic system, a pneumatic system, or any system in which signals aremoved between the components within the system and a controller withinthe system. Another example of a component in a system which can use theverification system of the present invention is a cable connector in acomputer system, in order to prevent the wrong cable from beingconnected to a connector.

[0027] We will begin by discussing the physical arrangement of thevarious components in a verification system in accordance with thepresent invention, including variations. We will then discuss theoperational aspects of the verification system.

[0028] In general, apparatus in accordance with the present inventioninclude a key device for signaling the identification of the componentto the receiving system, and a lock device for determining whether thecomponent should be admitted to the receiving system. Each of thesedevices include various sub-components. It is understood that thesub-components do not need to be contained within a single enclosure,and that it is possible to arrange the sub-components in any mannerwhich still accomplishes the objectives of the invention, resume

[0029] Turning now to FIG. 2, a side elevation sectional view of a partof a computer array 100 is shown. The computer array can be similar tothe array “A” depicted in FIG. 1. The array 100 includes a chassis 120which is configured to receive at least one module, and preferably aplurality of modules. A single module 110 is depicted as being partiallyinserted into a slot within the chassis. The module is supported byshelf 126, which is in turn supported by bracket 128, which is part ofthe chassis 120. The chassis also supports an electrical board or“plane” 122. The plane is used to communicate electrical power to themodules, as well as to communicate data to and from the modules. Theplane can be in communication with a controller included in the array100, as well as with a central controller such as controller “C” ofFIG. 1. A plane connector 124 is mounted on the plane 122. The planeconnector is configured to mate with a module connector 116, thusallowing the plane and module to be in electronic communication. Themodule includes a circuit board 114 which is in communication with themodule connector. The module can also include other internal components(not shown), such as a disk drive.

[0030] The module 110 and array 100 include a component verificationsystem 150 in accordance with one embodiment of the present invention.The verification system includes a key device and a lock device. The keydevice comprises an electronic key 152, and the lock device comprises anelectronic lock signal unit 156. The lock device can also include amechanical lock-out apparatus 130. The mechanical lock-out apparatus 130can be eliminated in one variation on the embodiment and replaced withan electronic lock-out apparatus, as will be discussed further below, .As shown, the electronic key 152 is supported by the module 110 and ismounted in an opening in the bottom of the module enclosure 112. Thelock signal unit 156 is mounted to a bracket 158, which is supported byshelf 126. The electronic key and the lock signal unit are positionedsuch that when the module 110 is initially inserted into the chassis120, they are in close proximity.

[0031] The electronic key 152 and the lock signal unit 156 areconfigured such that they can be in signal communication with oneanother when the module 110 is inserted into the chassis 120 as depictedin FIG. 2. Signal communication can be accomplished in a variety ofways. Turning briefly to FIGS. 4 and 5, two configurations for allowingthe electronic key 152 and the lock signal unit 156 to be in signalcommunication with one another are depicted. In FIG. 4, the electronickey 152 comprises metallic contacts 161 which are connected to a cable160, which is in turn connected to other components (not shown) withinthe electronic key. The metallic contacts protrude slightly below thebottom surface of the electronic key, and are biased slightly away fromthe lower surface. In a similar manner, the lock signal unit 156comprises metallic contacts 165 which are connected to a cable 164,which is in turn connected to other components (not shown) within thelock signal unit. The metallic contacts protrude slightly above theupper surface of the lock signal unit, and are biased slightly away fromthe upper surface. When the electronic key 152 and the lock signal unit156 are brought into proximity, the metallic contacts 161 and 165contact one another, providing an electrical circuit through whichelectrical signals and electrical power can flow.

[0032] In FIG. 5, a second embodiment of how signal communicationbetween the electronic key 152 and the lock signal unit 156 can beaccomplished is shown. The electronic key 152 of FIG. 5 comprises atransmitter 170, which is connected via cable 172 to other internalcomponents (not shown) within the electronic key. The transmitter cantransmit signals using a low range carrier signal, such as an infraredsignal or a radio frequency signal. The lock signal unit 156 comprises areceiver 174, which is connected via cable 176 to other internalcomponents (not shown) within the lock signal unit. The receiver 174 isconfigured to receive signals from the key transmitter 170. In thismanner, electronic signals can be passed from the electronic key 152 tothe lock signal unit 156.

[0033] Returning to FIG. 2, the electronic key 152 is depicted as beingin electrical communication with the circuit board 114 within the module110. Although the electronic key does not need to be configured in thismanner, certain advantages can be obtained from this arrangement, aswill be discussed further below.

[0034] The example depicted in FIG. 2 includes a mechanical lock-outdevice 130. In this arrangement, the lock-out device prevents the moduleconnector 116 from being connecting to the plane connector 124 until themodule has been verified as acceptable, as will be more fully describedbelow. However, in a variation on the embodiment shown in FIG. 2, theverification system does not include a mechanical lock-out device 130,and the module can be fully inserted into the slot in the chassis 120and physically connected to the plane 122 prior to being verified.However, as will be described in more detail below, the verificationsystem can be configured with an electronic lock-out device such thatthe module is not placed in service until after it has been verified,even though it can be physically connected to the system 100. In thislatter variation, the module can be provided with limited access to thesystem. For example, the system controller can be configured to providepower to the module 110, but not to allow the module signal access tothe system other than for verification purposes.

[0035] The module 110 in FIG. 2 is also depicted as including a lightemitting diode (LED) 115, which is mounted on the front of the module110 and is connected to the circuit board 114. The LED can be used tosignal to a user that the module is either acceptable to the system 100,or not acceptable to the system, as will be more fully described below.An alternate location for the indicator light is shown at position 115′,wherein the LED is mounted on the chassis 120 and is connected to theplane 122 of the array. The LED can signal to the user that the moduleis acceptable to the system by illuminating. Then user can fully insertthe module from the position depicted in FIG. 2 to the position depictedin FIG. 3. However, when the module is in the position depicted in FIG.2, the LED will not be able to receive power via the module connector116. In this instance, alternative sources of power for the LED can beemployed. For example, a battery internal to the module 110 can be used.Alternately, when the connection arrangement depicted in FIG. 4 is usedto connect the electronic key 152 and the lock signal unit 156, powerfor the LED 115 can be obtained via the plane 122.

[0036] In a similar manner, the electronic key typically is configuredto require power to perform its functions. Power can be obtained from abattery internal to either the module 110 or the electronic key 152, orpower can be obtained via the plane 122 when a connection such as thatdepicted in FIG. 4 is used. In an alternate embodiment, when theverification system does not include the mechanical lock-out device 130but instead uses an electronic lock-out device, the module can be fullyinserted into the slot and connected to the plane connector 124, and theelectronic key can receive power via connector 116. In yet anotherembodiment, the electronic key can receive power from an inductive coillocated within the chassis, or it can receive power via a radiofrequency signal or the like broadcast from a transmitter located withinthe chassis.

[0037] A mechanical lock-out device 130, which can be used in theverification system, can be configured as depicted in FIGS. 2 and 3.Other lock-out devices can also be used to equal effect. The lock-outdevice 130 comprises a moveable securing pin 136 which can protrudethrough a hole 138 in the shelf 126, effectively blocking movement ofthe module from the position depicted in FIG. 2 to the position depictedin FIG. 3. The securing pin can be activated by an actuator, such assolenoid 132, which is supported by bracket 134, which is in turnattached to the shelf 126. The solenoid can be powered via the plane122. The lock-out device can be configured to maintain the securing pinin the position shown in FIG. 2 until the verification system hasverified that the module should be admitted to the system 100. At thattime a controller can activate the solenoid 132 and retract the securingpin 136 to the position shown in FIG. 3, so that the module can be fullyinserted into the slot and the connectors 16 and 124 mated.

[0038] The module 110 can be further provided with a securing hole 140so that once the module is accepted to the system, the actuator 132 canbe activated to move the securing pin 136 into the hole 140, thussecuring the module in the system 100.

[0039] It is understood that the electronic lock-and-key device depictedin FIG. 2 is but one example of such a system, and that variousvariations can be employed, all within the scope of the presentinvention. For example, the electronic key device 152 can be located inthe chassis 120, rather than in the module 110, in which case theelectronic key signal unit 156 will be located in the module 110, ratherthan in the chassis 120. Likewise, the mechanical lock-out device 130can be supported within the module 110, and the chassis 120 can beprovided with an arresting surface. When extended, the securing pin 136contacts the arresting surface on the chassis to prevent the module frombeing fully inserted into the chassis. When the securing pin isretracted the module can be fully inserted into the chassis.

[0040] Turning now to FIG. 6, a schematic diagram depicting the variousoperational components of a key device 200 in accordance with thepresent invention is shown. It is understood that the various componentsneed not all be located in the same physical enclosure. For example,some operational components can be contained within the electronic key(item 152 in FIG. 2), while other operational components can becontained on the circuit board 114 within the module 110, or in a localcontroller in the array, or even in a main controller connected to thearray (such as item “C” in FIG. 1). Further, not all of the operationalcomponents shown in FIG. 6 are necessary for operation of the keydevice.

[0041] Turning briefly to FIG. 7, a schematic diagram depicting thevarious operational components of a lock device 300 in accordance withthe present invention is shown. As with the key device 200 of FIG. 6, itis understood that the various components need not all be located in thesame physical enclosure. For example, some operational components can becontained within the lock signal unit (item 156 in FIG. 2), while otheroperational components can be contained in a local controller in thearray or in a main controller connected to the array (such as item “C”in FIG. 1). Also, not all of the operational components shown in FIG. 7are necessary for operation of the lock device.

[0042] The key device 200 of FIG. 6 will now be discussed in conjunctionwith the lock device 300 of FIG. 7, since the two devices interactoperationally in a “lock-and-key” fashion to allow the module to accessthe system, provided the module “key” fits the system “lock”. Withreference to FIG. 6, the key device 200, as depicted, can include aninformation processing device 210 which functions to coordinate theother operational components of the key device. The informationprocessing device can be for example a state machine comprising aplurality of logic gates configured to perform a designated function orfunctions in response to a predefined set of conditions when theconditions are satisfied. The information processing device can alsocomprise a microprocessor configured to perform a series of computerexecutable program steps. In communication with the informationprocessing device 210 is a readable memory 220 and a data transmissiondevice 230 to transmit data from the key device to the lock device. Thereadable memory can be for example a computer readable memory such as aread-only-memory (ROM) or a programmable random access memory (RAM). Thekey device can also include a power source 240 which can be incommunication with the information processing device and/or othercomponents of the key device, such as the data transmission device 230.One example of a power supply is a direct current power supply, such asdirect current from a battery or alternating current from a powersupply. Other examples of a power supply include a photoelectric celland an antenna configured to receive power from a wireless transmission,such as a radio frequency. The key device 200 can also include a datareceiving device 250 to allow the key device to receive information fromthe lock device. The key device can further include a modulecommunication device 260 to allow the lock device to send and/or receivedata from the module.

[0043] Turning to FIG. 7, the lock device 300, as depicted, can includeat least one processor 310 which functions to coordinate the otheroperational components of the lock device. The processor 310 can be aninformation processing device similar to the information processingdevice 230 of FIG. 6, or it can be a full computer processor. Theprocessor functions can also reside within an information processingunit such as a local controller or a main controller, as will bedescribed more fully below. In communication with the processor 310 is areadable memory 320 and a data receiving device 350. The data receivingdevice can allow the lock device to receive information from the keydevice. The readable memory can be a device similar to the readablememory 220 of FIG. 6, described above. The key device 300 can alsoinclude a power source 340, which can be configured in a manner similarto the power supply 240 depicted in FIG. 6 and described above. Thepower supply can be connected directly to the processor 220, and/ordirectly other components within the lock system. The lock device canalso include an array communication device 360 to allow the lock deviceto send and/or receive data from a controller in communication with thearray. The controller can either be a controller local within the array,or a main controller. Preferably, the lock device 300 is incommunication with a local controller, which in turn is in communicationwith a main controller having overall management of the system. The lockdevice 300 can also include a data transmitting device 330 to allow thelock device to transmit data to the key device, and a lock-out device380 similar to lock-out unit 160 of FIG. 2.

[0044] It is understood that the schematic diagrams of the lock device200 of FIG. 6 and the key device 300 of FIG. 7 are exemplary only, andthat other configurations can be employed, all within the scope of thepresent invention. In general, a lock-and-key apparatus in accordancewith the present invention includes a key device capable of transmittinga distinct code to a receiver in a lock device. The lock device is thenconfigured to determine whether or not to admit the component associatedwith the key device, based on the code. As indicated earlier, thepositions of the lock device and the key device can be exchanged, suchthat the lock device is associated with the component and the key deviceis associated with the receiving system.

[0045]FIG. 9 depicts a schematic diagram of one example of a computersystem 500 which incorporates a component verification system inaccordance with one embodiment of the present invention. FIG. 9 isprovided for illustrative purposes to show where the various componentsof the key and lock devices of FIGS. 6 and 7 can be located. Thecomputer system 500 has a central controller 560, which is connected toan array 510. The array 510 can be one of many such arrays connected tothe main controller 560. The main controller is provided with a userdisplay 570, such as a video terminal, and a user input station 580,such as a keyboard. The main controller also includes an informationprocessing unit, shown here as processor 562, a readable memory 564 suchas a computer readable memory, and a verification program 566. Theverification program, which will be describe more fully below,preferably comprises a set of computer executable steps which are storedin the computer readable memory 564 and are performed by the processor562. The verification program can also comprise an arrangement of logicgates configured to perform the verification process, without use of theprocessor 562. For purposes of simplicity, in the following discussionit is assumed that the verification process is carried out by a set ofcomputer executable instructions in the processor 562, although this isnot a requirement.

[0046] The main controller can also include a system architecture map568 which can be stored in the main controller's readable memory 564.The architecture map can include a listing of all of the modulescurrently in use within the system, as well as the corresponding slotsin which the modules are inserted. The modules can be identified bymodule identification codes, each module preferably having a uniquemodule identification code. Likewise, the slots in each array can beidentified by slot identification codes, each slot preferably having aunique slot identification code. Alternately, the slots can be generallycategorized by slot type to thereby allow greater flexibility within thearray. The module identification codes can contain such information asthe service or function performed by each module. The slotidentification codes can include information regarding the assignedfunctions of the array slots. The architecture map can also include ahistory of the services a module has been and is currently performing, alisting of modules currently removed from the array for maintenance orrepair, and a list of the modules that are performing back-up functionsfor removed modules. Other information can also be included in thesystem architecture map 568.

[0047] The array 510 of the computer system 500 is configured to receivea module 515 in an open slot in the array chassis 522. Only one suchmodule 515 is shown, although typically the array 510 will have aplurality of such modules. As shown, the module 515 is basically thesame as the module 110 of FIG. 2. The module 515 is depicted as beingonly partially inserted into the slot, and is in a position for theverification process to occur. The array has an electrical connectorplane 526 which supports a plane connector 528. The plane connector 528is configured to mate with the module connector 524. The array 510 isalso provided with a mechanical lock-out device 550, similar to thelock-out device 160 describe above for FIG. 2. The lock-out device 550prevents the module connector 524 from being connected to the planeconnector 526 until the module is verified as acceptable by theverification system.

[0048] The array 510 of FIG. 9 further includes a power supply module514, and a local controller module 512. The local controller 512 is incommunication with the main controller 560, and can manage local controlfunctions, such as routing of signals from the main controller to themodules within the array 510. The local controller has a processor 516and a computer readable memory 518.

[0049] In the exemplary system depicted in FIG. 9, the key devicecomprises an electronic key 552, which is essentially the same as theelectronic key 152 shown and described in FIG. 2. The electronic key 552can include within the unit itself the following operational componentsof the key device depicted in FIG. 6: the information processing device210, the readable memory 220, and the data transmitter 230 for sending asignal or signals to the lock device. A data receiver 250 and a moduledata transfer component 260 can also be included in the electronic key552. In the example shown, the electronic key 552 is powered by abattery 240 which is resident within the module 515.

[0050] Unlike the components of the key device depicted in FIG. 9, thecomponents of the exemplary lock device in FIG. 9 are found in severaldifferent locations. The lock device processor 310 (FIG. 7) can beeither or both of the local controller processor 516 and the maincontroller processor 562. Likewise, the lock device readable memory canbe both the local controller computer readable memory 518 and the maincontroller computer readable memory 564. The receiver to receive datafrom the key device (item 350 of FIG. 7) can be located in the locksignal unit 556, which is essentially similar to the lock signal unitshown and described above as item 156 in FIG. 2. Similarly, thecomponents to transmit data to the array, and hence to the localcontroller processor 516 (see item 360 of FIG. 7) can be located in thelock signal unit 556. If the lock device is configured to transmit datato the key device as indicated by item 330 of FIG. 7, then theoperational components for a transmitter to perform these functions canbe contained within the lock signal unit 556. The module verificationcomponent, item 370 of FIG. 7, can be the module verification program566 of FIG. 9 (described above), which is depicted as being located inthe main controller 560. However, certain functional components of theverification program can also be located in the local controller 512.

[0051] Having shown and described apparatus in FIGS. 2-7 and 9 which canbe used to implement a component verification system in accordance withthe present invention, we will now describe how a component verificationsystem can be used. The following description will make reference to thevarious devices shown in the drawings, and is understood to merelyconstitute examples of how a component verification system can be used.Other methods of use within the scope of the present invention can alsobe employed.

[0052] In one example, a computer system 500 of FIG. 9 has a pluralityof arrays, of which array 510 is but one. A module 515, which can beinserted into an open slot in the array 510, is provided with anelectronic key 552. The electronic key contains an identification codewhich can be stored in the readable memory 220 of FIG. 6. Theidentification code can uniquely identify the module within overallcomputer system. Let us assume that the module 515 has been previouslyremoved for service, and is now to be reinstalled in the computersystem. A user first inserts the module 515 into an open slot in thearray 510. If a mechanical lock-out device 550 is used, the module canonly be partially inserted into the open slot, such that the connectors524 and 528 do not mate. The operator can then signal to the computersystem via the user input device 580 that a module is present forverification. This last step can be eliminated where the array 510 isconfigured to automatically detect the presence of a module and initiatethe verification sequence without user input. For this variation, thelock signal unit 556 can be provided with a sensor (not shown) which canalert the local controller 512 to the presence of the module in theslot. In any event, the module verification sequence is then begun.

[0053] A first step in the verification sequence can be for the locksignal unit 556 to send a signal to the electronic 552 key to poll thekey regarding the identity of the module 515. In response to receivingthe polling signal from the lock signal unit, the electronic key cantransmit the module identification code to the lock signal unit, whichthen communicates the communication code to the local controller 512,along with a code identifying the slot in which the module has beeninserted. The local controller then communicates the module and slotidentification codes to the main controller 560. The main controller canthen access the system architecture map 568 and, using the module andslot identification codes and the verification program 566, determine ifthe module should be accepted within the slot and connected to thearray. If the module should fail to be verified for the slot (forexample, if the module has been previously assigned to another slot),then the controller 560 can signal a user via the user display 570 thatthe module 510 has been inserted into the wrong slot. If the module hasa previously assigned slot, the controller can also provide thisinformation to the user. Likewise, if the slot in question has apreviously assigned module, the controller can provide this informationto the user. When a module fails to be verified, the main controller 560can notify the local controller 512 so that the local controller doesnot take any actions to put the module into service.

[0054] If the main controller 560 verifies that the module should beaccepted into the slot in the array, then the main controller can sendan authorization signal to the local controller 512. The localcontroller can then send a signal to the lock-out device 550 directingthe lock-out device to disengage such that the module can be fullyinserted into the slot. After the lock-out device has been successfullydisengaged, the local controller 512 can signal the main controller 560that the module can now be connected to the array 510. The maincontroller can then notify a user via the user display 570 that themodule has been verified and can now be fully inserted into the array.The user can then push the module into the array to allow the connectors524 and 528 to mate. In one variation, after the lock-out device hasbeen disengaged, the local controller 512 can illuminate a light, suchas LED 115′ of FIG. 2, that the module has been accepted. This allows auser to see whether or not a module has been verified without having togo to the user display 570 (FIG. 9), which can be remote from the array510. In another variation, after the lock-out device has beendisengaged, the local controller 512 can send a signal to the locksignal unit 556 rather than to the main controller. The lock signal unitcan then transmit a signal to the electronic key 552 indicating that themodule has been accepted, and the electronic key can cause the LED 115(FIG. 2) on the module to illuminate, indicating to a user that themodule has been verified as acceptable.

[0055] In one variation on the above configuration, if a mechanicallock-out device 550 is not employed, then the module 515 can be fullyinserted into the slot in the array 510, and the connectors 524 and 528can mate. However, the local controller can be configured with anelectronic lock-out program to not allow the module to be used until themain controller has provided an authorization code. The authorizationcode can then be obtained in the manner described above by polling theelectronic key for a module identification code. The moduleidentification code can then be used by the verification program 566. Ifthe verification program determines that the module 515 is accepted foruse, the module can then be placed into service by the local controller512. This variation has at least two advantages. One advantage is thatthe local controller can be configured to allow the power supply module514 to provide electrical power to the module, and thus the electronickey 552, before the module has been accepted for service within thesystem. The module then does not need to have a separate power supply240 to power the electronic key. A second advantage is that an operatordoes not need to fully insert the module 515 into the array 510 afterthe main controller 560 verifies that the module is acceptable for theslot in the array.

[0056] After the module 515 has been physically connected to the array510, and before the module is placed into operational service, the localcontroller 512 can perform a diagnostic routine on the module todetermine whether the module is operating properly. If the module isfunctioning as it should, then the local controller can signal the maincontroller 560 that the module is ready for use, and the main controllercan place the module 515 into service. However, if the local controllerdetermines that the module is not operating correctly, it can notify themain controller, which can then notify a user via the user display 570,and the module is not placed into service.

[0057] In another variation, the controller (local controller 512 ormain controller 560) can be configured to store data in the readablememory in the electronic key 552. In this way, if the controller detectsa problem with the module which requires the module to be removed formaintenance or repair, the controller can store information in theelectronic key describing the problem with the module. Once the moduleis removed for servicing, a technician can access the electronic key'sreadable memory and can determine what repairs or servicing should beperformed. Since the electronic key can also uniquely identify themodule, these features allow a module to be sent to a shop for servicingwith little or no accompanying paperwork. This in turn saves operatortime, and reduces the opportunity for human error (e.g., misdescriptionof the module defects, lost paperwork, etc.).

[0058] In addition to allowing a controller to access the electronickey's readable memory and save pertinent data therein, the electronickey readable memory can also be configured to be accessible by a repairtechnician. Thus, not only can a technician read the memory anddetermine what needs to be done to repair the module, but after therepairs have been affected the technician can record the repairs made,the date, and other information in the electronic key's memory.Thereafter, when the module is returned to be reinstalled in the array,the main controller can read the electronic key's readable memory todetermine if repairs have been made. This is useful since it helps toreduce the chance that a module removed for servicing will accidentallybe reinstalled into the array before repairs have been made.

[0059] Another use of the verification system of the present inventionoccurs when modules are removed from an array for reasons other thanmaintenance. For example, if a computer memory system is being expanded,it can be necessary to remove the modules from an array enclosure whenthe enclosure is moved or additional module slots are added to thearray. In this instance it is desirable to retain the memory contents ofeach module in the array, and also to ensure that the modules arereturned to their original slots. The verification system is basicallyused in the manner described above to allow the main controller toverify that a module is correctly positioned, and to authorize use ofthe module before it is placed into service. Alternately, if the modulesare not returned to their original slots, the electronic key uniquelyidentifying each module can be used to allow the controller to identifythe modules and the slots in which they are disposed. This informationcan then be used to update the architecture map (568 of FIG. 9), and themodules can be used where positioned.

[0060] Turning now to FIGS. 8A and 8B, a flow chart 400 is depictedwhich shows how one method in accordance with the present invention canbe practiced. The method provided for in the flow chart 400 isessentially one variation of the method described above, and thereforethe following description should be read in light of the foregoingdisclosure. It is understood that the flow chart 400 depicts but oneembodiment of the present invention, and should not be considered aslimiting the scope of the invention.

[0061] With reference to FIG. 8A, the process beings when an operatorpartially inserts a component into a receiving system at step S410. Forexample, the module 110 of FIG. 2 is partially inserted into a slot inthe array 120. This assumes that an a mechanical lock-out device, suchas lock-out device 160 of FIG. 2 is used. At step S412 a lock device inthe slot in the array checks for the presence of a component key. Theverification system can be configured such that the lock devicecontinually senses the slot for a key device until one is found. If nokey device, the process returns to step S412 to continue sensing for akey device. However, if the lock system detects a component key, then atstep S416 the lock device “handshakes” with the key device. That is, thelock device signals to the key device to transmit componentidentification information to the lock device, and the key device inturn transmits the requested information. The key device can alsotransmit other information to the lock device at this time, such as therecent history of the module in which the key is installed.

[0062] Having received the component identification information from thekey device in step S416, the lock device then transmits this informationto a controller at step S420. At step S420, the controller performs averification routine to determine if the module inserted in to the slotis the correct module for that slot, and if the module should otherwisebe accepted (e.g., it can determine if necessary repairs to the modulehave been made, in the manner described above). Based on the results ofthe verification routine, at step S422 the controller makes a decisionto accept or not accept the module. If the module is not accepted,control moves to step S424 (FIG. 8B), the module is not allowed to beplaced into service in the array, and a user is notified. However, if atstep S422 the controller determines that the module is acceptable, thenat step S426 (FIG, 8B) the controller authorizes the lock-out device toadmit the module. The controller then signals a user that the module canbe fully inserted and connected to the array.

[0063] After the user connects the module to the array at step S428,then at step S430 the controller can test the module for operationalfunctionality by performing a diagnostic routine on the module. Theresults of the diagnostic routine are analyzed at step S432. If thediagnostic routine indicates that the module should not be used for someoperational reason, then at step S434 the controller notifies a user,and the module is not placed into service. It should be mentioned herethat the rejection of the module for use at step S434 is not based onthe module being inserted into the wrong slot, but rather that themodule is not performing correctly for its intended function. If thediagnostic routine indicates that the module is acceptable for use forits intended function, then at step S436 the controller can activate themechanical lock-out device to lock the module into the array to guardagainst accidental removal. Finally, at step S438 the module is placedinto operational service, performing its intended function within thesystem. At this time, any module which was being used as a substitutefor the newly inserted module can be taken out of the substitute serviceand put into other service. The verification process then ends at stepS440.

[0064] While the above invention has been described in language more orless specific as to structural and methodical features, it is to beunderstood, however, that the invention is not limited to the specificfeatures shown and described, since the means herein disclosed comprisepreferred forms of putting the invention into effect. The invention is,therefore, claimed in any of its forms or modifications within theproper scope of the appended claims appropriately interpreted inaccordance with the doctrine of equivalents.

What is claimed is:
 1. An electronic key device for use in a componentintended to be received within a system which has an electronic lockdevice configured to respond to the electronic key device, theelectronic key device comprising: a readable memory containing anidentification code; and a signal transmitter configured to read theidentification code from the readable memory and transmit theidentification code as an identification signal.
 2. The electronic keydevice of claim 1, and further comprising a power source incommunication with the signal transmitter.
 3. The electronic key deviceof claim 1, and further comprising a data input port configured to allowdata to be stored in and read from the readable memory.
 4. Theelectronic key device of claim 3, and wherein the readable memorycontains at least a partial history of the component.
 5. The electronickey device of claim 1, and further comprising an information processingdevice in communication with the readable memory and the signaltransmitter.
 6. The electronic key device of claim 1, and furthercomprising a signal receiver configured to receive a signal from anelectronic lock device.
 7. A verification system for an interchangeablecomponent configured to be mated with a receiving system, comprising: akey device supported by the interchangeable component, the key devicecomprising a transmitter configured to transmit a signal comprisingcomponent identification characteristics; and a lock system having asignal receiver and a verification component, and wherein: the signalreceiver is configured to receive the signal from the key devicetransmitter and pass the signal to the verification component; and theverification component is configured to use the signal to determinewhether or not the component should be admitted to the receiving system,and to generate an authorization signal if the component should beadmitted.
 8. The verification system of claim 7, and further comprisinga component lock-out device configured to admit or deny the componentaccess to the receiving system, and wherein the component lock-outdevice is configured to receive the authorization signal from theverification component and to the provide the component access to thereceiving system in response to receipt of the authorization signal. 9.The verification system of claim 8, and wherein the component lock-outdevice comprises an interlock mechanism configured to be positioned in afirst position to prevent the component from mating with the receivingsystem, and a second position to allow the component to mate with thereceiving system, and wherein the interlock mechanism moves from thefirst position to the second position in response to receipt of theauthorization signal.
 10. The verification system of claim 8, andwherein the lock-out device comprises an electronic switch toelectrically isolate the component from the receiving position if thelock-out device does not receive the authorization signal.
 11. Theverification system of claim 7, and wherein the signal from the keydevice is transmitted to the signal receiver as a radio frequency. 12.The verification system of claim 7, and wherein the receiving systemcomprises an information processing unit, and wherein the verificationcomponent resides within the information processing unit.
 13. Theverification system of claim 12, and wherein the information processingunit comprises a controller, and further wherein the verificationcomponent comprises a set of executable instructions.
 14. Theverification system of claim 12, and wherein the component is intendedto perform an intended function within the receiving system, and furtherwherein the information processing unit is configured to verify that thecomponent can perform the intended function prior to using the componentin the receiving system to perform the intended function.
 15. Theverification system of claim 12, and wherein the key device comprises areadable memory, and further wherein the information processing unit isconfigured to save in the readable memory data pertaining to theoperation of the component within the receiving system.
 16. A method forverifying whether or not a component should be received into a receivingsystem, comprising: at least partially inserting the component into thereceiving system; generating an identification signal from the componentwhich identifies the component to the receiving system; analyzing theidentification signal to determine whether or not to admit the componentto the receiving system, and generating an authorization signal if theanalysis determines that the component should be admitted to thereceiving system; and if an authorization signal is generated, using theauthorization signal to allow the component to be admitted to thesystem.
 17. The method of claim 16, and wherein if the analysisdetermines that the component should not be admitted to the system,generating a signal to a user indicating that the component is notadmitted to the receiving system.
 18. The method of claim 16, andwherein the component can be characterized by a recent history ofmaintenance, the method further comprising providing the component withthe recent history, and wherein the identification signal comprises atleast a portion of the recent history.
 19. The method of claim 16, andwherein the step of using the authorization signal to allow thecomponent to be admitted to the system comprises causing a barrier to bemoved from a first position which bars the component from mating withthe receiving system to a second position which does not bar thecomponent from mating with the receiving system.
 20. The method of claim16, and further comprising admitting the component to the receivingsystem, and performing a diagnostic analysis of the component.