Avionics system for assisting implementation of security measures onboard an aircraft, aircraft comprising such a system, and associated method
20170313425 · 2017-11-02
Inventors
Cpc classification
B64D45/00
PERFORMING OPERATIONS; TRANSPORTING
B64D11/0015
PERFORMING OPERATIONS; TRANSPORTING
International classification
Abstract
Avionics system for assisting implementation of security measures onboard an aircraft, aircraft comprising such a system, and associated method are provided. The avionics system is intended to assist the occupants of an aircraft in implementing security measures onboard the aircraft. It includes a parameter collector for collecting at least one avionics parameter of the aircraft, a context finder to determine a context from the or each avionics parameter collected by the collector, an instruction identifier to identify at least one relevant security instruction based on the context determined by the context finder, and at least one instruction submitter to submit the or each relevant security instruction to a passenger of the aircraft.
Claims
1. An avionics system for assisting in implementing security measures onboard an aircraft, the avionics system comprising: a parameter collector configured for collecting at least one avionics parameter of the aircraft, a context finder configured to determine a context from the or each avionics parameter collected by the collector, an instruction identifier configured to identify at least one relevant security instruction based on the context determined by the context finder, and at least one instruction submitter configured to submit the or each relevant security instruction to a passenger of the aircraft.
2. The avionics system according to claim 1, further comprising a database storing a plurality of storage security instructions each associated with a predetermined applicability context, the instruction identifier being configured to identify the or each stored security instruction, whose applicability context consists of the context determined as making up a relevant security instruction.
3. The avionics system according to claim 2, wherein the stored security instructions are each associated with a respective instruction submitter, and each instruction submitter is configured to submit only relevant security instructions associated with the instruction submitter.
4. The avionics system according to claim 1, wherein each of the relevant security instructions is associated with a priority order, and the or each instruction submitter is configured to submit the relevant security instructions successively based on the priority order of the relevant security instructions.
5. The avionics system according to claim 4, comprising an instruction sequencer to determine the priority order of each relevant security instruction based on the context.
6. The avionics system according to claim 1, further comprising at least one acceptance member configured for actuation by a passenger of the aircraft, the or each acceptance member being associated with a respective instruction submitter.
7. The avionics system according to claim 6, further comprising a system for verifying the acceptance of the or each relevant security instruction by the passenger of the aircraft, the verification system comprising a member for identifying an acceptance state of each relevant security instruction, configured to impart an accepted value to the acceptance state of a relevant security instruction when an acceptance member is actuated while the relevant instruction is submitted by the instruction submitter with which the acceptance member is associated.
8. The avionics system according to claim 7, wherein the verification system comprises a verification viewer to display the acceptance state of the or each relevant security instruction.
9. The avionics system according to claim 1, comprising a sensor system associated with at least one piece of cabin equipment of the aircraft to detect a configuration of the piece(s) of cabin equipment, and a monitoring system to monitor, for the or each relevant security instruction, the application of the relevant security instruction, the monitoring system comprising a member for deducing an application state of the or each relevant security instruction based on the configuration detected by the sensor system.
10. The avionics system according to claim 9, wherein the monitoring system comprises a monitoring viewer to display the application state of the or each relevant security instruction.
11. The avionics system according to claim 1, wherein a viewable instruction is associated with the or each relevant security instruction, and the or each instruction submitter comprises a submission display in order to show the associated viewable instruction for the or each relevant security instruction submitted by the instruction submitter.
12. An aircraft comprising an avionics system according to claim 1.
13. A method for assisting the implementation of security measures onboard an aircraft, comprising the following steps: collecting at least one avionics parameter of the aircraft, determining a context from the or each collected avionics parameter, identifying at least one relevant security instruction based on the determined context, and submitting the or each relevant security instruction to a passenger of the aircraft.
14. The assistance method according to claim 13, wherein submitting of the or each relevant security instruction comprises temporarily showing a viewable instruction associated with the relevant security instruction.
15. The assistance method according to claim 13, wherein security instructions are stored in a database, each being associated with a predetermined context, and the or each relevant instruction is made up of a stored security instruction associated with the determined context.
16. The assistance method according to claim 13, further comprising receiving a signal acceptance of a displayed security instruction from the passenger.
17. The assistance method according to claim 16, wherein the receiving a signal acceptance includes receiving the passenger's actuation of an acceptance member associated with a respective instruction submitter while the instruction submitter is submitting the displayed security instruction.
18. The assistance method according to claim 13, wherein displaying relevant security instructions comprises displaying a first relevant security instruction, followed by displaying a second relevant security instruction, the displaying of the second relevant security instruction following a signaling of acceptance of the first relevant security instruction or occurring upon expiration of a predetermined length of time after beginning the displaying of the first relevant security instruction.
19. The assistance method according to claim 13 further comprising verifying acceptance of the or each relevant security instruction by the passenger of the aircraft, the verifying comprising the display of an acceptance state of the relevant security instruction on a verification viewer, for the or each relevant security instruction.
20. The assistance method according to claim 13 further comprising detecting a configuration of the aircraft cabin and monitoring the application of the or each relevant security instruction, the monitoring comprising deducing an application state of the or each relevant security instruction based on the configuration of the aircraft cabin.
Description
BRIEF SUMMARY OF THE DRAWINGS
[0042] Other features and advantages of the invention will appear upon reading the following description, provided solely as an example and done in reference to the appended drawings, in which:
[0043]
[0044]
[0045]
[0046]
[0047]
DETAILED DESCRIPTION
[0048] The aircraft 10 shown in
[0049] The cabin 18 contains cabin equipment 20, 22, 24. This cabin equipment 20, 22, 24 in particular comprises configurable equipment 20, 22, including reclining chairs 20 and a tray table 22, and cabinets 24. As indicated in the preamble of the present application, for security reasons, during certain critical flight phases of the aircraft 10, each piece of configurable equipment 20, 22 must be returned to a so-called “secure” configuration, and each cabinet 24 must be closed. It is thus necessary, during these critical flight phases of the aircraft 10, to perform certain actions, in particular on the configurable pieces of equipment 20, 22 and the cabinets 24, to place the cabin 18 in a so-called “secure” configuration. Here and below, we will describe these actions as “security measures”.
[0050] In order to facilitate the implementation of these security measures, the aircraft 10 comprises an avionics assistance system 30.
[0051] In reference to
[0052] The avionics parameters P.sub.i are made up of the information produced by the avionics systems of the aircraft 10 and in particular relative to: [0053] the configuration of the aircraft 10, i.e., the deployed or retracted state of a plurality of members of the aircraft 10 such as the leading-edge slats, the landing gear and/or the flaps, [0054] the state of the aircraft 10, i.e., the operating or failure state of flight equipment of the aircraft 10, [0055] the mission context, i.e., in particular the flight plan programmed into the flight management system of the aircraft 10, [0056] environmental data, i.e., the weather conditions encountered by the aircraft 10, as well as the instructions sent to the aircraft 10 by the air control systems, [0057] the current altitude of the aircraft 10, and [0058] the flight phase of the aircraft 10.
[0059] In order to be able to collect these avionics parameters P.sub.i, the collector 32 is in communication with the other avionics systems of the aircraft 10, and is suitable for receiving the avionics parameters P.sub.i from these avionics systems. The collector 32 is also configured to send these avionics parameters P.sub.i to the context finder 36.
[0060] The measured configuration CE.sub.i of each piece of cabin equipment 20, 22, 24 depends on the piece of cabin equipment 20, 22, 24 in question. For example, for each reclining chair 20, two configurations CE.sub.i are detected: a first measured configuration CE.sub.i relates to the inclined or upright position of the back of the reclining chair 20, and is typically detected by an end-of-travel sensor, and a second measured configuration CE.sub.i relates to the presence or absence of a load on the seat bottom of the reclining chair 20, and is for example detected by a piezoelectric sensor housed in the seat bottom of the reclining chair 20. The measured configuration CE.sub.i of the tray table 22 typically pertains to the retracted or deployed state of the tray table 22, detected for example using an end-of-travel sensor, and the measured configuration CE.sub.i of each cabinet 24 typically pertains to the open or closed state of the cabinet 24, also detected with an end-of-travel sensor.
[0061] The set of measured configurations CE.sub.i of the various pieces of cabin equipment 20, 22, 24 forms what will subsequently be referred to as a configuration of the cabin 18.
[0062] The system of sensors 34 is configured to send the measured configuration CE.sub.i of each piece of cabin equipment 20, 22, 24 to the context finder 36.
[0063] The context finder 36 is configured to receive the avionics parameters P.sub.i and the measured configurations CE.sub.i of the different pieces of cabin equipment 20, 22, 24, and to analyze these parameters P.sub.i and configurations CE.sub.i so as to determine the context C.
[0064] The avionics system 30 also comprises a database 38 storing a plurality of storage security instructions CS.sub.k, and an instruction identifier 40 to identify relevant security instructions CSP.sub.j from among the storage security instructions CS.sub.k, based on the context C determined by the context finder 36. The avionics system 30 further comprises a submission system 42 with a plurality of instruction submitters 44, 46, 48 to submit the relevant security instructions CSP.sub.j to the passengers of the aircraft 10.
[0065] Each stored security instruction CS.sub.k is associated in the database 38 with an applicability context CA.sub.k of the security instruction CS.sub.k, an instruction submitter identifier PC.sub.k designating one of the instruction submitters 44, 46, 48, and a post-application configuration CAA.sub.k representative of the configuration that one of the pieces of cabin equipment 20, 22, 24 must occupy after the storage security instruction CS.sub.k has been applied.
[0066] Each stored security instruction CS.sub.k is also associated with a specific priority order O.sub.k in the database 38. This priority order O.sub.k is determined based on the criticality (minor, major, dangerous or catastrophic) of events that may be caused by the failure to send said security instruction CS.sub.k when this security instruction CS.sub.k is a relevant security instruction CSP.sub.j, and the likelihood of occurrence (extremely unlikely, extremely rare, rare or likely) of these events, such that the security instructions CS.sub.k which, if not sent, may cause the most critical events with the highest likelihoods are associated with the highest priority orders O.sub.k. Thus, each stored security instruction CS.sub.k which, if not sent, may cause an event with a given criticality and a given likelihood is associated with a priority order O.sub.k higher than the priority order O.sub.k associated with each other stored security instruction CS.sub.k which, if not sent, may only cause events with a criticality lower than the given criticality, with an occurrence likelihood lower than or equal to the given occurrence likelihood, and events with a criticality lower than or equal to the given criticality with an occurrence likelihood lower than the given occurrence likelihood.
[0067] The instruction identifier 40 is in communication with the database 38 and is configured to receive the determined context C from the context finder 36. The instruction identifier 40 is also configured to identify each stored security instruction CS.sub.k whose applicability context CA.sub.k is the context C determined as making up one of the relevant security instructions CSP.sub.j.
[0068] The instruction identifier 40 is lastly configured to send the submission system 42 each of the identified relevant security instructions CSP.sub.j with, for each instruction CSP.sub.j, the instruction submitter identifier PC.sub.j and the priority order O.sub.j with which it is associated.
[0069] The submission system 42 is configured so that each instruction submitter 44, 46, 48 only submits the relevant instructions CSP.sub.j associated with an instruction submitter identifier PC.sub.j identifying it. To that end, the submission system 42 comprises a sorting member 50 suitable for sorting the relevant security instructions CSP.sub.j based on instruction submitter identifiers PC.sub.j with which they are associated and sending each instruction submitter 44, 46, 48, respectively, only the relevant security instructions CSP.sub.m, CSP.sub.p, CSP.sub.q, associated with an instruction submitter identifier PC.sub.j identifying it.
[0070] It will be noted that in the example shown in
[0071] Each stored security instruction CS.sub.k, and therefore each relevant security instruction CSP.sub.j, preferably comprises a viewable instruction. In order to allow this instruction to be submitted, each instruction submitter 44, 46, 48 comprises, as shown in
[0072] Advantageously, each instruction submitter 44, 46, 48 also comprises, as shown, an audio device 54 configured to emit a sound upon each new submission of a relevant security instruction CSP.sub.j by said instruction submitter 44, 46, 48, this sound preferably being formed by a beep and/or by the reading, by a recorded voice or a synthetic voice, of the viewable instruction.
[0073] The avionics system 30 further comprises acceptance members 64, 66, 68, respectively, each associated with a respective instruction submitter 44, 46, 48, respectively.
[0074] Each acceptance member 64, 66, 68 can be actuated by the passengers. Each acceptance member 64, 66, 68 is in particular intended to be actuated by a passenger when this passenger has seen the relevant security instructions CSP.sub.j submitted by the instruction submitter 44, 46, 48 with which the acceptance member 64, 66, 68 is associated; to that end, the acceptance member 64, 66, 68 is for example positioned near the viewer 52 of the instruction submitter 44, 46, 48 with which it is associated.
[0075] Each instruction submitter 44, 46, 48, respectively, is configured to submit the relevant security instructions that are assigned to it, CSPm, CSP.sub.p, CSP.sub.q, successively based on their respective priority orders, O.sub.m, O.sub.p, O.sub.q, respectively. In particular, each instruction submitter 44, 46, 48 is configured to first submit the relevant security instruction CSP.sub.j that, among that the relevant security instructions CSP.sub.m, CSP.sub.p, CSP.sub.q that are assigned to it, has the highest priority order O.sub.j, then the relevant security instruction CSP.sub.m, CSP.sub.p, CSP.sub.q that is assigned to it whose priority order O.sub.m, O.sub.p, O.sub.q comes immediately afterwards, and so forth.
[0076] Preferably, each instruction submitter 44, 46, 48, respectively, is configured to submit the relevant security instructions CSP.sub.m, CSP.sub.p, CSP.sub.q that are assigned to it according to one of the submission alternatives described below.
[0077] According to a first submission alternative, the instruction submitter 44, 46, 48 is configured to submit all of the relevant security instructions CSP.sub.m, CSP.sub.p, CSP.sub.q that are assigned to it at the same time, during the entire duration during which said instructions CSP.sub.m, CSP.sub.p, CSP.sub.q remain relevant.
[0078] According to a second submission alternative, the instruction submitter 44, 46, 48 is configured to wait for the expiration of a predetermined duration after the beginning of the submission of a first relevant security instruction CSP.sub.j before submitting, as a replacement for said first relevant security instruction CSP.sub.j, a second relevant security instruction CSP.sub.j having a priority order O.sub.j lower than the priority order O.sub.j of the first relevant security instruction CSP.sub.j.
[0079] According to a third submission alternative, the instruction submitter 44, 46, 48 is configured to wait for the expiration of a predetermined duration after the beginning of the submission of a first relevant security instruction CSP.sub.j before submitting, as a replacement for said first relevant security instruction CSP.sub.j, a second relevant security instruction CSP.sub.j having a priority order O.sub.j lower than the priority order O.sub.j of the first relevant security instruction CSP.sub.j, while being configured to submit the second relevant security instructions CSP.sub.j as a replacement for the first relevant security instruction CSP.sub.j before the expiration of said predetermined duration when the acceptance member 64, 66, 68 associated with said instruction submitter 44, 46, 48 is actuated.
[0080] Lastly, according to a fourth submission alternative, the instruction submitter 44, 46, 48 is configured to wait, without time limit, for the actuation of the acceptance member 64, 66, 68 associated with said instruction submitter 44, 46, 48 before submitting, as a replacement for the first relevant security instruction CSP.sub.j, the second relevant security instruction CSP.sub.j.
[0081] Advantageously, all of the instruction submitters 44, 46, 48 are not configured to submit the relevant security instructions CSP.sub.m, CSP.sub.p, CSP.sub.q that are assigned to them according to a same submission alternative. In other words, at least one instruction submitter 44, 46, 48 configured to submit the relevant security instructions CSP.sub.m, CSP.sub.p, CSP.sub.q that are assigned to it according to a submission alternative different from that according to which at least one other instruction submitter 44, 46, 48 is configured to submit the relevant security instructions CSP.sub.m, CSP.sub.p, CSP.sub.q that are assigned to it.
[0082] The avionics system 30 further comprises a verification system 70 verifying the acceptance of each relevant security instruction CSP.sub.j by the passengers of the aircraft 10. This verification system 70 comprises a member 72 for identifying an acceptance state E1.sub.j of each relevant instruction CSP.sub.j, and a verification viewer 74 to display the acceptance state E1.sub.j of each relevant instruction CSP.sub.j.
[0083] The identification member 72 is configured to receive, for each acceptance member 64, 66, 68, an actuating signal SA of the acceptance member 64, 66, 68 by a passenger of the aircraft 10. The identification member 72 is also configured to receive, for each instruction submitter 44, 46, 48, a piece of information IR.sub.j representative of the relevant instruction CSP.sub.j shown by said instruction submitter 44, 46, 48 at the moment at which the acceptance member 64, 66, 68 associated with said instruction submitter 44, 46, 48 has been actuated.
[0084] The identification member 72 is further configured to assign the acceptance state E1.sub.j of each relevant instruction CSP.sub.j an initial non-accepted value, and to convert this initial value into a subsequent accepted value when the relevant instruction CSP.sub.j is shown by an instruction submitter 44, 46, 48 at the moment when the acceptance member 64, 66, 68 associated with said instruction submitter 44, 46, 48 is actuated.
[0085] The verification viewer 74 is advantageously intended to be viewed by the onboard personnel, in particular by the pilots. To that end, the verification viewer 74 is preferably positioned in the cockpit 16.
[0086] The avionics system 30 further comprises a monitoring system 80 to monitor, for each relevant security instruction CSP.sub.j, the application of said relevant security instruction CSP.sub.j. To that end, the monitoring system 80 comprises a member 82 for deducing an application state E2.sub.j of each relevant security instruction CSP.sub.j, and a monitoring viewer 84 to display the application state E2.sub.j of each relevant instruction CSP.sub.j.
[0087] The deducing member 82 is configured to receive the measured configuration CE.sub.j of each piece of cabin equipment 20, 22, 24 from the system of sensors 34, and to receive each relevant security instruction CSP.sub.j and the post-application configuration CAA.sub.j with which it is associated from the instruction identifier 40. The deducing member 82 is also configured to deduce the application state E2.sub.j of each relevant security instruction CSP.sub.j from these data. In particular, the deducing member 82 is configured to compare, for each relevant security instruction CSP.sub.j, the post-application configuration CAA.sub.j with which said relevant security instruction CSP.sub.j is associated with the measured configuration CE.sub.1 of each piece of cabin equipment 20, 22, 24, and to deduce therefrom that the application state E2.sub.j of said relevant security instruction CSP.sub.j has the value: [0088] applied, when the post-application configuration CAA.sub.j with which the relevant security instruction CSP.sub.j is associated corresponds to one of the measured configurations CE.sub.1, or [0089] not applied when the post-application configuration CAA.sub.j with which the relevant security instruction CSP.sub.j is associated does not correspond to any of the measured configurations CE.sub.1.
[0090] The monitoring viewer 84 is advantageously intended to be viewed by the onboard personnel, in particular by the pilots. To that end, the monitoring viewer 84 is preferably positioned in the cockpit 16.
[0091] Advantageously, the verification 74 and monitoring 84 viewers are merged into a single viewer for example belonging to the electronic flight bag of the aircraft 10.
[0092] The second alternative of the assistance system 30, shown in
[0093] Unlike the first alternative, the assistance system 30 in the second alternative does not comprise a sorting member 50, and no instruction submitter identifier PC.sub.k, PC.sub.j is associated with the security instructions CS.sub.k, CSP.sub.j. In this alternative, the instruction identifier 40 is configured to send each relevant security instruction CSP.sub.j, with its associated priority order O.sub.j, to each instruction submitter 44, 46, 48.
[0094] Each instruction submitter 44, 46, 48 then comprises a filter 90 for filtering the received relevant security instructions CSP.sub.j, and is configured to submit only the relevant instructions CSP.sub.j whose transmission is not blocked by the filter 90.
[0095] The filter 90 comprises a database 92 containing a list of authorized instructions for the instruction submitter 44, 46, 48, and an instruction comparator 94 configured to compare each received relevant security instruction CSP.sub.j to the authorized instructions contained in the list and to determine, based on this comparison, whether the relevant instruction CSP.sub.j can be sent for submission or must be blocked. The instruction comparator 94 is in particular configured to authorize the transmission of a received relevant security instruction CSP.sub.j when this instruction CSP.sub.j corresponds to one of the authorized security instructions, and to block said transmission when the relevant security instruction CSP.sub.j does not correspond to any of the authorized security instructions.
[0096] This second alternative makes it possible to facilitate the management of the submission of relevant security instructions CSP.sub.j by the instruction submitters 44, 46, 48, in particular by making the assistance system 30 more configurable, and improves the overall reliability of the system 30.
[0097] The third alternative of the assistance system 30, shown in
[0098] Unlike the first alternative, each stored security instruction CS.sub.k is not, in this third alternative, associated with a priority order O.sub.k in the database 38. As a replacement, the assistance system 30 in this third alternative comprises an instruction sequencer 60 configured to determine the priority order O.sub.j of each relevant security instruction CSP.sub.j.
[0099] The instruction sequencer 60 is in particular configured to receive the relevant security instructions CSP.sub.j and the instruction submitter identifiers PC.sub.j from the instruction identifier 40, to receive the determined context C from the context finder 36, and to determine the priority order O.sub.j of each relevant security instruction CSP.sub.j based on the determined context C. To that end, the instruction sequencer 60 is configured to identify events that may be caused by the non-transmission of said relevant security instruction CSP.sub.j, assess the contextual criticality (minor, major, dangerous or catastrophic), depending on the context C, and the contextual likelihood of occurrence (extremely unlikely, extremely rare, rare or likely), also depending on the context C, of these events, and associate the highest priority orders O.sub.j with the relevant security instructions CS.sub.j whereof non-transmission is likely to cause events having the highest contextual criticalities with the highest contextual likelihoods of occurrence.
[0100] The instruction sequencer 60 is also configured to send the submission system 42 the priority order O.sub.j of each relevant security instruction CSP.sub.j.
[0101] A method 100 for assisting with the implementation of security measures onboard the aircraft 10, implemented using the assistance system 30, will now be described in reference to
[0102] This method 100 begins with a first step 110 for collecting avionics parameters, during which the collector 32 collects the avionics parameters P.sub.i from the other avionics systems.
[0103] This step 110 is accompanied by a step 120 for a first detection of the configuration of the cabin 18 of the aircraft 10, during which the system of sensors 34 detects the measured configurations CE.sub.i of the various pieces of cabin equipment 20, 22, 24.
[0104] These steps 110, 120 are followed by a step 130 for determining a context, during which the context determiner 36 determines the context C using avionics parameters P.sub.i and measured configurations CE.sub.i.
[0105] Steps 110, 120 and 130 are repeated all throughout the implementation of the method 100, so as to update the context C based on the evolution of the avionics parameters P.sub.i and measured configurations CE.sub.i.
[0106] Step 130 is followed by a step 140 for identifying relevant security instructions, during which the instruction identifier 40 identifies the relevant security instructions CSP.sub.j. This step 140 comprises a sub-step 142 for selecting stored security instructions CS.sub.k associated with the context C, during which the context identifier 40 selects the stored security instructions CS.sub.k associated with the context C from the database 38 and identifies them as constituting the relevant security instructions CSP.sub.j.
[0107] Step 140 is followed by a step 150 for displaying relevant security instructions CSP.sub.j, during which the relevant security instructions CSP.sub.j are displayed by the instruction submitters 44, 46, 48. This display step 150 comprises a first sub-step 152 for displaying a first relevant security instruction, during which a first relevant security instruction CSP.sub.j, associated with a first priority order O.sub.i, is displayed by a viewer 44, 46, 48, followed by a second sub-step 154 for submitting a second relevant security instruction, during which a second relevant security instructions CSP.sub.j, associated with a second priority order O.sub.j lower than the first priority order, is displayed by the same viewer 44, 46, 48. Each of these sub-steps 152, 154, respectively, comprises a sub-step 156 for displaying an associated viewable instruction, during which the viewable instruction associated with the first, second, respectively, relevant security instruction CSP.sub.j is temporarily displayed by the viewer 52 of the instruction submitter 44, 46, 48, and a simultaneous audio emission sub-step 158, during which a beep is emitted by the audio emitting device 54 of the instruction submitter 44, 46, 48.
[0108] In the case where, due to the evolution of the context C, a relevant security instruction CSP.sub.j ceases to be relevant, the display of the latter is interrupted.
[0109] The method 100 also comprises a step 162 for signaling the acceptance of the first relevant security instruction, during which a passenger actuates the acceptance member 64, 66, 68 associated with the instruction submitter 44, 46, 48 submitting the first relevant security instruction CSP.sub.j. This step 162 is concomitant with the step for submitting the first relevant security instruction 152 and precedes the step for submitting the second relevant security instruction 154.
[0110] The method 100 further comprises a step 164 for signaling the acceptance of the second relevant security instruction, during which a passenger actuates the acceptance member 64, 66, 68 associated with the instruction submitter 44, 46, 48 submitting the second relevant security instruction CSP.sub.j. This step 164 is concomitant with the step for submitting the second relevant security instruction 154.
[0111] The method 100 also comprises a step 170 for verifying acceptance of the relevant security instructions CSP.sub.j. This step 170 comprises a first sub-step 172 for updating the acceptance state E1.sub.j of each relevant security instruction CSP.sub.j, during which the identification member 72 updates the acceptance states E1.sub.j of the relevant security instructions CSP.sub.j based on the actuating signals SA of the acceptance members 64, 66, 68 that it receives. This first sub-step 172 is accompanied by a second sub-step for displaying the acceptance state E1.sub.j of each relevant security instruction CSP.sub.j, during which the acceptance state E1.sub.j of each relevant security instruction CSP.sub.j is displayed by the verification viewer 74, so as to inform the onboard personnel, in particular the pilots, of this acceptance state E1.sub.j,
[0112] Step 170 is repeated all throughout the implementation of the method 100.
[0113] The method 100 lastly comprises a step 180 for monitoring the application of the relevant security instructions CSP.sub.j. This step 180 comprises a first sub-step 181 for a second detection of the configuration of the cabin 18 of the aircraft 10, during which the system of sensors 34 updates the measured configurations CE.sub.i of the various pieces of cabin equipment 20, 22, 24. This first sub-step 181 is followed by a second sub-step 182 for producing the application state E2.sub.j of each relevant security instruction CSP.sub.j, during which the deduction member 82 deduces the application state E2.sub.j of each relevant security instruction CSP.sub.j based on the updated measured configurations CE.sub.i. A third sub-step 184 for displaying the application state E2.sub.j of each relevant security instruction CSP.sub.j follows the second step 182; during this third sub-step 184, the application state E2.sub.j of each relevant security instruction CSP.sub.j is displayed by the monitoring viewer 84, so as to inform the onboard personnel, in particular the pilots, of this application E2.sub.j.
[0114] Step 180 is repeated all throughout the implementation of the method 100.
[0115] Owing to the method and system described above, it is thus possible to significantly reduce the space occupied by the display of security instructions, since only the security instructions relevant at a given moment will be displayed at that moment.
[0116] The method and system further allow better taking into account of security instructions by the passengers, since these instructions are only displayed when they must be taken into account. The temporary nature of this display then forces passengers to pay attention to the display.
[0117] Lastly, the method and system allow better monitoring of the taking account of security instructions and the application of these security instructions by the passengers, owing to the display of the acceptance E1.sub.j and application E2.sub.j states of the relevant security instructions CSP.sub.j by the viewers 74, 84.