Sign In to Follow Application
View All Documents & Correspondence

Method And System For Providing Data Security For Micro Services Across Domains

Abstract: A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
31 October 2023
Publication Number
49/2023
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

BLACKBERRY LIMITED
2200 University Avenue East Waterloo, Ontario N2K 0A7

Inventors

1. MUKHERJEE, Biswaroop
c/o 2200 University Avenue East Waterloo, Ontario N2K 0A7
2. FERGUSON, Geordon Thomas
c/o 2200 University Avenue East Waterloo, Ontario N2K 0A7
3. BOWMAN, Roger Paul
c/o 2200 University Avenue East Waterloo, Ontario N2K 0A7

Specification

WE CLAIM
1. A method at a network element for securely sharing services across
domains, the method comprising:
receiving a request at the network element to add a first domain and an
edge domain to a system;
provisioning a public key of the network element to the first domain and
the edge domain;
receiving a public key of the first domain;
populating, in the network element, a table with services provided by the
first domain or the edge domain;
populating, in the network element, a second table with applications
installed at the first domain or edge domain and permissions for services for the
applications; and
controlling access to the services by the applications.
2. The method of claim 1, wherein the controlling access comprises:
receiving a request from an application on the first domain, the request
being signed by the first domain;
verifying the request;
based on the verifying and based on the permissions for services for the
application, providing at least one token for a service back to the first domain, the
at least one token including an identifier for the service and a signature of the
network element.
3. The method of claim 2, wherein the token further includes an expiration
time.
4. The method of claim 1, wherein the controlling access comprises:
receiving a request from a domain bridge on the first domain, the request
being signed by the first domain and including an application identifier;
verifying the request;
based on the verifying and based on the permissions for services for an application associated with the application identifier, providing at least one token for a service back to the domain bridge, the at least one token including an identifier for the service and a signature of the network element.
5. The method of claim 1, wherein the controlling access comprises: receiving a request from the first domain to synchronize the second table;
and
providing the second table to the first domain.
6. The method of claim 1, wherein the table with services further includes delegation of permissions for a subset of services.
7. The method of claim 1, wherein the provisioning occurs during manufacture of a computing device with the first domain and the edge domain.
8. The method of claim 1, wherein the provisioning occurs at a trusted service center for a computing device with the first domain and the edge domain.
9. The method of claim 1, wherein the first domain and the edge domain belong to a vehicle, and wherein the network element is a fleet manager.
10. A network element for securely sharing services across domains, the network element comprising:
a processor; and
a communications subsystem, wherein the network element is configured to:
receive a request at the network element to add a first domain and an edge domain to a system;
provision a public key of the network element to the first domain and the edge domain;
receive a public key of the first domain;
populate, in the network element, a table with services provided by the first domain or the edge domain;
populate, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and
control access to the services by the applications.

Documents

Application Documents

# Name Date
1 202347074248-STATEMENT OF UNDERTAKING (FORM 3) [31-10-2023(online)].pdf 2023-10-31
2 202347074248-PROOF OF RIGHT [31-10-2023(online)].pdf 2023-10-31
3 202347074248-PRIORITY DOCUMENTS [31-10-2023(online)].pdf 2023-10-31
4 202347074248-POWER OF AUTHORITY [31-10-2023(online)].pdf 2023-10-31
5 202347074248-NOTIFICATION OF INT. APPLN. NO. & FILING DATE (PCT-RO-105-PCT Pamphlet) [31-10-2023(online)].pdf 2023-10-31
6 202347074248-FORM 1 [31-10-2023(online)].pdf 2023-10-31
7 202347074248-DRAWINGS [31-10-2023(online)].pdf 2023-10-31
8 202347074248-DECLARATION OF INVENTORSHIP (FORM 5) [31-10-2023(online)].pdf 2023-10-31
9 202347074248-COMPLETE SPECIFICATION [31-10-2023(online)].pdf 2023-10-31
10 202347074248-FORM 18 [22-07-2025(online)].pdf 2025-07-22