US 12,463,974 B2
Securing blueprints for implementation in edge devices
Igor Dubrovsky, Beer Sheva (IL); Maxim Balin, Gan-Yavne (IL); and Stav Sapir, Beer Sheva (IL)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 20, 2023, as Appl. No. 18/491,141.
Prior Publication US 2025/0133086 A1, Apr. 24, 2025
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/102 (2013.01) [H04L 63/0428 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for securing a blueprint, the method comprising:
obtaining, from a blueprint user, a request for an edge device of an edge deployment to use a blueprint to update operation of the edge device;
making a first determination regarding whether the blueprint user is privileged to make the request for the edge device to use the blueprint to update the operation of the edge device;
in a first instance of the first determination where the blueprint user is privileged to make the request:
making a second determination regarding whether a blueprint author of the blueprint is privileged to author the blueprint;
in a first instance of the second determination where the blueprint author of the blueprint privileged to author blueprint:
creating a signed work order to implement the blueprint by the edge device; and
providing the signed work order to the edge device to initiate use of the blueprint by the edge device.