| CPC G06F 1/12 (2013.01) | 20 Claims |

|
1. A method for securing edge devices, the method comprising:
sending, by an edge orchestrator and to a trusted time server, a request for a true time value;
receiving, by the edge orchestrator and from the trusted time server, a response that comprises the true time value;
performing, by the edge orchestrator, a security verification process on the response from the trusted time server to verify integrity of the response;
making, by the edge orchestrator, a determination whether the integrity of the response is verified;
in a first instance of the determination where the integrity of the response is verified:
updating, by the edge orchestrator, a clock of the edge orchestrator with the true time value to obtain an updated clock;
receiving, by the edge orchestrator and from an edge device of the edge devices, a synchronization request for a time value; and
sending, by the edge orchestrator and to the edge device of the edge devices, a synchronization response using the updated clock.
|