US 12,292,759 B1
Secure time synchronization with an edge orchestrator
Maxim Balin, Gan-Yavne (IL); Nechami Maman, Jerusalem (IL); and Emmanuel Andre, Singapore (SG)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 26, 2023, as Appl. No. 18/495,150.
Int. Cl. G06F 1/12 (2006.01)
CPC G06F 1/12 (2013.01) 20 Claims
OG exemplary drawing
 
1. A method for securing edge devices, the method comprising:
sending, by an edge orchestrator and to a trusted time server, a request for a true time value;
receiving, by the edge orchestrator and from the trusted time server, a response that comprises the true time value;
performing, by the edge orchestrator, a security verification process on the response from the trusted time server to verify integrity of the response;
making, by the edge orchestrator, a determination whether the integrity of the response is verified;
in a first instance of the determination where the integrity of the response is verified:
updating, by the edge orchestrator, a clock of the edge orchestrator with the true time value to obtain an updated clock;
receiving, by the edge orchestrator and from an edge device of the edge devices, a synchronization request for a time value; and
sending, by the edge orchestrator and to the edge device of the edge devices, a synchronization response using the updated clock.