3.3.5.4 Challenge and Petition Flow

The general process of setting a secure clock is summarized in the following diagram.

Setting a secure clock

Figure 5: Setting a secure clock