Techniques for self-isolation of networked devices
First Claim
Patent Images
1. A method comprising:
- performing a security analysis of a host electronic system coupled with a network;
selectively disabling one or more devices coupled with a host bus in response to results of the security analysis; and
maintaining an out-of-band network connection that is not accessible by a host operating system during the self-isolation to support remedial actions in response to the results of the security analysis.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique for self-isolation of a network device that has been identified as potentially harmful. The network device may be isolated from the network except for an out-of-band communication channel that can be used for management purposes to restore or repair the device prior to the network connection being re-established.
311 Citations
27 Claims
-
1. A method comprising:
-
performing a security analysis of a host electronic system coupled with a network; selectively disabling one or more devices coupled with a host bus in response to results of the security analysis; and maintaining an out-of-band network connection that is not accessible by a host operating system during the self-isolation to support remedial actions in response to the results of the security analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An article comprising a machine-readable medium having stored thereon instructions that, when executed, cause one or more processors to:
-
perform a risk assessment self-analysis of a host electronic system coupled with a network; selectively self-isolate the host electronic system by disabling one or more network communications channels for the host electronic system in response to results of the risk assessment analysis; and maintain an out-of-band network connection that is not accessible by a host operating system during the self-isolation to support remedial actions in response to the results of the security analysis. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
one or more network interfaces; a machine-readable medium having stored thereon instructions that, when executed, cause one or more processors to perform a security analysis of the system, selectively logically disable one or more of the network interfaces in response to results of the risk assessment analysis, and maintain an out-of-band network connection that is not accessible by a host operating system during the self-isolation to support remedial actions in response to the results of the security analysis. - View Dependent Claims (24, 25, 26, 27)
-
Specification