×

Self-isolating and self-healing networked devices

  • US 8,154,987 B2
  • Filed: 06/09/2004
  • Issued: 04/10/2012
  • Est. Priority Date: 06/09/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • monitoring a host electronic system with a monitoring component of the host electronic system to determine whether a network connection for the host electronic system is operating within a predefined operating profile that includes at least network packet transmission parameters, wherein the monitoring component comprises an embedded agent;

    generating an indication of out-of-profile operation when the network connection for the host electronic system is not operating within the predefined operating profile;

    taking action on one or more components within the host electronic system in response to the indication of out-of-profile operation by isolating the one or more components from a network to which the host electronic system is coupled while maintaining an out-of-band communication channel for the host electronic system, wherein the out-of-band communication channel is maintained by the embedded agent that operates independently of a host operating system executing on the host electronic system and is used for management purposes to allow one or more components not isolated from the network to restore or repair a condition causing the out-of-profile operation, wherein the embedded agent is coupled to an embedded firmware agent via a bi-directional agent bus, and the embedded agent and embedded firmware agent operate together to provide manageability and/or security functionality;

    examining, as part of a network authentication process when the host system is first authenticated to the network, a connection history of the host electronic system to determine a boot history and network connection history of the host system since a previous secure connection, wherein the connection history comprises at least an amount of traffic, a kind of traffic by category and a destination network; and

    isolating the host electronic system if untrusted networks were contacted or untrusted peripherals were installed until an approved configuration can be validated or restored via the out-of-band network connection.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×