A technique for self-isolation of a network device that has been identified as potentially harmful. The network device may be isolated from the network except for an out-of-band communication channel that can be used for management purposes to restore or repair the device prior to the network connection being re-established.

 
Web www.patentalert.com

< Method and apparatus for intercepting events in a communication system

> Real-time recovery of compromised information

~ 00469