Mobile itinerant software agent carrying itinerary and data within
First Claim
1. A method, said method comprising:
- acquiring, by a computer processor of an agent computer system from a user computer system S0 via interaction with a human user at the user computer system S0, an identification of agent software and a request for the agent software and in response, said agent computer system retrieving the agent software from a repository of agents comprising the agent software and migrating the retrieved agent software to the user computer system S0, said request for the agent software being in response to a determination that use of the agent software, instead of performing the data processing without use of the agent software, avoids compromise of data integrity of sensitive data and further avoids transfer across a network of personal information, confidential information, and a volume of data that is large enough to cause unacceptable network latency and data propagation delay across the network;
acquiring by the computer processor of the agent computer system from the user computer system S0 via interaction with the human user at the user computer system S0, an itinerary, security credentials C1, C2, . . . , CN, and N sets of run time instructions I1, I2, . . . , IN, said N being at least 2, said itinerary specifying a path along which the agent software is to migrate to perform a portion of the data processing, using one or more processors P1, P2, . . . , PN and run time instructions I1, I2, . . . , IN, on computer system S1, S2, . . . , SN, respectively, which appear in a sequential order of S1, S2, . . . , SN on the path, said security credentials C1, C2, . . . , CN being specific to computer system S1, S2, . . . , SN for the agent software to gain access to resources and data comprised by computer system S1, S2, . . . , SN, said security credentials C1, C2, . . . , CN differing from each other if N=2 or differing from one another if N>
2; and
providing, by the computer processor of the agent computer system to the agent software at the user computer system S0, the received itinerary, security credentials, and the N sets of run time instructions I1, I2, . . . , IN, which configures the agent software to perform data processing on the computer system S1, S2, . . . , SN.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for performing data processing. A request for agent software is acquired by an agent computer system from a user computer system and in response, the agent computer system retrieves the agent software from a repository of agents and migrates the retrieved agent software to the user computer system. The agent computer system acquires an itinerary and N sets of run time instructions from the user computer system. N is at least 2. The itinerary specifies a path along which the agent software is to migrate to perform a portion of the data processing on N computer systems using the N sets of run time instructions. The agent computer system provides the received itinerary and the N sets of run time instructions to the agent software at the user computer system.
-
Citations
18 Claims
-
1. A method, said method comprising:
-
acquiring, by a computer processor of an agent computer system from a user computer system S0 via interaction with a human user at the user computer system S0, an identification of agent software and a request for the agent software and in response, said agent computer system retrieving the agent software from a repository of agents comprising the agent software and migrating the retrieved agent software to the user computer system S0, said request for the agent software being in response to a determination that use of the agent software, instead of performing the data processing without use of the agent software, avoids compromise of data integrity of sensitive data and further avoids transfer across a network of personal information, confidential information, and a volume of data that is large enough to cause unacceptable network latency and data propagation delay across the network; acquiring by the computer processor of the agent computer system from the user computer system S0 via interaction with the human user at the user computer system S0, an itinerary, security credentials C1, C2, . . . , CN, and N sets of run time instructions I1, I2, . . . , IN, said N being at least 2, said itinerary specifying a path along which the agent software is to migrate to perform a portion of the data processing, using one or more processors P1, P2, . . . , PN and run time instructions I1, I2, . . . , IN, on computer system S1, S2, . . . , SN, respectively, which appear in a sequential order of S1, S2, . . . , SN on the path, said security credentials C1, C2, . . . , CN being specific to computer system S1, S2, . . . , SN for the agent software to gain access to resources and data comprised by computer system S1, S2, . . . , SN, said security credentials C1, C2, . . . , CN differing from each other if N=2 or differing from one another if N>
2; andproviding, by the computer processor of the agent computer system to the agent software at the user computer system S0, the received itinerary, security credentials, and the N sets of run time instructions I1, I2, . . . , IN, which configures the agent software to perform data processing on the computer system S1, S2, . . . , SN. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product, comprising one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, said program instructions being executable by one or more processing units to implement a method, said one or more processing units including a computer processor of an agent computer system, said method comprising:
-
acquiring, by the computer processor of the agent computer system from a user computer system S0 via interaction with a human user at the user computer system S0, an identification of agent software and a request for the agent software and in response, said agent computer system retrieving the agent software from a repository of agents comprising the agent software and migrating the retrieved agent software to the user computer system S0, said request for the agent software being in response to a determination that use of the agent software, instead of performing the data processing without use of the agent software, avoids compromise of data integrity of sensitive data and further avoids transfer across a network of personal information, confidential information, and a volume of data that is large enough to cause unacceptable network latency and data propagation delay across the network; acquiring by the computer processor of the agent computer system from the user computer system S0 via interaction with the human user at the user computer system S0, an itinerary, security credentials C1, C2, . . . , CN, and N sets of run time instructions I1, I2, . . . , IN, said N being at least 2, said itinerary specifying a path along which the agent software is to migrate to perform a portion of the data processing, using one or more processors P1, P2, . . . , PN and run time instructions I1, I2, . . . , IN, on computer system S1, S2, . . . , SN, respectively, which appear in a sequential order of S1, S2, . . . , SN on the path, said security credentials C1, C2, . . . , CN being specific to computer system S1, S2, . . . , SN for the agent software to gain access to resources and data comprised by computer system S1, S2, . . . , SN, said security credentials C1, C2, . . . , CN differing from each other if N=2 or differing from one another if N>
2, said one or more processing units including the one or more processors P1, P2, . . . , PN, said program instructions comprising the N sets of run time instructions I1, I2, . . . , IN; andproviding, by the computer processor of the agent computer system to the agent software at the user computer system Sn, the received itinerary, security credentials, and the N sets of run time instructions I1, I2, . . . , IN, which configures the agent software to perform data processing on the computer system S1, S2, . . . , SN. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A data processing system comprising an agent computer system, one or more processing units including a computer processor of the agent computer system, one or more memories including a memory of the agent computer system, one or more computer-readable storage devices including a computer-readable storage device of the agent computer system, and program instructions stored on the one or more computer-readable storage devices, said program instructions being executable by the one or more processing units via the one or more memories to implement a method, said method comprising:
-
acquiring, by the computer processor of the agent computer system from a user computer system S0 via interaction with a human user at the user computer system S0, an identification of agent software and a request for the agent software and in response, said agent computer system retrieving the agent software from a repository of agents comprising the agent software and migrating the retrieved agent software to the user computer system S0, said request for the agent software being in response to a determination that use of the agent software, instead of performing the data processing without use of the agent software, avoids compromise of data integrity of sensitive data and further avoids transfer across a network of personal information, confidential information, and a volume of data that is large enough to cause unacceptable network latency and data propagation delay across the network; acquiring by the computer processor of the agent computer system from the user computer system S0 via interaction with the human user at the user computer system S0, an itinerary, security credentials C0, C2, . . . , CN, and N sets of run time instructions I1, I2, . . . , IN, said N being at least 2, said itinerary specifying a path along which the agent software is to migrate to perform a portion of the data processing, using one or more processors P1, P2, . . . , PN and run time instructions I1, I2, . . . , IN, on computer system S1, S2, . . . , SN, respectively, which appear in a sequential order of S1, S2, . . . , SN on the path, said security credentials C1, C2, . . . , CN being specific to computer system S1, S2, . . . , SN for the agent software to gain access to resources and data comprised by computer system S1, S2, . . . , SN, said security credentials C1, C2, . . . , CN differing from each other if N=2 or differing from one another if N>
2, said data processing system including the computer systems S1, S2, . . . , SN, said one or more processing units including the one or more processors P1, P2, . . . , PN, said program instructions comprising the N sets of run time instructions I1, I2, . . . , IN; andproviding, by the computer processor of the agent computer system to the agent software at the user computer system Sn, the received itinerary, security credentials, and the N sets of run time instructions I1, I2, . . . , IN, which configures the agent software to perform data processing on the computer system S1, S2, . . . , SN. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification