Please download the dossier by clicking on the dossier button x
×

Mobile itinerant software agent carrying itinerary and data within

  • US 10,257,262 B2
  • Filed: 01/03/2017
  • Issued: 04/09/2019
  • Est. Priority Date: 01/11/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method, said method comprising:

  • acquiring, by a computer processor of an agent computer system from a user computer system S0 via interaction with a human user at the user computer system S0, an identification of agent software and a request for the agent software and in response, said agent computer system retrieving the agent software from a repository of agents comprising the agent software and migrating the retrieved agent software to the user computer system S0, said request for the agent software being in response to a determination that use of the agent software, instead of performing the data processing without use of the agent software, avoids compromise of data integrity of sensitive data and further avoids transfer across a network of personal information, confidential information, and a volume of data that is large enough to cause unacceptable network latency and data propagation delay across the network;

    acquiring by the computer processor of the agent computer system from the user computer system S0 via interaction with the human user at the user computer system S0, an itinerary, security credentials C1, C2, . . . , CN, and N sets of run time instructions I1, I2, . . . , IN, said N being at least 2, said itinerary specifying a path along which the agent software is to migrate to perform a portion of the data processing, using one or more processors P1, P2, . . . , PN and run time instructions I1, I2, . . . , IN, on computer system S1, S2, . . . , SN, respectively, which appear in a sequential order of S1, S2, . . . , SN on the path, said security credentials C1, C2, . . . , CN being specific to computer system S1, S2, . . . , SN for the agent software to gain access to resources and data comprised by computer system S1, S2, . . . , SN, said security credentials C1, C2, . . . , CN differing from each other if N=2 or differing from one another if N>

    2; and

    providing, by the computer processor of the agent computer system to the agent software at the user computer system S0, the received itinerary, security credentials, and the N sets of run time instructions I1, I2, . . . , IN, which configures the agent software to perform data processing on the computer system S1, S2, . . . , SN.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×