Evaluation systems and methods for coordinating software agents
First Claim
Patent Images
1. A network subsystem including at least one application distributed across a plurality of network nodes, the network subsystem comprising:
- circuitry configured for providing a first agent with code for responding to situational information about the first agent and about a second agent including at least code configured for sending an inquiry to one or more network locations to determine whether the one or more network locations have one or more resources that enable performance of one or more selected data-transformative operations and code configured for obtaining raw vulnerability data; and
circuitry configured for deploying the first agent based on the determination of whether the one or more network locations have one or more resources that enable performance of one or more selected data-transformative operations including at least one security control operation.
3 Assignments
0 Petitions
Accused Products
Abstract
A device, method, computer program product, and network subsystem are described for associating a first mobile agent with a first security policy and a second mobile agent with a second security policy or for providing a first agent with code for responding to situational information about the first agent and about a second agent and for evaluating a received message at least in response to an indication of the first security policy and to an indication of the second security policy or for deploying the first agent.
-
Citations
33 Claims
-
1. A network subsystem including at least one application distributed across a plurality of network nodes, the network subsystem comprising:
-
circuitry configured for providing a first agent with code for responding to situational information about the first agent and about a second agent including at least code configured for sending an inquiry to one or more network locations to determine whether the one or more network locations have one or more resources that enable performance of one or more selected data-transformative operations and code configured for obtaining raw vulnerability data; and circuitry configured for deploying the first agent based on the determination of whether the one or more network locations have one or more resources that enable performance of one or more selected data-transformative operations including at least one security control operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
25. A computer program product comprising:
a non-transitory signal-bearing medium bearing at least; one or more instructions for associating a first mobile agent with a first security policy and a second mobile agent with a second security policy; and one or more instructions for evaluating a received message at least in response to an indication of the first security policy and to an indication of the second security policy including at least one or more instructions for updating at least one of the first security policy or the second security policy responsive to one or more inquiries relating to at least one of the first security policy or the second security policy operating in one or more processing cores.
Specification