A mobile proxy safeguarding method similar to biological self-protection

A mobile agent, security protection technology, applied in the direction of security communication devices, digital transmission systems, electrical components, etc., can solve problems such as difficulty

Inactive Publication Date: 2005-08-17
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the research on the protection of mobile agents is still in the preliminary stage, because the mobile agent is executed by the host, it has to disclose data and codes in ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile proxy safeguarding method similar to biological self-protection
  • A mobile proxy safeguarding method similar to biological self-protection
  • A mobile proxy safeguarding method similar to biological self-protection

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0104] Then its specific implementation method is:

[0105] (1) The agent initiator creates a mobile agent A

[0106] Since it is assumed that the daemon agent function is enabled, proceed with the following steps;

[0107] (2) The proxy initiator (set as A) sends a request to the security center (set as B)

[0108] Step 1: A initializes the request according to the parameters;

[0109] Assume that the parameters here include security level=1 (initial level), security function=anti-data tampering;

[0110] Step 2: A signs and encrypts the request;

[0111] Can use RSA algorithm to sign and encrypt;

[0112] Step 3: A sends the request to B, for example, using the TCP / IP-based Socket method;

[0113](3) B decrypts the request and verifies the signature of the sender. If it is determined that the verification is from A, then B sends the session key (indicated by k) to A, and d is encrypted, and the encryption key is A's public key;

[0114] (4) B uses d to encrypt the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to moving agent safety protective method similar to the biological creature, which is mainly used to solve the moving agent safety problem and introduces multiple functions agent and refers to the biological creature self-protection method. Comparing with the traditional structure, this invention adds four parts: environment appreciation device, agent generation control logics and combination receiver and aberrance logic control.

Description

technical field [0001] The invention is a security solution for distributed computing. It is mainly used to solve the security problem of mobile agents, and belongs to the field of distributed computing software security technology. Background technique [0002] Mobile agent technology is a new technology that appears with the development of the Internet (Internet). It better adapts to the characteristics of the Internet and effectively simplifies the design, implementation and maintenance of distributed systems. Generally speaking, a mobile agent refers to an independent computer program, which can move independently on a heterogeneous network according to certain rules, and complete specific tasks on behalf of users. The advantages of the mobile agent are mainly two points: on the one hand, it realizes the calculation close to the required resources, which can save the bandwidth of the network and has asynchronous function; on the other hand, it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L12/24
Inventor 王汝传穆鸿
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products