Flexible, secure agent development framework

DWPI Title: Intelligent agent generation method, involves protecting policies and constraints by agent at phases, and enforcing strict authorizations for changes from programmers, users, administrators and potentially malicious or disruptive entities
Abstract: While an agent generator is generating an intelligent agent, it can also evaluate the data processing platform on which it is executing, in order to assess a risk factor associated with operation of the agent generator on the data processing platform. The agent generator can retrieve from a location external to the data processing platform an open site that is configurable by the user, and load the open site into an agent substrate, thereby creating a development agent with code development capabilities. While an intelligent agent is executing a functional program on a data processing platform, it can also evaluate the data processing platform to assess a risk factor associated with performing the data processing function on the data processing platform.
Use: Method for generating an intelligent agent on a substrate of a distributed dynamic object that is utilized for providing a computing location-independent, object-oriented programming metaphor, with long-lived objects.
Advantage: The policies and constraints are protected by the agent at all phases of the lifecycle, and strict authorizations are enforced for changes from programmers, users, administrators and potentially malicious or disruptive entities, thus increasing confidence in systems that use the intelligent agent for national security and high-consequence applications. The method allows generation of the intelligent agent in autonomous, introspective, long-lived, cooperative, secure and robust manner.
Novelty: The method involves evaluating a data processing platform, and giving intelligent agent active mechanisms to enforce immutable integrity policies and constraints on agent's lifecycle properties via introspection into agent's environment, throughout agent's lifecycle phases of specification, design, construction, coding, testing, deployment and decommissioning. The policies and constraints are protected by an agent at all phases of the lifecycle, and strict authorizations are enforced for changes from programmers, users, administrators and potentially malicious or disruptive entities.
Filed: 3/24/2006
Application Number: US2006388278A
Tech ID: SD 7422.0
This invention was made with Government support under Contract No. DE-NA0003525 awarded by the United States Department of Energy/National Nuclear Security Administration. The Government has certain rights in the invention.
Data from Derwent World Patents Index, provided by Clarivate
All rights reserved. Republication or redistribution of Clarivate content, including by framing or similar means, is prohibited without the prior written consent of Clarivate. Clarivate and its logo, as well as all other trademarks used herein are trademarks of their respective owners and used under license.