Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring
Reexamination Certificate
2003-09-19
2008-12-30
Pwu, Jeffrey (Department: 2152)
Electrical computers and digital processing systems: multicomput
Computer network managing
Computer network monitoring
C709S202000, C709S229000, C714S025000, C714S038110, C717S127000
Reexamination Certificate
active
07472184
ABSTRACT:
A method for restricting resources consumed by a ghost agent can include the step of identifying a host, which is a software object operating within the grid environment and movable from one grid to another grid within the grid environment. The method also can include the step of associating a ghost agent with the host. The ghost agent is configured to replicate and record at least one action of the host and follows the movement of the associated host. Additionally, the ghost agent can be registered with a ghost registry of the domain in which it is disposed. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
REFERENCES:
patent: 6012152 (2000-01-01), Douik et al.
patent: 6083281 (2000-07-01), Diec et al.
patent: 6105059 (2000-08-01), Al-Karmi et al.
patent: 6122664 (2000-09-01), Boukobza et al.
patent: 6266805 (2001-07-01), Nwana et al.
patent: 6269330 (2001-07-01), Cidon et al.
patent: 6282697 (2001-08-01), Fables et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6427000 (2002-07-01), Mumford et al.
patent: 6430707 (2002-08-01), Matthews et al.
patent: 6564342 (2003-05-01), Landan
patent: 6681243 (2004-01-01), Putzolu et al.
patent: 2002/0112048 (2002-08-01), Gruyer et al.
patent: 2002/0162053 (2002-10-01), Os
patent: 2002/0174415 (2002-11-01), Hines
patent: 2003/0014691 (2003-01-01), Abdelilah et al.
patent: 2003/0028858 (2003-02-01), Hines
patent: 2004/0103195 (2004-05-01), Chalasani et al.
patent: 2004/0103339 (2004-05-01), Chalasani et al.
patent: 2004/0139202 (2004-07-01), Talwar et al.
patent: 2004/0225711 (2004-11-01), Burnett et al.
U.S. Appl. No. 10/665,586, Creamer et al.
U.S. Appl. No. 10/666,464, Creamer et al.
Fox, A., et al., “Cluster-Based Scalable Network Services”, ACM Digital Library, pp. 78-91, (Oct. 1997).
Wilson, L.F., et al., “Mobile Agents for Distributed Simulation”, 1999 Advanced Simulation Technologies Conference, pp. 53-58, 1999.
Kapolka, A., et al., “A Unified Component Framework for Dynamically Extensible Virtual Environments”, CVE '02, pp. 64-71, (Sep. 30-Oct. 2, 2002).
Martin, D.M., Jr., et al., “The Privacy Practices of Web Browser Extensions”, Communications of the ACM, vol. 44, No. 2, pp. 45-50, (Feb. 2001).
Creamer Thomas E.
Hilf Bill H.
Jaiswal Peeyush
Katz Neil A.
Mirt Michael
Dailey Thomas J
International Business Machines - Corporation
Pwu Jeffrey
Senterfitt Akerman
LandOfFree
Framework for restricting resources consumed by ghost agents does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Framework for restricting resources consumed by ghost agents, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Framework for restricting resources consumed by ghost agents will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4043536