WO1998047250A2 - Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages - Google Patents

Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages Download PDF

Info

Publication number
WO1998047250A2
WO1998047250A2 PCT/US1998/004876 US9804876W WO9847250A2 WO 1998047250 A2 WO1998047250 A2 WO 1998047250A2 US 9804876 W US9804876 W US 9804876W WO 9847250 A2 WO9847250 A2 WO 9847250A2
Authority
WO
WIPO (PCT)
Prior art keywords
message
agent
selector
intelligent agent
messages
Prior art date
Application number
PCT/US1998/004876
Other languages
French (fr)
Other versions
WO1998047250A3 (en
Inventor
Joseph Phillip Bigus
Brian John Cragun
Helen Roxlo Delp
Original Assignee
International Business Machines Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corporation filed Critical International Business Machines Corporation
Priority to KR10-1999-7007570A priority Critical patent/KR100368956B1/en
Priority to JP54389298A priority patent/JP3905926B2/en
Priority to CA002277863A priority patent/CA2277863C/en
Priority to DE69839088T priority patent/DE69839088T2/en
Priority to EP98937920A priority patent/EP0976039B1/en
Publication of WO1998047250A2 publication Critical patent/WO1998047250A2/en
Publication of WO1998047250A3 publication Critical patent/WO1998047250A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/188Electronic negotiation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S283/00Printed matter
    • Y10S283/901Concealed data

Definitions

  • the invention is generally related to intelligent agent computer programs executable on computer systems and the like, and in particular, the decision logic and communications mechanisms used by such programs.
  • Computer programs which are essentially the sets of instructions that control the operation of a computer to perform tasks, have also grown increasingly complex and powerful. While early computer programs were limited to performing only basic mathematical calculations, current computer programs handle complex tasks such as voice and image recognition, predictive analysis and forecasting, multimedia presentation, and other tasks that are too numerous to mention.
  • intelligent agent computer programs also referred to as intelligent agents or simply agents, that operate much like software-implemented passistantsp to automate and simplify certain tasks in a way that hides their complexity from the user.
  • agents a user may be able to perform tasks without having to know specific sequences of commands.
  • a user may be able to obtain information without having to know exactly how or where to search for the information.
  • Intelligent agents are characterized by the concept of delegation, where a user, or client, entrusts the agents to handle tasks with at least a certain degree of autonomy. Intelligent agents operate with varying degrees of constraints depending upon the amount of autonomy that is delegated to them by the user.
  • Intelligent agents may also have differing capabilities in terms of intelligence, mobility, agency, and user interface.
  • Intelligence is generally the amount of reasoning and decision making that an agent possesses. This intelligence can be as simple as following a predefined set of rules, or as complex as learning and adapting based upon a user's objectives and the agent's available resources.
  • Mobility is the ability to be passed through a network and execute on different computer systems. That is, some agents may be designed to stay on one computer system and may never be passed to different machines, while other agents may be mobile in the sense that they are designed to be passed from computer to computer while performing tasks at different stops along the way.
  • User interface defines how an agent interacts with a user, if at all.
  • Agents have a number of uses in a wide variety of applications, including systems and network management, mobile access and management, information access and management, collaboration, messaging, workflow and administrative management, and adaptive user interfaces. Another important use for agents is in electronic commerce, where an agent may be configured to seek out other parties such as other users, computer systems and agents, conduct negotiations on behalf of their client, and enter into commercial transactions.
  • intelligent agents similarly have a set of constraints on what they are authorized and not authorized to do.
  • a selling agent for electronic commerce applications may be constrained by a minimum acceptable price.
  • a good selling agent, whether electronic or human would never initially give its lowest acceptable price, as this would minimize profit margins.
  • giving the lowest price may not even assure sales because a buyer may infer that the price is not competitive because the agent is unwilling to lower the price from the original offer. Therefore, an agent typically starts negotiations with some margin from its worst case acceptable price, then works toward a mutually acceptable price with the other party.
  • the invention addresses these and other problems associated with the prior art in providing a manner of communication between an agent and its client where a selector is used in the generation and interpretation of messages to effectively disguise confidential information transmitted in the messages from third parties.
  • the selector controls how a given message, which need not be scrambled, is interpreted by transmitting and receiving parties .
  • a selector for use with the various embodiments of the invention may be a predetermined parameter known to both the agent and client, or may be transmitted between the agent and client in the same message as the confidential information or in a separate message.
  • the selector may be maintained as a distinct parameter that is known by or transmitted between the parties, or may be derived from an existing parameter having another use or purpose.
  • the selector may be used in a number of manners to disguise confidential information.
  • the selector may be used to select one of a plurality of messages to transmit, to select one of a plurality of alternate meanings for a particular message, to select where the confidential information is in a plurality of transmitted messages, and to indicate which of a plurality of messages to omit from a transmission, among others.
  • the decision logic of an agent may be disguised from third parties through the use of neural networks to implement part or all of the decision logic.
  • Neural networks which rely on interconnected nodes having variable weights to encode logic, are not readily reverse compiled or scanned, thus offering significant security advantages for an agent that is operating in an unsecured environment.
  • FIGURE 1 is a flowchart illustrating the operation of an intelligent agent consistent with the principles of the invention, utilizing procedural decision making and message disguising.
  • FIGURE 2 is a flowchart illustrating the operation of another intelligent agent consistent with the principles of the invention, utilizing neural network-implemented decision making and procedural message disguising.
  • FIGURE 3 is a flowchart illustrating the operation of another intelligent agent consistent with the principles of the invention, utilizing neural network-implemented decision making and message disguising.
  • FIGURE 4 is a block diagram of a networked computer system environment for use with the illustrated embodiments of the invention.
  • FIGURE 5 is a block diagram of the networked computer system of Fig. 4, illustrating the interaction between intelligent agents therein.
  • FIGURE 6 is another block diagram of the networked computer system of Fig. 4, illustrating in greater detail the primary components in the client and remote computer systems.
  • FIGURE 7 is a flowchart illustrating the interaction between the agent manager, mobile agent and negotiating agent (other party) of Fig. 5.
  • FIGURES 8a and 8b are block diagrams illustrating the primary components in one embodiment of the intelligent agent of Fig. 5.
  • FIGURE 9 is a flowchart illustrating the program flow of a network training routine for use in training the neural network in the intelligent agent of Figs. 8a and 8b.
  • the embodiments of the invention incorporate various manners of disguising confidential information in an intelligent agent from third parties.
  • Intelligent agents are computer programs which have been delegated a degree of autonomy but which are limited to operating within constraints defined by their client (which may be, for example, another agent; a computer program, application or system; or an individual interacting with the agent through a computer -- hereinafter a client computer process) .
  • client which may be, for example, another agent; a computer program, application or system; or an individual interacting with the agent through a computer -- hereinafter a client computer process
  • mobile agents A subset of such agents which are capable of being passed between and operating in different applications or computer systems.
  • an agent has the ability to sense, recognize and act. These functions are typically embodied in a number of components, including an engine, a knowledge component, an adapters component, a library, and a view component.
  • the engine controls the overall operation of an agent and functions as the pbrains of the agent, and the knowledge component stores information that is representative of the acquired knowledge of the agent.
  • the adapters component handles interaction between an agent and external objects, thereby functioning as the mechanism through which the agent psensesp and interacts with its environment.
  • a library persistently stores the information utilized by the knowledge component, and the view component provides the human interface, if any, for an agent, e.g., for supplying instructions to the agent.
  • An agent may receive, transmit, store and otherwise utilize confidential information such as data, unique decision logic or strategies, desired goals, etc. to which a client may wish to limit access by third parties.
  • an agent may wish to prevent parties with which it is negotiating from knowing certain information such as its negotiation strategy and authorized offer limits. This confidential information may be subject to scrutiny, however, if another party is capable of intercepting messages between the agent and its client, or if another party is capable of reverse compiling or otherwise scanning the program code of the agent.
  • the embodiments of the invention utilize a unique signaling methodology which relies on a selector that is ultimately known by both the agent and agent manager to generate and interpret messages which disguise the confidential information contained therein.
  • the messages need not be modified, encrypted or scrambled, as the selector is used primarily to interpret the meaning of the messages.
  • One difference between the use of a selector and encryption techniques is that, in the case of a selector, a third party may mistakenly believe a message has a different meaning than its true meaning and may inadvertently act to the advantage of the client.
  • Another advantage over encryption is that the fact that a message is disguised is not readily apparent, whereby the message typically does not stand out relative to other messages.
  • encryption techniques may be used in combination with message disguising in certain embodiments of the invention, with encryption used on disguised or undisguised messages.
  • the information to be transmitted may be sent in disguised messages with encrypted decoy messages also sent to draw attention away from the disguised messages.
  • FIG. 1 illustrates a program flow for an intelligent agent 160 consistent with the invention.
  • Agent 160 operates by receiving input at block 162 and making a decision based upon the input at block 164.
  • Block 164 outputs confidential information therefrom, which is disguised in a message in block 166 based upon a selector 167. The message is then sent in block 168 and control returns to block 162.
  • a selector may be analogized to the hand signals used by baseball players and coaches to communicate during a baseball game (e.g., pulling on the ear, touching the nose, etc.).
  • the signals or messages are visible to all, yet are difficult, if not impossible, to interpret because they are known only to the team using them, and because their meanings are often changed. Certain signals may have different meanings in different situations, which may confuse the other team or cause the other team to mistakenly believe a particular signal has another meaning.
  • the selector may be used in a number of manners to disguise confidential information. For example, a selector may be used to select one of a plurality of messages to transmit to convey a particular piece of confidential information. Moreover, one or more of the messages may have a plurality of alternate meanings. This may permit one set of messages to represent a plurality of pieces of confidential information, although it should be appreciated that messages need not have more than one meaning.
  • Table I shows a transform table illustrating how three messages bAp, pBp and pCp from a message set may be used by an agent to convey three pieces of confidential information (here, whether to accept or counteroffer) depending upon the value of a selector:
  • Table I Example Transform Table
  • One advantage of this configuration is that the messages, beyond disguising their contents or intended meaning, may cause another party to mistakenly believe a particular message has a different meaning. For example, if a buying agent sends a message to the client seeking authorization to complete a transaction at the last offered price, but the message is interpreted by the selling party to mean that the agent wants to terminate negotiations, the selling party may reduce its price to try to complete the transaction.
  • a selector may also be used to select which of a plurality of messages contains the desired confidential information. For example, messages A, B and C from Table I above could all be transmitted together, within a single transmission, with the selector indicating which of the messages should be considered.
  • a selector may be used to select which of a plurality of messages to omit from a transmission. For example, for a set of messages A-C, transmit messages A and B but not C to convey a certain piece of information.
  • a selector may be a predetermined parameter known to both the agent and client. For example, the selector may be modified after a predetermined number of communications or cycles (e.g., every three transmissions).
  • a selector may also be transmitted between the agent and client in the same message as the confidential information, in a separate message within the same transmission, or in a separate transmission altogether.
  • an agent manager may transmit an pincrement selectorp message to the agent so that the next selector value in a set of possible values is used, or an agent may precede a message with a separate message indicating from which message set the manager should interpret the message (e.g., for Table I, message D indicates selector 1, message E indicates selector 2, message F indicates selector 3) .
  • Multiple selectors may be interleaved with the confidential information in a message, e.g., sets of bits.
  • a 32 bit message could contain 3 8 -bit pieces of data, along with 8 -bits of selector information parsed into 4 2 -bit selectors that are disposed at the boundaries of the 8 -bit pieces of data.
  • a look-up table may be utilized to assist in the interleaving of selector information into a message.
  • other extraneous information that is ignored during interpretation may be included in a message, e.g., a few high order bits may be added to a value, but may be ignored during interpretation.
  • information may be split between multiple messages or transmissions, with a selector controlling from where the information may be retrieved and how it is to be interpreted.
  • the selector may be maintained as a distinct parameter that is known by or transmitted between the parties, or may be derived from an existing parameter having another use or purpose.
  • a selector may be derived from the time stamp on a message (e.g., the last digit, or the remainder when the sum of the digits is divided by three, etc.), or from a checksum value for the message.
  • Other seemingly innocuous information may be used to generate a ppseudo-randomp selector.
  • Agent 160 of Fig. 1 illustrates a procedural process of decision making and message disguising, whereby a series of steps are executed sequentially by a computer program to handle the functions in blocks 164 and 166. However, procedural logic may be subject to reverse compilation and scanning by third parties.
  • agent 160 is illustrated in Fig. 2, where an agent 170 substitutes a neural network 172 for procedural decision making. Message disguising is still handled through a procedural block 176 which receives a selector 177 and outputs a disguised message sent via block 178.
  • a neural network utilizes a set of processing elements or nodes that are interconnected in a network, with each node typically outputting a weighted sum of its inputs. The weight to apply to each input to a node is plearnedp over time by a neural network by training the network with sample, or training, data.
  • Fig. 3 illustrates an agent 180 which extends the use of a neural network to both decision making and message disguising.
  • a neural network 182 receives a plurality of inputs, including also one or more selectors (e.g., selectors 184 and 186) from which a disguised message is generated. Also, neural network 182 only outputs one or more disguised outputs (e.g., disguised output 1 and disguised output 2). Consequently, at no point is any undisguised data stored in agent 180.
  • Training of neural network 182 requires additional training records or examples to handle message disguising in view of the additional input of a selector to the network.
  • the standard training data would include N training records, as shown in Table II below:
  • additional training records are required given that an output may be represented by more than one message.
  • one group of training records are required for each possible value of the selector, which may be accomplished merely by reusing the original pure training information, duplicated for each value of the selector (e.g., 1 - K) , and with the messages (e.g., messages A, B, ... M) properly arranged for each value, as shown in Table III below:
  • Inputs Selector Outputs il.l il.2 il.3 1 msg l.A i2.1 i2.2 i2.3 1 msg l.B iN.l iN.2 iN.3 1 msg l.M il.l il.2 il.3 2 msg 2.A i2.1 i2.2 i2.3 2 msg 2.B iN.l iN.2 iN.3 2 msg 2.M il.l il.2 il.3 3 msg 3.A i2.1 i2.2 i2.3 3 msg 3.B iN.l iN.2 iN.3 3 msg 3.M il.l il.2 il.3 K msg K.A i2.1 i2.2 i2.3 K msg K.B iN.l iN.2 iN.3 ... K msg K.M
  • a set of training data is required for each combination of selector values. For example, as shown in Table V, for a set of three selectors, and two outputs, the following training data may be used:
  • Inputs Selector Outputs il.l il.2 il.3 1.1.1 msg 1.1. l.Al msg 1.1.1.A2 i2.1 i2.2 i2.3 1.1.1 msg 1.1.1.B1 msg 1.1.1.B2 iN.l iN.2 iN.3 1 1.1 msg 1.1. l.Ml msg 1.1.1.M2 il.l il.2 il.3 1 1.2 msg 1.1.2.A1 msg 1.1.2.A2 i2.1 i2.2 12.3 1 1.2 msg 1.1.2.B1 msg 1.1.2.B2 iN.l iN.2 iN.3 1.
  • the training records used to train a neural network depend upon the particular logic desired to be encoded in the network.
  • the message disguising function of an agent may be implemented either via a neural network or with procedural decision making, and that separate neural networks may be used for the decision making and message disguising functions.
  • various additional functions for an agent may be incorporated into the same or different neural networks as for either the decision making or message disguising functions. Other modifications will be apparent to one skilled in the art.
  • a networked computer system 10 generally includes one or more computer systems, e.g., single-user computer systems 16, 18 and multiuser computer systems 20, 60, coupled through a network 15.
  • Multi-user computer system 20 typically includes one or more servers 25 to which one or more single-user computers 22 may networked through a separate network 24.
  • multi-user computer system 20 typically includes one or more servers 65 coupled to one or more single-user computer systems 62 through a network 64.
  • Network 15 may represent any type of networked interconnection, including but not limited to local -area, wide- area, wireless, and public networks (e.g., the Internet).
  • Fig. 5 illustrates an embodiment of computer system 10 where multiuser computer system 20 is a client system, and multi-user computer system 60 is a remote system.
  • a client system will hereinafter refer to a computer system that provides an agent a certain level of security from manipulation by other parties when the agent is resident on the system.
  • the client system is also the computer system from which management of the agent is typically handled.
  • the agent typically but not necessarily will also originate from the client system.
  • a remote system will hereinafter refer to a computer system that is typically not capable of providing a desired level of security for an agent, generally because the computer system is not under the control of the client. It is typically while resident on a remote system that an agent runs the greatest risk of being scanned or reverse compiled, or of having communications intercepted or monitored, by other parties.
  • agents are configured to negotiate commercial transactions, generally in the role of buying or selling agents.
  • the agents may negotiate with other agents, other computer systems, or even other individuals.
  • the agents may interact one-on-one, or may be capable of operating within a pmarketp of multiple agents, along the lines of a stock or commodity market.
  • Computer systems having the ability to host agents for interaction therebetween include negotiating programs of varying sophistication and are hereinafter referred to as agent hosts.
  • agent hosts are hereinafter referred to as agent hosts.
  • Fig. 5 illustrates a mobile intelligent agent 100 which communicates with an agent manager 32 in client system 20.
  • mobile agent 100 is resident on remote system 60.
  • remote system 60 may be the client for agent 95, or may also be considered to be remote relative to this agent as well.
  • An exemplary functional design of networked computer system 10 for implementing the various embodiments of the invention is illustrated in Fig. 6.
  • Server 25 of client system 20 generally includes a central processing unit (CPU) 28 coupled to a memory 30 and storage 40 over a bus 54.
  • a local area network interface is provided at 52, and an interface to remote system 60 over external network 15 is provided through interface 50.
  • Agent manager program 32 is resident in memory 30, as is an agent trainer program 34 which trains agents.
  • Storage 40 includes one or more trained agents 42 (of which may include agent 100, for example), which are computer programs or modules that may be retrieved and used locally within system 20, or dispatched to remote systems to execute and perform tasks on behalf of the client system.
  • Storage 40 also includes an agent mission database 44 which may track agent operations and the relative success or failure thereof.
  • a training database 46 includes training data utilized by agent trainer program 34 to train agents, and translation tables 48 are utilized by agent trainer program 34 as well as by agent manager 32 to encode and decode messages to and from mobile agents, as will be discussed in greater detail below.
  • Server 65 of remote system 60 also includes a CPU 68 coupled to a memory 70, storage 80, external network connection 90 and local network connection 92 over a bus 94.
  • An agent host program 72 is resident in memory 70 to handle interactions between agents resident in the remote system.
  • the agent host program is an asynchronous message/event driven environment that provides a common platform over which agent computer programs execute and interact, much like an operating system.
  • the agent host is also capable of permitting messages to be sent between agents and their clients.
  • Memory 70 also includes a negotiating program 74 which operates as the pother partyp in transactions with agent 100, which may be another agent, a market or bulletin board application, or even an interface program through which an individual interacts with agent 100.
  • Storage 80 maintains a transaction history database 82 which logs the transactions completed on the server.
  • Servers 25, 65 may be, for example, AS/400 midrange computers from International Business Machines Corporation.
  • AS/400 midrange computers from International Business Machines Corporation.
  • the hardware embodiments described herein are merely exemplary, and that a multitude of other hardware platforms and configurations may be used in the alternative.
  • signal bearing media include but are not limited to recordable type media such as floppy disks, hard disk drives, and CD-ROM's, and transmission type media such as digital and analog communications links.
  • Fig. 7 illustrates an exemplary program flow illustrating the interaction between an agent 100, agent manager 32 and another party, negotiating agent 95.
  • Negotiations are generally instituted by agent manager 32 by dispatching agent 100 to a remote system, as illustrated in block 130.
  • agent 100 may be dispatched with a desired transaction or transactions which the client wishes to complete (including information such as desired quantity, description of goods/services to be sold/purchased, etc.), as well as any other constraints placed upon the agent by the manager (e.g., the number of negotiation iterations to process, a maximum or minimum limit on the amount to offer, etc.).
  • some or all of this information may be relayed to agent 100 at a later time by agent manager 32.
  • agent 100 gathers and filters information after it has been dispatched to the remote system. For example, agent 100 may poll a bulletin board or market for outstanding offers, or may attempt to find and initiate negotiations with another party, e.g. , another computer system, another agent, or an individual interacting through a computer system. Agent 100 may also simply wait for incoming offers from other parties. Block 132 also performs the functions of processing messages from other parties and from the agent manager.
  • agent 100 in block 134. It is in this block that the negotiation strategy of agent 100 is implemented, whereby the agent determines, based upon the input it receives, whether and how to proceed in negotiations with another party. Also, supportive procedural processing is completed, such as incrementing internal counts, e.g., the number of iterations (discussed below) .
  • agent 100 may decide to send a message to other party 95, e.g., indicating acceptance or rejection of an outstanding offer, issuing an offer or counteroffer, terminating negotiations, requesting that the other party wait, etc.
  • the other party receives the message at block 138 and processes it at block 140, typically issuing a response message back to agent 100.
  • Control of agent 100 returns to block 132 to process the response message from party 95.
  • agent 100 may decide to send a message back to agent manager 32. Consistent with the invention, this message is disguised in block 141 in the manner disclosed herein, and then sent in block 142. Agent manager 32 then receives and interprets the message at block 144, processes the message in block 146 and disguises and sends a response message back to agent 100 in block 148. Upon receipt of the response message, block 150 interprets the message and passes control to block 132 to process the response message from agent manager 32.
  • agent 100 may decide to leave the remote system and return to its client system, e.g., after completion of a successful transaction or after termination of an unsuccessful negotiation.
  • the return of the agent is illustrated in block 154.
  • the illustrated program flow for agent 100 is an example of a semi -autonomous agent that has authority to negotiate with another party with limits on the offer amount and the number of iterations (offers made by the agent) that the agent can undertake on its own. Agents with greater or lesser degrees of domain knowledge may also be used consistent with the invention.
  • a fully autonomous agent may be delegated the authority to negotiate without any input other than a desired transaction.
  • a fully dependent agent may have little authority other than to act as an intermediary by issuing offers and completing transactions pursuant to specific instructions from a manager and reporting the results back to the manager.
  • agent 100 may be one of several agents having varying degrees of domain knowledge, or may have multiple modules with varying degrees of domain knowledge, so that the agent may be optimized for operation in different situations based upon an objective criteria (e.g., security concerns).
  • an objective criteria e.g., security concerns
  • negotiation module or mechanism 200 The primary components in agent 100 for implementing the program flow of Fig. 7 are illustrated by negotiation module or mechanism 200 in Figs. 8a and 8b.
  • a mechanism or module may be considered to include any function, object, or block of program code configured to perform a desired task or operation.
  • Module 200 is configured to utilize a selector such as a message time stamp or other transmitted parameter, with a single set of messages used to disguise various confidential instructions and requests passed between the client and the agent.
  • the client and agent in this embodiment transmit only one message at a time to represent a given instruction or request, and some if not all of the messages have alternate meanings depending upon the value of the selector.
  • a selector such as a message time stamp or other transmitted parameter
  • Module 200 is configured to receive the following inputs : - other party's last price other party's current price agent's last public offer product characteristics instruction from manager: -- increase in offer authorized increase in iterations authorized increase in offer not authorized increase in iterations not authorized last message sent back to manager - selector(s)
  • module 200 is configured to generate the following outputs : public price offer message to other party -- make offer withdraw accept reject counteroffer - - please wait finished message to manager probable acceptable alternative, do you accept -- iterations exceeded, recommend continue iterations exceeded, recommend withdrawal recommend immediate withdrawal dummy transmission to motivate negotiation request approval to increase offer
  • agent autonomy price range range of prices within which agent is authorized to negotiate autonomously
  • manager approval price range range of prices within which agent requires approval from manager
  • Module 200 includes a primary neural network 202 in which the decision logic for decision making (including negotiation strategy) , message disguising, and other functions is implemented.
  • a number of filters 204-214 are utilized at the input side of primary network 202 to condition the inputs to the network, since neural networks typically operate on weights in the range of - 1 to +1, or 0 to +1.
  • Filters 204-214 may be implemented using procedural logic, or alternatively, may be implemented using separate neural networks to increase security.
  • a selector decode filter 204 is implemented in this embodiment as a neural network which receives the desired selector information and outputs a decoded selector signal, designated sel.
  • the decoded selector signal is provided to primary network 202, as well as to a number of the filters in module 200, as detailed below.
  • the configuration of filter 204 will vary depending upon the type of information used as a selector. For example, if a time stamp or other transmitted parameter is used, such information would be input to filter 204. On the other hand, if a non- ransmitted parameter is used, e.g., if the selector is changed every n transmissions, then filter 204 may be configured as a logic element such as a counter which is incremented every n transmission cycles. Because it may be possible for selector values to be observed as they are being gathered, any amount of superfluous information may also be gathered to assist in deception.
  • the last and current prices offered by the other party to the negotiation are stored in a pair of registers 220, 222 and conditioned by filters 206 and 208, which in this embodiment are implemented using neural networks.
  • the last offer generated by the agent is stored in a register 224 and conditioned by filter 210, also implemented as a neural network.
  • Filters 206-208 also receive the decoded selector input.
  • Registers 220 and 222 are maintained by the information gathering block 132 (Fig. 7) based upon the prices received from the other party.
  • Register 224 is maintained by a price offer generator filter 228 (Fig. 8b, as discussed below) .
  • each filter 206-210 outputs an identification (ID) signal, as well as three data signals designated value 1, value 2 and value 3.
  • ID identification
  • the ID signal output by each filter operates similar to a selector to indicate which of the n (here three) data signals includes the conditioned representation of the corresponding register's contents.
  • the other two data signals operate are unused and act as decoys to deter reverse compilation of the decision logic of the module.
  • the ID signal may be a function of the decoded selector input, or may be independent thereof.
  • a single value signal may be connected between each filter 206-210 and primary network 202 if detection of these conditioned signals is not a concern.
  • An instruction decode network filter 212 receives binary messages from the client, as well as the decoded selector signal to interpret the messages. A single instruction signal is output from filter 212. The instruction signal varies for any given message depending upon the value of the decoded selector signal.
  • An optional basic requirements network filter 214 which is primarily useful for a buying agent, receives one or more product characteristics related to the features of the goods/services being negotiated for compared to the features desired by the client. In response, filter 214 outputs a match signal which indicates the degree in which the products being negotiated for match what the client is actually looking for.
  • the product characteristics may include basic requirements that must be met to complete the transaction, as well as additional features that may not be required but which may make the products more desirable to the client. For example, for a VCR, a client may require that it have four heads, but the client may be willing to pay more for a hi-fi stereo model if one is available.
  • the match signal for a hi-fi model being negotiated for may be weighted more strongly than one without hi-fi, and as a consequence, the agent may be configured to negotiate more strongly for the hi-fi model in response to this signal.
  • Two additional registers 216, 218 are maintained by primary network 202 and are fed back as input thereto.
  • An offer increment register 216 represents the current negotiation margin for the agent, as modified by the agent manager through instructions to the agent.
  • the negotiation margin represents in filtered form that amount over which (for a buying agent) or under which (for a selling agent) the agent may complete a transaction outside of the desired price for the transaction.
  • An iteration register 218 maintains in filtered form the number of cycles in the current negotiation, where one cycle typically represents a transmission from the agent to another party or to the agent manager.
  • the agent is typically trained with a number of cycles for which the agent is authorized to negotiate without approval from the manager, and this number may be varied or overridden in response to an instruction from the agent manager.
  • Primary network 202 also receives as feedback a price offer delta signal related to the change in the agent's last and current offers, and a send message signal and a undisguised message signal related to the last message sent from the agent to the client. Each of these signals are output from network 202 (Fig. 8b) . As shown in Fig. 8b, primary network 202 outputs a number of other signals in response to the inputs shown in Fig. 8a. A set of filters 226-234 condition these output signals from neural network levels to levels that are more useful external to the primary network. A negotiation message creator filter 226, which is implemented in this embodiment as procedural logic, receives an output signal from network 202 and any value from the price offer generator 228 and outputs a message to the other party. The output message may include a number of possible messages, such as accept, reject, counteroffer, wait request, and negotiations finished, among others. The format of the message may follow a predetermined protocol that is understandable to the other party.
  • a price offer generator filter 228, which is also implemented in procedural logic in this embodiment, receives a price offer delta parameter and the value previously stored in my last offer block 224 and outputs therefrom the current price offer which is stored in register 224.
  • the price offer delta parameter is also fed back to primary network 202 as described above.
  • the current offer may be supplied in conjunction with the message to the other party provided by filter 226.
  • the current offer may also operate as a public offer which can be polled by other agents wishing to engage in negotiations with agent 100.
  • the current offer may also be output to a market or bulletin board set up on an agent host to solicit negotiations with other parties.
  • An adjust iteration filter 230 which in this embodiment is implemented with procedural logic, receives an iteration increment signal to increment register 218 in response thereto. Filter 230 also receives a reset signal to reset register 218 in response to an increase in iterations authorized instruction.
  • an increment processor filter 232 receives a change increment signal and an increment value signal. In response to a suitable change increment signal, the increment value represented by the increment value signal is output in filtered form and stored in register 216.
  • a message creator filter 2344 which is implemented as procedural logic in this embodiment, is used to output disguised messages to the agent's client in the manner discussed above.
  • Filter 234 receives a send message signal as well as a signal for the disguised message to send.
  • the undisguised message is typically one of several messages such as: "probable acceptable alternative, do you accept”, “iterations exceeded, recommend continue”, “iterations exceeded, recommend withdrawal”, “recommend immediate withdrawal”, a dummy transmission to motivate negotiation, and “request approval to increase offer", among others.
  • the send message signal initiates the transmission of a disguised message for the given message output by primary network 202.
  • the decoded selector signal sel is also received as input to block 234 as well as unfiltered selector values for inclusion in the message as needed.
  • Other value signals such as the current and/or last prices offered by the other party and stored in registers 220, 222, and the product characteristics supplied to filter 214, may also be received as input for incorporation in the message to the manager.
  • filter 234 outputs a message to the agent manager.
  • the message may be text, binary or other data formats which are recognizable by the agent manager.
  • the message may be a textual message representative of one of the undisguised messages, but with the selector indicating another message than that represented by the undisguised message (e.g., with a certain selector, "recommend immediate withdrawal” may be interpreted by the agent manager to mean "probable acceptable alternative, do you accept" .
  • module 200 the decision making and message disguising functions of agent 100, which may be conceptually considered to be performed by separate decision making and message disguising modules or mechanisms (e.g., as illustrated by blocks 134 and 141 in Fig. 7) , are both principally implemented in primary network 202. It should also be appreciated that the functions may be separated into different neural networks in the alternative. Moreover, it should be appreciated that primary network 202 may also be implemented via an interconnected network of separate neural networks.
  • primary network 202 may implement a number of negotiation strategies consistent with the invention.
  • U.S. Patent Application Serial No. 08/821,935 entitled “INTELLIGENT AGENT WITH NEGOTIATION CAPABILITY AND METHOD OF NEGOTIATION THEREWITH", which has been incorporated by reference, discloses a negotiation strategy which relies on the previous and current offers from the agent as well as the previous and current prices offered by the other party.
  • a number of additional negotiation features suitable for use by primary network 202 are also implemented in the aforementioned application, including dynamic value determination, disguising negotiation strategy by randomizing an agent's behavior, and limiting unproductive negotiations by constraining an agent's behavior, among others.
  • Other negotiation strategies and features may also be used consistent with the invention.
  • a wide variety of known neural network designs may be used for primary neural network 202 and any of the illustrated network filters consistent with the invention.
  • one suitable neural network design is a back propagation neural network known in the art.
  • Other neural network designs, including a radial basis function network, among others, may also be used in the alternative.
  • a suitable development environment for performing the development and training of such neural networks is the IBM Neural Network Utility available from International Business Machines Corporation, among others.
  • Training for the networks in module 200 is performed via the Supervised training process for neural networks, with the exception of the additional input provided by the decoded selector signal.
  • Each neural network/filter in module 200 may be trained separately, although the training process is significantly simplified if the entire module 200 is trained at once using combined training records.
  • one suitable process for training module
  • network training routine 300 is illustrated by network training routine 300 in Fig. 9.
  • the program flow includes three nested for-next loops.
  • the first for-next loop illustrated at block 302, cycles through each possible value of the selector(s).
  • a second for-next loop illustrated at block 302, cycles through each training record.
  • a suitable training record may have the general format illustrated in Table II above.
  • cycles through each output in the record, and at block 310, generates a trained output value using a transform function that is based upon the current value of the selector, and the desired output.
  • the trained output is retrieved using a transform table, e.g., as illustrated by Table I above, where a disguised message is selected from a set of messages to represent a desired output.
  • block 308 passes control to block 312 to train the neural network using the training record, current selector and the disguised outputs.
  • control then returns to block 304 to process the next training record.
  • Program flow continues until module 200 has been trained with each training record, as modified for each value of the selector(s) .
  • routine 300 a primary benefit of routine 300 is that training is simplified since the need to generate separate training records for each selector value is eliminated. In the alternative, however, individual training records for each value of the selector may be generated, e.g., in the forms illustrated in Tables III-V above.
  • module 200 of agent 100 may be trained by an agent manager to handle all possible situations, including all of the types of goods/services, etc. to be purchased or sold by the agent, whereby the agent manager merely dispatches the agent when negotiations are desired.
  • the agent manager may train an agent with only the information related to a particular desired transaction immediately prior to dispatching the agent. This latter process may require additional time to dispatch an agent once a transaction is desired, however, the size and complexity of the agent may be significantly reduced if the agent is more narrowly focused.
  • agent 100 may be required for the autonomous operation of agent 100, and that such additional functionality may be implemented via procedural logic and/or neural networks, whether incorporated within negotiation module 200 or in a separate program module.
  • additional functionality may be implemented via procedural logic and/or neural networks, whether incorporated within negotiation module 200 or in a separate program module.
  • functions such as initialization, maintenance, finding other agents or markets to interact with, etc. may also be utilized.
  • these functions relate more to the basic operation of an agent, which is in general known in the art, these functions will not be discussed in any greater detail herein.
  • Other modifications will be apparent to one skilled in the art. Therefore, the invention lies solely in the claims hereinafter appended.

Abstract

An intelligent agent (42) and its client (10) communicate using a selector known by both parties to generate and interpret messages and thereby effectively disguise confidential information transmitted in the messages from third parties. Moreover, a neural network is used to implement the decision logic and/or the message disguising functions of an agent (42) such that the logic employed in such functions is not readily reverse compiled or scanned by third parties.

Description

Description
Apparatus and Method for Communicating
Between an Intelligent Agent and Client Computer
Process Using Disguised Messages
Cross-reference to Related Applications
This application is related to the following U.S. Patent Applications, all of which were filed on even date herewith by Bigus et al: U.S. Serial No. 08/821,935 entitled "INTELLIGENT AGENT WITH NEGOTIATION CAPABILITY AND METHOD OF NEGOTIATION THEREWITH", U.S. Serial No. 08/826,107 entitled "APPARATUS AND METHOD FOR OPTIMIZING THE PERFORMANCE OF COMPUTER TASKS USING MULTIPLE INTELLIGENT AGENTS HAVING VARIED DEGREES OF DOMAIN KNOWLEDGE" and U.S. Serial No. 08/822,993 entitled "APPARATUS AND METHOD FOR OPTIMIZING THE PERFORMANCE OF COMPUTER TASKS USING INTELLIGENT AGENT WITH MULTIPLE PROGRAM MODULES HAVING VARIED DEGREES OF DOMAIN KNOWLEDGE". The disclosures of all of these applications are hereby incorporated by reference herein.
Field of the Invention The invention is generally related to intelligent agent computer programs executable on computer systems and the like, and in particular, the decision logic and communications mechanisms used by such programs.
Background of the Invention Since the advent of the first electronic computers in the 1940 's, computers have continued to handle a greater variety of increasingly complex tasks. Advances in semiconductors and other hardware components have evolved to the point that current low-end desktop computers can now handle tasks that once required roomfuls of computers.
Computer programs, which are essentially the sets of instructions that control the operation of a computer to perform tasks, have also grown increasingly complex and powerful. While early computer programs were limited to performing only basic mathematical calculations, current computer programs handle complex tasks such as voice and image recognition, predictive analysis and forecasting, multimedia presentation, and other tasks that are too numerous to mention.
However, one common characteristic of many computer programs is that the programs are typically limited to performing tasks in response to specific commands issued by an operator or user. A user therefore must often know the specific controls, commands, etc. required to perform specific tasks . As computer programs become more complex and feature rich, users are called upon to learn and understand more and more about the programs to take advantage of the improved functionality. In addition to being more powerful, computers have also become more interconnected through private networks such as local area networks and wide area networks, and through public networks such as the Internet. This enables computers and their users to interact and share information with one another on a global scale. However, the amount of information is increasing at an exponential rate, which makes it increasingly difficult for users to find specific information.
As a result of the dramatic increases in the both complexity of computer programs and the amount of information available to users, substantial interest has developed in the area of intelligent agent computer programs, also referred to as intelligent agents or simply agents, that operate much like software-implemented passistantsp to automate and simplify certain tasks in a way that hides their complexity from the user. With agents, a user may be able to perform tasks without having to know specific sequences of commands. Similarly, a user may be able to obtain information without having to know exactly how or where to search for the information.
Intelligent agents are characterized by the concept of delegation, where a user, or client, entrusts the agents to handle tasks with at least a certain degree of autonomy. Intelligent agents operate with varying degrees of constraints depending upon the amount of autonomy that is delegated to them by the user.
Intelligent agents may also have differing capabilities in terms of intelligence, mobility, agency, and user interface. Intelligence is generally the amount of reasoning and decision making that an agent possesses. This intelligence can be as simple as following a predefined set of rules, or as complex as learning and adapting based upon a user's objectives and the agent's available resources. Mobility is the ability to be passed through a network and execute on different computer systems. That is, some agents may be designed to stay on one computer system and may never be passed to different machines, while other agents may be mobile in the sense that they are designed to be passed from computer to computer while performing tasks at different stops along the way. User interface defines how an agent interacts with a user, if at all.
Agents have a number of uses in a wide variety of applications, including systems and network management, mobile access and management, information access and management, collaboration, messaging, workflow and administrative management, and adaptive user interfaces. Another important use for agents is in electronic commerce, where an agent may be configured to seek out other parties such as other users, computer systems and agents, conduct negotiations on behalf of their client, and enter into commercial transactions.
Just as human agents have a certain amount of autonomy, intelligent agents similarly have a set of constraints on what they are authorized and not authorized to do. For example, a selling agent for electronic commerce applications may be constrained by a minimum acceptable price. However, a good selling agent, whether electronic or human, would never initially give its lowest acceptable price, as this would minimize profit margins. Furthermore, giving the lowest price may not even assure sales because a buyer may infer that the price is not competitive because the agent is unwilling to lower the price from the original offer. Therefore, an agent typically starts negotiations with some margin from its worst case acceptable price, then works toward a mutually acceptable price with the other party.
Any negotiation plans, techniques, strategies or other confidential information used by an intelligent agent to operate within its constraints, however, often should be hidden from other parties. Otherwise, the agent is placed at a competitive disadvantage. Given that many agents may be dispatched to unsecured environments, an assumption must be made that other parties may be able to scan or reverse engineer an agent to learn its negotiation strategy or other constraints. It must also be assumed that other parties may be able to decode messages sent between an agent and its client to obtain the greatest advantage in negotiation. The validity of such assumptions stems from the fact that these techniques are conceptually similar to many of the techniques used by some salespeople to obtain the best price possible.
For example, if a message to an agent from its client indicates that the agent should offer $100, but is authorized to go as low as $90, another party that intercepts this message immediately knows that a transaction may be completed at the lower price. Also, even if the message is not intercepted, if the agent has stored the $90 price as its lowest authorized offer, reverse compilation or scanning of the agent by another party may lead to similar results.
Efforts have been made to encrypt messages between an agent and its client. However, most conventional encryption methods rely on private pkeysp for the agent and the client. Encryption presupposes that both the sender and receiver are in secured environments - - only the transmission path between them is unsecured. However, as an agent may be resident on and executing in an unsecured environment, the agent may be reverse compiled or scanned to obtain its private key and thereby break the encryption. Consequently, conventional encryption techniques do not adequately protect the confidential communications of agents or other computer programs executing in unsecured environments. Therefore, a significant need exists in the art for a manner of protecting the confidential information of an intelligent agent computer program.
Summary of the Invention The invention addresses these and other problems associated with the prior art in providing a manner of communication between an agent and its client where a selector is used in the generation and interpretation of messages to effectively disguise confidential information transmitted in the messages from third parties. In contrast to encryption techniques which attempt to scramble the contents of a message, the selector controls how a given message, which need not be scrambled, is interpreted by transmitting and receiving parties . A selector for use with the various embodiments of the invention may be a predetermined parameter known to both the agent and client, or may be transmitted between the agent and client in the same message as the confidential information or in a separate message. Moreover, the selector may be maintained as a distinct parameter that is known by or transmitted between the parties, or may be derived from an existing parameter having another use or purpose.
The selector may be used in a number of manners to disguise confidential information. For example, the selector may be used to select one of a plurality of messages to transmit, to select one of a plurality of alternate meanings for a particular message, to select where the confidential information is in a plurality of transmitted messages, and to indicate which of a plurality of messages to omit from a transmission, among others.
Moreover, in certain embodiments of the invention, the decision logic of an agent may be disguised from third parties through the use of neural networks to implement part or all of the decision logic. Neural networks, which rely on interconnected nodes having variable weights to encode logic, are not readily reverse compiled or scanned, thus offering significant security advantages for an agent that is operating in an unsecured environment.
These and other advantages and features, which characterize the invention, are set forth in the claims annexed hereto and forming a further part hereof. However, for a better understanding of the invention, and of the advantages and objectives attained through its use, reference should be made to the Drawing, and to the accompanying descriptive matter, in which there is described illustrated embodiments of the invention.
Brief Description of the Drawing
FIGURE 1 is a flowchart illustrating the operation of an intelligent agent consistent with the principles of the invention, utilizing procedural decision making and message disguising.
FIGURE 2 is a flowchart illustrating the operation of another intelligent agent consistent with the principles of the invention, utilizing neural network-implemented decision making and procedural message disguising. FIGURE 3 is a flowchart illustrating the operation of another intelligent agent consistent with the principles of the invention, utilizing neural network-implemented decision making and message disguising.
FIGURE 4 is a block diagram of a networked computer system environment for use with the illustrated embodiments of the invention.
FIGURE 5 is a block diagram of the networked computer system of Fig. 4, illustrating the interaction between intelligent agents therein. FIGURE 6 is another block diagram of the networked computer system of Fig. 4, illustrating in greater detail the primary components in the client and remote computer systems.
FIGURE 7 is a flowchart illustrating the interaction between the agent manager, mobile agent and negotiating agent (other party) of Fig. 5. FIGURES 8a and 8b are block diagrams illustrating the primary components in one embodiment of the intelligent agent of Fig. 5.
FIGURE 9 is a flowchart illustrating the program flow of a network training routine for use in training the neural network in the intelligent agent of Figs. 8a and 8b.
Detailed Description of the Illustrated Embodiments
The embodiments of the invention incorporate various manners of disguising confidential information in an intelligent agent from third parties.
Intelligent agents are computer programs which have been delegated a degree of autonomy but which are limited to operating within constraints defined by their client (which may be, for example, another agent; a computer program, application or system; or an individual interacting with the agent through a computer -- hereinafter a client computer process) . A subset of such agents which are capable of being passed between and operating in different applications or computer systems are referred to as mobile agents. In general, an agent has the ability to sense, recognize and act. These functions are typically embodied in a number of components, including an engine, a knowledge component, an adapters component, a library, and a view component. Generally, the engine controls the overall operation of an agent and functions as the pbrains of the agent, and the knowledge component stores information that is representative of the acquired knowledge of the agent. The adapters component handles interaction between an agent and external objects, thereby functioning as the mechanism through which the agent psensesp and interacts with its environment. A library persistently stores the information utilized by the knowledge component, and the view component provides the human interface, if any, for an agent, e.g., for supplying instructions to the agent. An agent may receive, transmit, store and otherwise utilize confidential information such as data, unique decision logic or strategies, desired goals, etc. to which a client may wish to limit access by third parties. For example, in electronic commerce applications, an agent may wish to prevent parties with which it is negotiating from knowing certain information such as its negotiation strategy and authorized offer limits. This confidential information may be subject to scrutiny, however, if another party is capable of intercepting messages between the agent and its client, or if another party is capable of reverse compiling or otherwise scanning the program code of the agent.
To address the former problem, the embodiments of the invention utilize a unique signaling methodology which relies on a selector that is ultimately known by both the agent and agent manager to generate and interpret messages which disguise the confidential information contained therein. As will become apparent below, in contrast to encryption techniques, the messages need not be modified, encrypted or scrambled, as the selector is used primarily to interpret the meaning of the messages. One difference between the use of a selector and encryption techniques is that, in the case of a selector, a third party may mistakenly believe a message has a different meaning than its true meaning and may inadvertently act to the advantage of the client. Another advantage over encryption is that the fact that a message is disguised is not readily apparent, whereby the message typically does not stand out relative to other messages. It should be appreciated, however, that encryption techniques may be used in combination with message disguising in certain embodiments of the invention, with encryption used on disguised or undisguised messages. In one embodiment, for example, the information to be transmitted may be sent in disguised messages with encrypted decoy messages also sent to draw attention away from the disguised messages.
For example, Fig. 1 illustrates a program flow for an intelligent agent 160 consistent with the invention. Agent 160 operates by receiving input at block 162 and making a decision based upon the input at block 164. Block 164 outputs confidential information therefrom, which is disguised in a message in block 166 based upon a selector 167. The message is then sent in block 168 and control returns to block 162.
The use of a selector may be analogized to the hand signals used by baseball players and coaches to communicate during a baseball game (e.g., pulling on the ear, touching the nose, etc.). The signals or messages are visible to all, yet are difficult, if not impossible, to interpret because they are known only to the team using them, and because their meanings are often changed. Certain signals may have different meanings in different situations, which may confuse the other team or cause the other team to mistakenly believe a particular signal has another meaning.
The selector may be used in a number of manners to disguise confidential information. For example, a selector may be used to select one of a plurality of messages to transmit to convey a particular piece of confidential information. Moreover, one or more of the messages may have a plurality of alternate meanings. This may permit one set of messages to represent a plurality of pieces of confidential information, although it should be appreciated that messages need not have more than one meaning.
For example, Table I below shows a transform table illustrating how three messages bAp, pBp and pCp from a message set may be used by an agent to convey three pieces of confidential information (here, whether to accept or counteroffer) depending upon the value of a selector:
Figure imgf000011_0001
Table I : Example Transform Table One advantage of this configuration is that the messages, beyond disguising their contents or intended meaning, may cause another party to mistakenly believe a particular message has a different meaning. For example, if a buying agent sends a message to the client seeking authorization to complete a transaction at the last offered price, but the message is interpreted by the selling party to mean that the agent wants to terminate negotiations, the selling party may reduce its price to try to complete the transaction. A selector may also be used to select which of a plurality of messages contains the desired confidential information. For example, messages A, B and C from Table I above could all be transmitted together, within a single transmission, with the selector indicating which of the messages should be considered. Similarly, a selector may be used to select which of a plurality of messages to omit from a transmission. For example, for a set of messages A-C, transmit messages A and B but not C to convey a certain piece of information. A selector may be a predetermined parameter known to both the agent and client. For example, the selector may be modified after a predetermined number of communications or cycles (e.g., every three transmissions).
A selector may also be transmitted between the agent and client in the same message as the confidential information, in a separate message within the same transmission, or in a separate transmission altogether. For example, an agent manager may transmit an pincrement selectorp message to the agent so that the next selector value in a set of possible values is used, or an agent may precede a message with a separate message indicating from which message set the manager should interpret the message (e.g., for Table I, message D indicates selector 1, message E indicates selector 2, message F indicates selector 3) . Multiple selectors may be interleaved with the confidential information in a message, e.g., sets of bits. For example, a 32 bit message could contain 3 8 -bit pieces of data, along with 8 -bits of selector information parsed into 4 2 -bit selectors that are disposed at the boundaries of the 8 -bit pieces of data. A look-up table may be utilized to assist in the interleaving of selector information into a message. In addition, other extraneous information that is ignored during interpretation may be included in a message, e.g., a few high order bits may be added to a value, but may be ignored during interpretation. Furthermore, information may be split between multiple messages or transmissions, with a selector controlling from where the information may be retrieved and how it is to be interpreted.
Moreover, the selector may be maintained as a distinct parameter that is known by or transmitted between the parties, or may be derived from an existing parameter having another use or purpose. For example, a selector may be derived from the time stamp on a message (e.g., the last digit, or the remainder when the sum of the digits is divided by three, etc.), or from a checksum value for the message. Other seemingly innocuous information, whether known to both the client and agent, or transmitted therebetween, may be used to generate a ppseudo-randomp selector.
Agent 160 of Fig. 1 illustrates a procedural process of decision making and message disguising, whereby a series of steps are executed sequentially by a computer program to handle the functions in blocks 164 and 166. However, procedural logic may be subject to reverse compilation and scanning by third parties. One alternative to agent 160 is illustrated in Fig. 2, where an agent 170 substitutes a neural network 172 for procedural decision making. Message disguising is still handled through a procedural block 176 which receives a selector 177 and outputs a disguised message sent via block 178.
The implementation and training of neural networks is well known in the art. The primary advantage of neural network-implemented decision making is that it is extremely difficult to determine the logic trained into a neural network since the logic is based upon weights, and not on a procedural process. A neural network utilizes a set of processing elements or nodes that are interconnected in a network, with each node typically outputting a weighted sum of its inputs. The weight to apply to each input to a node is plearnedp over time by a neural network by training the network with sample, or training, data.
However, while agent 170 is significantly more resistant to scrutiny by third parties, the agent may still be subject to some scrutiny since a procedural process is used in block 176 to generate disguised messages from an undisguised output generated by the neural network. It must be assumed that any undisguised data stored in an agent may be subject to reverse compilation and scanning when the agent is in an unsecured environment. Fig. 3 illustrates an agent 180 which extends the use of a neural network to both decision making and message disguising. A neural network 182 receives a plurality of inputs, including also one or more selectors (e.g., selectors 184 and 186) from which a disguised message is generated. Also, neural network 182 only outputs one or more disguised outputs (e.g., disguised output 1 and disguised output 2). Consequently, at no point is any undisguised data stored in agent 180.
Training of neural network 182 requires additional training records or examples to handle message disguising in view of the additional input of a selector to the network. For example, to train a neural network without disguised messages, the standard training data would include N training records, as shown in Table II below:
Inputs Outputs il . l il .2 il .3 . . ol i2. 1 i2 .2 i2 .3 o2 iN.l iN.2 iN.3 ... ON Table II: Standard Training Records However, to also train the neural network to disguise messages, additional training records are required given that an output may be represented by more than one message. In general one group of training records are required for each possible value of the selector, which may be accomplished merely by reusing the original pure training information, duplicated for each value of the selector (e.g., 1 - K) , and with the messages (e.g., messages A, B, ... M) properly arranged for each value, as shown in Table III below:
Inputs Selector Outputs il.l il.2 il.3 1 msg l.A i2.1 i2.2 i2.3 1 msg l.B iN.l iN.2 iN.3 1 msg l.M il.l il.2 il.3 2 msg 2.A i2.1 i2.2 i2.3 2 msg 2.B iN.l iN.2 iN.3 2 msg 2.M il.l il.2 il.3 3 msg 3.A i2.1 i2.2 i2.3 3 msg 3.B iN.l iN.2 iN.3 3 msg 3.M il.l il.2 il.3 K msg K.A i2.1 i2.2 i2.3 K msg K.B iN.l iN.2 iN.3 ... K msg K.M
Table III : Example Training Records - One Selector
To output more than one disguised message at a time requires no additional training besides that required by the number of inputs. For example, as shown in Table IV, to generate three output messages, the following training data may be used: Inputs Selector Outputs il.l il.2 il.3 . 1 msg l.Al msg 1.A2 msg 1.A3 i2.1 i2.2 i2.3 . 1 msg 1.B1 msg 1.B2 msg 1.B3 iN.l iN.2 iN.3 . 1 msg l.Ml msg 1.M2 msg 1.M3 il.l il.2 il.3 . 2 msg 2.A1 msg 2.A2 msg 2. A3 i2.1 i2.2 i2.3 . 2 msg 2.B1 msg 2.B2 msg 2.B3 iN.l iN.2 iN.3.. 2 msg 2. Ml msg 2.M2 msg 2.M3 il.l il.2 il.3.. 3 msg 3.A1 msg 3.A2 msg 3. A3 i2.1 i2.2 i2.3.. 3 msg 3.B1 msg 3.B2 msg 3.B3 iN.l iN.2 iN.3 . 3 msg 3. Ml msg 3.M2 msg 3.M3 il.l il.2 il.3 . K msg K.Al msg K.A2 msg K.A3 i2.1 i2.2 i2.3 . K msg K.Bl msg K.B2 msg K.B3 iN.l iN.2 iN.3 ... K msg K.Ml msg K.M2 msg K.M3
Table IV: Example Training Records - Multiple Messages
In addition, to generate disguised messages based upon more than one selector, a set of training data is required for each combination of selector values. For example, as shown in Table V, for a set of three selectors, and two outputs, the following training data may be used:
Inputs Selector Outputs il.l il.2 il.3 1.1.1 msg 1.1. l.Al msg 1.1.1.A2 i2.1 i2.2 i2.3 1.1.1 msg 1.1.1.B1 msg 1.1.1.B2 iN.l iN.2 iN.3 1 1.1 msg 1.1. l.Ml msg 1.1.1.M2 il.l il.2 il.3 1 1.2 msg 1.1.2.A1 msg 1.1.2.A2 i2.1 i2.2 12.3 1 1.2 msg 1.1.2.B1 msg 1.1.2.B2 iN.l iN.2 iN.3 1. msg 1.1.2. Ml msg 1.1.2.M2 il.l il.2 il.3 X. msg X.Y.1.A1 msg X.Y.1.A2 i2.1 i2.2 i2.3 X. msg X.Y.1.B1 msg X.Y.1.B2 iN.l iN.2 iN.3 X.Y.I msg X.Y.I. Ml msg X.Y.1.M2 il.l il.2 il.3 X.Y.Z msg X.Y.Z.A1 msg X.Y.Z.A2 i2.1 i2.2 i2.3 X.Y.Z msg X.Y.Z.B1 msg X.Y.Z.B2 iN.l iN.2 iN.3 X.Y.Z msg X.Y.Z. Ml msg X.Y.Z.M2
Table V: Example Training Records - Multiple Selectors
It should be appreciated that the training records used to train a neural network depend upon the particular logic desired to be encoded in the network. Moreover, it should be appreciated that the message disguising function of an agent may be implemented either via a neural network or with procedural decision making, and that separate neural networks may be used for the decision making and message disguising functions. In addition, various additional functions for an agent may be incorporated into the same or different neural networks as for either the decision making or message disguising functions. Other modifications will be apparent to one skilled in the art.
Exemplary Hardware/Software Environment
A representative hardware environment suitable for the training and/or hosting of intelligent agents consistent with the invention is illustrated in Fig. 4, where a networked computer system 10 generally includes one or more computer systems, e.g., single-user computer systems 16, 18 and multiuser computer systems 20, 60, coupled through a network 15. Multi-user computer system 20 typically includes one or more servers 25 to which one or more single-user computers 22 may networked through a separate network 24. Similarly, multi-user computer system 20 typically includes one or more servers 65 coupled to one or more single-user computer systems 62 through a network 64. Network 15 may represent any type of networked interconnection, including but not limited to local -area, wide- area, wireless, and public networks (e.g., the Internet). It is anticipated that agents consistent with the invention may originate in and be resident from time to time on any of the above-mentioned computer systems. One possible distinction between the computer systems for the purposes of the invention may be whether each is a client or a remote system relative to a particular agent. For example, Fig. 5 illustrates an embodiment of computer system 10 where multiuser computer system 20 is a client system, and multi-user computer system 60 is a remote system.
A client system will hereinafter refer to a computer system that provides an agent a certain level of security from manipulation by other parties when the agent is resident on the system. The client system is also the computer system from which management of the agent is typically handled. The agent typically but not necessarily will also originate from the client system. A remote system, on the other hand, will hereinafter refer to a computer system that is typically not capable of providing a desired level of security for an agent, generally because the computer system is not under the control of the client. It is typically while resident on a remote system that an agent runs the greatest risk of being scanned or reverse compiled, or of having communications intercepted or monitored, by other parties.
The various embodiments described herein have principal uses in electronic commerce applications, where agents are configured to negotiate commercial transactions, generally in the role of buying or selling agents. The agents may negotiate with other agents, other computer systems, or even other individuals. The agents may interact one-on-one, or may be capable of operating within a pmarketp of multiple agents, along the lines of a stock or commodity market. Computer systems having the ability to host agents for interaction therebetween include negotiating programs of varying sophistication and are hereinafter referred to as agent hosts. However, it should be appreciated that the invention applies equally to other applications of intelligent agents, and thus should not be limited specifically to commercial applications.
Fig. 5 illustrates a mobile intelligent agent 100 which communicates with an agent manager 32 in client system 20. During negotiation with another party such as negotiating agent 95, mobile agent 100 is resident on remote system 60. It should be appreciated that remote system 60 may be the client for agent 95, or may also be considered to be remote relative to this agent as well. An exemplary functional design of networked computer system 10 for implementing the various embodiments of the invention is illustrated in Fig. 6. Server 25 of client system 20 generally includes a central processing unit (CPU) 28 coupled to a memory 30 and storage 40 over a bus 54. A local area network interface is provided at 52, and an interface to remote system 60 over external network 15 is provided through interface 50. Agent manager program 32 is resident in memory 30, as is an agent trainer program 34 which trains agents. Storage 40 includes one or more trained agents 42 (of which may include agent 100, for example), which are computer programs or modules that may be retrieved and used locally within system 20, or dispatched to remote systems to execute and perform tasks on behalf of the client system. Storage 40 also includes an agent mission database 44 which may track agent operations and the relative success or failure thereof. Moreover, a training database 46 includes training data utilized by agent trainer program 34 to train agents, and translation tables 48 are utilized by agent trainer program 34 as well as by agent manager 32 to encode and decode messages to and from mobile agents, as will be discussed in greater detail below.
Server 65 of remote system 60 also includes a CPU 68 coupled to a memory 70, storage 80, external network connection 90 and local network connection 92 over a bus 94. An agent host program 72 is resident in memory 70 to handle interactions between agents resident in the remote system. Typically, the agent host program is an asynchronous message/event driven environment that provides a common platform over which agent computer programs execute and interact, much like an operating system. The agent host is also capable of permitting messages to be sent between agents and their clients. Memory 70 also includes a negotiating program 74 which operates as the pother partyp in transactions with agent 100, which may be another agent, a market or bulletin board application, or even an interface program through which an individual interacts with agent 100. Storage 80 maintains a transaction history database 82 which logs the transactions completed on the server. Servers 25, 65 may be, for example, AS/400 midrange computers from International Business Machines Corporation. However, it should be appreciated that the hardware embodiments described herein are merely exemplary, and that a multitude of other hardware platforms and configurations may be used in the alternative.
Moreover, while the invention has and hereinafter will be described in the context of fully functioning computer systems, those skilled in the art will appreciate that the various embodiments of the invention are capable of being distributed as a program product in a variety of forms, and that the invention applies equally regardless of the particular type of signal bearing media used to actually carry out the distribution. Examples of signal bearing media include but are not limited to recordable type media such as floppy disks, hard disk drives, and CD-ROM's, and transmission type media such as digital and analog communications links.
Decision Making and Message Disguising with Intelligent Agents
Fig. 7 illustrates an exemplary program flow illustrating the interaction between an agent 100, agent manager 32 and another party, negotiating agent 95. Negotiations are generally instituted by agent manager 32 by dispatching agent 100 to a remote system, as illustrated in block 130. It should be appreciated that agent 100 may be dispatched with a desired transaction or transactions which the client wishes to complete (including information such as desired quantity, description of goods/services to be sold/purchased, etc.), as well as any other constraints placed upon the agent by the manager (e.g., the number of negotiation iterations to process, a maximum or minimum limit on the amount to offer, etc.). In the alternative, some or all of this information may be relayed to agent 100 at a later time by agent manager 32.
Next, in block 132, agent 100 gathers and filters information after it has been dispatched to the remote system. For example, agent 100 may poll a bulletin board or market for outstanding offers, or may attempt to find and initiate negotiations with another party, e.g. , another computer system, another agent, or an individual interacting through a computer system. Agent 100 may also simply wait for incoming offers from other parties. Block 132 also performs the functions of processing messages from other parties and from the agent manager. Next, in response to input received by agent 100, a decision is made by agent 100 in block 134. It is in this block that the negotiation strategy of agent 100 is implemented, whereby the agent determines, based upon the input it receives, whether and how to proceed in negotiations with another party. Also, supportive procedural processing is completed, such as incrementing internal counts, e.g., the number of iterations (discussed below) .
Generally, one of three actions may be instituted in response to block 134. First, as illustrated by block 136, agent 100 may decide to send a message to other party 95, e.g., indicating acceptance or rejection of an outstanding offer, issuing an offer or counteroffer, terminating negotiations, requesting that the other party wait, etc. The other party receives the message at block 138 and processes it at block 140, typically issuing a response message back to agent 100. Control of agent 100 returns to block 132 to process the response message from party 95.
Second, as illustrated by blocks 141 and 142, agent 100 may decide to send a message back to agent manager 32. Consistent with the invention, this message is disguised in block 141 in the manner disclosed herein, and then sent in block 142. Agent manager 32 then receives and interprets the message at block 144, processes the message in block 146 and disguises and sends a response message back to agent 100 in block 148. Upon receipt of the response message, block 150 interprets the message and passes control to block 132 to process the response message from agent manager 32.
Third, as illustrated by block 152, agent 100 may decide to leave the remote system and return to its client system, e.g., after completion of a successful transaction or after termination of an unsuccessful negotiation. The return of the agent is illustrated in block 154. The illustrated program flow for agent 100 is an example of a semi -autonomous agent that has authority to negotiate with another party with limits on the offer amount and the number of iterations (offers made by the agent) that the agent can undertake on its own. Agents with greater or lesser degrees of domain knowledge may also be used consistent with the invention. For example, a fully autonomous agent may be delegated the authority to negotiate without any input other than a desired transaction. In contrast, a fully dependent agent may have little authority other than to act as an intermediary by issuing offers and completing transactions pursuant to specific instructions from a manager and reporting the results back to the manager.
Various agents of this type are discussed further, for example, in U.S. Patent Application Serial Nos. 08/826,107 and 08/822,993, respectively entitled "APPARATUS AND METHOD FOR OPTIMIZING THE PERFORMANCE OF COMPUTER TASKS USING MULTIPLE INTELLIGENT AGENTS HAVING VARIED DEGREES OF DOMAIN KNOWLEDGE" and "APPARATUS AND METHOD FOR OPTIMIZING THE PERFORMANCE OF COMPUTER TASKS USING INTELLIGENT AGENT WITH MULTIPLE PROGRAM MODULES HAVING VARIED DEGREES OF DOMAIN KNOWLEDGE", which have been incorporated by reference. As is also discussed in these applications, agent 100 may be one of several agents having varying degrees of domain knowledge, or may have multiple modules with varying degrees of domain knowledge, so that the agent may be optimized for operation in different situations based upon an objective criteria (e.g., security concerns).
The primary components in agent 100 for implementing the program flow of Fig. 7 are illustrated by negotiation module or mechanism 200 in Figs. 8a and 8b. A mechanism or module may be considered to include any function, object, or block of program code configured to perform a desired task or operation.
Module 200 is configured to utilize a selector such as a message time stamp or other transmitted parameter, with a single set of messages used to disguise various confidential instructions and requests passed between the client and the agent. The client and agent in this embodiment transmit only one message at a time to represent a given instruction or request, and some if not all of the messages have alternate meanings depending upon the value of the selector. However, it should be appreciated that any of the above-described modifications and variations in terms of possible selectors and manners of disguising messages may be used in the alternative. Module 200 is configured to receive the following inputs : - other party's last price other party's current price agent's last public offer product characteristics instruction from manager: -- increase in offer authorized increase in iterations authorized increase in offer not authorized increase in iterations not authorized last message sent back to manager - selector(s)
In addition, module 200 is configured to generate the following outputs : public price offer message to other party -- make offer withdraw accept reject counteroffer - - please wait finished message to manager probable acceptable alternative, do you accept -- iterations exceeded, recommend continue iterations exceeded, recommend withdrawal recommend immediate withdrawal dummy transmission to motivate negotiation request approval to increase offer
Two variables, the number of iterations and the offer increment (the current authorized negotiation margin for the agent) , are also maintained in module 200 for feedback purposes, but are generally not accessed by external sources.
Moreover, for training purposes, additional information may also be used in the generation of suitable training records, although the information is not directly input to the module. Such information includes: - desired price and features agent autonomy price range (range of prices within which agent is authorized to negotiate autonomously) manager approval price range (range of prices within which agent requires approval from manager) acceptable iterations allowed without approval
Module 200 includes a primary neural network 202 in which the decision logic for decision making (including negotiation strategy) , message disguising, and other functions is implemented. In addition, as shown in Fig. 8a, a number of filters 204-214 are utilized at the input side of primary network 202 to condition the inputs to the network, since neural networks typically operate on weights in the range of - 1 to +1, or 0 to +1. Filters 204-214 may be implemented using procedural logic, or alternatively, may be implemented using separate neural networks to increase security.
A selector decode filter 204 is implemented in this embodiment as a neural network which receives the desired selector information and outputs a decoded selector signal, designated sel. The decoded selector signal is provided to primary network 202, as well as to a number of the filters in module 200, as detailed below. The configuration of filter 204 will vary depending upon the type of information used as a selector. For example, if a time stamp or other transmitted parameter is used, such information would be input to filter 204. On the other hand, if a non- ransmitted parameter is used, e.g., if the selector is changed every n transmissions, then filter 204 may be configured as a logic element such as a counter which is incremented every n transmission cycles. Because it may be possible for selector values to be observed as they are being gathered, any amount of superfluous information may also be gathered to assist in deception.
The last and current prices offered by the other party to the negotiation are stored in a pair of registers 220, 222 and conditioned by filters 206 and 208, which in this embodiment are implemented using neural networks. In addition, the last offer generated by the agent is stored in a register 224 and conditioned by filter 210, also implemented as a neural network. Filters 206-208 also receive the decoded selector input. Registers 220 and 222 are maintained by the information gathering block 132 (Fig. 7) based upon the prices received from the other party. Register 224 is maintained by a price offer generator filter 228 (Fig. 8b, as discussed below) .
In addition, each filter 206-210 outputs an identification (ID) signal, as well as three data signals designated value 1, value 2 and value 3. The ID signal output by each filter operates similar to a selector to indicate which of the n (here three) data signals includes the conditioned representation of the corresponding register's contents. The other two data signals operate are unused and act as decoys to deter reverse compilation of the decision logic of the module. The ID signal may be a function of the decoded selector input, or may be independent thereof. In the alternative, a single value signal may be connected between each filter 206-210 and primary network 202 if detection of these conditioned signals is not a concern. An instruction decode network filter 212 receives binary messages from the client, as well as the decoded selector signal to interpret the messages. A single instruction signal is output from filter 212. The instruction signal varies for any given message depending upon the value of the decoded selector signal.
An optional basic requirements network filter 214, which is primarily useful for a buying agent, receives one or more product characteristics related to the features of the goods/services being negotiated for compared to the features desired by the client. In response, filter 214 outputs a match signal which indicates the degree in which the products being negotiated for match what the client is actually looking for.
The product characteristics may include basic requirements that must be met to complete the transaction, as well as additional features that may not be required but which may make the products more desirable to the client. For example, for a VCR, a client may require that it have four heads, but the client may be willing to pay more for a hi-fi stereo model if one is available. The match signal for a hi-fi model being negotiated for may be weighted more strongly than one without hi-fi, and as a consequence, the agent may be configured to negotiate more strongly for the hi-fi model in response to this signal. Two additional registers 216, 218 are maintained by primary network 202 and are fed back as input thereto. An offer increment register 216 represents the current negotiation margin for the agent, as modified by the agent manager through instructions to the agent. The negotiation margin represents in filtered form that amount over which (for a buying agent) or under which (for a selling agent) the agent may complete a transaction outside of the desired price for the transaction.
An iteration register 218 maintains in filtered form the number of cycles in the current negotiation, where one cycle typically represents a transmission from the agent to another party or to the agent manager. The agent is typically trained with a number of cycles for which the agent is authorized to negotiate without approval from the manager, and this number may be varied or overridden in response to an instruction from the agent manager.
Primary network 202 also receives as feedback a price offer delta signal related to the change in the agent's last and current offers, and a send message signal and a undisguised message signal related to the last message sent from the agent to the client. Each of these signals are output from network 202 (Fig. 8b) . As shown in Fig. 8b, primary network 202 outputs a number of other signals in response to the inputs shown in Fig. 8a. A set of filters 226-234 condition these output signals from neural network levels to levels that are more useful external to the primary network. A negotiation message creator filter 226, which is implemented in this embodiment as procedural logic, receives an output signal from network 202 and any value from the price offer generator 228 and outputs a message to the other party. The output message may include a number of possible messages, such as accept, reject, counteroffer, wait request, and negotiations finished, among others. The format of the message may follow a predetermined protocol that is understandable to the other party.
A price offer generator filter 228, which is also implemented in procedural logic in this embodiment, receives a price offer delta parameter and the value previously stored in my last offer block 224 and outputs therefrom the current price offer which is stored in register 224. The price offer delta parameter is also fed back to primary network 202 as described above.
The current offer may be supplied in conjunction with the message to the other party provided by filter 226. In addition, the current offer may also operate as a public offer which can be polled by other agents wishing to engage in negotiations with agent 100. The current offer may also be output to a market or bulletin board set up on an agent host to solicit negotiations with other parties. An adjust iteration filter 230, which in this embodiment is implemented with procedural logic, receives an iteration increment signal to increment register 218 in response thereto. Filter 230 also receives a reset signal to reset register 218 in response to an increase in iterations authorized instruction.
In addition, an increment processor filter 232, implemented in this embodiment with procedural logic, receives a change increment signal and an increment value signal. In response to a suitable change increment signal, the increment value represented by the increment value signal is output in filtered form and stored in register 216.
A message creator filter 234, which is implemented as procedural logic in this embodiment, is used to output disguised messages to the agent's client in the manner discussed above. Filter 234 receives a send message signal as well as a signal for the disguised message to send. As discussed above, the undisguised message is typically one of several messages such as: "probable acceptable alternative, do you accept", "iterations exceeded, recommend continue", "iterations exceeded, recommend withdrawal", "recommend immediate withdrawal", a dummy transmission to motivate negotiation, and "request approval to increase offer", among others. The send message signal initiates the transmission of a disguised message for the given message output by primary network 202.
The decoded selector signal sel is also received as input to block 234 as well as unfiltered selector values for inclusion in the message as needed. Other value signals, such as the current and/or last prices offered by the other party and stored in registers 220, 222, and the product characteristics supplied to filter 214, may also be received as input for incorporation in the message to the manager.
In response to these inputs, filter 234 outputs a message to the agent manager. The message may be text, binary or other data formats which are recognizable by the agent manager. For example, the message may be a textual message representative of one of the undisguised messages, but with the selector indicating another message than that represented by the undisguised message (e.g., with a certain selector, "recommend immediate withdrawal" may be interpreted by the agent manager to mean "probable acceptable alternative, do you accept") .
It should be appreciated that in the illustrated embodiment of module 200, the decision making and message disguising functions of agent 100, which may be conceptually considered to be performed by separate decision making and message disguising modules or mechanisms (e.g., as illustrated by blocks 134 and 141 in Fig. 7) , are both principally implemented in primary network 202. It should also be appreciated that the functions may be separated into different neural networks in the alternative. Moreover, it should be appreciated that primary network 202 may also be implemented via an interconnected network of separate neural networks.
As a component of its decision making function, primary network 202 may implement a number of negotiation strategies consistent with the invention. For example, U.S. Patent Application Serial No. 08/821,935, entitled "INTELLIGENT AGENT WITH NEGOTIATION CAPABILITY AND METHOD OF NEGOTIATION THEREWITH", which has been incorporated by reference, discloses a negotiation strategy which relies on the previous and current offers from the agent as well as the previous and current prices offered by the other party. A number of additional negotiation features suitable for use by primary network 202 are also implemented in the aforementioned application, including dynamic value determination, disguising negotiation strategy by randomizing an agent's behavior, and limiting unproductive negotiations by constraining an agent's behavior, among others. Other negotiation strategies and features may also be used consistent with the invention.
A wide variety of known neural network designs may be used for primary neural network 202 and any of the illustrated network filters consistent with the invention. For example, one suitable neural network design is a back propagation neural network known in the art. Other neural network designs, including a radial basis function network, among others, may also be used in the alternative. A suitable development environment for performing the development and training of such neural networks is the IBM Neural Network Utility available from International Business Machines Corporation, among others.
Training for the networks in module 200 is performed via the Supervised training process for neural networks, with the exception of the additional input provided by the decoded selector signal. Each neural network/filter in module 200 may be trained separately, although the training process is significantly simplified if the entire module 200 is trained at once using combined training records. For example, one suitable process for training module
200 is illustrated by network training routine 300 in Fig. 9. Generally, the program flow includes three nested for-next loops. The first for-next loop, illustrated at block 302, cycles through each possible value of the selector(s). For each value, a second for-next loop, illustrated at block 302, cycles through each training record.
For each training record, the record is obtained in block 306. A suitable training record may have the general format illustrated in Table II above. Next, a third for-next loop, illustrated at block
308, cycles through each output in the record, and at block 310, generates a trained output value using a transform function that is based upon the current value of the selector, and the desired output. The trained output is retrieved using a transform table, e.g., as illustrated by Table I above, where a disguised message is selected from a set of messages to represent a desired output.
Once suitable disguised (trained) outputs have been generated for a training record, block 308 passes control to block 312 to train the neural network using the training record, current selector and the disguised outputs. After the training record is used to train module 200, control then returns to block 304 to process the next training record. Program flow continues until module 200 has been trained with each training record, as modified for each value of the selector(s) . It should be appreciated that a primary benefit of routine 300 is that training is simplified since the need to generate separate training records for each selector value is eliminated. In the alternative, however, individual training records for each value of the selector may be generated, e.g., in the forms illustrated in Tables III-V above.
It is anticipated that module 200 of agent 100 may be trained by an agent manager to handle all possible situations, including all of the types of goods/services, etc. to be purchased or sold by the agent, whereby the agent manager merely dispatches the agent when negotiations are desired. In the alternative, the agent manager may train an agent with only the information related to a particular desired transaction immediately prior to dispatching the agent. This latter process may require additional time to dispatch an agent once a transaction is desired, however, the size and complexity of the agent may be significantly reduced if the agent is more narrowly focused.
It should be appreciated that beyond decision making and disguising messages, other functionality may be required for the autonomous operation of agent 100, and that such additional functionality may be implemented via procedural logic and/or neural networks, whether incorporated within negotiation module 200 or in a separate program module. For example, functions such as initialization, maintenance, finding other agents or markets to interact with, etc. may also be utilized. However, as these functions relate more to the basic operation of an agent, which is in general known in the art, these functions will not be discussed in any greater detail herein. Other modifications will be apparent to one skilled in the art. Therefore, the invention lies solely in the claims hereinafter appended.

Claims

Claims
1. A method of communicating between an intelligent agent computer program and a client computer process, comprising the steps of: (a) selecting a message from a plurality of messages based upon a selector and information to be transmitted between the intelligent agent and the client computer process; and (b) transmitting the selected message between the intelligent agent and the client computer process.
2. The method of claim 1, wherein the selecting and transmitting steps are performed in the intelligent agent, and wherein the method further comprises the step of determining the information to be transmitted using a neural network into which has been programmed a decision logic for the intelligent agent .
3. The method of claim 2, wherein the selecting step includes the step of selecting the message using a neural network into which has been programmed a transform table for matching a message with the information to be transmitted.
4. The method of claim 3, wherein the intelligent agent is configured to conduct negotiations in an electronic commerce application, wherein the decision logic for the intelligent agent includes a negotiation strategy, and wherein the information to be transmitted by the intelligent agent includes at least one of the group consisting of probable acceptable alternative do you accept, iterations exceeded recommend continue, iterations exceeded recommend withdrawal, recommend immediate withdrawal, request approval to increase offer, and a dummy transmission to motivate negotiation.
5. The method of claim 1, wherein the selector includes a predetermined parameter known to both of the intelligent agent and the client computer process.
6. The method of claim 5, wherein the selector is changed after a predetermined number of transmissions between the intelligent agent and the client computer process.
7. The method of claim 1, wherein the selector is transmitted between the intelligent agent and the client computer process.
8. The method of claim 1, wherein the selector is derived from an existing parameter having another purpose.
9. The method of claim 8, wherein the selector is derived from a time stamp appended to the selected message transmitted between the intelligent agent and the client computer process.
10. The method of claim 1, wherein each of the plurality of messages has a plurality of alternate meanings which are selected based upon the selector.
11. The method of claim 1, wherein the selecting step includes the step of selecting at least one additional message from the plurality of messages, and wherein the transmitting step includes the step of additionally transmitting the additional message between the intelligent agent and the client computer process; whereby the selector controls which of the transmitted messages includes the information to be transmitted.
12. The method of claim 1, wherein the selecting step includes the step of selecting each message from the plurality of messages with the exception of an omitted message corresponding to the information to be transmitted, and wherein the transmitting step includes the step of transmitting every message in the plurality of messages except for the omitted message.
13. The method of claim 1, wherein the selecting step includes the step of determining the message to select using a transform table indexed by the selector and the information to be transmitted.
14. The method of claim 1, wherein the message transmitted in the transmitting step is unscrambled.
15. A method of communicating with an intelligent agent computer program, the method comprising the steps of: (a) processing with a neural network an input received from an external source and thereby generating an output therefrom; (b) disguising the output in an output message selected from a plurality of messages based upon the output and a selector; and (c) transmitting the output message.
16. The method of claim 15, wherein the disguising step is performed using a neural network.
17. The method of claim 16, wherein the processing and disguising steps are performed using the same neural network.
18. A method of communicating between an intelligent agent computer program and a client computer process, comprising the steps of: (a) receiving a disguised message transmitted between the intelligent agent and the client computer process, the disguised message selected from a plurality of messages, each of which is related to predetermined information based upon a selector; (b) determining the selector; and (c) interpreting the disguised message using the selector to determine the predetermined information transmitted in the disguised message.
19. A program product comprising: (a) a program configured to perform a method of communicating between an intelligent agent computer program and a client computer process, the method comprising the steps of: (1) selecting a message from a plurality of messages based upon a selector and information to be transmitted between the intelligent agent and the client computer process; and (2) transmitting the selected message between the intelligent agent and the client computer process; and (b) a signal bearing media bearing the program.
20. The program product of claim 19, wherein the signal bearing media is transmission type media.
21. The program product of claim 19, wherein the signal bearing media is recordable media.
22. An apparatus for communicating with one of an intelligent agent computer program and a client computer process, the apparatus comprising: (a) a decision logic mechanism, configured to receive an input from an external source and generate therefrom an output; and (b) a message disguising mechanism, configured to receive the output of the decision logic mechanism and output one of a plurality of messages as a disguised message in response to a selector and the output of the decision logic mechanism.
23. The apparatus of claim 22, wherein the decision logic mechanism is incorporated in an intelligent agent computer program, and wherein the decision logic mechanism includes a neural network into which has been programmed a decision logic for the intelligent agent.
24. The apparatus of claim 23, wherein the message disguising mechanism includes a neural network into which has been programmed a transform table for matching a message with the information to be transmitted.
25. The apparatus of claim 24, wherein the decision logic mechanism and the message disguising mechanism are incorporated into the same neural network.
26. The apparatus of claim 23, wherein the decision logic mechanism further comprises a plurality of neural network filters for conditioning inputs and outputs to and from the neural network.
27. The apparatus of claim 23, wherein the intelligent agent is configured to conduct negotiations in an electronic commerce application, and wherein the neural network is programmed with a negotiation strategy for the intelligent agent.
28. The apparatus of claim 22, wherein the selector includes a predetermined parameter known to both of the intelligent agent and the client computer process.
29. The apparatus of claim 22, wherein the selector is transmitted between the intelligent agent and the client computer process.
30. The apparatus of claim 22, wherein the selector is derived from an existing parameter having another purpose.
PCT/US1998/004876 1997-03-21 1998-03-12 Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages WO1998047250A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
KR10-1999-7007570A KR100368956B1 (en) 1997-03-21 1998-03-12 Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages
JP54389298A JP3905926B2 (en) 1997-03-21 1998-03-12 Method for communicating using impersonation message and recording medium recording program
CA002277863A CA2277863C (en) 1997-03-21 1998-03-12 Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages
DE69839088T DE69839088T2 (en) 1997-03-21 1998-03-12 DEVICE AND METHOD FOR TRANSMITTING BETWEEN AN INTELLIGENT MEDIUM AND USER COMPUTER USING MASKED MESSAGES
EP98937920A EP0976039B1 (en) 1997-03-21 1998-03-12 Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/822,119 1997-03-21
US08/822,119 US6085178A (en) 1997-03-21 1997-03-21 Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages

Publications (2)

Publication Number Publication Date
WO1998047250A2 true WO1998047250A2 (en) 1998-10-22
WO1998047250A3 WO1998047250A3 (en) 1999-01-28

Family

ID=25235194

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/004876 WO1998047250A2 (en) 1997-03-21 1998-03-12 Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages

Country Status (10)

Country Link
US (1) US6085178A (en)
EP (1) EP0976039B1 (en)
JP (1) JP3905926B2 (en)
KR (1) KR100368956B1 (en)
CA (1) CA2277863C (en)
DE (1) DE69839088T2 (en)
ES (1) ES2299213T3 (en)
MY (1) MY123188A (en)
TW (1) TW436732B (en)
WO (1) WO1998047250A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001057724A1 (en) * 2000-02-01 2001-08-09 Nextgen Pty Ltd Interactive agent for mobile device
US6757685B2 (en) 2001-02-19 2004-06-29 Hewlett-Packard Development Company, L.P. Process for executing a downloadable service receiving restrictive access rights to at least one profile file

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW504632B (en) 1997-03-21 2002-10-01 Ibm Apparatus and method for optimizing the performance of computer tasks using intelligent agent with multiple program modules having varied degrees of domain knowledge
US6401080B1 (en) * 1997-03-21 2002-06-04 International Business Machines Corporation Intelligent agent with negotiation capability and method of negotiation therewith
US6311165B1 (en) * 1998-04-29 2001-10-30 Ncr Corporation Transaction processing systems
GB9819392D0 (en) * 1998-09-04 1998-10-28 Balaena Limited Database
US7162458B1 (en) 1998-11-16 2007-01-09 Sky Technologies, Llc System and method for process mining
US6553347B1 (en) * 1999-01-25 2003-04-22 Active Point Ltd. Automatic virtual negotiations
US6792412B1 (en) * 1999-02-02 2004-09-14 Alan Sullivan Neural network system and method for controlling information output based on user feedback
US7296001B1 (en) * 1999-07-12 2007-11-13 Ariba, Inc. Electronic multilateral negotiation system
US6834272B1 (en) * 1999-08-10 2004-12-21 Yeda Research And Development Company Ltd. Privacy preserving negotiation and computation
US20020055903A1 (en) * 1999-11-01 2002-05-09 Neal Solomon System, method, and apparatus for a cooperative communications network
US20020069134A1 (en) * 1999-11-01 2002-06-06 Neal Solomon System, method and apparatus for aggregation of cooperative intelligent agents for procurement in a distributed network
US20030074301A1 (en) * 1999-11-01 2003-04-17 Neal Solomon System, method, and apparatus for an intelligent search agent to access data in a distributed network
US20020046157A1 (en) * 1999-11-01 2002-04-18 Neal Solomon System, method and apparatus for demand-initiated intelligent negotiation agents in a distributed network
US6876991B1 (en) * 1999-11-08 2005-04-05 Collaborative Decision Platforms, Llc. System, method and computer program product for a collaborative decision platform
US8676896B1 (en) 1999-12-10 2014-03-18 At&T Intellectual Property Ii, L.P. Network-based service for secure electronic mail delivery on an internet protocol network
US6453301B1 (en) 2000-02-23 2002-09-17 Sony Corporation Method of using personal device with internal biometric in conducting transactions over a network
US6609212B1 (en) 2000-03-09 2003-08-19 International Business Machines Corporation Apparatus and method for sharing predictive failure information on a computer network
MXPA02009198A (en) * 2000-03-22 2004-09-06 Arac Man Services Inc Apparatus and methods for interactive rental information retrieval and management.
US7103580B1 (en) * 2000-03-30 2006-09-05 Voxage, Ltd. Negotiation using intelligent agents
US7136821B1 (en) 2000-04-18 2006-11-14 Neat Group Corporation Method and apparatus for the composition and sale of travel-oriented packages
US7908200B2 (en) * 2000-05-16 2011-03-15 Versata Development Group, Inc. Method and apparatus for efficiently generating electronic requests for quote
US7493486B1 (en) * 2000-06-09 2009-02-17 Verizon Laboratories, Inc. Method and apparatus for supporting cryptographic-related activities in a public key infrastructure
US7076445B1 (en) 2000-06-20 2006-07-11 Cartwright Shawn D System and methods for obtaining advantages and transacting the same in a computer gaming environment
US20050119980A1 (en) * 2000-06-29 2005-06-02 Neat Group Corporation Electronic negotiation systems
US20020026423A1 (en) * 2000-08-23 2002-02-28 Sony Electronics, Inc. Automated usage-independent and location-independent agent-based incentive method and system for customer retention
US20020052797A1 (en) * 2000-08-23 2002-05-02 Maritzen L. Michael Customizing a price of a product or a service by using an intelligent agent
US20020073339A1 (en) * 2000-12-07 2002-06-13 Card Ronald C. System and method to access secure information related to a user
US20020095386A1 (en) * 2000-12-07 2002-07-18 Maritzen L. Michael Account control and access management of sub-accounts from master account
US20020072931A1 (en) * 2000-12-07 2002-06-13 Ronald C. Card System and method to provide financial rewards and other incentives to users of personal transaction devices
US20020073036A1 (en) * 2000-12-08 2002-06-13 Brant Candelore Method and apparatus for holding a product in escrow "For Sale"
US7729925B2 (en) * 2000-12-08 2010-06-01 Sony Corporation System and method for facilitating real time transactions between a user and multiple entities
US7251633B2 (en) * 2000-12-11 2007-07-31 Sony Corporation Method or system for executing deferred transactions
US7765163B2 (en) * 2000-12-12 2010-07-27 Sony Corporation System and method for conducting secure transactions over a network
US20020082912A1 (en) * 2000-12-22 2002-06-27 Leon Batachia Transactions between vendors and customers using push/pull model
US20020120874A1 (en) * 2000-12-22 2002-08-29 Li Shu Method and system for secure exchange of messages
US7047227B2 (en) * 2000-12-22 2006-05-16 Voxage, Ltd. Interface between vendors and customers that uses intelligent agents
US20020124190A1 (en) * 2001-03-01 2002-09-05 Brian Siegel Method and system for restricted biometric access to content of packaged media
US7478068B2 (en) * 2001-06-14 2009-01-13 Sony Corporation System and method of selecting consumer profile and account information via biometric identifiers
US7099453B2 (en) * 2001-09-26 2006-08-29 Sbc Properties, L.P. Method and apparatus for enhanced call routing in a telecommunication system
US20030061173A1 (en) * 2001-09-27 2003-03-27 Hiroshi Ogino Electronic gathering of product information and purchasing of products
US20030074209A1 (en) * 2001-10-15 2003-04-17 Tobin Christopher M. User device with service finding and purchasing functionality
US7275048B2 (en) * 2001-10-30 2007-09-25 International Business Machines Corporation Product support of computer-related products using intelligent agents
US7171493B2 (en) * 2001-12-19 2007-01-30 The Charles Stark Draper Laboratory Camouflage of network traffic to resist attack
EP1338982A1 (en) * 2002-02-26 2003-08-27 Hewlett-Packard Company Process for enhancing the access to resources
EP1552417A4 (en) * 2002-09-17 2010-07-14 Ubs Ag System and method for message communication
US20040220884A1 (en) * 2002-11-01 2004-11-04 Khan Saadat H. Intelligent internet bargaining system
US20040172371A1 (en) * 2003-02-28 2004-09-02 Fujitsu Limited Automated negotiation
US8473451B1 (en) 2004-07-30 2013-06-25 At&T Intellectual Property I, L.P. Preserving privacy in natural language databases
US7333456B2 (en) * 2004-08-02 2008-02-19 Beceem Communications Inc. Training information transmission method in a block transmission system
US20060287966A1 (en) * 2004-12-21 2006-12-21 Oracle International Corporation Methods and systems for authoring customized contracts using contract templates that include user-configured rules and questions
US20080306784A1 (en) * 2007-06-05 2008-12-11 Vijay Rajkumar Computer-implemented methods and systems for analyzing clauses of contracts and other business documents
US8037004B2 (en) 2007-06-11 2011-10-11 Oracle International Corporation Computer-implemented methods and systems for identifying and reporting deviations from standards and policies for contracts, agreements and other business documents
JP5098695B2 (en) * 2008-02-28 2012-12-12 富士通株式会社 Workflow management system
RU2450336C1 (en) * 2011-01-11 2012-05-10 Государственное образовательное учреждение высшего профессионального образования "Кубанский государственный технологический университет" (ГОУ ВПО "КубГТУ") Modified intelligent controller with adaptive critic
US8543280B2 (en) 2011-04-29 2013-09-24 Toyota Motor Engineering & Manufacturing North America, Inc. Collaborative multi-agent vehicle fault diagnostic system and associated methodology
US20160342583A1 (en) * 2015-05-20 2016-11-24 International Business Machines Corporation Managing electronic message content
EP3326114A1 (en) 2015-07-24 2018-05-30 Deepmind Technologies Limited Continuous control with deep reinforcement learning
DE102020202093A1 (en) 2020-02-19 2021-08-19 Robert Bosch Gesellschaft mit beschränkter Haftung Method and apparatus for machine learning

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5644727A (en) * 1987-04-15 1997-07-01 Proprietary Financial Products, Inc. System for the operation and management of one or more financial accounts through the use of a digital communication and computation system for exchange, investment and borrowing
US4881263A (en) * 1987-09-25 1989-11-14 Digital Equipment Corporation Apparatus and method for secure transmission of data over an unsecure transmission channel
US4914585A (en) * 1988-05-23 1990-04-03 Hewlett-Packard Company Modular complier with a class independent parser and a plurality of class dependent parsers
US5117496A (en) * 1988-05-23 1992-05-26 Hewlett-Packard Company Method for recording and replaying mouse commands by recording the commands and the identities of elements affected by the commands
US5317688A (en) * 1988-07-27 1994-05-31 Hewlett-Packard Company Software agent used to provide instruction to a user for a plurality of computer applications
US5073890A (en) * 1988-12-30 1991-12-17 At&T Bell Laboratories Remote agent operation for automatic call distributors
JP2518071B2 (en) * 1989-12-22 1996-07-24 日本電気株式会社 Communication network management method
US5355444A (en) * 1990-01-23 1994-10-11 International Business Machines Corporation Expert system wtih a plurality of independent knowledge bases
US5226176A (en) * 1990-08-20 1993-07-06 Microsystems, Inc. System for selectively aborting operation or waiting to load required data based upon user response to non-availability of network load device
JPH04157944A (en) * 1990-10-22 1992-05-29 Nippon Telegr & Teleph Corp <Ntt> Method and device for managing controlling communication network
US5329626A (en) * 1990-10-23 1994-07-12 Digital Equipment Corporation System for distributed computation processing includes dynamic assignment of predicates to define interdependencies
US5155763A (en) * 1990-12-11 1992-10-13 International Business Machines Corp. Look ahead method and apparatus for predictive dialing using a neural network
JPH04256101A (en) * 1991-02-08 1992-09-10 Nippon Telegr & Teleph Corp <Ntt> Agent control system
US5276768A (en) * 1991-03-20 1994-01-04 Tidewater Consultants, Inc. Automated telephone information system
DE59109081D1 (en) * 1991-06-21 1999-02-04 Ibm Access control in computer networks
US5241621A (en) * 1991-06-26 1993-08-31 Digital Equipment Corporation Management issue recognition and resolution knowledge processor
US5301320A (en) * 1991-06-28 1994-04-05 Digital Equipment Corporation Workflow management and control system
US5367635A (en) * 1991-08-29 1994-11-22 Hewlett-Packard Company Network management agent with user created objects providing additional functionality
CA2061117C (en) * 1991-12-02 1998-09-29 Neta J. Amit Apparatus and method for distributed program stack
AU4286893A (en) * 1992-04-15 1993-11-18 Inference Corporation Autonomous learning and reasoning agent
JPH05324009A (en) * 1992-05-18 1993-12-07 Nippon Telegr & Teleph Corp <Ntt> Agent control system
US5469562A (en) * 1992-06-26 1995-11-21 Digital Equipment Corporation Durable atomic storage update manager
JPH0612401A (en) * 1992-06-26 1994-01-21 Fuji Xerox Co Ltd Emotion simulating device
US5235642A (en) * 1992-07-21 1993-08-10 Digital Equipment Corporation Access control subsystem and method for distributed computer system using locally cached authentication credentials
EP0589249A3 (en) * 1992-09-24 1994-05-25 Siemens Ag Program-controlled isdn communication system with at least one object-oriented system program module
US5267314A (en) * 1992-11-17 1993-11-30 Leon Stambler Secure transaction system and method utilized therein
GB9224224D0 (en) * 1992-11-19 1993-01-06 Int Computers Ltd Data processing system
US5398012A (en) * 1992-11-24 1995-03-14 International Business Machines Corporation Distributed processing of route selection across networks and subnetworks
JPH06175944A (en) * 1992-12-04 1994-06-24 Fujitsu Ltd Network monitoring method
FR2701580B1 (en) * 1993-02-10 1995-03-24 Bull Sa Method of administration of applications with standard protocols.
US5371889A (en) * 1993-04-22 1994-12-06 Digital Equipment Corporation Journalling optimization system and method for distributed computations
US5325528A (en) * 1993-04-22 1994-06-28 Digital Equipment Corporation Distributed computation recovery management system and method
US5392345A (en) * 1993-04-30 1995-02-21 At&T Corp. Work at home ACD agent network
SE501433C2 (en) * 1993-06-23 1995-02-13 Ellemtel Utvecklings Ab Ways to obtain data access in a primary memory-based database
US5421013A (en) * 1993-07-08 1995-05-30 Park City Group, Inc. Agent-based multithreading application programming interface
US5603031A (en) * 1993-07-08 1997-02-11 General Magic, Inc. System and method for distributed computation based upon the movement, execution, and interaction of processes in a network
US5408470A (en) * 1993-10-14 1995-04-18 Intel Corporation Deferred synchronization of distributed objects
IL111154A0 (en) * 1993-10-21 1994-12-29 Martino Ii John A Systems and methods for electronic messaging
DE69433968T2 (en) * 1993-11-30 2005-08-11 British Telecommunications P.L.C. KOMMUNIKATIONSNETWERKVERWALTUNG
US5481715A (en) * 1993-12-15 1996-01-02 Sun Microsystems, Inc. Method and apparatus for delegated communications in a computer system using trusted deputies
US5423043A (en) * 1994-01-21 1995-06-06 International Business Machines Corporation Method and apparatus for creating and monitoring logical associations among desktop objects
US5465286A (en) * 1994-05-24 1995-11-07 Executone Information Systems, Inc. Apparatus for supervising an automatic call distribution telephone system
US5717989A (en) * 1994-10-13 1998-02-10 Full Service Trade System Ltd. Full service trade system
WO1996033559A2 (en) * 1995-04-21 1996-10-24 Philips Electronics N.V. Concealment method and arrangement and reproducing apparatus provided with the concealment arrangement
US5710918A (en) * 1995-06-07 1998-01-20 International Business Machines Corporation Method for distributed task fulfillment of web browser requests
US5765028A (en) * 1996-05-07 1998-06-09 Ncr Corporation Method and apparatus for providing neural intelligence to a mail query agent in an online analytical processing system
US5790789A (en) * 1996-08-02 1998-08-04 Suarez; Larry Method and architecture for the creation, control and deployment of services within a distributed computer environment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
BILLARD, "Effects of Group Size on Goal-Directed Agents in Distributed Environments", IEEE, 1995, pages 3403-3408, XP002913543 *
KERSTEN et al., "Negotiation in Distributed Artificial Intelligence: Drawing from Human Experience", IEEE, 1994, pages 258-270, XP002913541 *
OLIVER, "On Artificial Agents for Negotiation in Electronic Commerce", IEEE, 1996, pages 337-346, XP002913542 *
See also references of EP0976039A2 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001057724A1 (en) * 2000-02-01 2001-08-09 Nextgen Pty Ltd Interactive agent for mobile device
US6757685B2 (en) 2001-02-19 2004-06-29 Hewlett-Packard Development Company, L.P. Process for executing a downloadable service receiving restrictive access rights to at least one profile file
US8275791B2 (en) 2001-02-19 2012-09-25 Hewlett-Packard Development Company, L.P. Process for executing a downloadable service receiving restrictive access rights to at least one profile file

Also Published As

Publication number Publication date
KR100368956B1 (en) 2003-01-24
JP3905926B2 (en) 2007-04-18
EP0976039B1 (en) 2008-02-06
DE69839088D1 (en) 2008-03-20
KR20000075511A (en) 2000-12-15
TW436732B (en) 2001-05-28
CA2277863A1 (en) 1998-10-22
WO1998047250A3 (en) 1999-01-28
EP0976039A4 (en) 2005-07-20
US6085178A (en) 2000-07-04
JP2000513127A (en) 2000-10-03
DE69839088T2 (en) 2009-01-29
MY123188A (en) 2006-05-31
EP0976039A2 (en) 2000-02-02
ES2299213T3 (en) 2008-05-16
CA2277863C (en) 2001-05-29

Similar Documents

Publication Publication Date Title
US6085178A (en) Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages
US6192354B1 (en) Apparatus and method for optimizing the performance of computer tasks using multiple intelligent agents having varied degrees of domain knowledge
TW504632B (en) Apparatus and method for optimizing the performance of computer tasks using intelligent agent with multiple program modules having varied degrees of domain knowledge
Bogetoft et al. Secure multiparty computation goes live
CN100388228C (en) System and method for reviewing received digital content
CN101039239B (en) System and method for remote image capture with centralized processing and storage
AU2018222992B2 (en) System and method for secure two-party evaluation of utility of sharing data
CN109034800A (en) A kind of privacy method of commerce, system and equipment
US20010047477A1 (en) Transparent user and session management for web applications
CN107527222A (en) Information processing method and apparatus and system
CN110322321A (en) Electronic bill assignment method, device, equipment and medium based on block chain
CN116432039B (en) Collaborative training method and device, business prediction method and device
Shih et al. A new reverse auction agent system for m-commerce using mobile agents
US20060288212A1 (en) Transparent user and session management for web applications
van der Merwe et al. Electronic commerce with secure intelligent trade agents
CN100349401C (en) Data communication system, information processing device and method, recording medium and program
CN110689412A (en) Method, device, server and storage medium for game virtual article transaction based on block chain
CN106485478A (en) Using the hyperphoric system of the hyperphoric object of resource, method and device
Kowalczyk et al. InterMarket-towards intelligent mobile agent e-marketplaces
CN108460642A (en) loan classification method and device
US7844496B2 (en) Method and system for processing a request of a customer
CA2426794C (en) Method and system for processing a request of a customer
Velimirovic et al. Modelling electronic trust using bayesian networks
CN117010004B (en) Block chain-based intelligent processing method and device for customer investment data interaction
JP6934148B1 (en) Virtual trading methods and systems for digital products

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): BR CA JP KR

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): BR CA JP KR

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 2277863

Country of ref document: CA

Ref country code: CA

Ref document number: 2277863

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1019997007570

Country of ref document: KR

ENP Entry into the national phase

Ref country code: JP

Ref document number: 1998 543892

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1998937920

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1998937920

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1019997007570

Country of ref document: KR

WWR Wipo information: refused in national office

Ref document number: 1019997007570

Country of ref document: KR

WWG Wipo information: grant in national office

Ref document number: 1998937920

Country of ref document: EP