3) The authorized Agent receives a variety of state information,
the information about the Mobile Agent and the limited permitting access resources is sent and analyzed by monitoring Agent, filters out the key information by the feature extraction device to determine the state of the limited permitting access resources and the service type of the Mobile Agent,
judges whether the Mobile Agent is malicious and do harm to the host.