In this way, when the Mobile Agent visits a running environment, it does not directly visit the network host's resources, but first interacts with the virtual environment of the target host, verifies the identity of both parties, judges the other's intention, then denies being visited or authorizes the limited access.