For the Mobile Agent which has been trusted,
put it in a virtual operation platform,
explain the Mobile Agent code and state information by the virtual environment,
if it is harmful code by detecting, then cease to perform,
which is similar to Java’s sandbox model. For the target host,
verifying the Mobile Agent’s security process is shown in Figure 2
.