A method and device for questioning a plurality of computerized devices
A device, a technology within the device, applied in the field of information security, can solve the problems that the directory module cannot provide IT security solutions, lack of security threats, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] In the following detailed description, numerous specific details are explained in order to provide a thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures and parts have not been described in detail so as not to obscure the present invention.
[0032] Unless specifically stated otherwise, as will be apparent from the following discussion, it should be understood that throughout the discussion of the specification, terms such as "processing", "operation", "calculation", "determining",
[0033] "Generate," "distribute," etc. refer to the operation and / or processing of a computer or computing system or similar electronic computing device that manipulates and / or transforms data representing a physical quantity, such as an electrical charge, within a computing system's registers and / or memory int...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 