Data collecting method, information security management method and information security management host
A data collection and information security technology, applied in the field of information security, can solve problems such as high labor costs and inconvenient use, and achieve the effects of saving storage space, saving manpower, and facilitating search operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In order to further explain the technical means and effects adopted by the present invention to achieve the intended purpose of the invention, the data collection method, information security management method and information security management host proposed according to the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments. Embodiments, methods, steps, structures, features and effects are described in detail below.
[0028] figure 1 It is a schematic diagram of an information security management host disclosed by an embodiment of the present invention. Such as figure 1 As shown, the information security management host 110 in this embodiment is suitable for managing one or more user hosts 120, wherein the user hosts 120 can be computer devices commonly used in the industry, such as notebook computers, desktop computers, and tablet computers. In this embodiment, the user host 120 may include a ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 