System and method using dedicated computer security services
A technology for computer security and security services, applied in the field of using dedicated computer security services, to solve problems such as ineffectiveness and inability to use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] Example aspects are described herein in the context of systems, methods, and computer program products for specialized computer security services. Those skilled in the art will appreciate that the following description is illustrative only and is not intended to be limiting in any way. Those of ordinary skill in the art having the benefit of this disclosure will readily appreciate the teachings from others themselves. Reference will now be made in detail to exemplary method implementations as illustrated in the accompanying drawings. The same reference designators will be used throughout the drawings and the following description, to the extent possible, to refer to the same or like items.
[0027] A company that provides computer security services can be thought of as an antivirus company that provides access to its cloud security services (such as AOKasperskyLab and KasperskySecurityNetworkservice). Also, the client company may be a company that uses cloud security ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com