Intranet penetration proxy method, system, host and computer-readable storage medium
A technology of intranet penetration and agent program, which is applied in the computer field to achieve the effect of reducing task load, saving cost and improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] It is to be understood that the specific embodiments described herein are intended to explain the present invention and is not intended to limit the invention.
[0042] Such as figure 1 Distance figure 1 A terminal structure of the hardware operating environment of the host according to the embodiment of the present invention.
[0043] Such as figure 1 As shown, the terminal may include a processor 1001, such as a CPU, a network port 1004, a user port 1003, a memory 1005, a communication bus 1002. The communication bus 1002 is used to implement connection communication between these components. User port 1003 can include a display, an input unit such as a control panel, and optionally user port 1003 can also include a standard wired port, a wireless port. Network port 1004 can include a standard wired port, a wireless port (such as a 5G port). Memory 1005 can be a high speed RAM memory, or a stable memory (Non-VolatileMemory), such as a disk memory. The memory 1005 can also...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com