Intranet penetration proxy method, system, host and computer-readable storage medium
A technology of intranet penetration and agent program, which is applied in the computer field to achieve the effect of reducing task load, saving cost and improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] It is to be understood that the specific embodiments described herein are intended to explain the present invention and is not intended to limit the invention.
[0042] Such as figure 1 Distance figure 1 A terminal structure of the hardware operating environment of the host according to the embodiment of the present invention.
[0043] Such as figure 1 As shown, the terminal may include a processor 1001, such as a CPU, a network port 1004, a user port 1003, a memory 1005, a communication bus 1002. The communication bus 1002 is used to implement connection communication between these components. User port 1003 can include a display, an input unit such as a control panel, and optionally user port 1003 can also include a standard wired port, a wireless port. Network port 1004 can include a standard wired port, a wireless port (such as a 5G port). Memory 1005 can be a high speed RAM memory, or a stable memory (Non-VolatileMemory), such as a disk memory. The memory 1005 can also...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


