Fortinet, Inc.
SYSTEMS AND METHODS FOR PORTABLE COMPUTING DEVICE PROTECTION

Last updated:

Abstract:

Various approaches for providing intermediary threat detection. In some cases, the intermediary threat detection is performed by a communication control port that operatively couples with a portable computing device to protect the portable computing device from network based vulnerabilities and exploits.

Status:
Application
Type:

Utility

Filling date:

2 Mar 2021

Issue date:

8 Sep 2022