CLASS 713, ELECTRICAL COMPUTERS AND DIGITAL PROCESSING SYSTEMS: SUPPORT |
1 | DIGITAL DATA PROCESSING SYSTEM INITIALIZATION OR CONFIGURATION (E.G., INITIALIZING, SETUP, CONFIGURATION, OR RESETTING): |
This subclass is indented under the class definition. Subject matter comprising means or steps for establishing
an original operating parameter or data for a computer or digital
data processing system.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||||||||||||||||||
2 | . Loading initialization program (e.g., booting, rebooting, warm booting, remote booting, BIOS, initial program load (IPL), bootstrapping): |
This subclass is indented under subclass 1. Subject matter comprising means or steps for booting a computer
or digital data processing system.
SEE OR SEARCH CLASS:
| |||||||||
100 | RECONFIGURATION (E.G., CHANGING SYSTEM SETTING): |
This subclass is indented under the class definition. Subject matter comprising means or steps for changing a
system setting or an operational mode after it has been set.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||||||||||||||||||||
150 | MULTIPLE COMPUTER COMMUNICATION USING CRYPTOGRAPHY: |
Subject matter for cryptographically protecting the transfer
of data among a plurality of spatially distributed (i.e., situated
at different locations) computers or digital data processing systems
via one or more communications media (e.g., computer
networks) wherein the computers or digital data processing
systems employ the data in data processing before or after the transferring, and
wherein the transferring affects the data transfer between the computers.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||
151 | . Protection of a particular protocol layer: |
This subclass is indented under 150. Subject matter wherein the protection of the data transfer occurs at a specified stack model level. | |
152 | .. Application layer security: |
This subclass is indented under 151. Subject matter wherein protection occurs at the highest stack
model level.
| |||
153 | . Particular node (e.g., gateway, bridge, router, etc.) for directing data and applying cryptography: |
This subclass is indented under 150. Subject matter wherein cryptographic protection
of data is effected by a distinct element directing the data
transfer among the spatially distributed computers.
SEE OR SEARCH CLASS:
| |||||||
154 | .. Including filtering based on content or address: |
This subclass is indented under 153. Subject matter wherein the distinct element screens the data for particular subject matter or network location designation. | |
155 | . Central trusted authority provides computer authentication: |
This subclass is indented under 150. Subject matter wherein a single source confirms the legitimacy
of a computer on the network or provides logon authorization.
SEE OR SEARCH CLASS:
| |||||||
156 | .. By certificate: |
This subclass is indented under 155. Subject matter wherein the single source provides digital
information attesting to a network computers legitimacy.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||
157 | ... Chain or hierarchical certificates: |
This subclass is indented under 156. Subject matter wherein a certificate references another certificate. | |
158 | ... Revocation or expiration: |
This subclass is indented under 156. Subject matter wherein a single source provides information invalidating a previously issued certificate. | |
159 | .. Including intelligent token: |
This subclass is indented under 155. Subject matter wherein the authentication includes a portable
carrier with data processing capability.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||
160 | . Packet header designating cryptographically protected data: |
This subclass is indented under 150. Subject matter wherein the data transfer uses an integral
unit including information indicating that the associated data
is encrypted or signed.
SEE OR SEARCH CLASS:
| |||||
161 | .. Data authentication: |
This subclass is indented under 160. Subject matter wherein the integral unit includes information
to attest to the integrity of the data transferred.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||
162 | . Having particular address related cryptography: |
This subclass is indented under 150. Subject matter including a specific network location designation
associated with cryptographic protection.
SEE OR SEARCH CLASS:
| |||
163 | .. Multicast: |
This subclass is indented under 162. Subject matter wherein a group of users is selectively addressed. | |
164 | . Security kernel or utility: |
This subclass is indented under 150. Subject matter wherein cryptographic protection of a computer
network is provided by a portion of an operating system or a program
dedicated to a specific system function.
SEE OR SEARCH CLASS:
| |||
165 | .. File protection: |
This subclass is indented under 164. Subject matter wherein the kernel or utility implements a file security system. | |
166 | .. Security levels: |
This subclass is indented under 164. Subject matter wherein the kernel or utility controls access to distinct tiers of system protection. | |
167 | .. Object protection: |
This subclass is indented under 164. Subject matter wherein the kernel or utility provides protection of or access to an integrated structure of data and routines is provided. | |
168 | . Particular communication authentication technique: |
This subclass is indented under 150. Subject matter wherein the data processing before or after
the transferring provides indication of a genuine transmission or
reception of information or related entity.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||
169 | .. Mutual entity authentication: |
This subclass is indented under 168. Subject matter wherein both a transmission and reception entity are determined to be genuine by each other. | |
170 | .. Authentication of an entity and a message: |
This subclass is indented under 168. Subject matter wherein a transmission or reception entity and a corresponding message are determined to be genuine. | |
171 | .. Having key exchange: |
This subclass is indented under 168. Subject matter wherein the transmission and reception entities
exchange information during authentication which establishes an
operational key.
SEE OR SEARCH CLASS:
| |||
172 | .. Intelligent token: |
This subclass is indented under 168. Subject matter wherein a transmission or reception entity
is a portable carrier with data processing capability.
SEE OR SEARCH CLASS:
| |||||
173 | ... Pre-loaded with certificate: |
This subclass is indented under 172. Subject matter wherein the portable carrier stores information
attesting to the authenticity of a variable or parameter involved
in the authentication.
SEE OR SEARCH CLASS:
| |||
174 | ... Including particular multiplication or exponentiation circuit: |
This subclass is indented under 172. Subject matter including a circuit performing the
arithmetic operation of multiplying two numbers together or raising
a number to a particular power.
SEE OR SEARCH CLASS:
| |||
175 | .. By generation of certificate: |
This subclass is indented under 168. Subject matter wherein digital information attesting to the
legitimacy of a transmission or reception is produced.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||
176 | .. Authentication by digital signature representation or digital watermark: |
This subclass is indented under 168. Subject matter wherein a data object is cryptographically
processed to produce a unique identifier which subsequently verifies
the data object.
SEE OR SEARCH CLASS:
| |||||||
177 | ... Signature tree: |
This subclass is indented under 176. Subject matter wherein the cryptographic processing produces a combined time sequenced verifiable record of plural related data objects. | |
178 | ... Time stamp: |
This subclass is indented under 176. Subject matter wherein a time identifier is included in the verifiable record. | |
179 | ... Includes generation of associated coded record: |
This subclass is indented under 176. Subject matter wherein a machine readable indicia is produced
which is representative of the data object.
SEE OR SEARCH CLASS:
| |||
180 | .. Generating specific digital signature type (e.g., blind, shared, or undeniable): |
This subclass is indented under 168. Subject matter including a particular type of processing for
the production of the indication of a genuine transmission or reception
of information or related entity.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||
181 | .. Message digest travels with message: |
This subclass is indented under 168. Subject matter wherein a value for verifying the integrity
of the information transmitted is conveyed with the information.
SEE OR SEARCH CLASS:
| |||
182 | SYSTEM ACCESS CONTROL BASED ON USER IDENTIFICATION BY CRYPTOGRAPHY: |
Subject matter wherein authorization to a digital processing
system is dependent upon cryptographically processed data for personal verification.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||||
183 | . Solely password entry (no record or token): |
This subclass is indented under 182. Subject matter wherein the identification is dependent upon
the submission exclusively of a password by the user.
SEE OR SEARCH CLASS:
| |||||
184 | . PIN/password generator device: |
This subclass is indented under 182. Subject matter including a device which produces the personal
identification number or the user password.
SEE OR SEARCH CLASS:
| |||
185 | . Using record or token: |
This subclass is indented under 182. Subject matter wherein verification is determined in conjunction
with a portable data carrier.
SEE OR SEARCH CLASS:
| |||||
186 | .. Biometric acquisition: |
This subclass is indented under 185. Subject matter wherein the identification is provided
by a measurement or sensing of some unique user physical characteristic.
SEE OR SEARCH CLASS:
| |||||
187 | COMPUTER PROGRAM MODIFICATION DETECTION BY CRYPTOGRAPHY: |
Subject matter wherein a cryptographic technique is used
to determine that a change has occurred to a particular computer
program.
SEE OR SEARCH CLASS:
| |||||||
188 | COMPUTER VIRUS DETECTION BY CRYPTOGRAPHY: |
Subject matter which cryptographically determines the presence
of a computer program designed to cause a system malfunction.
SEE OR SEARCH CLASS:
| |||||||
189 | DATA PROCESSING PROTECTION USING CRYPTOGRAPHY: |
Subject matter wherein cryptography is used in the protection
of the operation of a computer.
SEE OR SEARCH CLASS:
| |||||
190 | . Computer instruction/address encryption: |
This subclass is indented under 189. Subject matter wherein a step of program execution or a
designated memory location is encrypted.
SEE OR SEARCH CLASS:
| |||
191 | . Upgrade/install encryption: |
This subclass is indented under 189. Subject matter wherein an encryption routine is
enhanced or introduced.
SEE OR SEARCH CLASS:
| |||
192 | . Having separate add-on board: |
This subclass is indented under 189. Subject matter including a distinct expansion circuit board
which provides cryptographic protection.
SEE OR SEARCH CLASS:
| |||
193 | . By stored data protection: |
This subclass is indented under 189. Subject matter wherein unauthorized access to information
held in static memory elements is prevented.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||
194 | . Tamper resistant: |
This subclass is indented under 189. Subject matter wherein a physical barrier has been provided
to protect a component providing cryptographic processing in a digital
processing system.
SEE OR SEARCH CLASS:
| |||
300 | COMPUTER POWER CONTROL |
This subclass is indented under the class definition. Subject matter including details of steps or means for modifying
an amount of power used by a digital data processing system or a system
response to available power.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||||||||||||||||||
310 | . By external command: |
This subclass is indented under subclass 300. Subject matter wherein modification of power in a digital
data processing system is initiated by a signal from outside of
the system.
SEE OR SEARCH CLASS:
| |||
320 | . Power conservation: |
This subclass is indented under subclass 300. Subject matter wherein means or steps are provided to reduce
an amount of power consumed by the digital data processing system.
SEE OR SEARCH CLASS:
| |||||||
321 | .. Programmable calculator with power saving feature: |
This subclass is indented under subclass 320. Subject matter wherein means or steps are provided to reduce
an amount of power consumed by a programmable calculator.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||
322 | .. By clock speed control (e.g., clock on/off): |
Subject matter under subclass320 wherein power conservation
is achieved by regulating system oscillator frequency.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||
323 | .. Active/idle mode processing: |
This subclass is indented under subclass 320. Subject matter wherein power conservation is achieved by
selectively removing or reducing power to all elements of the digital
data processing system according to a predefined pattern (i.e., mode) which
results in a temporary interruption of data processing.
| |||||||
324 | .. By shutdown of only part of system: |
This subclass is indented under subclass 320. Subject matter wherein power conservation is achieved by selectively turning power off to only a portion of the digital data processing system. | |
330 | . Power sequencing: |
This subclass is indented under subclass 320. Subject matter involving an application or a removal of
power to the data processing system by a pre-determined
series of stages.
| |||
340 | . Having power source monitoring: |
This subclass is indented under subclass 300. Subject matter including sensing of some digital data processing
system power parameter.
SEE OR SEARCH CLASS:
| |||||||
375 | SYNCHRONIZATION OF PLURAL PROCESSORS: |
This subclass is indented under the class definition. Subject matter comprising means or steps for synchronizing
the control or regulation of clocking or timing operations of two
or more processors.
SEE OR SEARCH CLASS:
| |||||||
400 | SYNCHRONIZATION OF CLOCK OR TIMING SIGNALS, DATA, OR PULSES |
This subclass is indented under the class definition. Subject matter wherein clock or timing signals, timing
pulses, or data associated with a control or regulation
of processing component, memory component, or
I/O component are caused to operate in synchronization.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||||||||||||||||||||||
401 | . Using delay: |
This subclass is indented under subclass 400. Subject matter wherein the clock or timing signals, timing
pulses, or data are delayed to provide synchronization.
SEE OR SEARCH CLASS:
| |||||||||
500 | CLOCK, PULSE, OR TIMING SIGNAL GENERATION OR ANALYSIS: |
This subclass is indented under the class definition. Subject matter including generation, division or
distribution of a clock signal, pulse signal, or
timing signal in the digital data processing system from one or
more sources into a group of continuous and successive time increments; or
including event timing and counting, or correction of a
clock signal, pulse signal, or timing signal.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||||||||||||||
501 | . Multiple or variable intervals or frequencies: |
This subclass is indented under subclass 500. Subject matter including generation and selection of plural
or variable timing intervals.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||
502 | . Counting, scheduling, or event timing: |
This subclass is indented under subclass 500. Subject matter wherein counting is performed, an
event is timed, or operation is scheduled using a generated
interval.
SEE OR SEARCH CLASS:
| |||||||
503 | . Correction for skew, phase, or rate: |
This subclass is indented under subclass 500. Subject matter wherein a timing interval is corrected for
skew or phase, or a rate is corrected by adjustment or
alignment.
SEE OR SEARCH CLASS:
| |||||||||
600 | CLOCK CONTROL OF DATA PROCESSING SYSTEM, COMPONENT, OR DATA TRANSMISSION: |
This subclass is indented under the class definition. Subject matter wherein there is a significant temporal, incremental, or
sequencing control provided to a digital data processing system, processor, memory
or peripheral, or to data transmission between such systems
or components.
SEE OR SEARCH CLASS:
| |||||||||||||
601 | . Inhibiting timing generator or component: |
This subclass is indented under subclass 600. Subject matter wherein a clock or interval generator or
a component of the system is inhibited or stopped.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||
FOR000 | CLASS-RELATED FOREIGN DOCUMENTS |
This subclass has no definition. | |
This subclass has no definition. | |
FOR 123 | . Having cryptographic user or record actuated authentication (380/23): |
Foreign art collection under the class definition which encrypts a signal indicating proper authorization of an individual or validity of a record for operating a device. | |
FOR 125 | .. Computer (380/25): |
Foreign art collection under collection 123 which encrypts and transmits authorization for access to computing or data processing equipment. | |
FOR 400 | SYNCHRONIZATION OF PLURAL PROCESSORS: |
Foreign art collection under the class definition including subject matter wherein control or regulation of clocking or timing operations of two or more processors is synchronized. | |