CLASS 726, INFORMATION SECURITY |
1 | POLICY: |
This subclass is indented under the class definition. Subject matter comprising systems, methods, and apparatus that provide for the administration and management of rules or regulations governing the protection of information, services and other data processing resources involving coordination of more than one security mechanisms among a plurality of entities, resources, or processes. | |
2 | ACCESS CONTROL OR AUTHENTICATION: |
This subclass is indented under the class definition. Subject matter comprising systems, methods, and
apparatus for the prevention of unauthorized access to resources
of a system or information system, including the manner
of identifying and verifying the entity, process, or mechanism
requesting access to the resource.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||||||||||||||||
3 | . Network: |
This subclass is indented under subclass 2. Subject matter including means of limiting access to
the resources of a system based on a network level.
SEE OR SEARCH CLASS:
| |||||
4 | .. Authorization: |
This subclass is indented under subclass 3. Subject matter including permitting the use of rights,
privileges, and permissions in a network environment.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||||
5 | .. Credential: |
This subclass is indented under subclass 3. Subject matter including the existence of network data
that can be used to establish the claimed identity of a principal
including passwords, biometrics.
SEE OR SEARCH CLASS:
| |||||||
6 | ... Management: |
This subclass is indented under subclass 5. Subject matter including means or steps for administering
credentials, including specific techniques for creating the credentials.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||
7 | ... Usage: |
This subclass is indented under subclass 5. Subject matter including means or steps for using the
credential to establish the identity of the bearer.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||
8 | ... Global (e.g., Single Sign On (SSO), etc.): |
This subclass is indented under subclass 5. Subject matter whereby a single credential can be used to access a plurality of systems or resources. | |
9 | ... Tokens (e.g., smartcards or dongles, etc.): |
This subclass is indented under subclass 5. Subject matter whereby the credential includes a unique
combination of bits used to confer transmit privileges to a computer
on a local network.
SEE OR SEARCH THIS CLASS, SUBCLASS:
SEE OR SEARCH CLASS:
| |||||||||
10 | ... Tickets (e.g., Kerberos or certificates, etc.): |
This subclass is indented under subclass 5. Subject matter whereby the credential includes data used
to indicate that the bearer is authorized for access.
SEE OR SEARCH CLASS:
| |||
11 | .. Firewall: |
This subclass is indented under subclass 3. Subject matter including a device installed between internal
(private) networks and outside networks (public) and which protects
the internal network from network-based attacks that may originate
from the outside and to provide a traffic point where security constraints and
audits may be affected.
SEE OR SEARCH CLASS:
| |||||||||
12 | ... Proxy server or gateway: |
This subclass is indented under subclass 11. Subject matter including an intermediate internetworking
device that connects one or more networks to another for a specific
application.
| |||
13 | ... Packet filtering: |
This subclass is indented under subclass 11. Subject matter including a multi-ported internetworking
device that applies a set of rules to each incoming IP packet in
order to decide whether it is to be forwarded or dropped.
| |||||||
14 | ... Security protocols: |
This subclass is indented under subclass 11. Subject matter including a set of rules, procedures, or conventions governing the format and relative timing of message exchange between two communications terminals to prevent unauthorized intrusion or interference (i.e., attacks). | |
15 | .... Virtual Private Network or Virtual Terminal Protocol (i.e., VPN or VTP): |
This subclass is indented under subclass 14. Subject matter wherein the protocol is used for a software-defined
network offering the appearance, functionality, and usefulness of
a dedicated private network or for a terminal that is defined as
a standard on the network that can handle diverse terminals.
SEE OR SEARCH CLASS:
| |||||
16 | . Stand-alone: |
This subclass is indented under subclass 2. Subject matter wherein the access control or authentication
includes the means of limiting access to the resources of a system
based on a single computer or end user level.
| |||
17 | .. Authorization: |
This subclass is indented under subclass 16. Subject matter wherein the access control or authentication
includes permitting the use of rights, privileges, and permissions
in the stand-alone network environment.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||||
18 | ... Credential management: |
This subclass is indented under subclass 17. Subject matter wherein the authorization includes systems,
methods, or apparatus for administering information supplied to
authenticate a communication.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||||
19 | ... Credential usage: |
This subclass is indented under subclass 17. Subject matter wherein the authorization includes systems,
methods, and apparatus for using information supplied to authenticate
a communication to establish the identity of the bearer.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||
20 | ... Tokens (e.g., smartcards or dongles, etc.): |
This subclass is indented under subclass 17. Subject matter wherein the authorization includes a unique
combination of bits used to confer transmit privileges to a computer
on a stand-alone.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||
21 | . Authorization: |
This subclass is indented under subclass 2. Subject matter wherein access control means includes
use of permissions, rights, or privileges.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||||
22 | MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION: |
This subclass is indented under the class definition. Subject matter comprising systems, methods, and apparatus
for ensuring data integrity by scanning of software or data or otherwise
monitoring data to prevent or detect attacks.
SEE OR SEARCH CLASS:
| |||||||
23 | . Intrusion detection: |
This subclass is indented under subclass 22. Subject matter comprising means to sense the presence of an intruder. | |
24 | .. Virus detection: |
This subclass is indented under subclass 23. Subject matter wherein the intruder is a virus.
SEE OR SEARCH CLASS:
| |||
25 | . Vulnerability assessment: |
This subclass is indented under subclass 22. Subject matter wherein monitoring or scanning of software
or data includes methods or systems to evaluate the defensive capabilities
of a system, process, apparatus, or entity against attacks.
| |||
26 | PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION: |
This subclass is indented under the class definition. Subject matter comprising systems, methods, and apparatus
for prohibiting any impersonation, unauthorized browsing, falsification
or theft of data, or alteration of data not consistent with defined
security policy.
SEE OR SEARCH CLASS:
| |||||||||||||||||
27 | . Access control: |
This subclass is indented under subclass 26. Subject matter comprising means to control data tampering
by limiting access to authorized entities or processes.
SEE OR SEARCH THIS CLASS, SUBCLASS:
| |||
28 | .. By authorizing user: |
This subclass is indented under subclass 27. Subject matter wherein the access control includes means to limit access by an authorized user. | |
29 | .. By authorizing client: |
This subclass is indented under subclass 27. Subject matter wherein the access control includes means to limit access to an authorized client. | |
30 | .. By authorizing data: |
This subclass is indented under subclass 27. Subject matter wherein the access control includes means to limit access by the data to be used. | |
31 | . Limitations on number or amount of copies: |
This subclass is indented under subclass 26. Subject matter wherein the prevention of unauthorized use of data includes means to limit number or amount of electronic copies of the data that can be made. | |
32 | . Copy detection: |
This subclass is indented under subclass 26. Subject matter including means to prevent unauthorized
use by detecting electronic copying of data.
SEE OR SEARCH CLASS:
| |||||||
33 | . Copy inactivation: |
This subclass is indented under subclass 26. Subject matter including means to prevent unauthorized use by rendering an electronic copy inactive unless access is authorized. | |
34 | PROTECTION OF HARDWARE: |
This subclass is indented under the class definition. Subject matter comprising systems, methods, and apparatus
used for safeguarding physical equipment used in data processing.
SEE OR SEARCH CLASS:
| |||||||||||||||||
35 | . Theft prevention: |
This subclass is indented under subclass 34. Subject matter wherein the protection of hardware includes means to prevent unauthorized removal of hardware. | |
36 | . Via power supply: |
This subclass is indented under subclass 34. Subject matter wherein the protection of hardware includes
means for protecting hardware by interruption of power supply.
SEE OR SEARCH CLASS:
| |||