Click to skip top of page links USPTO IntranetIntranet HomeIndexResourcesContactsInternetSearch
Patent Intranet > Classification Home Page > Classification Search Page > Classification Schedule with Indent Level
Site Feedback
 
   Search Classification Data | Class Numbers & Titles | Class Numbers | USPC Index  | International  | HELP  | Employee by Name  | Employees by Org       

 Class   726INFORMATION SECURITY
  Click here to view a PDF version of this file
  1           POLICY
  2           ACCESS CONTROL OR AUTHENTICATION
  3           . (1 indent ) Network
  4           .. (2 indent ) Authorization
  5           .. (2 indent ) Credential
  6           ... (3 indent ) Management
  7           ... (3 indent ) Usage
  8           ... (3 indent ) Global (e.g., Single Sign On (SSO), etc.)
  9           ... (3 indent ) Tokens (e.g., smartcards or dongles, etc.)
  10           ... (3 indent ) Tickets (e.g., Kerberos or certificates, etc.)
  11           .. (2 indent ) Firewall
  12           ... (3 indent ) Proxy server or gateway
  13           ... (3 indent ) Packet filtering
  14           ... (3 indent ) Security protocols
  15           .... (4 indent ) Virtual Private Network or Virtual Terminal Protocol (i.e., VPN or VTP)
  16           . (1 indent ) Stand-alone
  17           .. (2 indent ) Authorization
  18           ... (3 indent ) Credential management
  19           ... (3 indent ) Credential usage
  20           ... (3 indent ) Tokens (e.g., smartcards or dongles, etc.)
  21           . (1 indent ) Authorization
  22           MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION
  23           . (1 indent ) Intrusion detection
  24           .. (2 indent ) Virus detection
  25           . (1 indent ) Vulnerability assessment
  26           PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION
  27           . (1 indent ) Access control
  28           .. (2 indent ) By authorizing user
  29           .. (2 indent ) By authorizing client
  30           .. (2 indent ) By authorizing data
  31           . (1 indent ) Limitations on number or amount of copies
  32           . (1 indent ) Copy detection
  33           . (1 indent ) Copy inactivation
  34           PROTECTION OF HARDWARE
  35           . (1 indent ) Theft prevention
  36           . (1 indent ) Via power supply


   Note: Some content linked to on this page may require a plug-in for Adobe Acrobat Reader.

This file produced by USPTO - SIRA - Office of Patent Automation - ReferenceTools Project. Questions or comments relating to this file should be directed to Patent Automation Feedback.

Click to skip end of page links


Intranet Home | Index | Resources | Contacts | Internet | Search | Firewall | Web Services

This data is current as of June/2006