This page requires javascipt to function properly
2 ACCESS CONTROL OR AUTHENTICATION
4 .. (2 indent ) Authorization
5 .. (2 indent ) Credential
6 ... (3 indent ) Management
8 ... (3 indent ) Global (e.g., Single Sign On (SSO), etc.)
9 ... (3 indent ) Tokens (e.g., smartcards or dongles, etc.)
10 ... (3 indent ) Tickets (e.g., Kerberos or certificates, etc.)
11 .. (2 indent ) Firewall
12 ... (3 indent ) Proxy server or gateway
13 ... (3 indent ) Packet filtering
14 ... (3 indent ) Security protocols
15 .... (4 indent ) Virtual Private Network or Virtual Terminal Protocol (i.e., VPN or VTP)
16 . (1 indent ) Stand-alone
17 .. (2 indent ) Authorization
18 ... (3 indent ) Credential management
19 ... (3 indent ) Credential usage
20 ... (3 indent ) Tokens (e.g., smartcards or dongles, etc.)
21 . (1 indent ) Authorization
22 MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION
23 . (1 indent ) Intrusion detection
24 .. (2 indent ) Virus detection
25 . (1 indent ) Vulnerability assessment
26 PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION
27 . (1 indent ) Access control
28 .. (2 indent ) By authorizing user
29 .. (2 indent ) By authorizing client
30 .. (2 indent ) By authorizing data
31 . (1 indent ) Limitations on number or amount of copies
32 . (1 indent ) Copy detection
33 . (1 indent ) Copy inactivation
34 PROTECTION OF HARDWARE
35 . (1 indent ) Theft prevention
36 . (1 indent ) Via power supply
Note: Some content
linked to on this page may require a plug-in for Adobe
Acrobat Reader .
This file produced by USPTO - SIRA -
Office of Patent Automation - ReferenceTools Project.
Questions or comments relating to this file should be
directed to Patent
Automation Feedback .