Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Industry

  • CPC
  • G06F2221/00
This industry / category may be too specific. Please go to a parent level for more data

Sub Industries

G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms G06F2221/031Protect user input by software means G06F2221/032Protect output to user by software means G06F2221/033Test or assess software G06F2221/034Test or assess a computer or a system G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content G06F2221/0702Binding G06F2221/0704Device G06F2221/0706Domain G06F2221/0708Location G06F2221/0711Token G06F2221/0713User G06F2221/0715Characteristics G06F2221/0717Domain G06F2221/072Knowledge G06F2221/0722Content G06F2221/0724Editing G06F2221/0726Personalisation G06F2221/0728Conversion G06F2221/0731On user or administrative requirements G06F2221/0733Watermark G06F2221/0735Restriction at operating system level G06F2221/0737Traceability G06F2221/074Tracing pattern recognition G06F2221/0742Enhanced product G06F2221/0744Unique instance G06F2221/0746Emerging technologies G06F2221/0748Hiding G06F2221/0751Key G06F2221/0753Distribution G06F2221/0755Generation G06F2221/0757Licence G06F2221/0759Conversion G06F2221/0762Definition G06F2221/0764Grace period G06F2221/0766Language G06F2221/0768Editing G06F2221/0771Revocation G06F2221/0773Recurrent authorisation G06F2221/0775Logging G06F2221/0777Return G06F2221/0779Transfer G06F2221/0782Backup or restore G06F2221/0784Fragments G06F2221/0786Indirect via third party G06F2221/0788Peer-to-Peer [P2P] G06F2221/0791Superdistribution G06F2221/0793Synchronisation G06F2221/0795Transaction with ACID [Atomicity, Consistency, Isolation and Durability] properties G06F2221/0797using dedicated hardware at the client G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity G06F2221/2101Auditing as a secondary aspect G06F2221/2103Challenge-response G06F2221/2105Dual mode as a secondary aspect G06F2221/2107File encryption G06F2221/2109Game systems G06F2221/2111Location-sensitive G06F2221/2113Multi-level security G06F2221/2115Third party G06F2221/2117User registration G06F2221/2119Authenticating web pages G06F2221/2121Chip on media G06F2221/2123Dummy operation G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation G06F2221/2127Bluffing G06F2221/2129Authenticate client device independently of the user G06F2221/2131Lost password G06F2221/2133Verifying human interaction, e.g., Captcha G06F2221/2135Metering G06F2221/2137Time limited access G06F2221/2139Recurrent verification G06F2221/2141Access rights G06F2221/2143Clearing memory G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy G06F2221/2147Locking files G06F2221/2149Restricted operating environment G06F2221/2151Time stamp G06F2221/2153Using hardware token as a secondary aspect