Industry
-
CPC
-
G06F2221/00
This industry / category may be too specific. Please go to a parent level for more data
Sub Industries
G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
G06F2221/031Protect user input by software means
G06F2221/032Protect output to user by software means
G06F2221/033Test or assess software
G06F2221/034Test or assess a computer or a system
G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
G06F2221/0702Binding
G06F2221/0704Device
G06F2221/0706Domain
G06F2221/0708Location
G06F2221/0711Token
G06F2221/0713User
G06F2221/0715Characteristics
G06F2221/0717Domain
G06F2221/072Knowledge
G06F2221/0722Content
G06F2221/0724Editing
G06F2221/0726Personalisation
G06F2221/0728Conversion
G06F2221/0731On user or administrative requirements
G06F2221/0733Watermark
G06F2221/0735Restriction at operating system level
G06F2221/0737Traceability
G06F2221/074Tracing pattern recognition
G06F2221/0742Enhanced product
G06F2221/0744Unique instance
G06F2221/0746Emerging technologies
G06F2221/0748Hiding
G06F2221/0751Key
G06F2221/0753Distribution
G06F2221/0755Generation
G06F2221/0757Licence
G06F2221/0759Conversion
G06F2221/0762Definition
G06F2221/0764Grace period
G06F2221/0766Language
G06F2221/0768Editing
G06F2221/0771Revocation
G06F2221/0773Recurrent authorisation
G06F2221/0775Logging
G06F2221/0777Return
G06F2221/0779Transfer
G06F2221/0782Backup or restore
G06F2221/0784Fragments
G06F2221/0786Indirect via third party
G06F2221/0788Peer-to-Peer [P2P]
G06F2221/0791Superdistribution
G06F2221/0793Synchronisation
G06F2221/0795Transaction with ACID [Atomicity, Consistency, Isolation and Durability] properties
G06F2221/0797using dedicated hardware at the client
G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F2221/2101Auditing as a secondary aspect
G06F2221/2103Challenge-response
G06F2221/2105Dual mode as a secondary aspect
G06F2221/2107File encryption
G06F2221/2109Game systems
G06F2221/2111Location-sensitive
G06F2221/2113Multi-level security
G06F2221/2115Third party
G06F2221/2117User registration
G06F2221/2119Authenticating web pages
G06F2221/2121Chip on media
G06F2221/2123Dummy operation
G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
G06F2221/2127Bluffing
G06F2221/2129Authenticate client device independently of the user
G06F2221/2131Lost password
G06F2221/2133Verifying human interaction, e.g., Captcha
G06F2221/2135Metering
G06F2221/2137Time limited access
G06F2221/2139Recurrent verification
G06F2221/2141Access rights
G06F2221/2143Clearing memory
G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
G06F2221/2147Locking files
G06F2221/2149Restricted operating environment
G06F2221/2151Time stamp
G06F2221/2153Using hardware token as a secondary aspect