Membership
Tour
Register
Log in
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Follow
Industry
CPC
G06F21/00
This industry / category may be too specific. Please go to a parent level for more data
Parent Industries
G
PHYSICS
G06
Computing
G06F
ELECTRICAL DIGITAL DATA PROCESSING
Current Industry
G06F21/00
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Sub Industries
G06F21/10
Protecting distributed programs or content
G06F21/105
Tools for software license management or administration
G06F21/12
Protecting executable software
G06F21/121
Restricting unauthorised execution of programs
G06F21/123
by using dedicated hardware
G06F21/125
by manipulating the program code
G06F21/126
Interacting with the operating system
G06F21/128
involving web programs, i.e. using technology especially used in internet, generally interacting with a web browser
G06F21/14
against software analysis or reverse engineering
G06F21/16
Program or content traceability
G06F21/30
Authentication
G06F21/305
by remotely controlling device operation
G06F21/31
User authentication
G06F21/313
using a call-back technique via a telephone network
G06F21/316
by observing the pattern of computer usage
G06F21/32
using biometric data
G06F21/33
using certificates
G06F21/335
for accessing specific resources
G06F21/34
involving the use of external additional devices
G06F21/35
communicating wirelessly
G06F21/36
by graphic or iconic representation
G06F21/40
by quorum
G06F21/41
where a single sign-on provides access to a plurality of computers
G06F21/42
using separate channels for security data
G06F21/43
wireless channels
G06F21/44
Program or device authentication
G06F21/445
by mutual authentication
G06F21/45
Structures or tools for the administration of authentication
G06F21/46
by designing passwords or checking the strength of passwords
G06F21/50
Monitoring users, programs or devices to maintain the integrity of platforms
G06F21/51
at application loading time
G06F21/52
during program execution
G06F21/53
by executing in a restricted environment
G06F21/54
by adding security routines or objects to programs
G06F21/55
Detecting local intrusion or implementing counter-measures
G06F21/552
involving long-term monitoring or reporting
G06F21/554
involving event detection and direct action
G06F21/556
involving covert channels
G06F21/558
with measures against differential power attack
G06F21/56
Computer malware detection or handling
G06F21/561
Virus type analysis
G06F21/562
Static detection
G06F21/563
by source code analysis
G06F21/564
by virus signature recognition
G06F21/565
by checking file integrity
G06F21/566
Dynamic detection, i.e. detection performed at run-time
G06F21/567
using dedicated hardware
G06F21/568
eliminating virus, restoring damaged files
G06F21/57
Certifying or maintaining trusted computer platforms
G06F21/572
Secure firmware programming
G06F21/575
Secure boot
G06F21/577
Assessing vulnerabilities and evaluating computer system security
G06F21/60
Protecting data
G06F21/602
Providing cryptographic facilities or services
G06F21/604
Tools and structures for managing or administering access control systems
G06F21/606
by securing the transmission between two devices or processes
G06F21/608
Secure printing
G06F21/62
Protecting access to data via a platform
G06F21/6209
to a single file or object
G06F21/6218
to a system of files or objects
G06F21/6227
where protection concerns the structure of data
G06F21/6236
between heterogeneous systems
G06F21/6245
Protecting personal data
G06F21/6254
by anonymising data
G06F21/6263
during internet communication
G06F21/6272
by registering files or documents with a third party
G06F21/6281
at program execution time, where the protection is within the operating system
G06F21/629
to features or functions of an application
G06F21/64
Protecting data integrity
G06F21/645
using a third party
G06F21/70
Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
G06F21/71
to assure secure computing or processing of information
G06F21/72
in cryptographic circuits
G06F21/725
operating on a secure reference time value
G06F21/73
by creating or determining hardware identification
G06F21/74
operating in dual or compartmented mode
G06F21/75
by inhibiting the analysis of circuitry or operation
G06F21/76
in application-specific integrated circuits [ASICs] or field-programmable devices
G06F21/77
in smart cards
G06F21/78
to assure secure storage of data
G06F21/79
in semiconductor storage media
G06F21/80
in storage media based on magnetic or optical technology
G06F21/805
using a security table for the storage sub-system
G06F21/81
by operating on the power supply
G06F21/82
Protecting input, output or interconnection devices
G06F21/83
input devices
G06F21/84
output devices
G06F21/85
interconnection devices
G06F21/86
Secure or tamper-resistant housings
G06F21/87
by means of encapsulation
G06F21/88
Detecting or preventing theft or loss
Industries
Overview
Organizations
People
Information
Impact
Please log in for detailed analytics