USPC Patent Classifications

Links will help build a uspc search at the uspto for you.

Class 726 information security
uspcdescription
726/1726 information security/(1) policy
726/2726 information security/(2) access control or authentication
726/3726 information security/(2) access control or authentication (3) network
726/4726 information security/(2) access control or authentication (3) network (4) authorization
726/5726 information security/(2) access control or authentication (3) network (5) credential
726/6726 information security/(2) access control or authentication (3) network (5) credential (6) management
726/7726 information security/(2) access control or authentication (3) network (5) credential (7) usage
726/8726 information security/(2) access control or authentication (3) network (5) credential (8) global (e.g., single sign on (sso), etc.)
726/9726 information security/(2) access control or authentication (3) network (5) credential (9) tokens (e.g., smartcards or dongles, etc.)
726/10726 information security/(2) access control or authentication (3) network (5) credential (10) tickets (e.g., kerberos or certificates, etc.)
726/11726 information security/(2) access control or authentication (3) network (11) firewall
726/12726 information security/(2) access control or authentication (3) network (11) firewall (12) proxy server or gateway
726/13726 information security/(2) access control or authentication (3) network (11) firewall (13) packet filtering
726/14726 information security/(2) access control or authentication (3) network (11) firewall (14) security protocols
726/15726 information security/(2) access control or authentication (3) network (11) firewall (14) security protocols (15) virtual private network or virtual terminal protocol (i.e., vpn or vtp)
726/16726 information security/(2) access control or authentication (16) stand-alone
726/17726 information security/(2) access control or authentication (16) stand-alone (17) authorization
726/18726 information security/(2) access control or authentication (16) stand-alone (17) authorization (18) credential management
726/19726 information security/(2) access control or authentication (16) stand-alone (17) authorization (19) credential usage
726/20726 information security/(2) access control or authentication (16) stand-alone (17) authorization (20) tokens (e.g., smartcards or dongles, etc.)
726/21726 information security/(2) access control or authentication (21) authorization
726/22726 information security/(22) monitoring or scanning of software or data including attack prevention
726/23726 information security/(22) monitoring or scanning of software or data including attack prevention (23) intrusion detection
726/24726 information security/(22) monitoring or scanning of software or data including attack prevention (23) intrusion detection (24) virus detection
726/25726 information security/(22) monitoring or scanning of software or data including attack prevention (25) vulnerability assessment
726/26726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification
726/27726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (27) access control
726/28726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (27) access control (28) by authorizing user
726/29726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (27) access control (29) by authorizing client
726/30726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (27) access control (30) by authorizing data
726/31726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (31) limitations on number or amount of copies
726/32726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (32) copy detection
726/33726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (33) copy inactivation
726/34726 information security/(34) protection of hardware
726/35726 information security/(34) protection of hardware (35) theft prevention
726/36726 information security/(34) protection of hardware (36) via power supply

Back to the Class List