Class 726 information security | |
---|---|
uspc | description |
726/1 | 726 information security/(1) policy |
726/2 | 726 information security/(2) access control or authentication |
726/3 | 726 information security/(2) access control or authentication (3) network |
726/4 | 726 information security/(2) access control or authentication (3) network (4) authorization |
726/5 | 726 information security/(2) access control or authentication (3) network (5) credential |
726/6 | 726 information security/(2) access control or authentication (3) network (5) credential (6) management |
726/7 | 726 information security/(2) access control or authentication (3) network (5) credential (7) usage |
726/8 | 726 information security/(2) access control or authentication (3) network (5) credential (8) global (e.g., single sign on (sso), etc.) |
726/9 | 726 information security/(2) access control or authentication (3) network (5) credential (9) tokens (e.g., smartcards or dongles, etc.) |
726/10 | 726 information security/(2) access control or authentication (3) network (5) credential (10) tickets (e.g., kerberos or certificates, etc.) |
726/11 | 726 information security/(2) access control or authentication (3) network (11) firewall |
726/12 | 726 information security/(2) access control or authentication (3) network (11) firewall (12) proxy server or gateway |
726/13 | 726 information security/(2) access control or authentication (3) network (11) firewall (13) packet filtering |
726/14 | 726 information security/(2) access control or authentication (3) network (11) firewall (14) security protocols |
726/15 | 726 information security/(2) access control or authentication (3) network (11) firewall (14) security protocols (15) virtual private network or virtual terminal protocol (i.e., vpn or vtp) |
726/16 | 726 information security/(2) access control or authentication (16) stand-alone |
726/17 | 726 information security/(2) access control or authentication (16) stand-alone (17) authorization |
726/18 | 726 information security/(2) access control or authentication (16) stand-alone (17) authorization (18) credential management |
726/19 | 726 information security/(2) access control or authentication (16) stand-alone (17) authorization (19) credential usage |
726/20 | 726 information security/(2) access control or authentication (16) stand-alone (17) authorization (20) tokens (e.g., smartcards or dongles, etc.) |
726/21 | 726 information security/(2) access control or authentication (21) authorization |
726/22 | 726 information security/(22) monitoring or scanning of software or data including attack prevention |
726/23 | 726 information security/(22) monitoring or scanning of software or data including attack prevention (23) intrusion detection |
726/24 | 726 information security/(22) monitoring or scanning of software or data including attack prevention (23) intrusion detection (24) virus detection |
726/25 | 726 information security/(22) monitoring or scanning of software or data including attack prevention (25) vulnerability assessment |
726/26 | 726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification |
726/27 | 726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (27) access control |
726/28 | 726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (27) access control (28) by authorizing user |
726/29 | 726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (27) access control (29) by authorizing client |
726/30 | 726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (27) access control (30) by authorizing data |
726/31 | 726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (31) limitations on number or amount of copies |
726/32 | 726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (32) copy detection |
726/33 | 726 information security/(26) prevention of unauthorized use of data including prevention of piracy, privacy violations, or unauthorized data modification (33) copy inactivation |
726/34 | 726 information security/(34) protection of hardware |
726/35 | 726 information security/(34) protection of hardware (35) theft prevention |
726/36 | 726 information security/(34) protection of hardware (36) via power supply |
Back to the Class List