This page displays all 「FI」 in main group G06F21/00. |
HB:Handbook | ||||
CC:Concordance |
|
Security arrangements for protecting computers or computer systems against unauthorised activity (multiprogramming G06F 9/46; protection against unauthorised use of memory G06F 12/14; dispensing apparatus actuated by coded identity card or credit card G07F 7/08; equipment anti-theft monitoring by a central station G08B 26/00; secret or secure communication H04L 9/00; data switching networks H04L 12/00) [8] | HB | CC | 5B285 | |
|
.Protecting distributed programs or content, e.g. vending or licensing of copyrighted material (protection in video systems or pay television H04N 7/16) | HB | CC | 5B017 | |
|
..tool for software lisence management, e.g. management of lisence at corporate level | HB | CC | 5B017 | |
|
..Protecting executable software | HB | CC | 5B276 | |
|
...limiting wrongful execution of program | HB | CC | 5B276 | |
|
....using specific hardware, e.g. dongle, smart card, encoding processor, GPS apparatus | HB | CC | 5B276 | |
|
....by operating program code, e.g. source code, compiled code, interpreted code, machine language | HB | CC | 5B276 | |
|
.....interacts with OS | HB | CC | 5B276 | |
|
....includes web program, i.e. uses technique especially useful in internet and interacts with web browser, e.g. HTML, applet | HB | CC | 5B276 | |
|
...against software analysis or reverse engineering, e.g. by obfuscation | HB | CC | 5B276 | |
|
..Program or content traceability, e.g. by watermarking [2013.01] | HB | CC | 5B276 | |
|
.Authentication, i.e. establishing the identity or authorisation of security principals | HB | CC | 5B285 | |
|
..by operation of remote control device | HB | CC | 5B285 | |
|
..User authentication | HB | CC | 5B285 | |
|
...using call back technique through telephone line | HB | CC | 5B285 | |
|
...monitoring usage pattern of computer, e.g. typical user behavior | HB | CC | 5B285 | |
|
...using biometric data, e.g. fingerprints, iris scans or voiceprints | HB | CC | 5B285 | |
|
...using certificates | HB | CC | 5B285 | |
|
....to access specific resource, e.g. using kerberos ticket | HB | CC | 5B285 | |
|
...involving the use of external additional devices, e.g. dongles or smart cards | HB | CC | 5B285 | |
|
....communicating wirelessly | HB | CC | 5B285 | |
|
...by graphic or iconic representation | HB | CC | 5B285 | |
|
...by quorum, i.e. whereby two or more security principals are required | HB | CC | 5B285 | |
|
...where a single sign-on provides access to a plurality of computers | HB | CC | 5B285 | |
|
...using separate channels for security data | HB | CC | 5B285 | |
|
....wireless channels | HB | CC | 5B285 | |
|
..Program or device authentication | HB | CC | 5B285 | |
|
...by mutual certification, e.g. mutual certification between devices or between programs | HB | CC | 5B285 | |
|
..Structures or tools for the administration of authentication | HB | CC | 5B285 | |
|
...by designing passwords or checking the strength of passwords | HB | CC | 5B285 | |
|
.Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems | HB | CC | 5B276 | |
|
..at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability | HB | CC | 5B276 | |
|
..during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure | HB | CC | 5B276 | |
|
...by executing in a restricted environment, e.g. sandbox or secure virtual machine | HB | CC | 5B276 | |
|
...by adding security routines or objects to programs | HB | CC | 5B276 | |
|
..Detecting local intrusion or implementing counter-measures | HB | CC | 5B276 | |
|
...includes monitoring or reporting contimued for long period of time | HB | CC | 5B276 | |
|
...includes detection of events and direct actions | HB | CC | 5B276 | |
|
...covert channel, i.e. includes preention of data leakage bettween processes | HB | CC | 5B276 | |
|
....having counter measure against differential power attack (DPA) | HB | CC | 5B276 | |
|
...Computer malware detection or handling, e.g. anti-virus arrangements | HB | CC | 5B276 | |
|
....virus type analysis | HB | CC | 5B276 | |
|
....static detection of virus | HB | CC | 5B276 | |
|
.....by source code analysis | HB | CC | 5B276 | |
|
.....characterized by virus signature processing | HB | CC | 5B276 | |
|
.....by testing completeness of file | HB | CC | 5B276 | |
|
....dynamic detection of virus, i.e. detectio performed at execution, e.g. emulation, detection of suspicious behavior | HB | CC | 5B276 | |
|
....by using specific hardware | HB | CC | 5B276 | |
|
....deleting virus, recovery of infected file | HB | CC | 5B276 | |
|
..Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities | HB | CC | 5B276 | |
|
...secured programming, e.g. revision of BIOS or firmware | HB | CC | 5B276 | |
|
...secured plate | HB | CC | 5B276 | |
|
...vulnerability evaluation and security evaluation of computer system | HB | CC | 5B276 | |
|
.Protecting data | HB | CC | 5B017 | |
|
..to offer encoding facility or service | HB | CC | 5B017 | |
|
..tool and structure for managing access management system | HB | CC | 5B017 | |
|
..establish confidentiality on transmission between two devices or processes | HB | CC | 5B017 | |
|
...secured printing | HB | CC | 5B017 | |
|
..Protecting access to data via a platform, e.g. using keys or access control rules | HB | CC | 5B017 | |
|
...protection of single file or object, e.g. protection by using secured envelope, encoding and access using key, or access control policy attached to object per se | HB | CC | 5B017 | |
|
...protection of system of multiple files or objects, e.g. ptotection of local or dispersed files or database | HB | CC | 5B017 | |
|
....performs protection related to data structure, e.g. protection related to record, type, query | HB | CC | 5B017 | |
|
....protection between systems of different type | HB | CC | 5B017 | |
|
....protection of personal inormation, e.g. protection of asset information or information for medical purpose | HB | CC | 5B017 | |
|
.....protection of personal information by making it anonymous, e.g. deleting personal information from owner identification information | HB | CC | 5B017 | |
|
.....protection of personal information at intertnet communication, e.g. measure against personal information leakage from cookies | HB | CC | 5B017 | |
|
....protection by trusted third party performing filing or document registration | HB | CC | 5B017 | |
|
....protect data inside OS when executing program | HB | CC | 5B017 | |
|
...protection of characteristics or function of application | HB | CC | 5B017 | |
|
..Protecting data integrity, e.g. using checksums, certificates or signatures | HB | CC | 5B017 | |
|
...using third pary organization | HB | CC | 5B017 | |
|
.Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer | HB | CC | 5B017 | |
|
..to assure secure computing or processing of information | HB | CC | 5B017 | |
|
...in cryptographic circuits | HB | CC | 5B017 | |
|
....make motion based on secured reference time | HB | CC | 5B017 | |
|
...by creating or determining hardware identification, e.g. serial numbers | HB | CC | 5B017 | |
|
...operating in dual or compartmented mode, i.e. at least one secure mode | HB | CC | 5B017 | |
|
...by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering | HB | CC | 5B017 | |
|
...in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD] [2013.01] | HB | CC | 5B017 | |
|
...in smart cards | HB | CC | 5B017 | |
|
..to assure secure storage of data (address-based protection against unauthorised use of memory G06F 12/14; record carriers for use with machines and with at least a part designed to carry digital markings G06K 19/00) | HB | CC | 5B017 | |
|
...in semiconductor storage media, e.g. directly-addressable memories | HB | CC | 5B017 | |
|
...in storage media based on magnetic or optical technology, e.g. disks with sectors (preventing unauthorised reproduction or copying of disk-type recordable media G11B 20/00) | HB | CC | 5B017 | |
|
....using security table for storage subsystem | HB | CC | 5B017 | |
|
..by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations | HB | CC | 5B017 | |
|
..Protecting input, output or interconnection devices | HB | CC | 5B017 | |
|
...input devices, e.g. keyboards, mice or controllers thereof | HB | CC | 5B017 | |
|
...output devices, e.g. displays or monitors | HB | CC | 5B017 | |
|
...interconnection devices, e.g. bus-connected or in-line devices | HB | CC | 5B017 | |
|
..Secure or tamper-resistant housings | HB | CC | 5B017 | |
|
...by means of encapsulation, e.g. for integrated circuits | HB | CC | 5B017 | |
|
..Detecting or preventing theft or loss | HB | CC | 5B017 | |