ReturnTo Theme-Group-Choice | Onelevelup |
(Not Translated)
5B285 | SECURITIES OF ONLINE SYSTEMS | |
G06F21/00 ;21/30-21/46 |
G06F15/00,330-15/00,330@Z | AA | AA00 PURPOSE OF PROTECTION |
AA01 | AA02 | AA03 | AA04 | AA05 | AA06 | AA07 | |||
. Preventing unauthorised use | . . managing copyright or license | . . Charging | . Securities | . Preventing destruction or tampering | . Detecting unauthorised use destruction or tampering | . Measures taken after unauthorised use destruction or tampering | ||||||
BA | BA00 OBJECT TO BE PROTECTED |
BA01 | BA02 | BA03 | BA04 | BA05 | BA06 | BA07 | BA08 | BA09 | BA10 | |
. Whole systems | . Terminals | . Servers centres or hosts | . Peripheral devices | . Media | . . Cards | . Files or data | . . Information for authentication | . . Contents or works e.g. pictures or music | . . Personal information | |||
BA11 | ||||||||||||
. Programmes | ||||||||||||
CA | CA00 SECURITY MEASURE |
CA01 | CA02 | CA03 | CA04 | CA05 | CA06 | |||||
. Setting authority levels | . . according to users | . . according to groups of users | . . according to apparatus | . . according to network groups or domains | . . of access rules or policies | |||||||
CA11 | CA12 | CA13 | CA14 | CA16 | CA17 | CA18 | CA19 | |||||
. Managing authority | . . Registering or updating | . . Invalidating | . . Delegation | . . Restrictions of use | . . . Periods of use time | . . . with the limited number of times | . . managing the number of simultaneous uses or licenses | |||||
CA21 | CA22 | CA23 | CA24 | CA25 | ||||||||
. Secrecy or hiding | . . of connection sources | . . . keeping terminals anonymous or restricting acquisition to personal information | . . of connection destinations | . . . of destination addresses | ||||||||
CA31 | CA32 | CA33 | CA34 | CA35 | CA36 | CA37 | CA38 | CA39 | ||||
. Monitoring detecting or recovering | . . of behaviours or logs | . . Tracking e.g. of access sources | . . Firewalls | . . Electronic watermarks | . . Checking virus or worms | . . . using other measures than patterns | . . Vaccines | . . Backups | ||||
CA41 | CA42 | CA43 | CA44 | CA45 | CA47 | |||||||
. Using encryption techniques | . . Shared keys | . . Public key cryptosystems | . . Electronic signatures | . . using certificate authorities or key management servers | . . using random number codes | |||||||
CA51 | CA52 | CA53 | CA54 | |||||||||
. Measures against physical destructions | . . Anti-tampering | . . erasing secret information | . . Duplex or redundancy | |||||||||
CB | CB00 AUTHENTICATION |
CB01 | CB02 | CB03 | CB04 | CB05 | CB06 | CB07 | CB08 | CB09 | ||
. User identification | . . IDs or passwords | . . . Hidden input | . . . characterised by input or display modes e.g. selecting graphics | . . . Measures against forgetting IDs or passwords | . . Personal media | . . . IC cards | . . . . contactless | . . . Keys or dongles | ||||
CB12 | CB13 | CB14 | CB15 | CB16 | CB17 | CB18 | CB20 | |||||
. . Physical characteristics or biological information | . . . Weight or height | . . . Faces or appearances | . . . Fingerprints or palm prints | . . . Blood vessel patterns e.g. of retinas or hands | . . . Irises | . . . DNA | . . . detecting vital reactions e.g. body temperatures or pulses | |||||
CB23 | CB24 | CB25 | CB26 | |||||||||
. . . Speeches or voiceprints | . . . Handwritings or signatures | . . . Key input timing | . . . Actions or motions | |||||||||
CB32 | CB33 | CB34 | CB35 | |||||||||
. . Special authentication | . . . by operating procedures | . . . . Screen passwords | . . . by personal information | |||||||||
CB41 | CB42 | CB43 | CB44 | CB45 | CB46 | CB47 | CB48 | CB49 | CB50 | |||
. Verifying using or connecting means | . . Equipment IDs | . . IP addresses | . . Media IDs | . . Software IDs | . . . Instructions or data patterns | . . Access tickets or certificates | . . . Tallies | . . using position information or locations | . . Connection routes or lines | |||
CB51 | CB52 | CB53 | CB54 | CB55 | CB56 | CB57 | CB58 | CB59 | ||||
. Creating or registering authentication information | . . characterised by the procedures | . . characterised by the means | . . Registering means thereof | . . . Servers | . . . Terminals | . . . Personal media | . . changing authentication information | . . . Keys | ||||
CB61 | CB62 | CB63 | CB64 | |||||||||
. Means for storing authentication information | . . Servers | . . Terminals | . . Personal media | |||||||||
CB71 | CB72 | CB73 | CB74 | CB75 | CB76 | |||||||
. Means for executing authentication | . . Servers | . . . Integrated authentication servers or license servers | . . Terminals | . . Media | . Mutual authentication between apparatus | |||||||
CB81 | CB82 | CB83 | CB84 | CB85 | CB86 | CB87 | CB89 | CB90 | ||||
. Timing of authentication | . . at the time of arranging or installing | . . at the time of starting equipment or programmes | . . at the time of connecting networks or servers | . . . Log-on authentication | . . at the time of switching authority levels | . . at the time of suspending or restarting | . . at regular intervals | . . Single sign-ons | ||||
CB91 | CB92 | CB93 | CB94 | CB95 | ||||||||
. Authentication procedures | . . sending or receiving authentication information | . . using shared knowledge | . . . Challenges and responses | . . . One time passwords | ||||||||
DA | DA00 COMMUNICATION LINE BETWEEN SYSTEMS |
DA01 | DA02 | DA03 | DA04 | DA05 | DA06 | DA08 | DA09 | DA10 | ||
. Public lines | . . Telephone lines | . . . using mobile communication networks | . IP lines | . . Internet connection | . . Intranet | . Leased lines | . . building VPNs | . Wireless communications between systems |