F-Term-List

(Not Translated)
5B285 SECURITIES OF ONLINE SYSTEMS
G06F21/00 ;21/30-21/46
G06F15/00,330-15/00,330@Z AA AA00
PURPOSE OF PROTECTION
AA01 AA02 AA03 AA04 AA05 AA06 AA07
. Preventing unauthorised use . . managing copyright or license . . Charging . Securities . Preventing destruction or tampering . Detecting unauthorised use destruction or tampering . Measures taken after unauthorised use destruction or tampering
BA BA00
OBJECT TO BE PROTECTED
BA01 BA02 BA03 BA04 BA05 BA06 BA07 BA08 BA09 BA10
. Whole systems . Terminals . Servers centres or hosts . Peripheral devices . Media . . Cards . Files or data . . Information for authentication . . Contents or works e.g. pictures or music . . Personal information
BA11
. Programmes
CA CA00
SECURITY MEASURE
CA01 CA02 CA03 CA04 CA05 CA06
. Setting authority levels . . according to users . . according to groups of users . . according to apparatus . . according to network groups or domains . . of access rules or policies
CA11 CA12 CA13 CA14 CA16 CA17 CA18 CA19
. Managing authority . . Registering or updating . . Invalidating . . Delegation . . Restrictions of use . . . Periods of use time . . . with the limited number of times . . managing the number of simultaneous uses or licenses
CA21 CA22 CA23 CA24 CA25
. Secrecy or hiding . . of connection sources . . . keeping terminals anonymous or restricting acquisition to personal information . . of connection destinations . . . of destination addresses
CA31 CA32 CA33 CA34 CA35 CA36 CA37 CA38 CA39
. Monitoring detecting or recovering . . of behaviours or logs . . Tracking e.g. of access sources . . Firewalls . . Electronic watermarks . . Checking virus or worms . . . using other measures than patterns . . Vaccines . . Backups
CA41 CA42 CA43 CA44 CA45 CA47
. Using encryption techniques . . Shared keys . . Public key cryptosystems . . Electronic signatures . . using certificate authorities or key management servers . . using random number codes
CA51 CA52 CA53 CA54
. Measures against physical destructions . . Anti-tampering . . erasing secret information . . Duplex or redundancy
CB CB00
AUTHENTICATION
CB01 CB02 CB03 CB04 CB05 CB06 CB07 CB08 CB09
. User identification . . IDs or passwords . . . Hidden input . . . characterised by input or display modes e.g. selecting graphics . . . Measures against forgetting IDs or passwords . . Personal media . . . IC cards . . . . contactless . . . Keys or dongles
CB12 CB13 CB14 CB15 CB16 CB17 CB18 CB20
. . Physical characteristics or biological information . . . Weight or height . . . Faces or appearances . . . Fingerprints or palm prints . . . Blood vessel patterns e.g. of retinas or hands . . . Irises . . . DNA . . . detecting vital reactions e.g. body temperatures or pulses
CB23 CB24 CB25 CB26
. . . Speeches or voiceprints . . . Handwritings or signatures . . . Key input timing . . . Actions or motions
CB32 CB33 CB34 CB35
. . Special authentication . . . by operating procedures . . . . Screen passwords . . . by personal information
CB41 CB42 CB43 CB44 CB45 CB46 CB47 CB48 CB49 CB50
. Verifying using or connecting means . . Equipment IDs . . IP addresses . . Media IDs . . Software IDs . . . Instructions or data patterns . . Access tickets or certificates . . . Tallies . . using position information or locations . . Connection routes or lines
CB51 CB52 CB53 CB54 CB55 CB56 CB57 CB58 CB59
. Creating or registering authentication information . . characterised by the procedures . . characterised by the means . . Registering means thereof . . . Servers . . . Terminals . . . Personal media . . changing authentication information . . . Keys
CB61 CB62 CB63 CB64
. Means for storing authentication information . . Servers . . Terminals . . Personal media
CB71 CB72 CB73 CB74 CB75 CB76
. Means for executing authentication . . Servers . . . Integrated authentication servers or license servers . . Terminals . . Media . Mutual authentication between apparatus
CB81 CB82 CB83 CB84 CB85 CB86 CB87 CB89 CB90
. Timing of authentication . . at the time of arranging or installing . . at the time of starting equipment or programmes . . at the time of connecting networks or servers . . . Log-on authentication . . at the time of switching authority levels . . at the time of suspending or restarting . . at regular intervals . . Single sign-ons
CB91 CB92 CB93 CB94 CB95
. Authentication procedures . . sending or receiving authentication information . . using shared knowledge . . . Challenges and responses . . . One time passwords
DA DA00
COMMUNICATION LINE BETWEEN SYSTEMS
DA01 DA02 DA03 DA04 DA05 DA06 DA08 DA09 DA10
. Public lines . . Telephone lines . . . using mobile communication networks . IP lines . . Internet connection . . Intranet . Leased lines . . building VPNs . Wireless communications between systems
TOP