| Class 726 | INFORMATION SECURITY |
| Click here for a printable version of this file | |
Expand/Contract Processing Please Wait
![]() | ![]() | 1 | POLICY |
![]() | ![]() | 2 | ACCESS CONTROL OR AUTHENTICATION |
![]() | ![]() | 3 | Network |
![]() | ![]() | 4 | Authorization |
![]() | ![]() | 5 | Credential |
![]() | ![]() | 6 | Management |
![]() | ![]() | 7 | Usage |
![]() | ![]() | 8 | Global (e.g., Single Sign On (SSO), etc.) |
![]() | ![]() | 9 | Tokens (e.g., smartcards or dongles, etc.) |
![]() | ![]() | 10 | Tickets (e.g., Kerberos or certificates, etc.) |
![]() | ![]() | 11 | Firewall |
![]() | ![]() | 16 | Stand-alone |
![]() | ![]() | 21 | Authorization |
![]() | ![]() | 22 | MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION |
![]() | ![]() | 26 | PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION |
![]() | ![]() | 27 | Access control |
![]() | ![]() | 31 | Limitations on number or amount of copies |
![]() | ![]() | 32 | Copy detection |
![]() | ![]() | 33 | Copy inactivation |
![]() | ![]() | 34 | PROTECTION OF HARDWARE |
![[List of Pre Grant Publications for class 726 subclass 1]](../as.gif)
![[List of Patents for class 726 subclass 1]](../ps.gif)



