Recherchebereich

Symbol Version, Sprache

Ergebnisbereich

Suchanfrage: Es wurde noch keine Recherche ausgeführt.

Symbol IPC-Stellen auswählen Titel
A
Hierarchie anzeigen
HUMAN NECESSITIES
B
Hierarchie anzeigen
PERFORMING OPERATIONSTRANSPORTING
C
Hierarchie anzeigen
CHEMISTRYMETALLURGY
D
Hierarchie anzeigen
TEXTILESPAPER
E
Hierarchie anzeigen
FIXED CONSTRUCTIONS
F
Hierarchie anzeigen
MECHANICAL ENGINEERINGLIGHTINGHEATINGWEAPONSBLASTING
G
Hierarchie anzeigen
PHYSICS
G01
Hierarchie anzeigen
INSTRUMENTS
G01
Hierarchie anzeigen
MEASURINGTESTING
G02
Hierarchie anzeigen
OPTICS
G03
Hierarchie anzeigen
PHOTOGRAPHYCINEMATOGRAPHYANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVESELECTROGRAPHYHOLOGRAPHY [4]
G04
Hierarchie anzeigen
HOROLOGY
G05
Hierarchie anzeigen
CONTROLLINGREGULATING
G06
Hierarchie anzeigen
COMPUTINGCALCULATINGCOUNTING
G06C
Hierarchie anzeigen
DIGITAL COMPUTERS IN WHICH ALL THE COMPUTATION IS EFFECTED MECHANICALLY (score computers for card games A63F 1/18; construction of keys, printing mechanisms, or other parts of general application to the typewriting or printing art B41; keys or printing mechanisms for special applications, see the relevant subclass, e.g. G05G, G06K; cash registers G07G 1/00) [4]
G06D
Hierarchie anzeigen
DIGITAL FLUID-PRESSURE COMPUTING DEVICES
G06E
Hierarchie anzeigen
OPTICAL COMPUTING DEVICES (digital storage using optical elements G11C 13/04) [5]
G06F
Hierarchie anzeigen
ELECTRIC DIGITAL DATA PROCESSING (computers in which a part of the computation is effected hydraulically or pneumatically G06D, optically G06E; computer systems based on specific computational models G06N)
G06F 1/00
Hierarchie anzeigen
Details not covered by groups G06F 3/00-G06F 13/00 and G06F 21/00 (architectures of general purpose stored programme computers G06F 15/76) [1, 2006.01]
G06F 3/00
Hierarchie anzeigen
Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements [1, 4, 2006.01]
G06F 5/00
Hierarchie anzeigen
Methods or arrangements for data conversion without changing the order or content of the data handled [1, 4, 2006.01]
G06F 7/00
Hierarchie anzeigen
Methods or arrangements for processing data by operating upon the order or content of the data handled (logic circuits H03K 19/00) [1, 2006.01]
G06F 9/00
Hierarchie anzeigen
Arrangements for programme control, e.g. control unit (programme control for peripheral devices G06F 13/10) [1, 4, 2006.01]
G06F 11/00
Hierarchie anzeigen
Error detectionError correctionMonitoring (methods or arrangements for verifying the correctness of marking on a record carrier G06K 5/00; in information storage based on relative movement between record carrier and transducer G11B, e.g. G11B 20/18; in static stores G11C 29/00) [1, 4, 2006.01]
G06F 12/00
Hierarchie anzeigen
Accessing, addressing or allocating within memory systems or architectures (digital input from, or digital output to record carriers, e.g. to disk storage units, G06F 3/06) [4, 5, 2006.01]
G06F 13/00
Hierarchie anzeigen
Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units (interface circuits for specific input/output devices G06F 3/00; multi-processor systems G06F 15/16) [1, 4, 2006.01]
G06F 15/00
Hierarchie anzeigen
Digital computers in general (details G06F 1/00-G06F 13/00)Data processing equipment in general [1, 2006.01]
G06F 17/00
Hierarchie anzeigen
Digital computing or data processing equipment or methods, specially adapted for specific functions [6, 2006.01]
G06F 19/00
Hierarchie anzeigen
Digital computing or data processing equipment or methods, specially adapted for specific applications (G06F 17/00 takes precedence; data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q) [6, 2006.01, 2011.01]
G06F 21/00
Hierarchie anzeigen
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity [2006.01, 2013.01]
G06F 21/10
Hierarchie anzeigen
Protecting distributed programs or content, e.g. vending or licensing of copyrighted material (protection in video systems or pay television H04N 7/16) [2013.01]
G06F 21/12
Hierarchie anzeigen
. . Protecting executable software [2013.01]
G06F 21/14
Hierarchie anzeigen
. . . against software analysis or reverse engineering, e.g. by obfuscation [2013.01]
G06F 21/16
Hierarchie anzeigen
. . Program or content traceability, e.g. by watermarking (digital watermarking on images H04N 1/32) [2013.01]
G06F 21/30
Hierarchie anzeigen
Authentication, i.e. establishing the identity or authorisation of security principals [2013.01]
G06F 21/31
Hierarchie anzeigen
. . User authentication [2013.01]
G06F 21/32
Hierarchie anzeigen
. . . using biometric data, e.g. fingerprints, iris scans or voiceprints [2013.01]
G06F 21/33
Hierarchie anzeigen
. . . using certificates [2013.01]
G06F 21/34
Hierarchie anzeigen
. . . involving the use of external additional devices, e.g. dongles or smart cards [2013.01]
G06F 21/35
Hierarchie anzeigen
. . . . communicating wirelessly [2013.01]
G06F 21/36
Hierarchie anzeigen
. . . by graphic or iconic representation [2013.01]
G06F 21/40
Hierarchie anzeigen
. . . by quorum, i.e. whereby two or more security principals are required [2013.01]
G06F 21/41
Hierarchie anzeigen
. . . where a single sign-on provides access to a plurality of computers [2013.01]
G06F 21/42
Hierarchie anzeigen
. . . using separate channels for security data [2013.01]
G06F 21/43
Hierarchie anzeigen
. . . . wireless channels [2013.01]
G06F 21/44
Hierarchie anzeigen
. . Program or device authentication [2013.01]
G06F 21/45
Hierarchie anzeigen
. . Structures or tools for the administration of authentication [2013.01]
G06F 21/46
Hierarchie anzeigen
. . . by designing passwords or checking the strength of passwords [2013.01]
G06F 21/50
Hierarchie anzeigen
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems [2013.01]
G06F 21/51
Hierarchie anzeigen
. . at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability [2013.01]
G06F 21/52
Hierarchie anzeigen
. . during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure [2013.01]
G06F 21/53
Hierarchie anzeigen
. . . by executing in a restricted environment, e.g. sandbox or secure virtual machine [2013.01]
G06F 21/54
Hierarchie anzeigen
. . . by adding security routines or objects to programs [2013.01]
G06F 21/55
Hierarchie anzeigen
. . Detecting local intrusion or implementing counter-measures [2013.01]
G06F 21/56
Hierarchie anzeigen
. . . Computer malware detection or handling, e.g. anti-virus arrangements [2013.01]
G06F 21/57
Hierarchie anzeigen
. . Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities [2013.01]
G06F 21/60
Hierarchie anzeigen
Protecting data [2013.01]
G06F 21/62
Hierarchie anzeigen
. . Protecting access to data via a platform, e.g. using keys or access control rules [2013.01]
G06F 21/64
Hierarchie anzeigen
. . Protecting data integrity, e.g. using checksums, certificates or signatures [2013.01]
G06F 21/70
Hierarchie anzeigen
Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer [2013.01]
G06F 21/71
Hierarchie anzeigen
. . to assure secure computing or processing of information [2013.01]
G06F 21/72
Hierarchie anzeigen
. . . in cryptographic circuits [2013.01]
G06F 21/73
Hierarchie anzeigen
. . . by creating or determining hardware identification, e.g. serial numbers [2013.01]
G06F 21/74
Hierarchie anzeigen
. . . operating in dual or compartmented mode, i.e. at least one secure mode [2013.01]
G06F 21/75
Hierarchie anzeigen
. . . by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering [2013.01]
G06F 21/76
Hierarchie anzeigen
. . . in application-specific integrated circuits [ASICs] or field-programmable devices, e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs] [2013.01]
G06F 21/77
Hierarchie anzeigen
. . . in smart cards [2013.01]
G06F 21/78
Hierarchie anzeigen
. . to assure secure storage of data (address-based protection against unauthorised use of memory G06F 12/14; record carriers for use with machines and with at least a part designed to carry digital markings G06K 19/00) [2013.01]
G06F 21/79
Hierarchie anzeigen
. . . in semiconductor storage media, e.g. directly-addressable memories [2013.01]
G06F 21/80
Hierarchie anzeigen
. . . in storage media based on magnetic or optical technology, e.g. disks with sectors (preventing unauthorised reproduction or copying of disk-type recordable media G11B 20/00) [2013.01]
G06F 21/81
Hierarchie anzeigen
. . by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations [2013.01]
G06F 21/82
Hierarchie anzeigen
. . Protecting input, output or interconnection devices [2013.01]
G06F 21/83
Hierarchie anzeigen
. . . input devices, e.g. keyboards, mice or controllers thereof [2013.01]
G06F 21/84
Hierarchie anzeigen
. . . output devices, e.g. displays or monitors [2013.01]
G06F 21/85
Hierarchie anzeigen
. . . interconnection devices, e.g. bus-connected or in-line devices [2013.01]
G06F 21/86
Hierarchie anzeigen
. . Secure or tamper-resistant housings [2013.01]
G06F 21/87
Hierarchie anzeigen
. . . by means of encapsulation, e.g. for integrated circuits [2013.01]
G06F 21/88
Hierarchie anzeigen
. . Detecting or preventing theft or loss [2013.01]
G06G
Hierarchie anzeigen
ANALOGUE COMPUTERS (analogue optical computing devices G06E 3/00; computer systems based on specific computational models G06N)
G06J
Hierarchie anzeigen
HYBRID COMPUTING ARRANGEMENTS (optical hybrid computing devices G06E 3/00; computer systems based on specific computational models G06N; neural networks for image data processing G06T; analogue/digital conversion, in general H03M 1/00)
G06K
Hierarchie anzeigen
RECOGNITION OF DATAPRESENTATION OF DATARECORD CARRIERSHANDLING RECORD CARRIERS (printing per seB41J)
G06M
Hierarchie anzeigen
COUNTING MECHANISMSCOUNTING OF OBJECTS NOT OTHERWISE PROVIDED FOR (counting by measuring volume or weight of articles to be counted G01F, G01G; adaptation of counters to electricity meters in electromechanical arrangements for measuring time integral of electric power or current G01R 11/16; computers G06C-G06J; counting electric pulses H03K; counting characters, words or messages in switching networks for transmission of digital information H04L 12/08; metering arrangements in telephonic systems H04M 15/00)
G06N
Hierarchie anzeigen
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS [7]
G06Q
Hierarchie anzeigen
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSESSYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR [2006.01]
G06T
Hierarchie anzeigen
IMAGE DATA PROCESSING OR GENERATION, IN GENERAL (specially adapted for particular applications, see the relevant subclasses, e.g. G01C, G06K, G09G, H04N) [6, 2006.01]
G07
Hierarchie anzeigen
CHECKING-DEVICES
G08
Hierarchie anzeigen
SIGNALLING
G09
Hierarchie anzeigen
EDUCATINGCRYPTOGRAPHYDISPLAYADVERTISINGSEALS
G10
Hierarchie anzeigen
MUSICAL INSTRUMENTSACOUSTICS
G11
Hierarchie anzeigen
INFORMATION STORAGE
G12
Hierarchie anzeigen
INSTRUMENT DETAILS
G21
Hierarchie anzeigen
NUCLEONICS
G21
Hierarchie anzeigen
NUCLEAR PHYSICSNUCLEAR ENGINEERING
G99
Hierarchie anzeigen
SUBJECT MATTER NOT OTHERWISE PROVIDED FOR IN THIS SECTION [2006.01]
H
Hierarchie anzeigen
ELECTRICITY

Zu vergleichende IPC-Stelle: Es wurden im Verzeichnis noch keine IPC-Stellen für die Vergleichsansicht vorgemerkt. [Version , Sprache ]