Search area

Symbol Version, Language

Result area

Search request: No search request has been comitted.

Symbol Select IPC entry Title
A
Show hierarchy
SECTION A — HUMAN NECESSITIES
B
Show hierarchy
SECTION B — PERFORMING OPERATIONSTRANSPORTING
C
Show hierarchy
SECTION C — CHEMISTRYMETALLURGY
D
Show hierarchy
SECTION D — TEXTILESPAPER
E
Show hierarchy
SECTION E — FIXED CONSTRUCTIONS
F
Show hierarchy
SECTION F — MECHANICAL ENGINEERINGLIGHTINGHEATINGWEAPONSBLASTING
G
Show hierarchy
SECTION G — PHYSICS
G01
Show hierarchy
INSTRUMENTS
G01
Show hierarchy
MEASURINGTESTING
G02
Show hierarchy
OPTICS
G03
Show hierarchy
PHOTOGRAPHYCINEMATOGRAPHYANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVESELECTROGRAPHYHOLOGRAPHY [4]
G04
Show hierarchy
HOROLOGY
G05
Show hierarchy
CONTROLLINGREGULATING
G06
Show hierarchy
COMPUTINGCALCULATINGCOUNTING
G06C
Show hierarchy
DIGITAL COMPUTERS IN WHICH ALL THE COMPUTATION IS EFFECTED MECHANICALLY (score computers for card games A63F 1/18; construction of keys, printing mechanisms, or other parts of general application to the typewriting or printing art B41; keys or printing mechanisms for special applications, see the relevant subclass, e.g. G05G, G06K; cash registers G07G 1/00) [4]
G06D
Show hierarchy
DIGITAL FLUID-PRESSURE COMPUTING DEVICES
G06E
Show hierarchy
OPTICAL COMPUTING DEVICES (digital storage using optical elements G11C 13/04) [5]
G06F
Show hierarchy
ELECTRIC DIGITAL DATA PROCESSING (computers in which a part of the computation is effected hydraulically or pneumatically G06D, optically G06E; computer systems based on specific computational models G06N)
G06F 1/00
Show hierarchy
Details not covered by groups G06F 3/00-G06F 13/00 and G06F 21/00 (architectures of general purpose stored programme computers G06F 15/76) [1, 2006.01]
G06F 3/00
Show hierarchy
Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements [4]
G06F 5/00
Show hierarchy
Methods or arrangements for data conversion without changing the order or content of the data handled [4]
G06F 7/00
Show hierarchy
Methods or arrangements for processing data by operating upon the order or content of the data handled (logic circuits H03K 19/00)
G06F 9/00
Show hierarchy
Arrangements for programme control, e.g. control unit (programme control for peripheral devices G06F 13/10) [4]
G06F 11/00
Show hierarchy
Error detectionError correctionMonitoring (methods or arrangements for verifying the correctness of marking on a record carrier G06K 5/00; in information storage based on relative movement between record carrier and transducer G11B, e.g. G11B 20/18; in static stores G11C 29/00) [4]
G06F 12/00
Show hierarchy
Accessing, addressing or allocating within memory systems or architectures (information storage in general G11) [4, 5]
G06F 13/00
Show hierarchy
Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units (interface circuits for specific input/output devices G06F 3/00; multi-processor systems G06F 15/16) [4]
G06F 15/00
Show hierarchy
Digital computers in general (details G06F 1/00-G06F 13/00)Data processing equipment in general
G06F 17/00
Show hierarchy
Digital computing or data processing equipment or methods, specially adapted for specific functions [6]
G06F 19/00
Show hierarchy
Digital computing or data processing equipment or methods, specially adapted for specific applications (G06F 17/00 takes precedence; data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q) [6, 2006.01, 2011.01]
G06F 21/00
Show hierarchy
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity [2006.01, 2013.01]
G06F 21/02
(transferred to G06F 21/70)
G06F 21/04
(transferred to G06F 21/82)
G06F 21/06
(transferred to G06F 21/86G06F 21/88)
G06F 21/10
Show hierarchy
Protecting distributed programs or content, e.g. vending or licensing of copyrighted material (protection in video systems or pay television H04N 7/16) [2013.01]
G06F 21/12
Show hierarchy
. . Protecting executable software [2013.01]
G06F 21/14
Show hierarchy
. . . against software analysis or reverse engineering, e.g. by obfuscation [2013.01]
G06F 21/16
Show hierarchy
. . Program or content traceability, e.g. by watermarking (digital watermarking on images H04N 1/32) [2013.01]
G06F 21/20
(transferred to G06F 21/30)
G06F 21/22
(transferred to G06F 21/10)
G06F 21/24
(transferred to G06F 21/60)
G06F 21/30
Show hierarchy
Authentication, i.e. establishing the identity or authorisation of security principals [2013.01]
G06F 21/31
Show hierarchy
. . User authentication [2013.01]
G06F 21/32
Show hierarchy
. . . using biometric data, e.g. fingerprints, iris scans or voiceprints [2013.01]
G06F 21/33
Show hierarchy
. . . using certificates [2013.01]
G06F 21/34
Show hierarchy
. . . involving the use of external additional devices, e.g. dongles or smart cards [2013.01]
G06F 21/35
Show hierarchy
. . . . communicating wirelessly [2013.01]
G06F 21/36
Show hierarchy
. . . by graphic or iconic representation [2013.01]
G06F 21/40
Show hierarchy
. . . by quorum, i.e. whereby two or more security principals are required [2013.01]
G06F 21/41
Show hierarchy
. . . where a single sign-on provides access to a plurality of computers [2013.01]
G06F 21/42
Show hierarchy
. . . using separate channels for security data [2013.01]
G06F 21/43
Show hierarchy
. . . . wireless channels [2013.01]
G06F 21/44
Show hierarchy
. . Program or device authentication [2013.01]
G06F 21/45
Show hierarchy
. . Structures or tools for the administration of authentication [2013.01]
G06F 21/46
Show hierarchy
. . . by designing passwords or checking the strength of passwords [2013.01]
G06F 21/50
Show hierarchy
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems [2013.01]
G06F 21/51
Show hierarchy
. . at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability [2013.01]
G06F 21/52
Show hierarchy
. . during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure [2013.01]
G06F 21/53
Show hierarchy
. . . by executing in a restricted environment, e.g. sandbox or secure virtual machine [2013.01]
G06F 21/54
Show hierarchy
. . . by adding security routines or objects to programs [2013.01]
G06F 21/55
Show hierarchy
. . Detecting local intrusion or implementing counter-measures [2013.01]
G06F 21/56
Show hierarchy
. . . Computer malware detection or handling, e.g. anti-virus arrangements [2013.01]
G06F 21/57
Show hierarchy
. . Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities [2013.01]
G06F 21/60
Show hierarchy
Protecting data [2013.01]
G06F 21/62
Show hierarchy
. . Protecting access to data via a platform, e.g. using keys or access control rules [2013.01]
G06F 21/64
Show hierarchy
. . Protecting data integrity, e.g. using checksums, certificates or signatures [2013.01]
G06F 21/70
Show hierarchy
Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer [2013.01]
G06F 21/71
Show hierarchy
. . to assure secure computing or processing of information [2013.01]
G06F 21/72
Show hierarchy
. . . in cryptographic circuits [2013.01]
G06F 21/73
Show hierarchy
. . . by creating or determining hardware identification, e.g. serial numbers [2013.01]
G06F 21/74
Show hierarchy
. . . operating in dual or compartmented mode, i.e. at least one secure mode [2013.01]
G06F 21/75
Show hierarchy
. . . by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering [2013.01]
G06F 21/76
Show hierarchy
. . . in application-specific integrated circuits [ASICs] or field-programmable devices, e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs] [2013.01]
G06F 21/77
Show hierarchy
. . . in smart cards [2013.01]
G06F 21/78
Show hierarchy
. . to assure secure storage of data (address-based protection against unauthorised use of memory G06F 12/14; record carriers for use with machines and with at least a part designed to carry digital markings G06K 19/00) [2013.01]
G06F 21/79
Show hierarchy
. . . in semiconductor storage media, e.g. directly-addressable memories [2013.01]
G06F 21/80
Show hierarchy
. . . in storage media based on magnetic or optical technology, e.g. disks with sectors (preventing unauthorised reproduction or copying of disk-type recordable media G11B 20/00) [2013.01]
G06F 21/81
Show hierarchy
. . by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations [2013.01]
G06F 21/82
Show hierarchy
. . Protecting input, output or interconnection devices [2013.01]
G06F 21/83
Show hierarchy
. . . input devices, e.g. keyboards, mice or controllers thereof [2013.01]
G06F 21/84
Show hierarchy
. . . output devices, e.g. displays or monitors [2013.01]
G06F 21/85
Show hierarchy
. . . interconnection devices, e.g. bus-connected or in-line devices [2013.01]
G06F 21/86
Show hierarchy
. . Secure or tamper-resistant housings [2013.01]
G06F 21/87
Show hierarchy
. . . by means of encapsulation, e.g. for integrated circuits [2013.01]
G06F 21/88
Show hierarchy
. . Detecting or preventing theft or loss [2013.01]
G06G
Show hierarchy
ANALOGUE COMPUTERS (analogue optical computing devices G06E 3/00; computer systems based on specific computational models G06N)
G06J
Show hierarchy
HYBRID COMPUTING ARRANGEMENTS (optical hybrid computing devices G06E 3/00; computer systems based on specific computational models G06N; neural networks for image data processing G06T; analogue/digital conversion, in general H03M 1/00)
G06K
Show hierarchy
RECOGNITION OF DATAPRESENTATION OF DATARECORD CARRIERSHANDLING RECORD CARRIERS (printing per seB41J)
G06M
Show hierarchy
COUNTING MECHANISMSCOUNTING OF OBJECTS NOT OTHERWISE PROVIDED FOR (counting by measuring volume or weight of articles to be counted G01F, G01G; adaptation of counters to electricity meters in electromechanical arrangements for measuring time integral of electric power or current G01R 11/16; computers G06C-G06J; counting electric pulses H03K; counting characters, words or messages in switching networks for transmission of digital information H04L 12/08; metering arrangements in telephonic systems H04M 15/00)
G06N
Show hierarchy
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS [7]
G06Q
Show hierarchy
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSESSYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR [2006.01]
G06T
Show hierarchy
IMAGE DATA PROCESSING OR GENERATION, IN GENERAL (specially adapted for particular applications, see the relevant subclasses, e.g. G01C, G06K, G09G, H04N) [6, 2006.01]
G07
Show hierarchy
CHECKING-DEVICES
G08
Show hierarchy
SIGNALLING
G09
Show hierarchy
EDUCATINGCRYPTOGRAPHYDISPLAYADVERTISINGSEALS
G10
Show hierarchy
MUSICAL INSTRUMENTSACOUSTICS
G11
Show hierarchy
INFORMATION STORAGE
G12
Show hierarchy
INSTRUMENT DETAILS
G21
Show hierarchy
NUCLEONICS
G21
Show hierarchy
NUCLEAR PHYSICSNUCLEAR ENGINEERING
G99
Show hierarchy
SUBJECT MATTER NOT OTHERWISE PROVIDED FOR IN THIS SECTION [2006.01]
H
Show hierarchy
SECTION H — ELECTRICITY

IPC entry to be compared: No IPC entry bookmarked for comparison view [Version , Language ]