throbber
Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`United States Patent and Trademark Office
`
`PATENTS
`
`Home|Site Index|Search|FAQ|Glossary|Guides|Contacts|eBusiness|eBiz alerts|News|Help
`
`Patents > Guidance, Tools, and Manuals >> Classification >>> Class Definition
`
`Class Numbers & Titles | Class Numbers Only | USPC Index | International | HELP
`
`You are viewing a Class definition.
`
`CLASS
`INFORMATION SECURITY
`726,
`Click here for a printable version of this file
`
`SECTION I - CLASS DEFINITION
`
`GENERAL STATEMENT OF THE CLASS SUBJECT MATTER
`
`This class provides, within a computer or digital data processing system, for processes or apparatus for
`increasing a system s extension of protection of system hardware, software, or data from maliciously caused
`destruction, unauthorized modification, or unauthorized disclosure.
`
`INFORMATION SECURITY
`
`This class provides for protection of data processing systems, apparatus, and methods as well as protection
`of information and services. Subject matter included in this class includes security policies, access control,
`monitoring, scanning data, countermeasures, usage control, and data protection from maliciously caused
`destruction, unauthorized modification, or unauthorized disclosure. This class also includes protection of
`hardware, and user protection, e.g., privacy, etc.
`
`SECTION II - REFERENCES TO OTHER CLASSES
`
`SEE OR SEARCH CLASS:
`
`326,
`
`340,
`
`365,
`
`380,
`
`455,
`704,
`
`705,
`
`708,
`
`Electronic Digital Logic Circuitry, subclass 8 for digital logic circuits acting to disable or prevent
`access to stored data or designated integrated circuit structure.
`Communications: Electrical, subclasses 5.2 through 5.74for authorization control without
`significant data process features claimed, particularly subclasses 5.22-5.25 for programmable or
`code learning authorization control; and subclasses 5.8-5.86 for intelligence comparison for
`authentication.
`Static Information Storage and Retrieval, subclass 185.04 for floating gate memory device having
`ability for securing data signal from being erased from memory cells.
`Cryptography, subclasses 200 through 242for video with data encryption; subclasses 243-246 for
`facsimile encryption; subclasses 247-250 for cellular telephone cryptographic authentication;
`subclass 251 for electronic game using cryptography; subclasses 255-276 for communication using
`cryptography; subclasses 277-47 for key management; and subclasses 287-53 for electrical signal
`modification with digital signal handling.
`Telecommunications, subclass 410 for security or fraud prevention in a radiotelephone system.
`Data Processing: Speech Signal Processing, Linguistics, Language Translation, and Audio
`Compression/Decompression, subclass 273 for an application of speech processing in a security
`system.
`Data Processing: Financial, Business Practice, Management, or Cost/Price Determination, subclass
`18 for security in an electronic cash register or point of sale terminal having password entry mode,
`and subclass 44 for authorization or authentication in a credit transaction or loan processing
`system.
`Electrical Computers: Arithmetic Processing And Calculating, subclass 135 for electrical digital
`calculating computer with specialized input for security.
`
`1 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`710,
`
`711,
`
`713,
`
`714,
`
`Electrical Computers and Digital Data Processing Systems: Input/Output, subclasses 36 through
`51for regulating access of peripherals to computers or vice-versa; subclasses 107-125 for
`regulating access of processors or memories to a bus; and subclasses 200-240 for general purpose
`access regulating and arbitration.
`Electrical Computers and Digital Processing Systems: Memory, subclass 150 for regulating access
`to shared memories, subclasses 163-164 for preventing unauthorized memory access requests.
`Electrical Computers and Digital Processing Systems: Support, subclasses 150 through 181for
`multiple computer communication using cryptography; subclasses 182-186 for system access
`control based on user identification by cryptography; subclass 187 for computer program
`modification detection by cryptography; subclass 188 for computer virus detection by cryptography;
`and subclasses 189-194 for data processing protection using cryptography.
`Error Detection/Correction and Fault Detection/Recovery, subclasses 1 through 57for recovering
`from, locating, or detecting a system fault caused by malicious or unauthorized access (e.g., by
`virus, etc.).
`
`SECTION III - GLOSSARY
`
`ACCESS CONTROL
`
`The prevention of unauthorized access to resources of a system or information system, including the
`prevention of their use in an unauthorized manner.
`
`INFORMATION
`
`Data with meaning concerning a particular act or circumstance in general. Note: May include or consist of
`graphics or text or numerical or non-numerical values.
`
`MONITORING
`
`Subject matter includes means of watching, tracking, inspecting, analyzing of system or user activity. This
`includes the auditing of system vulnerabilities and system configuration, assessing the integrity of files within
`a system, identifying and recognizing patterns that dictate known attacks, analysis of abnormal activity
`patterns, recognizing user activity in regards to policy violations and operating system audit trail
`management.
`
`POLICY
`
`Rules for protecting information, services and other data processing resources.
`
`USAGE CONTROL
`
`Subject matter includes means placing restrictions on computer and/or user use of applications
`
`USER PROTECTION/PRIVACY
`
`Subject matter includes means for ensuring the state or integrity of information or data associated with a
`user.
`
`SUBCLASSES
`
`1
`
`POLICY:
`This subclass is indented under the class definition. Subject matter comprising systems,
`methods, and apparatus that provide for the administration and management of rules or
`regulations governing the protection of information, services and other data processing resources
`involving coordination of more than one security mechanisms among a plurality of entities,
`resources, or processes.
`
`2 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`2
`
`ACCESS CONTROL OR AUTHENTICATION:
`This subclass is indented under the class definition. Subject matter comprising systems,
`methods, and apparatus for the prevention of unauthorized access to resources of a system or
`information system, including the manner of identifying and verifying the entity, process, or
`mechanism requesting access to the resource.
`(1) Note. This subclass is directed to access control in information security systems. The
`concept of access control exists throughout the class. Therefore, a search to a particular
`concept of access control should consider the related topics in bus access control, memory
`access control, computer system access control, generic access control, etc.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`27,
`
`for prevention of unauthorized use of data access control.
`
`SEE OR SEARCH CLASS:
`
`340,
`
`345,
`
`380,
`
`705,
`
`707,
`
`709,
`
`710,
`
`711,
`
`713,
`
`Communications: Electrical, subclasses 5.8 through 5.86for selective electrical
`communications systems with intelligence comparison for identity authentication.
`Computer Graphics Processing and Selective Visual Display Systems, subclasses 716
`through 726for operator interface aspects of workgroup data processing environments
`for plural users or sites.
`Cryptography, appropriate subclasses for systems employing encrypted user or record
`actuated authentication, and for digital control or digital computer communication in
`which an encrypting or decrypting device utilizes a digital signal manipulation technique
`on the computer signal, and subclasses 247 through 250for cellular telephone
`cryptographic authentication.
`Data Processing: Financial, Business Practice, Management, or Cost/Price Determination,
`subclass 18 for an electronic cash register having cryptography; and subclass 44 for a
`general funds transfer or credit transaction requiring authorization or authentication not
`including a cryptographic limitation.
`Data Processing: Database, Data Mining, and File Management or Data Structures,
`subclasses 705 through 789for database accessing and control.
`Electrical Computers and Digital Processing Systems: Multicomputer Data Transferring,
`subclass 225 for controlling which of plural computers may transfer data via a
`communications medium.
`Electrical Computers and Digital Data Processing Systems: Input /Output, subclasses
`107 through 125for bus access regulating.
`Electrical Computers and Digital Processing Systems: Memory, subclasses 147 through
`153for shared memory access and control, and subclasses 163-164 for access limiting
`and password use therein.
`Electrical Computers and Digital Processing Systems: Support, subclasses 155 through
`159for central trusted authority authentication; subclasses 168-181 for particular
`communication authentication technique; and subclasses 182-186 for system access
`control based on cryptographic user identification.
`
`3
`
`Network:
`This subclass is indented under subclass 2. Subject matter including means of limiting access to
`the resources of a system based on a network level.
`(1) Note. The network level is computer-to-computer communication.
`
`SEE OR SEARCH CLASS:
`
`709,
`
`Electrical Computers and Digital Processing Systems: Multicomputer Data Transferring,
`subclass 22 controlling which of plural computers may transfer data via a
`communications medium.
`
`3 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Authorization:
`This subclass is indented under subclass 3. Subject matter including permitting the use of rights,
`privileges, and permissions in a network environment.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`18,
`21,
`
`for stand-alone authorization.
`for access control or authentication.
`
`Credential:
`This subclass is indented under subclass 3. Subject matter including the existence of network
`data that can be used to establish the claimed identity of a principal including passwords,
`biometrics.
`
`SEE OR SEARCH CLASS:
`
`382,
`
`713,
`
`902,
`
`Image Analysis, subclass 115 for image analysis for personal identification
`(biometrics).
`Electrical Computers and Digital Processing Systems: Support, subclass 186 for
`biometric acquisition.
`Electronic Funds Transfer, cross-reference art collection 3, for biometric evaluation in
`electronic funds transfer.
`
`Management:
`This subclass is indented under subclass 5. Subject matter including means or steps for
`administering credentials, including specific techniques for creating the credentials.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`18,
`
`for stand-alone credential management.
`
`Usage:
`This subclass is indented under subclass 5. Subject matter including means or steps for using
`the credential to establish the identity of the bearer.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`20,
`
`for stand-alone credential usage.
`
`Global (e.g., Single Sign On (SSO), etc.):
`This subclass is indented under subclass 5. Subject matter whereby a single credential can be
`used to access a plurality of systems or resources.
`
`Tokens (e.g., smartcards or dongles, etc.):
`This subclass is indented under subclass 5. Subject matter whereby the credential includes a
`unique combination of bits used to confer transmit privileges to a computer on a local network.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`20,
`
`for stand-alone authorization.
`
`SEE OR SEARCH CLASS:
`
`380,
`
`Cryptography, subclass 229 for authentication in a video system using a record or
`token.
`
`4 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`10
`
`11
`
`12
`
`13
`
`705,
`
`713,
`
`Data Processing: Financial, Business Practice, Management, or Cost /Price
`Determination, subclasses 65 through 69for secure transaction including intelligent
`token.
`Electrical Computers and Digital Processing Systems: Support, subclasses 172 through
`174for generic authentication using intelligent token in multiple computer
`communication.
`
`Tickets (e.g., Kerberos or certificates, etc.):
`This subclass is indented under subclass 5. Subject matter whereby the credential includes data
`used to indicate that the bearer is authorized for access.
`
`SEE OR SEARCH CLASS:
`
`713,
`
`Electrical Computers and Digital Processing Systems: Support, subclasses 156 through
`158for computer network certificates, and subclass 175 for generation of a certificate.
`
`Firewall:
`This subclass is indented under subclass 3. Subject matter including a device installed between
`internal (private) networks and outside networks (public) and which protects the internal
`network from network-based attacks that may originate from the outside and to provide a traffic
`point where security constraints and audits may be affected.
`
`SEE OR SEARCH CLASS:
`
`705,
`
`370, Multiplex Communications, subclasses 351 through 430for multiplex communication
`routing absent cryptography.
`Data Processing: Financial, Business Practice, Management, or Cost /Price
`Determination, subclass 79 for cryptographic remote charge determination of a secure
`transaction including payment switch or gateway.
`Electrical Computers and Digital Processing Systems: Multicomputer Data Transferring,
`subclasses 238 through 244for computer-to-computer data routing.
`Electrical Computers and Digital Processing Systems: Support, subclasses 153 and 154
`for a particular node in cryptographically protected multiple computer communication.
`
`709,
`
`713,
`
`Proxy server or gateway:
`This subclass is indented under subclass 11. Subject matter including an intermediate
`internetworking device that connects one or more networks to another for a specific application.
`(1) Note. The gateway runs a process at the request of the client/user and obtains the
`service of a particular server; hence it works as both a client and a server provider.
`
`Packet filtering:
`This subclass is indented under subclass 11. Subject matter including a multi-ported
`internetworking device that applies a set of rules to each incoming IP packet in order to decide
`whether it is to be forwarded or dropped.
`(1) Note. The filtering usually takes place on information contained in the headers, such as
`protocol numbers, source or destination addresses/ports, TCP connections, and other
`options. The filtering may be dynamic or static.
`(2) Note. The packet filter may be different and distinct from routers; see note on routers.
`Routers are internetworking devices that run a custom operating system to transfer
`packets between two or more physically separated network segments (via the use of
`routing tables). This device operates at the network level of the OSI model, or the Internet
`level of the Internet model.
`(3) Note. Some routers have a scanning ability and are know as screening routers,
`effectively becoming a packet-filtering device.
`
`5 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`Security protocols:
`This subclass is indented under subclass 11. Subject matter including a set of rules, procedures,
`or conventions governing the format and relative timing of message exchange between two
`communications terminals to prevent unauthorized intrusion or interference (i.e., attacks).
`
`Virtual Private Network or Virtual Terminal Protocol (i.e., VPN or VTP):
`This subclass is indented under subclass 14. Subject matter wherein the protocol is used for a
`software-defined network offering the appearance, functionality, and usefulness of a dedicated
`private network or for a terminal that is defined as a standard on the network that can handle
`diverse terminals.
`
`SEE OR SEARCH CLASS:
`
`370, Multiplex Communications, subclass 351 for a path finding or routing through a
`switching network or a packet switching network.
`Telephonic Communications, cross-reference art collection 901for virtual network or
`virtual private network for a telephonic device.
`
`379,
`
`Stand-alone:
`This subclass is indented under subclass 2. Subject matter wherein the access control or
`authentication includes the means of limiting access to the resources of a system based on a
`single computer or end user level.
`(1) Note. The end user level is the occupant of the premises who uses the product.
`
`Authorization:
`This subclass is indented under subclass 16. Subject matter wherein the access control or
`authentication includes permitting the use of rights, privileges, and permissions in the
`stand-alone network environment.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`4,
`21,
`
`for network authorization.
`for standalone credential management.
`
`Credential management:
`This subclass is indented under subclass 17. Subject matter wherein the authorization includes
`systems, methods, or apparatus for administering information supplied to authenticate a
`communication.
`(1) Note. This subject includes specific techniques for creating the credentials.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`6,
`
`for network credential management.
`
`Credential usage:
`This subclass is indented under subclass 17. Subject matter wherein the authorization includes
`systems, methods, and apparatus for using information supplied to authenticate a
`communication to establish the identity of the bearer.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`7,
`
`for network credential usage.
`
`20
`
`Tokens (e.g., smartcards or dongles, etc.):
`
`6 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`This subclass is indented under subclass 17. Subject matter wherein the authorization includes a
`unique combination of bits used to confer transmit privileges to a computer on a stand-alone.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`9,
`
`for network credential tokens.
`
`Authorization:
`This subclass is indented under subclass 2. Subject matter wherein access control means
`includes use of permissions, rights, or privileges.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`4,
`17,
`
`for network authorization.
`for stand-alone authorization.
`
`MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK
`PREVENTION:
`This subclass is indented under the class definition. Subject matter comprising systems,
`methods, and apparatus for ensuring data integrity by scanning of software or data or otherwise
`monitoring data to prevent or detect attacks.
`
`SEE OR SEARCH CLASS:
`
`705,
`
`713,
`
`717,
`
`Data Processing: Financial, Business Practice, Management, or Cost/Price Determination,
`subclasses 51 through 54for usage protection of a distributed data file, and subclass
`405 for cost/data protection.
`Electrical Computers and Digital Processing Systems: Support, subclasses 189 through
`194for data processing protection using cryptography.
`Data Processing: Software Development, Installation, and Management, 168-173 for
`software upgrading or updating (including plural version management) and subclasses
`174 through 178for software installation.
`
`Intrusion detection:
`This subclass is indented under subclass 22. Subject matter comprising means to sense the
`presence of an intruder.
`
`Virus detection:
`This subclass is indented under subclass 23. Subject matter wherein the intruder is a virus.
`
`SEE OR SEARCH CLASS:
`
`713,
`
`Electrical Computers and Digital Processing Systems: Support, subclasses 150 through
`181for multiple computer communication using cryptography; and subclasses 187 and
`188 for software program protection or computer virus detection in combination with
`data encryption.
`
`Vulnerability assessment:
`This subclass is indented under subclass 22. Subject matter wherein monitoring or scanning of
`software or data includes methods or systems to evaluate the defensive capabilities of a system,
`process, apparatus, or entity against attacks.
`(1) Note. The subject matter of this subclass is primarily concerned with keeping out
`intruders and preventing attacks as opposed to authenticating users.
`
`PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY,
`PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION:
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`7 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`This subclass is indented under the class definition. Subject matter comprising systems,
`methods, and apparatus for prohibiting any impersonation, unauthorized browsing, falsification
`or theft of data, or alteration of data not consistent with defined security policy.
`
`SEE OR SEARCH CLASS:
`
`380,
`
`399,
`
`455,
`
`700,
`
`705,
`
`711,
`
`713,
`
`714,
`
`Cryptography, subclasses 200 through 242for video with data encryption; subclasses
`243-246 for facsimile encryption; subclasses 247-250 for cellular telephone
`cryptographic authentication; subclass 251 for electronic game using cryptography;
`subclasses 255-276 for communication using cryptography; subclasses 277-47 for key
`management; and subclasses 287-53 for electrical signal modification with digital signal
`handling.
`Electrophotography, subclass 366 for document handling of unauthorized copy
`prevention.
`Telecommunications, subclass 26.1 for subject matter which blocks access a signal
`source or otherwise limits usage of modulated carrier equipment.
`Data Processing: Generic Control Systems or Specific Applications, subclasses 225
`through 227for data processing article handling system having identification code, and
`subclass 237 for an operator or payment initiated dispensing or ending data processing
`system having password or PIN authorization.
`Data Processing: Financial, Business Practice, Management, or Cost/Price Determination,
`subclass 18 for security in an electronic cash register or point of sale terminal having
`password entry mode; subclasses 57 and 58 for preventing access to or copying of
`stored information in a distributed data file.
`Electrical Computers and Digital Processing Systems: Memory, subclass 164 for
`memory access requiring authorization code information (e.g., password or key other
`than encryption key, etc.).
`Electrical Computers and Digital Processing Systems: Support, subclass 187 for
`computer program modification detection by cryptography.
`Error Detection/Correction and Fault Detection /Recovery, subclasses 763 through
`773for memory access block coding, and subclass 805 for storage accessing error/fault
`detection techniques.
`
`Access control:
`This subclass is indented under subclass 26. Subject matter comprising means to control data
`tampering by limiting access to authorized entities or processes.
`
`SEE OR SEARCH THIS CLASS, SUBCLASS:
`
`2,
`
`for general access control or authentication of information security.
`
`By authorizing user:
`This subclass is indented under subclass 27. Subject matter wherein the access control includes
`means to limit access by an authorized user.
`
`By authorizing client:
`This subclass is indented under subclass 27. Subject matter wherein the access control includes
`means to limit access to an authorized client.
`
`By authorizing data:
`This subclass is indented under subclass 27. Subject matter wherein the access control includes
`means to limit access by the data to be used.
`
`Limitations on number or amount of copies:
`
`27
`
`28
`
`29
`
`30
`
`31
`
`8 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`This subclass is indented under subclass 26. Subject matter wherein the prevention of
`unauthorized use of data includes means to limit number or amount of electronic copies of the
`data that can be made.
`
`Copy detection:
`This subclass is indented under subclass 26. Subject matter including means to prevent
`unauthorized use by detecting electronic copying of data.
`
`SEE OR SEARCH CLASS:
`
`380,
`
`399,
`
`705,
`
`Cryptography, subclasses 201 through 204for copy protection or prevention of a video
`signal.
`Electrophotography, subclass 366 for document handling of unauthorized copy
`prevention.
`Data Processing: Financial, Business Practice, Management, or Cost/Price Determination,
`subclass 57 for copy protection or prevention.
`
`Copy inactivation:
`This subclass is indented under subclass 26. Subject matter including means to prevent
`unauthorized use by rendering an electronic copy inactive unless access is authorized.
`
`PROTECTION OF HARDWARE:
`This subclass is indented under the class definition. Subject matter comprising systems,
`methods, and apparatus used for safeguarding physical equipment used in data processing.
`
`SEE OR SEARCH CLASS:
`
`49,
`70,
`109,
`
`116,
`
`340,
`
`348,
`361,
`
`379,
`
`Movable or Removable Closures, subclasses 13 and 14 for closure condition indicator.
`Locks, subclasses 432 through 441and Digest 49 for locks with indicator or alarm.
`Safes, Bank Protection, or a Related Device, subclass 21 for bank protection device
`with alarm or indicator; subclass 31 for art device combined with fluent material
`distributing, generating device for alarm or indicator; and subclass 38 for combined art
`device with alarm or indicator.
`Signals and Indicators, subclass 6 for burglar alarm and subclass 33 for vehicle theft
`prevention.
`Communications: Electrical, subclasses 287 through 309for a signal box alarm
`arrangement, particularly subclass 288 for alarm transmission over a power line;
`subclasses 426.1-426.36 for vehicle alarms or indication of burglary or unauthorized
`use; and subclasses 541-567 for an intrusion responsive indicator or alarm.
`Television, subclass 152 for intrusion detection by a television camera.
`Electricity: Electrical Systems and Devices, appropriate subclassesfor safety and
`protection of systems and devices.
`Telephonic Communications, subclasses 37 through 51for emergency or alarm
`communications (e.g., watchman’s circuit, etc.), particularly subclass 39 for subject
`matter responsive to sense nonsystem condition, external to the telephone system, and
`subclasses 106.01-106.11 for remote condition indication, other than an emergency or
`alarm condition, over a telephone line.
`
`Theft prevention:
`This subclass is indented under subclass 34. Subject matter wherein the protection of hardware
`includes means to prevent unauthorized removal of hardware.
`
`Via power supply:
`
`32
`
`33
`
`34
`
`35
`
`36
`
`9 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`This subclass is indented under subclass 34. Subject matter wherein the protection of hardware
`includes means for protecting hardware by interruption of power supply.
`
`SEE OR SEARCH CLASS:
`
`713,
`
`Electrical Computers and Digital Processing Systems: Support, subclasses 300 through
`340for computer power control, in general.
`
`This page is produced by the Office of Classification Support (Office of Patent Classification) for the Reference Tools Project.
`
`Please send questions and comments to usptoinfo@uspto.gov .
`
`Note: The Patent and Trademark Depository Library Program (PTDLP) administers a nationwide network of public, state and academic libraries
`designated as Patent and Trademark Depository Libraries authorized by 35 U.S.C. 13 to: Disseminate Patent and Trademark Information Support
`Diverse Intellectual Property Needs of the Public. PTDL Contact Information
`
`Note: For information/comments on electronic information products, such as purchasing USPTO data, or to discuss system requirements for
`magnetic tape products, contact:
`
` Information Products Division -- U.S. Patent and Trademark Office Information Products Division Contact Information
` Or, browse their on-line catalog.
`
`KEY:
`
`=online business system
`
`=fees
`
`=forms
`
`=help
`
`=laws/regulations =definition (glossary)
`
`The Inventors Assistance Center is available to help you on patent matters.Send questions about USPTO programs and services to the USPTO
`Contact Center (UCC). You can suggest USPTO webpages or material you would like featured on this section by E-mail to the webmaster@uspto.gov.
`While we cannot promise to accommodate all requests, your suggestions will be considered and may lead to other improvements on the website.
`
`|.HOME | SITE INDEX| SEARCH | eBUSINESS | HELP | PRIVACY POLICY
`
`Last Modified: 08/11/2011 17:43:42
`
`10 of 11
`
`11/15/2015 1:17 AM
`
`

`

`Class Definition for Class 726 - INFORMATION SECURITY
`
`http://www.uspto.gov/web/patents/classification/uspc726/defs726.htm
`
`11 of 11
`
`11/15/2015 1:17 AM
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket