This class includes equipment and processes which (a) conceal
or obscure intelligible information by transforming such information
so as to make the information unintelligible to a casual or unauthorized
recipient, or (b) extract intelligible information from such a concealed
representation, including breaking of unknown codes and messages.
(1)
Note. Cryptographic processing may include, e.g., scrambling
or masking or their complementary transformations.
(2)
Note. All electrical communications equipment which processes
an information signal for purposes of concealment are classified in
this class.
(3)
Note. Processing or converting of a signal for purposes of
handling or transmission which may incidentally render a signal unintelligible
are not classified in this class.
(4)
Note. Mere blocking of access to the information is not considered
a cryptographic transformation of the signal or information.
(5)
Note. A cryptogram or a cryptographic record absent a separate
encrypting or decrypting device is classified elsewhere. See References
to Other Classes, below.
(6)
Note. Excluded herein is nominal cryptography in combination
with subject matter of another class. Such subject matter is classified
with the other class. See search notes below.
(7)
Note. Excluded herein is subject matter of this class in combination
with the specific environments of a) business data processing or
b) electrical computer or digital processing system support. Such
subject matter is classified elsewhere in the classes providing
for the specific environment. See search notes below.
(8)
Note. During the latest reclassification project, a group
of existing subclasses were repositioned as is pending additional
reclassification of this class. However, screening was not done
within this group of subclasses or between this group and the other subclasses
not part of the latest project. This should be taken into consideration when
determining an appropriate field of search.
Coded Data Generation or Conversion,
subclasses 20+ and 173+, for code transmission, and 50+ for
code conversion not specified as a concealing or cryptographic coding
method.
Communications: Directive Radio Wave Systems
and Devices (e.g., Radar, Radio Navigation),
subclasses 13+ for radar electronic warfare; subclasses 42+ for
a radar transponder identification system.
Electrophotography,
subclass 12 for unit or part identification, subclass 84 for
key sheet controlling job mode, and subclasses 366+ for document
handling of unauthorized copy prevention.
Data Processing: Financial, Business Practice, Management,
or Cost/Price Determination,
subclasses 50 through 80for business processing using cryptography and
foreign art collection FOR 124 for cryptographic protection of electronic
funds transfer.
Electrical Computers and Digital Processing Systems:
Multicomputer Data Transferring or Plural Processor Synchronization, appropriate subclassesfor data transferring among multiple computer
and digital processing systems.
Electrical Computers and Digital Data Processing
Systems: Input/Output,
subclasses 240 through 244for generalized access blocking less cryptographic
means or function.
Electrical Computers and Digital Processing Systems:
Support,
subclasses 150 through 194for cryptographic electrical computer or digital processing
system support, and foreign art collections FOR 123 and FOR 125
for cryptographic user or record authentication.
Interactive Video Distribution Systems,
subclasses 1 through 31for billing, surveying, awarding credit, and access
control or blocking in a video distribution system wherein the video
encryption or scrambling may be nominally claimed.
Information Security,
subclasses 1 through 36for information security in computers or digital processing
system.
SECTION III - GLOSSARY
CIPHER
Information concealed by substitution or interchange
of text characters for those in the original message.
CODE
Information concealed by substitution of words or symbols
for words of the concealed message.
CRYPTOGRAPHY
The study of secret information storage or communication.
CRYPTANALYSIS
Determination of encryption code of encrypted message (i.e.,
codebreaking).
DECRYPTING OR DECIPHERING
A process of extracting concealed information from an intentionally
obscured form and changing it into a form intelligible to a recipient
with proper authorization or equipment.
ENCRYPTING OR ENCIPHERING
A process of obscuring information by intentionally changing
it to a form unintelligible to a casual or unauthorized observer.
KEY
A formula, word or signal used to define the code in encryption
or decryption of the information. Such a signal is often a digital
signal having a predetermined or pseudorandom content.
This subclass is indented under the class definition. Subject matter for evaluating or monitoring the condition
of cryptographic equipment or equipment associated with a cryptographic system.
(1)
Note. Associated equipment includes testing or monitoring
of diverse equipment (e.g. communication or display equipment) which
would be classified in either the class providing for the particular
equipment or in a testing class absent association with cryptographic
equipment.
Dynamic Magnetic Information Storage or Retrieval,
subclasses 7 and 8+ for delay, and for modification, respectively,
of an electrical signal by recording and subsequent retrieval from
a magnetic record medium.
Data Processing: Financial, Business Practice,
Management, or Cost/Price Determination,
subclasses 57 and 58 for preventing access to or copying of stored
information in a distributed data file.
This subclass is indented under the subclass definition. Subject matter including an electrical element controlled
by the motion of physical configuration of a solid object.
(1)
Note. The device in this subclass generally use a mechanically
varying element as a cryptographic key.
(2)
Note. Included herein are cam controlled elements.
This subclass is indented under subclass 26. Subject matter which controls cryptographic signal modification
in accordance with a pattern of openings along the length of an
elongate web.
(1)
Note. The elongate web may be a movable strip.
(2)
Note. The pattern of perforations may supply the encryption
key.
This subclass is indented under the class definition. Subject matter wherein an algorithmic operation is performed
upon a signal in order to encrypt the information signal.
(1)
Note. The processed signal may be the message signal.
This subclass is indented under subclass 28. Subject matter which encrypts a digital signal by a sequence
including an initial 64-bit permutation, a 56-bit encryption-key
dependent substitution block computation, and an inversion of the
initial permutation.
(1)
Note. The details of this encryption algorithm are published
in the U.S. Government standard: Federal Information Processing
Standard (FIPS) publication No. 46, January 15, 1977, U.S. National Bureau
of Standards.
This subclass is indented under subclass 28. Subject matter including an encryption algorithm which is
computationally infeasible to invert, and having distinct encryption
and decryption keys.
(1)
Note. The encryption keys do not require secrecy and are
usually published.
This subclass is indented under subclass 270. Subject matter which modulates a carrier with more than
one signal or varies more than one signal parameter.
(1)
Note. The additional signal may be scrambling signal or another
information signal.
Multiplex Communications,
subclass 204 for multiplexing by plural forms of modulation;
subclasses 343+ and 480+ for combining or distributing information
via frequency channels.
This subclass is indented under subclass 31. Subject matter which varies the frequency of an information
modulated carrier signal periodically over a definite range.
This subclass is indented under subclass 270. Subject matter which transmits an information signal or
a portion thereof over different communications links simultaneously,
serially, or alternately.
(1)
Note. This subclass includes an alternate nonencrypted communications
path.
This subclass is indented under subclass 33. Subject matter which transmits different composite parts
of an information signal over carrier waves of different frequencies.
This subclass is indented under subclass 255. Subject matter which divides the message signal into time
interval segments the order of which are interchanged.
(1)
Note. Excluded herein is this subject matter which involves
a magnetic record carrier. Such subject matter is classified with
electric signal modification by magnetic record carrier. See search notes
below.
This subclass is indented under subclass 36. Subject matter wherein time interchanged data segments are
processed either in discrete blocks, or a continuous stream, of
bits or pulses which serially comprise the message stream.
Pulse or Digital Communications,
subclasses 240+ for bandwidth compression or expansion to facilitate
digital signal handling, rather than conceal information.
Data Processing: Speech Signal Processing, Linguistics,
Language Translation, and Audio Compression/Decompression,
subclasses 500+ for audio signal bandwidth compression or expansion
for purposes other than concealment of information.
This subclass is indented under subclass 38. Subject matter which divides the signal into a plurality
of subbands by filtering prior to a frequency shift or inversion.
This subclass is indented under subclass 255. Subject matter which divides the signal into a plurality
of subbands by filtering prior to further encryption.
This subclass is indented under subclass 257. Subject matter wherein the message signal amplitude is divided
into discrete amplitude ranges which are subsequently weighted and combined.
This subclass is indented under subclass 255. Subject matter which encrypts a message signal composed
of a stream of data elements serially and continuously to produce
a stream of the corresponding encrypted data elements.
(1)
Note. The encryption may be performed by either modification
of substitution of the data stream elements.
This subclass is indented under subclass 42. Subject matter wherein a predetermined sequence of digital
signals is combined element-for-element with the message signal
data elements to produce an encrypted or decrypted signal.
This subclass is indented under the class definition. Subject matter which generates a permanent visible record
of either the encrypted or decrypted characters.
Typewriting Machines,
subclass 90 for a typewriter having electrical key reassignment
without message concealment (e.g., "QWERTY" to "DVORAK" conversion).
This subclass is indented under the class definition. Subject matter which includes a detail of the configuration
or arrangement of the cryptographic equipment of communications
equipment connected thereto.
(1)
Note. Such equipment may include an enclosure, keyboard display,
etc.
This subclass is indented under subclass 52. Subject matter including a structural detail or an audio
sensing or reproducing transducer or a mounting therefor.
BY MODIFYING OPTICAL IMAGE (E.G., TRANSMISSIVE OVERLAY):
This subclass is indented under the class definition. Subject matter which changes the visible appearance of an
object so as to encrypt visible markings, or to decode the appearance
of the object into intelligible visible markings.
Optical: Systems and Elements, appropriate subclasses for optically transmissive elements,
particularly
subclasses 1+ for a holographic element; subclasses 619+ for
a surface composed of lenticular elements; subclasses 885+ for
an optical filter.
Electrophotography,
subclass 12 for unit or part identification, subclass 84 for
key sheet controlling job mode, and subclasses 366+ for
document handling of unauthorized copy prevention.
HAVING PRODUCTION OF PRINTED COPY (E.G., CRYPTOGRAPHIC PRINTER
OR TYPEWRITER):
This subclass is indented under the class definition. Subject matter which generates a permanent visible record
of either the encrypted or decrypted characters.
SELECTIVELY MOVABLE ELEMENT HAVING CODE CHARACTERS:
This subclass is indented under the class definition. Subject matter for encrypting a message signal which is
composed of distinct intelligible characters which are visibly positioned
on relatively movable surfaces to enable transposing or substituting
such characters.
(1)
Note. The term "character" is intended to mean at least a
distinct intelligible element, but also includes phrases, numbers,
etc., as the intelligence bearing or the encrypted message
Electrophotography,
subclass 12 for unit or part identification, subclass 84 for
key sheet controlling job mode, and subclasses 366+ for
document handling of unauthorized copy prevention.
This subclass is indented under 200. Subject matter which prevents rerecording of a stored picture
signal representative of a time varying object or image.
Data Processing: Financial, Business Practice,
Management, or Cost/Price Determination,
subclasses 57 and 58 for copy protection or prevention of distributed
data files.
This subclass is indented under 201. Subject matter wherein a video signal which is copy protected
is supplemented by a unique identifier of a source or picture
signal.
This subclass is indented under 201. Subject matter wherein a video signal which is copy protected
is supplemented by a separate signal indicating a protection
mode.
This subclass is indented under 200. Subject matter wherein the characteristics of an information
bearing video electric signal are obscured by the addition of an
extraneous interfering signal.
(1)
Note. Obscuring of a video display by an optical overlay is
classified elsewhere.
This subclass is indented under 205. Subject matter wherein the interfering signal is combined
with the video electric signal to obscure a scanning time
component.
Electrical Computers: Arithmetic Processing and
Calculating,
subclasses 300+ for filtering by digital computer and subclass
819 for filtering by analog calculating computer.
Interactive Video Distribution Systems,
subclass 31 for access control or blocking in the interactive
video wherein the video signal scrambling is nominally claimed.
This subclass is indented under 210. Subject matter wherein the normal ordering of the scan components
is modified.
(1)
Note. Examples of a nonstandard scan pattern are: nonadjacent
scan lines, oppositely directed scan lines, or nonsequential video
information in standard scan line.
(2)
Note. Scan components are: line segments, lines, fields, and
frames.
This subclass is indented under 216. Subject matter wherein the quantity of data representing
the converted image data is reduced prior to further processing.
Data Processing: Speech Signal Processing, Linguistics,
Language Translation, and Audio Compression/Decompression,
subclasses 503 and 504 for audio signal time compression or expansion.
This subclass is indented under 210. Subject matter which modifies a picture signal before carrier
modulation by application of varying amounts of time delay.
(1)
Note. This and indented subclasses also include time shifting
between video information and synchronizing signals.
This subclass is indented under 210. Subject matter in which a picture signal modulated onto
a carrier wave is modified by a phase change of the carrier.
This subclass is indented under 221. Subject matter wherein the signal needed to restore
the modified synchronizing component is transmitted on a carrier
distinct from the video carrier.
This subclass is indented under 221. Subject matter wherein the synchronizing component
is regenerated by a circuit detecting a nonstandard timing characteristic
of the modified video signal.
(1)
Note. The circuit does not rely on a key signal for timing.
This subclass is indented under 221. Subject matter wherein the signal needed to restore
the modified synchronizing component is transmitted during a
video retrace portion.
This subclass is indented under 210. Subject matter wherein a video signal is made intelligible
through the use of an object bearing a code or providing a medium
of exchange.
(1)
Note. Such objects may include coins and other currency,
or credit and debit cards.
Data Processing: Financial, Business Practice,
Management, or Cost/Price Determination,
subclasses 65 through 69for a cryptographic secure transaction using an
intelligent token.
Electrical Computers and Digital Processing Systems:
Support,
subclasses 172 through 174for cryptographic multiple computer communication authentication
using intelligent token.
Interactive Video Distribution Systems,
subclasses 1 through 31for billing, surveying, awarding credit, and access
control or blocking in a video distribution system wherein the video encryption
or scrambling may be nominally claimed.
for video signal modification which has usage or
charge determination ncluding authentication, subclasses 247-250
for cellular phone cryptographic authentication, and subclass 258
for a communication system which is position dependent or has authentication.
Data Processing: Financial, Business Practice,
Management, or Cost/Price Determination,
subclass 67 for secure transaction cryptographic processing (e.g.,
EFT / POS) including authentication.
Electrical Computers and Digital Processing Systems:
Support,
subclasses 155 through 159for multiple computer communication using cryptography
having central trusted authority providing computer authentication, subclass
161 for multiple computer communication using cryptography where
packet header denotes cryptographically protected data and having data
authentication, and subclasses 168-181 for multiple computer communication
using cryptography having particular communication authentication
technique, particularly subclasses 172-174 for a multiple computer
communication system using cryptography with authentication using
an intelligent token.
This subclass is indented under 210. Subject matter including determining the amount of use or
a cost associated therewith in making the modified video signal
intelligible.
Data Processing: Financial, Business Practice,
Management, or Cost/Price Determination,
subclasses 52 through 54for usage protection of distributed data files
including usage or charge determination, subclasses 77-79 for a cryptographic
electric commerce system including billing and subclasses 1-45
for automated electrical financial or business practice or management arrangement.
for video signal modification which is record or
coin controlled and includes authentication, subclasses 247-250
for cellular phone cryptographic authentication, and subclass 258
for a communication system which is position dependent or has authentication.
Data Processing: Financial, Business Practice,
Management, or Cost/Price Determination,
subclass 67 for secure transaction cryptographic processing (e.g.,
EFT / POS) including authentication.
Electrical Computers and Digital Processing Systems:
Support,
subclasses 155 through 159for multiple computer communication using cryptography
having central trusted authority providing computer authentication, subclass
161 for multiple computer communication using cryptography where
packet header denotes cryptographically protected data and having data
authentication, and subclasses 168-181 for multiple computer communication
using cryptography having particular communication authentication
technique.
This subclass is indented under 231. Subject matter wherein data representing program descrambling
activity or cost thereof is written to a storage device at a user
s location.
This subclass is indented under 210. Subject matter wherein a parameter of an audio signal is
varied so as to render the sound unintelligible in a conventional
receiver.
Data Processing: Speech Signal Processing, Linguistics,
Language Translation, and Audio Compression/Decompression, appropriate subclasses for speech signal processing
in general.
This subclass is indented under 236. Subject matter wherein audio modification occurs by varying
a frequency characteristic of an audio signal or by frequency shifting
of an audio carrier.
This subclass is indented under 210. Subject matter wherein a control coding signal modifying
the video electric signal has itself been made unintelligible.
This subclass is indented under 240. Subject matter wherein the addressed decoder signal includes
a unique identifier for a particular video signal or access thereto.
This subclass is indented under 243. Subject matter wherein the normal ordering of the scan components
is modified.
(1)
Note. Examples of a nonstandard scan pattern are: nonadjacent
scan lines, oppositely directed scan lines, or nonsequential video
information in a standard scan line.
(2)
Note. Scan components are: line segments, lines, fields, and
frames.
This subclass is indented under 243. Subject matter wherein a machine readable indicia is produced
which is representative of the scanned static picture.
Electrical Computers and Digital Processing Systems:
Support,
subclass 179 for digital signature representation with generation
of associated coded record.
for video signal modification which is record or
coin controlled and includes authentication, subclass 232 for video signal
modification which has usage or charge determination including authentication,
subclass 258 for a communication system which is position dependent
or has authentication, and subclasses 270 - 274 for cryptography
in a wireless communication system.
Data Processing: Financial, Business Practice,
Management, or Cost/Price Determination,
subclass 67 for secure transaction cryptographic processing (e.g.,
EFT / POS) including authentication.
Electrical Computers and Digital Processing Systems:
Support,
subclasses 155 through 159for multiple computer communication using cryptography
having central trusted authority providing computer authentication, subclass
161 for multiple computer communication using cryptography where
packet header denotes cryptographically protected data and having data
authentication, and subclasses 168 - 181 for multiple computer communication
using cryptography having particular communication authentication
technique.
This subclass is indented under 247. Subject matter wherein authorization to a cellular system
other than the subscriber’s home system is processed
through an intermediary.
This subclass is indented under 255. Subject matter including plural nodes joined by an optical
waveguide for the transmission or reception of light waves.
This subclass is indented under 255. Subject matter wherein protection of the transmission or
reception of information occurs in a system having plural nodes
joined by switched physical links (usually two-way voice).
(1)
Note. Excluded herein is symmetric key cryptography which
includes a modem. This is classified elsewhere.
This subclass is indented under 255. Subject matter wherein cryptographic protection is based
upon or validates the spatial location of a transmitter or
receiver.
for video signal modification which is record or
coin controlled and includes authentication, subclass 232 for video signal
modification which has usage or charge determination including authentication,
and subclasses 247- 250 for cellular phone cryptographic authentication.
Communications: Directive Radio Wave Systems and
Devices (e.g., Radar, Radio Navigation),
subclasses 357.01+ for directive radio wave systems including a satellite
with position indicating.
Data Processing: Financial, Business Practice,
Management, or Cost/Price Determination,
subclass 67 for secure transaction cryptographic processing (e.g.,
EFT / POS) including authentication.
Electrical Computers and Digital Processing Systems:
Support,
subclasses 155 through 159for multiple computer communication using cryptography
having central trusted authority providing computer authentication, subclass
161 for multiple computer communication using cryptography where
packet header denotes cryptographically protected data and having data
authentication, and subclasses 168-181 for multiple computer communication
using cryptography having particular communication authentication
technique.
This subclass is indented under 259. Subject matter including transmission of a signal for generating
identical transmitting and receiving keys in step relationship.
This subclass is indented under 260. Subject matter wherein the synchronizing signal is determined
by the starting point of a discrete data block input to a receiver.
This subclass is indented under 259. Subject matter wherein the encryption or decryption includes
summing the taps from individual stages of a shift register.
This subclass is indented under 259. Subject matter including a device converting a digital signal
to a signal suitable for telephone network transfer.
This subclass is indented under 255. Subject matter wherein modification of a digital data signal
is affected to randomly distribute consecutive appearance of ones
and zeros.
Data Processing: Speech Signal Processing, Linguistics,
Language Translation, and Audio Compression/Decompression,
subclasses 503 and 504 for audio signal time compression or expansion.
This subclass is indented under 255. Subject matter including cryptographic structure or methods
which protect the transmission or reception of information over
a nonphysical link by electromagnetic waves.
This subclass is indented under 270. Subject matter wherein cryptographic protection is extended
or modified by a switch between serving base stations of a mobile
receiver.
This subclass is indented under 270. Subject matter including a signal for placing the transmitter
and receiver into a particular in step relationship.
Data Processing: Speech Signal Processing, Linguistics,
Language Translation, and Audio Compression/Decompression,
subclasses 200 through 278for speech signal processing in general.
STORED INFORMATION ACCESS OR COPY PREVENTION (380/3):
Foreign art collection under the class definition
which conceals or prevents rerecording of machine readable information
by making the stored information unintelligible.
Foreign art collection under collection 103 which
prevents duplication of, or unauthorized access to, information
stored as a group of discrete pulses.
Foreign art collection under collection 103 for
preventing rerecording of, or unauthorized access to, a stored picture
signal representative of an object or image.
Foreign art collection under the class definition
wherein the characteristics of an information bearing electric signal
are obscured by the addition of an extraneous interfering signal.
Foreign art collection under collection 109 for
modifying either (a) a picture signal representative of an object
or image, or (b) a signal transmitted with such a picture signal (e.g.,
audio).
Foreign art collection under collection 110 wherein
video signal modification is actuated by an object authorizing or
making payment for use of the equipment.
Foreign art collection under collection 110 which
transmits an auxiliary signal between the transmitter and receiver
for actuation or modification of an encrypting or decrypting function.
Foreign art collection under collection 109 wherein
a sequence of signals necessary for decoding of an encrypted signal
is transmitted over a data link.
Foreign art collection under collection 109 which
uses a particular signal or circuit for control of timing relationships
between a transmitting encrypting device and a receiving decrypting
device.
Foreign art collection under collection 109 in which
an encrypting or decrypting device utilizes a digital signal manipulation
technique on the information signal.
Note: The Patent
and Trademark Depository Library Program (PTDLP) administers a nationwide
network of public, state and academic libraries designated as Patent and
Trademark Depository Libraries authorized by 35 U.S.C. 13 to: Disseminate
Patent and Trademark Information Support Diverse Intellectual Property
Needs of the Public. PTDL Contact Information
Note: For information/comments on electronic information products, such
as purchasing USPTO data, or to discuss system requirements for magnetic
tape products, contact:
KEY: =online
business system =fees =forms=help =laws/regulations =definition
(glossary)
The Inventors
Assistance Center is available to help you on patent
matters.Send questions about USPTO programs and services
to theUSPTO
Contact Center (UCC). You can suggest USPTO webpages
or material you would like featured on this section by E-mail
to the webmaster@uspto.gov.
While we cannot promise to accommodate all requests, your suggestions
will be considered and may lead to other improvements on the
website.