FI (list display)

  • H04W12/00
  • Security arrangements; Authentication; Protecting privacy or anonymity [2021.01] HB CC 5K067
  • H04W12/02
  • .Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII] [2009.01] HB CC 5K067
  • H04W12/03
  • .Protecting confidentiality, e.g. by encryption [2021.01] HB CC 5K067
  • H04W12/033
  • ..of the user plane, e.g. user's traffic [2021.01] HB CC 5K067
  • H04W12/037
  • ..of the control plane, e.g. signalling traffic [2021.01] HB CC 5K067
  • H04W12/04
  • .Key management, e.g. using generic bootstrapping architecture [GBA] [2021.01] HB CC 5K067
  • H04W12/041
  • ..Key generation or derivation [2021.01] HB CC 5K067
  • H04W12/043
  • ..using a trusted network node as an anchor [2021.01] HB CC 5K067
  • H04W12/0431
  • ...Key distribution or pre-distribution; Key agreement [2021.01] HB CC 5K067
  • H04W12/0433
  • ...Key management protocols [2021.01] HB CC 5K067
  • H04W12/047
  • ..without using a trusted network node as an anchor [2021.01] HB CC 5K067
  • H04W12/0471
  • ...Key exchange [2021.01] HB CC 5K067
  • H04W12/06
  • .Authentication [2021.01] HB CC 5K067
  • H04W12/062
  • ..Pre-authentication [2021.01] HB CC 5K067
  • H04W12/065
  • ..Continuous authentication [2021.01] HB CC 5K067
  • H04W12/069
  • ..using certificates or pre-shared keys [2021.01] HB CC 5K067
  • H04W12/08
  • .Access security [2021.01] HB CC 5K067
  • H04W12/082
  • ..using revocation of authorisation [2021.01] HB CC 5K067
  • H04W12/084
  • ..using delegated authorisation, e.g. open authorisation [OAuth] protocol [2021.01] HB CC 5K067
  • H04W12/086
  • ..using security domains [2021.01] HB CC 5K067
  • H04W12/088
  • ..using filters or firewalls [2021.01] HB CC 5K067
  • H04W12/10
  • .Integrity [2021.01] HB CC 5K067
  • H04W12/102
  • ..Route integrity, e.g. using trusted paths [2021.01] HB CC 5K067
  • H04W12/104
  • ..Location integrity, e.g. secure geotagging [2021.01] HB CC 5K067
  • H04W12/106
  • ..Packet or message integrity [2021.01] HB CC 5K067
  • H04W12/108
  • ..Source integrity [2021.01] HB CC 5K067
  • H04W12/12
  • .Detection or prevention of fraud [2021.01] HB CC 5K067
  • H04W12/121
  • ..Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS] [2021.01] HB CC 5K067
  • H04W12/122
  • ...Counter-measures against attacks; Protection against rogue devices [2021.01] HB CC 5K067
  • H04W12/125
  • ..Protection against power exhaustion attacks [2021.01] HB CC 5K067
  • H04W12/126
  • ..Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning [2021.01] HB CC 5K067
  • H04W12/128
  • ..Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware [2021.01] HB CC 5K067
  • H04W12/30
  • .Security of mobile devices; Security of mobile applications [2021.01] HB CC 5K067
  • H04W12/33
  • ..using wearable devices, e.g. using a smartwatch or smart-glasses [2021.01] HB CC 5K067
  • H04W12/37
  • ..Managing security policies for mobile devices or for controlling mobile applications [2021.01] HB CC 5K067
  • H04W12/40
  • .Security arrangements using identity modules [2021.01] HB CC 5K067
  • H04W12/42
  • ..using virtual identity modules [2021.01] HB CC 5K067
  • H04W12/43
  • ..using shared identity modules, e.g. SIM sharing [2021.01] HB CC 5K067
  • H04W12/45
  • ..using multiple identity modules [2021.01] HB CC 5K067
  • H04W12/47
  • ..using near field communication [NFC] or radio frequency identification [RFID] modules [2021.01] HB CC 5K067
  • H04W12/48
  • ..using secure binding, e.g. securely binding identity modules to devices, services or applications [2021.01] HB CC 5K067
  • H04W12/50
  • .Secure pairing of devices [2021.01] HB CC 5K067
  • H04W12/55
  • ..involving three or more devices, e.g. group pairing [2021.01] HB CC 5K067
  • H04W12/60
  • .Context-dependent security [2021.01] HB CC 5K067
  • H04W12/61
  • ..Time-dependent [2021.01] HB CC 5K067
  • H04W12/63
  • ..Location-dependent; Proximity-dependent [2021.01] HB CC 5K067
  • H04W12/64
  • ...using geofenced areas [2021.01] HB CC 5K067
  • H04W12/65
  • ..Environment-dependent, e.g. using captured environmental data [2021.01] HB CC 5K067
  • H04W12/67
  • ..Risk-dependent, e.g. selecting a security level depending on risk profiles [2021.01] HB CC 5K067
  • H04W12/68
  • ..Gesture-dependent or behaviour-dependent [2021.01] HB CC 5K067
  • H04W12/69
  • ..Identity-dependent [2021.01] HB CC 5K067
  • H04W12/71
  • ...Hardware identity [2021.01] HB CC 5K067
  • H04W12/72
  • ...Subscriber identity [2021.01] HB CC 5K067
  • H04W12/73
  • ...Access point logical identity [2021.01] HB CC 5K067
  • H04W12/75
  • ...Temporary identity [2021.01] HB CC 5K067
  • H04W12/76
  • ...Group identity [2021.01] HB CC 5K067
  • H04W12/77
  • ...Graphical identity [2021.01] HB CC 5K067
  • H04W12/79
  • ...Radio fingerprint [2021.01] HB CC 5K067
  • H04W12/80
  • .Arrangements enabling lawful interception [LI] [2021.01] HB CC 5K067
    TOP