[{"name":"S3-180542","title":"Discussion on visited network control of using null-scheme","source":"ZTE Corporation","contact":"Zhenhua Xie","contact-id":38520,"tdoctype":"discussion","for":"Endorsement","abstract":"This paper discusses the issue of current SUPI privacy mechanism and proposes a solution that visited network can control the using of null-scheme.","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":7690,"status":"noted","reservation_date":"2018-02-14 12:19:59","uploaded":"2018-02-18 03:40:38","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180542.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180543","title":"Visited network control of null-scheme","source":"ZTE Corporation","contact":"Zhenhua Xie","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"This paper proposes a way for visited network control of null-scheme.","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":8180,"status":"noted","reservation_date":"2018-02-14 12:21:59","uploaded":"2018-02-18 03:40:38","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180543.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180590","title":"Requirement for SUPI privacy and LI","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":7680,"status":"noted","reservation_date":"2018-02-18 16:37:58","uploaded":"2018-02-18 17:38:51","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180590.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180591","title":"Solution for SUPI privacy and LI requirement","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":6840,"status":"noted","reservation_date":"2018-02-18 16:40:59","uploaded":"2018-02-18 17:38:51","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180591.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180684","title":"Proposal and Discussion for Privacy and LI solution","source":"KPN, DT, BT, NTT DOCOMO, NEC","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"discussion","for":"Approval","abstract":"This document discusses which solution should be picked for providing proof of the correctness of the SUPI to the visited network.","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":5420,"status":"noted","reservation_date":"2018-02-19 11:57:20","uploaded":"2018-02-19 12:00:29","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180684.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180768","title":"Discussion on LI conformity by verification hash with ppt attachment","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":5430,"status":"noted","reservation_date":"2018-02-19 13:27:26","uploaded":"2018-02-19 14:35:41","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180768.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180769","title":"5G AKA with verification hash","source":"Nokia, Gemalto, IDEMIA","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":5900,"status":"noted","reservation_date":"2018-02-19 13:27:26","uploaded":"2018-02-19 14:35:41","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180769.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180818","title":"Clause 6.7.2 (NAS SMC, SUPI from UE for LI)","source":"Ericsson, Qualcomm Incorporated, Samsung, Huawei, Hisilicon, Intel","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":5910,"status":"noted","reservation_date":"2018-02-19 14:16:48","uploaded":"2018-02-19 14:51:33","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.7.1","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180818.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180963","title":"Combined solution: Verification hash and SUPI key binding","source":"Nokia, Gemalto, IDEMIA, \n   Interdigital, AT&T, Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"discussion","for":"Discussion","abstract":"Abstract: This contribution proposes the combination of 2 already existing solutions to be considered in the LI \/ privacy discussion and for a possible voting. It is combining the verification hash solution as described in S3-180769 and the key binding of","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":96300,"status":"noted","reservation_date":"2018-03-05 11:05:19","uploaded":"2018-03-05 11:07:58","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180963.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180965","title":"PCR Proposal and Discussion for Privacy and LI solution","source":"KPN","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":5421,"status":"approved","reservation_date":"2018-03-01 16:43:35","uploaded":"2018-03-01 16:43:35","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.7.1","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180965.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180966","title":"5G AKA with verification hash","source":"Nokia, Gemalto, IDEMIA","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":5901,"status":"withdrawn","reservation_date":"2018-03-05 11:05:20","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180983","title":"LS on LI SUPI privacy","source":"BT","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"4.1.14.1","ainame":"SUPI and LI","tdoc_agenda_sort_order":98300,"status":"approved","reservation_date":"2018-03-01 16:56:18","uploaded":"2018-03-01 16:56:18","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA3-LI","Cc":"ETSI TC LI","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180983.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]