[{"name":"S3-234419","title":"Correction in trusted non-3GPP access authentication","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":620,"status":"not pursued","reservation_date":"2023-10-20 09:08:12","uploaded":"2023-10-30 13:50:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1894.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234419.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234420","title":"Discussion on UPU Header Security","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1010,"status":"noted","reservation_date":"2023-10-20 09:10:03","uploaded":"2023-10-30 13:50:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234420.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234421","title":"UPU Header Security","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1020,"status":"not pursued","reservation_date":"2023-10-20 09:10:40","uploaded":"2023-10-30 13:50:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"5GS_Ph1-SEC"},{"winame":" TEI18"}],"crnumber":1896.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234421.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234433","title":"Evaluation of different options of security for selective SCG Activation.","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":930,"status":"noted","reservation_date":"2023-10-24 06:54:03","uploaded":"2023-10-27 05:54:50","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234433.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234434","title":"Security for Selective SCG Activation","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":940,"status":"noted","reservation_date":"2023-10-24 06:56:59","uploaded":"2023-10-27 05:54:50","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234434.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234534","title":"Callback URI clarification and API correction","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":450,"status":"merged","reservation_date":"2023-10-27 15:46:04","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1793.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234534.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234536","title":"Removing GUTI from Registration Reject","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":45360,"status":"revised","reservation_date":"2023-10-27 15:46:05","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"S3-235045","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1794.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234536.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7.2.1, 7A.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234537","title":"NULL encryption clarification","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":45370,"status":"revised","reservation_date":"2023-10-27 15:46:05","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"S3-235046","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1795.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234537.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7B.7.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234538","title":"N3IWF procedure clarification","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":540,"status":"not pursued","reservation_date":"2023-10-27 15:46:06","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.17.0","workitem":[{"winame":"TEI15"}],"crnumber":1796.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234538.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234539","title":"N3IWF procedure clarification","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":550,"status":"not pursued","reservation_date":"2023-10-27 15:46:06","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.16.0","workitem":[{"winame":"TEI15"}],"crnumber":1797.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234539.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7.2.1, ","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234540","title":"N3IWF procedure clarification","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":560,"status":"not pursued","reservation_date":"2023-10-27 15:46:07","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI15"}],"crnumber":1798.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234540.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234541","title":"N3IWF procedure clarification","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":570,"status":"revised","reservation_date":"2023-10-27 15:46:08","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"S3-235082","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1799.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234541.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234542","title":"Discussion paper on security aspect of NF accessing the external AF services","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":690,"status":"noted","reservation_date":"2023-10-27 15:46:08","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"","workitem":[{"winame":"TEI17"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234542.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234543","title":"Framework for NF accessing the external AF data","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":700,"status":"not pursued","reservation_date":"2023-10-27 15:46:08","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI17"}],"crnumber":1800.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234543.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.2.3, 12.1, 12.4, 12.x(new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234544","title":"Framework for NF accessing the external AF data","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":710,"status":"not pursued","reservation_date":"2023-10-27 15:46:09","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI17"}],"crnumber":1801.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234544.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234545","title":"SOR UPU NVM issue","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":600,"status":"not pursued","reservation_date":"2023-10-27 15:46:10","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1802.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234545.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"6.14.2.1, 6.14.2.2, 6.15.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234548","title":"Discussion paper of UPU implementation gaps","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1030,"status":"noted","reservation_date":"2023-10-27 15:46:11","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234548.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234549","title":"Enhancement in UPU procedure to protect UPU header","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1040,"status":"merged","reservation_date":"2023-10-27 15:46:11","uploaded":"2023-10-30 13:51:29","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1803.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234549.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.15.2.1,","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234550","title":"Updates to the SBA certificate profile","source":"Nokia, Nokia Shanghai Bell","contact":"German Peinado","contact-id":93903,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":220,"status":"not pursued","reservation_date":"2023-10-27 16:24:09","uploaded":"2023-10-30 09:42:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.31,"crspecversion":"18.1.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":169.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234550.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234551","title":"Discussion paper on automated additions of root CAs certificates using CMP","source":"Nokia, Nokia Shanghai Bell","contact":"German Peinado","contact-id":93903,"tdoctype":"discussion","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":780,"status":"noted","reservation_date":"2023-10-27 16:24:12","uploaded":"2023-10-30 09:42:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234551.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234552","title":"Automated additions of root CAs certificates using CMP","source":"Nokia, Nokia Shanghai Bell","contact":"German Peinado","contact-id":93903,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":790,"status":"not pursued","reservation_date":"2023-10-27 16:24:12","uploaded":"2023-10-30 09:42:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.31,"crspecversion":"18.1.0","workitem":[{"winame":"TEI18"}],"crnumber":170.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234552.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234561","title":"Guidance on mitigating privacy risk of variable length NAI-based SUPIs","source":"InterDigital Communications, Nokia","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"CR","for":"Agreement","abstract":"The FS_Id_Prvc study concluded that informative guidance on how operators can protect against the potential threat of anonymity set reduction in 5GS when using NAI-based SUPIs that are of variable length is recommended to be added to TS 33.501. \nThis CR a","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":45610,"status":"revised","reservation_date":"2023-10-27 17:12:59","uploaded":"2023-10-29 22:18:27","revisionof":"","revisedto":"S3-234854","release":"Rel-19","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI19"}],"crnumber":1808.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234561.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234566","title":"Rel-18 Work Item Exception for FS_PIN_Sec","source":"InterDigital Communications","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"WI exception request","for":"Approval","abstract":"This contribution proposes an Exception Sheet for Study on personal Internet of Things (IoT) networks security aspects.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":800,"status":"noted","reservation_date":"2023-10-29 14:42:39","uploaded":"2023-10-29 22:18:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":[{"winame":"FS_PIN_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234566.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234575","title":"Replace reference to IETF draft-emu-eap-tls13 in annex B with RFC 9190","source":"CableLabs","contact":"Tao Wan","contact-id":79074,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : CableLabs","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":720,"status":"revised","reservation_date":"2023-10-30 02:16:34","uploaded":"2023-10-30 02:33:38","revisionof":"","revisedto":"S3-235042","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1809.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234575.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"2, Annex B.2.1, B.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234577","title":"AUSF sends back MSK to W-AGF after successful EAP authentication","source":"CableLabs","contact":"Tao Wan","contact-id":79074,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":580,"status":"revised","reservation_date":"2023-10-30 02:24:31","uploaded":"2023-10-30 02:33:38","revisionof":"","revisedto":"S3-235048","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1810.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234577.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234585","title":"Remove the EN on I.10.3.1","source":"ZTE","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":590,"status":"merged","reservation_date":"2023-10-30 03:18:39","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"eNPN_Ph2"}],"crnumber":1811.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234585.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"I.10.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234586","title":"Remove the 5G-GUTI in the Registration Reject message in clause 7.2.1 and 7A.2.1","source":"ZTE","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1050,"status":"merged","reservation_date":"2023-10-30 03:18:40","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1812.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234586.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"7.2.1, 7A.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234587","title":"Update the clause 6.6.3.3 in 33.503","source":"ZTE","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":810,"status":"merged","reservation_date":"2023-10-30 03:18:42","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.503,"crspecversion":"18.0.0","workitem":[{"winame":"5G_ProSe_Ph2"}],"crnumber":128.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234587.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.6.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234588","title":"Discussion on the AKMA context removal and A-KID update after UPU","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":45880,"status":"withdrawn","reservation_date":"2023-10-30 03:18:43","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":33.535,"crspecversion":"","workitem":[{"winame":"AKMA_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234589","title":"A-KID update after UPU","source":"ZTE","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":260,"status":"not pursued","reservation_date":"2023-10-30 03:18:43","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.535,"crspecversion":"18.1.0","workitem":[{"winame":"AKMA_Ph2"}],"crnumber":188.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234589.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.X(new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234590","title":"Adding SUPI\/GPSI as an option in KAF request message","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":270,"status":"not pursued","reservation_date":"2023-10-30 03:18:44","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.535,"crspecversion":"18.1.0","workitem":[{"winame":"AKMA_Ph2"}],"crnumber":189.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234590.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.2.1, 6.3, 7.1.3, 7.1.5, 7.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234591","title":"Editorial corrections to TS 33.535 in R17","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Editorial corrections to TS 33.535<br\/><br\/>Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":280,"status":"revised","reservation_date":"2023-10-30 03:18:44","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"S3-235080","release":"Rel-17","crspec":33.535,"crspecversion":"17.9.0","workitem":[{"winame":"AKMA"}],"crnumber":190.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234591.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.7.2, 6.2.1, 6.3, 6.4.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234592","title":"Editorial corrections to TS 33.535 in R18","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Editorial corrections to TS 33.535<br\/><br\/>Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":290,"status":"revised","reservation_date":"2023-10-30 03:18:45","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"S3-235081","release":"Rel-18","crspec":33.535,"crspecversion":"18.1.0","workitem":[{"winame":"AKMA"}],"crnumber":191.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234592.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.7.2, 6.2.1, 6.3, 6.4.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234593","title":"Update AKMA key lifetimes","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":300,"status":"not pursued","reservation_date":"2023-10-30 03:18:46","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.535,"crspecversion":"18.1.0","workitem":[{"winame":"HN_Auth"}],"crnumber":192.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234593.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234594","title":"Update AKMA related UDM services","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":310,"status":"agreed","reservation_date":"2023-10-30 03:18:47","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.535,"crspecversion":"18.1.0","workitem":[{"winame":"HN_Auth"}],"crnumber":193.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231332","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234594.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234595","title":"Adding indication to inform UE of A-KID refresh","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":320,"status":"not pursued","reservation_date":"2023-10-30 03:18:47","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.535,"crspecversion":"18.1.0","workitem":[{"winame":"HN_Auth"}],"crnumber":194.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234595.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.4.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234596","title":"Reuse error code during home network triggered primary authentication procedure","source":"ZTE","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":380,"status":"revised","reservation_date":"2023-10-30 03:18:48","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"S3-235038","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1813.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234596.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.5, 8.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234597","title":"Clarify AMF responses in HONTRA procedure.","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Clarify AMF responses in HONTRA procedure<br\/><br\/>Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":390,"status":"not pursued","reservation_date":"2023-10-30 03:18:48","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1814.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234597.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234598","title":"HONTRA procedure corrections","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":400,"status":"merged","reservation_date":"2023-10-30 03:18:49","uploaded":"2023-10-30 09:14:54","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1815.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234598.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234599","title":"Dummy WID for R18 eNS","source":"Huawei, HiSilicon, Nokia, Nokia Shanghai Bell, LGE, Xiaomi, ZTE","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"WID new","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":350,"status":"noted","reservation_date":"2023-10-30 04:31:33","uploaded":"2023-10-30 11:51:44","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234599.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234600","title":"Home control for Network Slice Admission Control procedures","source":"Huawei, HiSilicon, Nokia, Nokia Shanghai Bell, LGE, Xiaomi, ZTE","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : CR for R18 eNS on NSACF<br\/><br\/>Source modified on 10\/30\/2023. Original source : Huawei, HiSilicon, Nokia, Nokia Shanghai Bell, LGE, Xiaomi, ZTE","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":0,"status":"not pursued","reservation_date":"2023-10-30 04:31:33","uploaded":"2023-10-30 11:51:44","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"Limbo"}],"crnumber":1816.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234600.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.X","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234605","title":"NSSAA procedure update for multiple registration","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Address issue in NSSAA procedures for multiple registration<br\/><br\/>Source modified on 10\/30\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":360,"status":"not pursued","reservation_date":"2023-10-30 04:31:36","uploaded":"2023-10-30 11:51:44","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.0","workitem":[{"winame":"TEI17"}],"crnumber":1817.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234605.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.3, 16.4, 16.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234616","title":"Revocation procedures invoked by API invoker","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":40,"status":"not pursued","reservation_date":"2023-10-30 06:06:09","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":37.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234616.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234617","title":"Revocation procedure invoked by resource owner client","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":50,"status":"not pursued","reservation_date":"2023-10-30 06:06:12","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":38.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234617.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234618","title":"Correction on authentication and authorization for RNAA","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2023-10-30 06:06:13","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"S3-235113","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":39.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234618.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234619","title":"Security negotiation for RNAA","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":110,"status":"merged","reservation_date":"2023-10-30 06:06:13","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":40.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234619.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234620","title":"Access token profile for RNAA","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":120,"status":"revised","reservation_date":"2023-10-30 06:06:14","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"S3-235115","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":41.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234620.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234621","title":"Obtaining Tokens Procedure for RNAA","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":130,"status":"merged","reservation_date":"2023-10-30 06:06:15","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":42.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234621.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234622","title":"Refreshing Token for RNAA","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":140,"status":"merged","reservation_date":"2023-10-30 06:06:15","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":43.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234622.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234639","title":"Update to Set up of initial trust","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":230,"status":"agreed","reservation_date":"2023-10-30 06:06:22","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.31,"crspecversion":"18.1.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":171.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231325","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234639.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234640","title":"Update to Validation of usage of X.509 certificate","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":240,"status":"agreed","reservation_date":"2023-10-30 06:06:23","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.31,"crspecversion":"18.1.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":172.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231325","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234640.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234648","title":"draftCR on Securtiy of Selective SCG Activation","source":"Huawei, HiSilicon, Qualcomm Incorporated, Ericsson, Nokia, Nokia Shanghai Bell, Samsung","contact":"Ao Lei","contact-id":84307,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":950,"status":"merged","reservation_date":"2023-10-30 06:06:27","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234648.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234650","title":"Update the abbreviation list to include CPA and CPC R17","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Update the abbreviation list to include CPA and CPC - R17<br\/><br\/>Source modified on 10\/30\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":730,"status":"agreed","reservation_date":"2023-10-30 06:06:28","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI17"}],"crnumber":1826.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234650.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234651","title":"Update the abbreviation list to include CPA and CPC R18","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Update the abbreviation list to include CPA and CPC - R18<br\/><br\/>Source modified on 10\/30\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":740,"status":"agreed","reservation_date":"2023-10-30 06:06:28","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI17"}],"crnumber":1827.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-231342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234651.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234652","title":"CR to update certificate lifecycle management","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : CR to update certificate lifecycle managemnet<br\/><br\/>Source modified on 10\/30\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":250,"status":"not pursued","reservation_date":"2023-10-30 06:06:29","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.31,"crspecversion":"18.1.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":173.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234652.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"10.6","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234654","title":"Update step 8 in AUN3 devices supporting 5G key hierarchy procedure","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1070,"status":"not pursued","reservation_date":"2023-10-30 06:06:30","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"5WWC_Ph2_Sec"}],"crnumber":1829.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234654.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234655","title":"clarification for HONTRA procedure","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":410,"status":"revised","reservation_date":"2023-10-30 06:06:31","uploaded":"2023-10-30 13:07:17","revisionof":"","revisedto":"S3-235040","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1830.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234655.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234666","title":"Updates to Security for Selective SCG Activation","source":"Intel","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":960,"status":"revised","reservation_date":"2023-10-30 06:24:03","uploaded":"2023-10-30 09:09:44","revisionof":"","revisedto":"S3-235100","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234666.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234667","title":"Remove the 5G-GUTI in the Registration Reject message in clause 7.2.1 and 7A.2.1","source":"Intel","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Updates to GUTI from Registration Reject<br\/><br\/>Source modified on 10\/30\/2023. Original source : Intel","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1060,"status":"merged","reservation_date":"2023-10-30 06:27:21","uploaded":"2023-10-30 09:30:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1832.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234667.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"7.2.1, 7A.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234669","title":"CR on Security vulnerability fix for use of AES-GCM and AES-GMAC in 33.203","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":630,"status":"not pursued","reservation_date":"2023-10-30 07:51:54","uploaded":"2023-10-30 09:50:20","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.203,"crspecversion":"17.1.0","workitem":[{"winame":"TEI18"}],"crnumber":274.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234669.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234680","title":"Clarification on signalling overload in Home Network Triggered Authentication","source":"LG Electronics","contact":"Anbin Kim","contact-id":93429,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : LG Electronics Polska","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":420,"status":"not pursued","reservation_date":"2023-10-30 08:43:33","uploaded":"2023-10-30 13:48:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1833.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234680.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234696","title":"Security for subsequent CPAC","source":"OPPO","contact":"Lihui Xiong","contact-id":100807,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Security of SCPAC<br\/><br\/>Source modified on 10\/30\/2023. Original source : OPPO","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":970,"status":"not pursued","reservation_date":"2023-10-30 10:01:25","uploaded":"2023-10-30 10:32:14","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1837.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234696.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":true,"cn_affected":false,"clauses_affected":"6.10.2.X (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234701","title":"Discussion on protecting header information in UPU","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":47010,"status":"noted","reservation_date":"2023-10-30 10:17:57","uploaded":"2023-10-30 13:09:12","revisionof":"S3-233869","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234701.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234702","title":"Protection of UPU header","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":47020,"status":"merged","reservation_date":"2023-10-30 10:17:57","uploaded":"2023-10-30 13:09:12","revisionof":"S3-233870","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"},{"winame":" 5GS_Ph1-SEC"}],"crnumber":1612.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234702.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.15.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234703","title":"Establishing IPsec SAs for IAB inter-CU topology adaptation and backhaul RLF recovery procedure","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":47030,"status":"revised","reservation_date":"2023-10-30 10:17:58","uploaded":"2023-10-30 13:09:12","revisionof":"","revisedto":"S3-234933","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI17"}],"crnumber":1838.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234703.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234704","title":"Establishing IPsec SAs for IAB inter-CU topology adaptation and backhaul RLF recovery procedure","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":460,"status":"not pursued","reservation_date":"2023-10-30 10:17:58","uploaded":"2023-10-30 13:09:12","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI17"}],"crnumber":1839.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234704.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":true,"cn_affected":false,"clauses_affected":"M.5, A.X (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234705","title":"Updating the FC values","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":47050,"status":"revised","reservation_date":"2023-10-30 10:17:59","uploaded":"2023-10-30 13:09:12","revisionof":"","revisedto":"S3-234936","release":"Rel-17","crspec":33.22,"crspecversion":"17.4.0","workitem":[{"winame":"TEI17"}],"crnumber":226.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234705.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234706","title":"Updating the FC values","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":47060,"status":"revised","reservation_date":"2023-10-30 10:18:00","uploaded":"2023-10-30 13:09:12","revisionof":"","revisedto":"S3-234938","release":"Rel-18","crspec":33.22,"crspecversion":"18.1.0","workitem":[{"winame":"TEI17"}],"crnumber":227.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234706.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234708","title":"Handling of SoR\/UPU Counter stored in NVM","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":610,"status":"revised","reservation_date":"2023-10-30 10:18:01","uploaded":"2023-10-30 13:09:12","revisionof":"S3-233892","revisedto":"S3-235052","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1746.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234708.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.2.2.2 ","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234724","title":"Guidance on mitigating privacy risk of variable length NAI based SUPIs","source":"Ericsson, Qualcomm Incorporated","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson, Qualcomm Incorporated","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":47240,"status":"withdrawn","reservation_date":"2023-10-30 10:18:45","uploaded":"2023-10-30 10:43:02","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1846.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234724.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.12.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234737","title":"Security for Subsequent Conditional PSCell Addition or Change","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":980,"status":"noted","reservation_date":"2023-10-30 10:30:55","uploaded":"2023-10-30 13:00:24","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"","workitem":[{"winame":"TEI18"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234737.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234759","title":"Correction of Figure 7A.2.1-1","source":"Ericsson,Lenovo","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1080,"status":"agreed","reservation_date":"2023-10-30 10:38:07","uploaded":"2023-10-30 13:08:50","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"5WWC_Ph2_Sec"}],"crnumber":1854.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231324","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234759.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"7A.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234766","title":"Authentication result removal","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":750,"status":"not pursued","reservation_date":"2023-10-30 10:53:28","uploaded":"2023-10-30 12:32:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI19"}],"crnumber":1856.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234766.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234772","title":"Guidance on mitigating privacy risk of variable length NAI based SUPIs","source":"Ericsson, Qualcomm Incorporated","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":470,"status":"revised","reservation_date":"2023-10-30 10:53:41","uploaded":"2023-10-30 11:02:41","revisionof":"","revisedto":"S3-235058","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1861.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234772.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234784","title":"Identification of RNAA token","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":150,"status":"merged","reservation_date":"2023-10-30 10:59:01","uploaded":"2023-10-30 13:44:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":44.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234784.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.1, 6.5.3.2, 6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234785","title":"Optimizations for accessing own resources","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":180,"status":"not pursued","reservation_date":"2023-10-30 10:59:06","uploaded":"2023-10-30 13:44:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":45.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234785.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234786","title":"Clarification on resource owner ID","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2023-10-30 10:59:08","uploaded":"2023-10-30 13:44:27","revisionof":"","revisedto":"S3-235059","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":46.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234786.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234787","title":"Clarification on the scope of the Rel-18 RNAA specification","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":200,"status":"not pursued","reservation_date":"2023-10-30 10:59:09","uploaded":"2023-10-30 13:44:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":47.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234787.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.1, 6.5.3.2, 6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234790","title":"Optimization in the authorization code flow usage","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":170,"status":"not pursued","reservation_date":"2023-10-30 10:59:12","uploaded":"2023-10-30 13:44:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":48.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234790.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234794","title":"Implementation corrections","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":430,"status":"merged","reservation_date":"2023-10-30 11:02:53","uploaded":"2023-10-30 13:28:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1865.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234794.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.1.5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234795","title":"Clarifications of the AMF and UDM behaviour","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":440,"status":"merged","reservation_date":"2023-10-30 11:02:54","uploaded":"2023-10-30 13:28:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1866.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234795.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234796","title":"Update UE terminating procedures for e2DCe","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":820,"status":"agreed","reservation_date":"2023-10-30 11:02:55","uploaded":"2023-10-30 13:28:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.328,"crspecversion":"18.0.0","workitem":[{"winame":"NG_RTC_SEC"}],"crnumber":72.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231335","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234796.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"7.3.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234797","title":"Change of  the abbreviation \"DCMF to \"MF\" and related changes to the text and figures","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : Change of the abbreviation \"DCMF to \"MF  \" and related changes to the text and figures<br\/><br\/>Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":830,"status":"agreed","reservation_date":"2023-10-30 11:02:55","uploaded":"2023-10-30 13:28:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.328,"crspecversion":"18.0.0","workitem":[{"winame":"NG_RTC_SEC"}],"crnumber":73.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231335","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234797.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"3.3, 4.1.1, 4.1.2.4, 4.2.1, 4.2.5, 5.5.6, 6.2.4.1, 6.2.4.3.1, 7.2.4, Annex N.3.1, Annex N.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234798","title":"Add the abbreviation \"IMS AS\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":840,"status":"agreed","reservation_date":"2023-10-30 11:02:56","uploaded":"2023-10-30 13:28:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.328,"crspecversion":"18.0.0","workitem":[{"winame":"NG_RTC_SEC"}],"crnumber":74.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231335","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234798.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234799","title":"Remove \"DC Application Server\" in Figure N.3.4-1 and add a NOTE","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":850,"status":"agreed","reservation_date":"2023-10-30 11:02:57","uploaded":"2023-10-30 13:28:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.328,"crspecversion":"18.0.0","workitem":[{"winame":"NG_RTC_SEC"}],"crnumber":75.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231335","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234799.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex N.3.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234800","title":"Editorial changes to clause 7.2.5","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":860,"status":"agreed","reservation_date":"2023-10-30 11:02:58","uploaded":"2023-10-30 13:28:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.328,"crspecversion":"18.0.0","workitem":[{"winame":"NG_RTC_SEC"}],"crnumber":76.0,"crrevision":"","crcategory":"D","tsg_crp":"SP-231335","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234800.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"7.2.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234801","title":"Change the \"P-CSCF(IMS AS)\" to \"IMS AS via the P-CSCF\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":870,"status":"agreed","reservation_date":"2023-10-30 11:02:59","uploaded":"2023-10-30 13:28:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.328,"crspecversion":"18.0.0","workitem":[{"winame":"NG_RTC_SEC"}],"crnumber":77.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231335","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234801.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.2.4.1, 7.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234821","title":"Handling of 3gpp-Sbi-Originating-Network-Id header in the SNPN case","source":"Ericsson, Nokia, Nokia Shanghai Bell","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson, Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":880,"status":"agreed","reservation_date":"2023-10-30 11:24:36","uploaded":"2023-10-30 12:44:28","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI17"}],"crnumber":1873.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234821.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.2.4, 5.9.3.2, 5.9.3.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234822","title":"Handling of 3gpp-Sbi-Originating-Network-Id header in the SNPN case","source":"Ericsson, Nokia, Nokia Shanghai Bell","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson, Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":890,"status":"agreed","reservation_date":"2023-10-30 11:24:36","uploaded":"2023-10-30 12:44:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI17"}],"crnumber":1874.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-231342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234822.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.2.4, 5.9.3.2, 5.9.3.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234823","title":"Discussion of the Verification of the serving network name by the AUSF","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":900,"status":"noted","reservation_date":"2023-10-30 11:24:37","uploaded":"2023-10-30 12:44:28","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234823.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234824","title":"Verification of the serving network name by the AUSF","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":910,"status":"agreed","reservation_date":"2023-10-30 11:24:37","uploaded":"2023-10-30 12:44:28","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI17"}],"crnumber":1875.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234824.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234825","title":"Verification of the serving network name by the AUSF","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":920,"status":"agreed","reservation_date":"2023-10-30 11:24:38","uploaded":"2023-10-30 12:44:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI17"}],"crnumber":1876.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-231342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234825.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234828","title":"[IAB][Rel-17] IAB inter-CU topology adaptation procedure","source":"Samsung, Intel, Nokia, Nokia Shanghai Bell","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":480,"status":"revised","reservation_date":"2023-10-30 11:24:44","uploaded":"2023-10-30 12:51:14","revisionof":"","revisedto":"S3-235032","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI17"}],"crnumber":1878.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234828.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234829","title":"[IAB][Rel-18] IAB inter-CU topology adaptation procedure","source":"Samsung, Intel, Huawei, HiSilicon, Nokia, Nokia Shanghai Bell","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":490,"status":"revised","reservation_date":"2023-10-30 11:24:45","uploaded":"2023-10-30 12:55:49","revisionof":"","revisedto":"S3-235033","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1879.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234829.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234830","title":"Discussion paper on Selective SCG activation","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":990,"status":"noted","reservation_date":"2023-10-30 11:24:45","uploaded":"2023-10-30 12:56:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234830.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234831","title":"Security for Selective SCG Activation","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Samsung","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1000,"status":"not pursued","reservation_date":"2023-10-30 11:24:45","uploaded":"2023-10-30 12:57:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1880.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234831.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":true,"cn_affected":false,"clauses_affected":"6.10.2.X (new clause), Annex A.16","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234832","title":"Revocation procedure for RNAA","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Samsung","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":70,"status":"not pursued","reservation_date":"2023-10-30 11:24:46","uploaded":"2023-10-30 12:58:36","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"TEI18"}],"crnumber":49.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234832.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234854","title":"Guidance on mitigating privacy risk of variable length NAI-based SUPIs","source":"InterDigital Communications, Nokia","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"CR","for":"Agreement","abstract":"The FS_Id_Prvc study concluded that informative guidance on how operators can protect against the potential threat of anonymity set reduction in 5GS when using NAI-based SUPIs that are of variable length is recommended to be added to TS 33.501. \nThis CR i","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":48540,"status":"revised","reservation_date":"2023-10-30 12:01:26","uploaded":"2023-10-30 12:06:12","revisionof":"S3-234561","revisedto":"S3-234925","release":"Rel-19","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI19"}],"crnumber":1808.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234854.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234867","title":"Discussion SNAAPP-CAPIF RNAA authorization methods and related interfaces","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1090,"status":"noted","reservation_date":"2023-10-30 12:03:44","uploaded":"2023-10-30 13:41:50","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234867.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234868","title":"Detailed functional security model description for support of RNAA","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : SNAAPPY RNAA functional securty model description<br\/><br\/>Source modified on 10\/30\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":10,"status":"revised","reservation_date":"2023-10-30 12:03:44","uploaded":"2023-10-30 13:41:50","revisionof":"","revisedto":"S3-235104","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":50.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234868.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234879","title":"Correction of reference and related text","source":"Orange","contact":"Todor Gamishev","contact-id":58178,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":640,"status":"revised","reservation_date":"2023-10-30 12:27:50","uploaded":"2023-10-30 12:34:58","revisionof":"","revisedto":"S3-235020","release":"Rel-18","crspec":33.31,"crspecversion":"18.1.0","workitem":[{"winame":"TEI18"}],"crnumber":175.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234879.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234907","title":"Clarification for CAPIF-8","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Xiaomi communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2023-10-30 12:28:34","uploaded":"2023-10-30 14:36:40","revisionof":"","revisedto":"S3-235111","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":51.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234907.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.8, 5.2, 6.5.3.1, 6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234908","title":"Resolve EN related to authorization flow","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Xiaomi communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":160,"status":"revised","reservation_date":"2023-10-30 12:28:35","uploaded":"2023-10-30 14:36:40","revisionof":"","revisedto":"S3-235114","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":52.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234908.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.3.1.2, 6.5.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234909","title":"Streamline the Editor's Notes for RNAA","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Xiaomi communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":190,"status":"not pursued","reservation_date":"2023-10-30 12:28:35","uploaded":"2023-10-30 14:36:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":53.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234909.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.1, 6.5.3.2, 6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234910","title":"Update for authorization revocation procedure for RNAA","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Xiaomi communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":60,"status":"not pursued","reservation_date":"2023-10-30 12:28:36","uploaded":"2023-10-30 14:36:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":54.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234910.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234911","title":"Resolve EN related to API invoker ID and GPSI","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Xiaomi communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":80,"status":"not pursued","reservation_date":"2023-10-30 12:28:37","uploaded":"2023-10-30 14:36:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":55.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234911.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.2, 6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234912","title":"Routing indicator update issue in the A-KID construction procedure Release 17","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Xiaomi communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":330,"status":"not pursued","reservation_date":"2023-10-30 12:28:37","uploaded":"2023-10-30 14:36:40","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.535,"crspecversion":"17.9.0","workitem":[{"winame":"AKMA"}],"crnumber":196.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234912.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.1, 6.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234913","title":"Routing indicator update issue in the A-KID construction procedure Release 18 (mirror)","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Xiaomi communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":340,"status":"not pursued","reservation_date":"2023-10-30 12:28:46","uploaded":"2023-10-30 14:36:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.535,"crspecversion":"18.1.0","workitem":[{"winame":"AKMA"}],"crnumber":197.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234913.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.1, 6.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234915","title":"Correction of reference and related text","source":"Orange","contact":"Todor Gamishev","contact-id":58178,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":650,"status":"revised","reservation_date":"2023-10-30 12:31:09","uploaded":"2023-10-30 12:34:58","revisionof":"","revisedto":"S3-235021","release":"Rel-17","crspec":33.31,"crspecversion":"17.7.0","workitem":[{"winame":"TEI18"}],"crnumber":176.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234915.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234916","title":"Correction of reference and related text","source":"Orange UK","contact":"Todor Gamishev","contact-id":58178,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":660,"status":"revised","reservation_date":"2023-10-30 12:32:49","uploaded":"2023-10-30 12:34:58","revisionof":"","revisedto":"S3-235022","release":"Rel-16","crspec":33.31,"crspecversion":"16.14.0","workitem":[{"winame":"TEI18"}],"crnumber":177.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234916.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234920","title":"Correction to Figure 16.4-1","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"The figure is not available for all readers.","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":670,"status":"not pursued","reservation_date":"2023-10-30 12:43:09","uploaded":"2023-10-30 12:59:29","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"eNS2_SEC"}],"crnumber":1893.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234920.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"16.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234925","title":"Guidance on mitigating privacy risk of variable length NAI-based SUPIs","source":"InterDigital Communications, Nokia","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"CR","for":"Agreement","abstract":"The FS_Id_Prvc study concluded that informative guidance on how operators can protect against the potential threat of anonymity set reduction in 5GS when using NAI-based SUPIs that are of variable length is recommended to be added to TS 33.501. \nThis CR i","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":500,"status":"merged","reservation_date":"2023-10-30 12:50:06","uploaded":"2023-10-30 12:54:33","revisionof":"S3-234854","revisedto":"","release":"Rel-19","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI19"}],"crnumber":1808.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234925.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234926","title":"Discussion paper on 33.122 updates and responses for reply-LS on SNAAPPY","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":49260,"status":"noted","reservation_date":"2023-10-30 13:03:13","uploaded":"2023-10-30 13:41:50","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234926.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234927","title":"Correction to Figure 16.4-1","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"The figure is not available for all readers.","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":680,"status":"not pursued","reservation_date":"2023-10-30 13:09:56","uploaded":"2023-10-30 13:17:22","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"eNS2_SEC"}],"crnumber":1895.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234927.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"16.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234932","title":"Add the case of a failed AUTS verification in the UDM\/ARPF to the synchronization failure recovery of the Home Network","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":49320,"status":"revised","reservation_date":"2023-10-30 13:14:01","uploaded":null,"revisionof":"","revisedto":"S3-234957","release":"Rel-19","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI19"}],"crnumber":1897.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234933","title":"Establishing IPsec SAs for IAB inter-CU topology adaptation and backhaul RLF recovery procedure","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":510,"status":"not pursued","reservation_date":"2023-10-30 13:15:24","uploaded":"2023-10-30 13:34:46","revisionof":"S3-234703","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI17"}],"crnumber":1838.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234933.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":true,"cn_affected":false,"clauses_affected":"M.5, A.X (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234934","title":"Add the case of a failed AUTS verification in the  HE\/AuC to the re-synchronisation procedure","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":49340,"status":"revised","reservation_date":"2023-10-30 13:15:32","uploaded":null,"revisionof":"","revisedto":"S3-234958","release":"Rel-19","crspec":33.102,"crspecversion":"17.0.0","workitem":[{"winame":"TEI19"}],"crnumber":283.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234936","title":"Updating the FC values","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":520,"status":"not pursued","reservation_date":"2023-10-30 13:17:40","uploaded":"2023-10-30 13:34:46","revisionof":"S3-234705","revisedto":"","release":"Rel-17","crspec":33.22,"crspecversion":"17.4.0","workitem":[{"winame":"TEI17"}],"crnumber":226.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234936.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":true,"cn_affected":false,"clauses_affected":"B.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234938","title":"Updating the FC values","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":530,"status":"not pursued","reservation_date":"2023-10-30 13:19:36","uploaded":"2023-10-30 13:34:46","revisionof":"S3-234706","revisedto":"","release":"Rel-18","crspec":33.22,"crspecversion":"18.1.0","workitem":[{"winame":"TEI17"}],"crnumber":227.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234938.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":true,"cn_affected":false,"clauses_affected":"B.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234945","title":"resolving RNA stage 2 editor's notes","source":"NTT DOCOMO INC.","contact":"Alf Zugenmaier","contact-id":52494,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":49450,"status":"revised","reservation_date":"2023-10-30 13:25:48","uploaded":"2023-10-30 13:54:34","revisionof":"","revisedto":"S3-234961","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":56.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234945.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234957","title":"Add the case of a failed AUTS verification in the UDM\/ARPF to the synchronization failure recovery of the Home Network","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":760,"status":"not pursued","reservation_date":"2023-10-30 13:45:26","uploaded":"2023-10-30 13:49:21","revisionof":"S3-234932","revisedto":"","release":"Rel-19","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI19"}],"crnumber":1897.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234957.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.3.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234958","title":"Add the case of a failed AUTS verification in the  HE\/AuC to the re-synchronisation procedure","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":49580,"status":"revised","reservation_date":"2023-10-30 13:46:19","uploaded":"2023-10-30 13:49:27","revisionof":"S3-234934","revisedto":"S3-234959","release":"Rel-19","crspec":33.102,"crspecversion":"17.0.0","workitem":[{"winame":"TEI19"}],"crnumber":283.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234958.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234959","title":"Add the case of a failed AUTS verification in the  HE\/AuC to the re-synchronisation procedure","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":770,"status":"not pursued","reservation_date":"2023-10-30 13:50:23","uploaded":"2023-10-30 13:51:19","revisionof":"S3-234958","revisedto":"","release":"Rel-19","crspec":33.102,"crspecversion":"17.0.0","workitem":[{"winame":"TEI19"}],"crnumber":283.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234959.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.3.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234961","title":"Resolving stage 2 editor's notes","source":"NTT DOCOMO","contact":"Alf Zugenmaier","contact-id":52494,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 10\/30\/2023. Original title : resolving RNA stage 2 editor's notes<br\/><br\/>Source modified on 10\/30\/2023. Original source : NTT DOCOMO INC.","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":30,"status":"not pursued","reservation_date":"2023-10-30 13:58:59","uploaded":"2023-10-30 14:00:56","revisionof":"S3-234945","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":56.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234961.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.2, 6.5.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235020","title":"Correction of reference and related text","source":"Orange","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":641,"status":"agreed","reservation_date":"2023-08-11 09:13:27","uploaded":"2023-11-08 09:13:27","revisionof":"S3-234879","revisedto":"","release":"Rel-18","crspec":33.31,"crspecversion":"18.1.0","workitem":[{"winame":"TEI16"}],"crnumber":175.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-231341","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235020.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235021","title":"Correction of reference and related text","source":"Orange","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":651,"status":"agreed","reservation_date":"2023-08-11 09:13:27","uploaded":"2023-11-08 09:13:27","revisionof":"S3-234915","revisedto":"","release":"Rel-17","crspec":33.31,"crspecversion":"17.7.0","workitem":[{"winame":"TEI16"}],"crnumber":176.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-231341","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235021.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235022","title":"Correction of reference and related text","source":"Orange UK","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":661,"status":"agreed","reservation_date":"2023-08-11 09:13:27","uploaded":"2023-11-08 09:13:27","revisionof":"S3-234916","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.14.0","workitem":[{"winame":"TEI16"}],"crnumber":177.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231341","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235022.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235032","title":"[IAB][Rel-17] IAB inter-CU topology adaptation procedure","source":"Samsung, Intel, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":481,"status":"agreed","reservation_date":"2023-10-11 14:29:15","uploaded":"2023-11-10 14:29:15","revisionof":"S3-234828","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"TEI17"}],"crnumber":1878.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235032.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235033","title":"[IAB][Rel-18] IAB inter-CU topology adaptation procedure","source":"Samsung, Intel, Huawei, HiSilicon, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":491,"status":"agreed","reservation_date":"2023-10-11 14:29:15","uploaded":"2023-11-10 14:29:15","revisionof":"S3-234829","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI17"}],"crnumber":1879.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-231342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235033.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235038","title":"Reuse error code during home network triggered primary authentication procedure","source":"ZTE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":381,"status":"agreed","reservation_date":"2023-10-11 11:42:56","uploaded":"2023-11-10 11:42:56","revisionof":"S3-234596","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1813.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231332","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235038.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235039","title":"Clarify AMF responses in HONTRA procedure.","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":391,"status":"withdrawn","reservation_date":"2023-11-24 16:07:47","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1814.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235040","title":"clarification for HONTRA procedure","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":411,"status":"agreed","reservation_date":"2023-10-11 15:18:39","uploaded":"2023-11-10 15:18:39","revisionof":"S3-234655","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1830.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231332","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235040.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235041","title":"Callback URI clarification and API correction","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":451,"status":"withdrawn","reservation_date":"2023-11-24 16:07:49","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1793.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235042","title":"Replace reference to IETF draft-emu-eap-tls13 in annex B with RFC 9190","source":"CableLabs","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":721,"status":"agreed","reservation_date":"2023-08-11 09:13:27","uploaded":"2023-11-08 09:13:27","revisionof":"S3-234575","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1809.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231343","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235042.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235045","title":"Removing GUTI from Registration Reject","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":45361,"status":"agreed","reservation_date":"2023-10-11 15:06:15","uploaded":"2023-11-10 15:06:15","revisionof":"S3-234536","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"5WWC_Ph2_Sec"}],"crnumber":1794.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231324","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235045.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235046","title":"NULL encryption clarification","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":45371,"status":"agreed","reservation_date":"2023-10-11 15:06:15","uploaded":"2023-11-10 15:06:15","revisionof":"S3-234537","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"5WWC_Ph2_Sec"}],"crnumber":1795.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231324","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235046.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235047","title":"UPU Header Security","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":1021,"status":"withdrawn","reservation_date":"2023-11-24 16:07:57","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"},{"winame":" 5GS_Ph1-SEC"}],"crnumber":1896.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235048","title":"AUSF sends back MSK to W-AGF after successful EAP authentication","source":"CableLabs","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":581,"status":"agreed","reservation_date":"2023-10-11 14:25:21","uploaded":"2023-11-10 14:25:21","revisionof":"S3-234577","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1810.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231343","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235048.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235052","title":"Handling of SoR\/UPU Counter stored in NVM","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":611,"status":"agreed","reservation_date":"2023-10-11 15:11:22","uploaded":"2023-11-10 15:11:22","revisionof":"S3-234708","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1746.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-231343","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235052.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235058","title":"Guidance on mitigating privacy risk of variable length NAI based SUPIs","source":"Ericsson, Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":471,"status":"agreed","reservation_date":"2023-10-11 14:25:21","uploaded":"2023-11-10 14:25:21","revisionof":"S3-234772","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1861.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231343","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235058.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235059","title":"Clarification on resource owner ID","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":91,"status":"agreed","reservation_date":"2023-10-11 14:51:27","uploaded":"2023-11-10 14:51:27","revisionof":"S3-234786","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":46.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231340","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235059.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235060","title":"Clarification on the scope of the Rel-18 RNAA specification","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":201,"status":"withdrawn","reservation_date":"2023-11-24 16:08:09","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":47.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235064","title":"Identification of RNAA token","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":151,"status":"withdrawn","reservation_date":"2023-11-24 16:08:13","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":44.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235065","title":"Optimizations for accessing own resources","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":181,"status":"withdrawn","reservation_date":"2023-11-24 16:08:14","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":45.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235080","title":"Editorial corrections to TS 33.535 in R17","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":281,"status":"agreed","reservation_date":"2023-10-11 11:42:56","uploaded":"2023-11-10 11:42:56","revisionof":"S3-234591","revisedto":"","release":"Rel-17","crspec":33.535,"crspecversion":"17.9.0","workitem":[{"winame":"AKMA"}],"crnumber":190.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231326","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235080.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235081","title":"Editorial corrections to TS 33.535 in R18","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":291,"status":"agreed","reservation_date":"2023-10-11 11:42:56","uploaded":"2023-11-10 11:42:56","revisionof":"S3-234592","revisedto":"","release":"Rel-18","crspec":33.535,"crspecversion":"18.1.0","workitem":[{"winame":"AKMA"}],"crnumber":191.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-231326","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235081.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235082","title":"N3IWF procedure clarification","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":571,"status":"agreed","reservation_date":"2023-10-11 15:06:15","uploaded":"2023-11-10 15:06:15","revisionof":"S3-234541","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":1799.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231343","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235082.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235100","title":"Updates to Security for Selective SCG Activation","source":"Intel","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":961,"status":"approved","reservation_date":"2023-10-11 11:42:56","uploaded":"2023-11-10 11:42:56","revisionof":"S3-234666","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"18.3.0","workitem":[{"winame":"TEI18"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235100.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235104","title":"Detailed functional security model description for support of RNAA","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":11,"status":"agreed","reservation_date":"2023-10-11 15:06:15","uploaded":"2023-11-10 15:06:15","revisionof":"S3-234868","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":50.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231340","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235104.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235111","title":"Clarification for CAPIF-8","source":"Xiaomi,Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":21,"status":"agreed","reservation_date":"2023-10-11 14:51:27","uploaded":"2023-11-10 14:51:27","revisionof":"S3-234907","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":51.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231340","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235111.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235113","title":"Correction on authentication and authorization for RNAA","source":"Huawei, HiSilicon,Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":101,"status":"agreed","reservation_date":"2023-10-11 15:06:15","uploaded":"2023-11-10 15:06:15","revisionof":"S3-234618","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":39.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231340","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235113.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235114","title":"Resolve EN related to authorization flow","source":"Xiaomi,Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":161,"status":"agreed","reservation_date":"2023-10-11 14:51:27","uploaded":"2023-11-10 14:51:27","revisionof":"S3-234908","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":52.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231340","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235114.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235115","title":"Access token profile for RNAA","source":"Huawei, HiSilicon,Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":121,"status":"agreed","reservation_date":"2023-10-11 15:06:15","uploaded":"2023-11-10 15:06:15","revisionof":"S3-234620","revisedto":"","release":"Rel-18","crspec":33.122,"crspecversion":"18.1.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":41.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231340","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235115.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]