[{"name":"S3-210004","title":"AMF transparency for SOR","source":"C1-207736","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2300,"status":"postponed","reservation_date":"2020-12-21 11:07:56","uploaded":"2020-12-21 14:38:50","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210004.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210005","title":"LS on Storage of KAUSF","source":"C1-207764","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":400,"status":"replied to","reservation_date":"2020-12-21 11:07:58","uploaded":"2020-12-21 14:38:50","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-210706","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210005.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210025","title":"LS on Changes to SoR Delivery Mechanism","source":"C4-205696","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2400,"status":"postponed","reservation_date":"2020-12-21 11:07:58","uploaded":"2020-12-21 14:38:49","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210025.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210030","title":"LS on integrity and confidentiality protection of xcap-diff and pidf documents in MCPTT (TS 24.379)","source":"R5- 206273","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":900,"status":"noted","reservation_date":"2020-12-21 11:07:58","uploaded":"2020-12-21 14:38:49","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210030.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210053","title":"[33.180] R14 RFC3830 reference correction","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"This CR corrects the RFC3830 reference in 33.180 to match 33.179 which maintains backward compatibility.","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1000,"status":"agreed","reservation_date":"2021-01-05 16:48:54","uploaded":"2021-01-09 22:35:05","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.8.0","workitem":[{"winame":"MCSec"}],"crnumber":155.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-210108","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210053.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210054","title":"[33.180] R15 RFC3830 reference correction (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"This mirror CR corrects the RFC3830 reference in 33.180 to match 33.179 and maintains backward compatibility.","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1100,"status":"agreed","reservation_date":"2021-01-05 16:52:35","uploaded":"2021-01-09 22:35:05","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.8.0","workitem":[{"winame":"MCSec"}],"crnumber":156.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210108","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210054.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210055","title":"[33.180] R16 RFC3830 reference correction (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"This mirror CR corrects the RFC3830 reference in 33.180 to match 33.179 and maintains backward compatibility.","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1200,"status":"agreed","reservation_date":"2021-01-05 16:55:46","uploaded":"2021-01-09 22:35:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.5.0","workitem":[{"winame":"MCSec"}],"crnumber":157.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210108","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210055.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210056","title":"[33.180] R17 RFC3830 reference correction (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"This mirror CR corrects the RFC3830 reference in 33.180 to match 33.179 and maintains backward compatibility.","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1300,"status":"agreed","reservation_date":"2021-01-05 16:59:11","uploaded":"2021-01-09 22:35:05","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.18,"crspecversion":"17.1.0","workitem":[{"winame":"MCSec"}],"crnumber":158.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210108","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210056.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210057","title":"[33.180] R14 XML encryption correction","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Correct xmlenc note in clause 9.3.4.1.","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1400,"status":"agreed","reservation_date":"2021-01-05 17:04:59","uploaded":"2021-01-09 22:35:05","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.8.0","workitem":[{"winame":"MCSec"}],"crnumber":159.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-210108","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210057.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210058","title":"[33.180] R15 XML encryption correction (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Correct the xmlenc note in 9.3.4.1","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1500,"status":"agreed","reservation_date":"2021-01-05 17:07:51","uploaded":"2021-01-09 22:35:05","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.8.0","workitem":[{"winame":"MCSec"}],"crnumber":160.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210108","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210058.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210059","title":"[33.180] R16 XML encryption correction (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Correct the xmlenc note in 9.3.4.1.","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1600,"status":"agreed","reservation_date":"2021-01-05 17:10:14","uploaded":"2021-01-09 22:35:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.5.0","workitem":[{"winame":"MCSec"}],"crnumber":161.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210108","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210059.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210060","title":"[33.180] R17 XML encryption correction (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Correct the xmlenc note in 9.3.4.1.","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1700,"status":"agreed","reservation_date":"2021-01-05 17:13:05","uploaded":"2021-01-09 22:35:05","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.18,"crspecversion":"17.1.0","workitem":[{"winame":"MCSec"}],"crnumber":162.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210108","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210060.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210073","title":"Correct NAS uplink COUNT for KgNB\/KeNB derivation","source":"MediaTek Inc.","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1900,"status":"agreed","reservation_date":"2021-01-07 11:07:58","uploaded":"2021-01-11 13:08:49","revisionof":"S3-202947","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":962.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-210109","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210073.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210141","title":"Authentication procedure during Xn handover procedure","source":"NEC","contact":"Kundan Tiwari","contact-id":76330,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1800,"status":"not pursued","reservation_date":"2021-01-11 02:05:21","uploaded":"2021-01-11 08:33:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":1029.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210141.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210144","title":"DISC Handling of latest Kasuf","source":"NEC","contact":"Kundan Tiwari","contact-id":76330,"tdoctype":"discussion","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":200,"status":"noted","reservation_date":"2021-01-11 02:29:43","uploaded":"2021-01-11 14:19:27","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210144.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210146","title":"Maintaining latest Kausf","source":"NEC","contact":"Kundan Tiwari","contact-id":76330,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":300,"status":"not pursued","reservation_date":"2021-01-11 02:33:27","uploaded":"2021-01-11 13:05:18","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":1030.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210146.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210279","title":"Authentication procedure during Xn handover procedure","source":"NEC","contact":"Kundan Tiwari","contact-id":76330,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":1900,"status":"not pursued","reservation_date":"2021-01-11 08:21:20","uploaded":"2021-01-11 08:33:40","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.0.0","workitem":[{"winame":"TEI16"}],"crnumber":1039.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210279.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210294","title":"Clarification on security protection in AMF reallocation(direct NAS reroute)","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2000,"status":"revised","reservation_date":"2021-01-11 08:32:47","uploaded":"2021-01-11 13:59:56","revisionof":"","revisedto":"S3-210743","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1040.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210294.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210326","title":"Correct current uplink EPS NAS COUNT used at derivation of a mapped 5G security context","source":"MediaTek Inc.","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2100,"status":"revised","reservation_date":"2021-01-11 09:40:13","uploaded":"2021-01-11 13:09:17","revisionof":"","revisedto":"S3-210787","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":1041.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210326.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210350","title":"DP on loop registration in CAG","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2700,"status":"noted","reservation_date":"2021-01-11 10:16:07","uploaded":"2021-01-11 11:10:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210350.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210351","title":"LS on loop registration in CAG","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2600,"status":"noted","reservation_date":"2021-01-11 10:16:07","uploaded":"2021-01-11 11:10:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2, CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210351.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210367","title":"LS reply on changes to SoR delivery mechanims","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2500,"status":"noted","reservation_date":"2021-01-11 10:16:08","uploaded":"2021-01-11 11:03:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT4","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210367.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210415","title":"Correcting notation used for inter-AMF mobility key derivation","source":"MediaTek Inc.","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2200,"status":"revised","reservation_date":"2021-01-11 10:41:20","uploaded":"2021-01-11 13:08:26","revisionof":"S3-202948","revisedto":"S3-210782","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":963.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210415.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210445","title":"Correction to FC values in range for future use in 3GPP specifications","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":3000,"status":"agreed","reservation_date":"2021-01-11 11:45:04","uploaded":"2021-01-11 13:24:36","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1056.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210445.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210449","title":"Discussion on MitM attack","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2800,"status":"noted","reservation_date":"2021-01-11 11:45:06","uploaded":"2021-01-11 13:24:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"TEI16"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210449.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210450","title":"CR for identification of MitM attack","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":2900,"status":"not pursued","reservation_date":"2021-01-11 11:45:06","uploaded":"2021-01-11 13:24:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":1057.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210450.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210451","title":"CR for correction in SEAL","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":3100,"status":"revised","reservation_date":"2021-01-11 11:45:07","uploaded":"2021-01-11 13:24:36","revisionof":"","revisedto":"S3-210707","release":"Rel-16","crspec":33.434,"crspecversion":"16.1.0","workitem":[{"winame":"SEAL"}],"crnumber":3.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210451.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210459","title":"LS on Reply LS on Storage of KAUSF from CT1","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":500,"status":"revised","reservation_date":"2021-01-11 11:45:11","uploaded":"2021-01-11 13:24:36","revisionof":"","revisedto":"S3-210706","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"TEI16"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-210005","lsto":"CT1","Cc":"","lsoriginalls":"C1-207764","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210459.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210460","title":"Handling of KAUSF upon successful primary authentication","source":"Samsung, Nokia, Nokia Shanghai Bell, Intel","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":600,"status":"not pursued","reservation_date":"2021-01-11 11:45:11","uploaded":"2021-01-11 13:24:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":1060.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210460.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210472","title":"Discussion on K_AUSF handling","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":100,"status":"noted","reservation_date":"2021-01-11 12:45:15","uploaded":"2021-01-11 14:37:54","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210472.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210477","title":"Profiling the GBA TLS protocols for use with AKMA","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":0,"status":"not pursued","reservation_date":"2021-01-11 12:45:15","uploaded":"2021-01-11 14:37:54","revisionof":"","revisedto":"S3-211785","release":"Rel-17","crspec":33.535,"crspecversion":"17.0.0","workitem":[{"winame":"AKMA_TLS"}],"crnumber":66.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210477.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210478","title":"Adding references to AKMA profiles of Ua protocols","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":800,"status":"not pursued","reservation_date":"2021-01-11 12:45:16","uploaded":"2021-01-11 14:22:12","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.222,"crspecversion":"16.1.0","workitem":[{"winame":"DUMMY"}],"crnumber":53.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210478.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210706","title":"LS on Reply LS on Storage of KAUSF from CT1","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7060,"status":"approved","reservation_date":"2021-01-29 12:04:46","uploaded":"2021-01-29 12:31:58","revisionof":"S3-210459","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"TEI16"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-210005","lsto":"CT1, CT4","Cc":"","lsoriginalls":"C1-207764","lsreply":"C1-210737, C1-211338, C1-211516, C1-211518","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210706.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210707","title":"CR for correction in SEAL","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7070,"status":"agreed","reservation_date":"2021-01-29 12:08:37","uploaded":"2021-01-29 12:31:58","revisionof":"S3-210451","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"16.1.0","workitem":[{"winame":"SEAL"}],"crnumber":3.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-210112","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210707.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210743","title":"Clarification on security protection in AMF reallocation(direct NAS reroute)","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7430,"status":"agreed","reservation_date":"2021-01-30 02:08:52","uploaded":"2021-01-30 07:41:54","revisionof":"S3-210294","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":1040.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-210109","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210743.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210782","title":"Correcting notation used for inter-AMF mobility key derivation","source":"MediaTek Inc.","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7820,"status":"agreed","reservation_date":"2021-02-01 09:42:07","uploaded":"2021-02-01 10:00:02","revisionof":"S3-210415","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":963.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-210109","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210782.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210785","title":"Correcting notation used for inter-AMF mobility key derivation","source":"MediaTek Inc. \/ Marko","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7850,"status":"agreed","reservation_date":"2021-02-01 09:56:44","uploaded":"2021-02-01 10:00:02","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.0.0","workitem":[{"winame":"TEI16"}],"crnumber":1074.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210109","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210785.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210786","title":"Correct NAS uplink COUNT for KgNB\/KeNB derivation","source":"MediaTek Inc. \/ Marko","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7860,"status":"agreed","reservation_date":"2021-02-01 10:03:44","uploaded":"2021-02-01 10:12:25","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.0.0","workitem":[{"winame":"TEI16"}],"crnumber":1075.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210109","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210786.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210787","title":"Correct current uplink EPS NAS COUNT used at derivation of a mapped 5G security context","source":"MediaTek Inc. \/ Marko","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7870,"status":"agreed","reservation_date":"2021-02-01 10:14:51","uploaded":"2021-02-01 10:27:30","revisionof":"S3-210326","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.5.0","workitem":[{"winame":"TEI16"}],"crnumber":1041.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-210109","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210787.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210788","title":"Correct current uplink EPS NAS COUNT used at derivation of a mapped 5G security context","source":"MediaTek Inc. \/ Marko","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7880,"status":"agreed","reservation_date":"2021-02-01 10:20:19","uploaded":"2021-02-01 10:27:30","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.0.0","workitem":[{"winame":"TEI16"}],"crnumber":1076.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210109","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210788.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-210799","title":"Mirror_Clarification on security protection in AMF reallocation","source":"Huawei, HiSilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"4.23","ainame":"Other work areas (no release restrictions)","tdoc_agenda_sort_order":7990,"status":"agreed","reservation_date":"2021-02-04 08:25:32","uploaded":"2021-02-04 08:29:13","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.0.0","workitem":[{"winame":"TEI16"}],"crnumber":1079.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-210109","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_102e\/Docs\/S3-210799.zip","group":"S3","meeting":"S3-102-e","year":2021,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]