[{"name":"S3-223221","title":"Conclusion for KI#1","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":70,"status":"noted","reservation_date":"2022-11-04 14:15:46","uploaded":"2022-11-07 14:01:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-223221.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223222","title":"Evaluation Update of Solution #2","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":20,"status":"noted","reservation_date":"2022-11-04 14:17:07","uploaded":"2022-11-07 14:01:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-223222.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223550","title":"Updates to evalution of solution 2","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":30,"status":"noted","reservation_date":"2022-11-07 06:12:53","uploaded":"2022-11-07 12:03:10","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-223550.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223576","title":"Solution on prevention of URSP rule misuse by a non-genuine application using home network anchor","source":"Intel","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":60,"status":"revised","reservation_date":"2022-11-07 08:11:41","uploaded":"2022-11-07 09:17:11","revisionof":"","revisedto":"S3-224177","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-223576.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223799","title":"Proposal for a KI on injection of authentication data","source":"Nokia, Nokia Shanghai Bell","contact":"Bo Holm Bjerrum","contact-id":80370,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":10,"status":"withdrawn","reservation_date":"2022-11-07 11:38:15","uploaded":"2022-11-07 12:02:52","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-223799.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223802","title":"Resolution to editor\u2019s note in solution 1 concerning threat mitigation","source":"Nokia, Nokia Shanghai Bell","contact":"Bo Holm Bjerrum","contact-id":80370,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":40,"status":"noted","reservation_date":"2022-11-07 11:38:15","uploaded":"2022-11-07 12:02:52","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-223802.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223803","title":"Resolution to editor\u2019s note in solution 1 concerning the provisioning of security material","source":"Nokia, Nokia Shanghai Bell","contact":"Bo Holm Bjerrum","contact-id":80370,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":50,"status":"noted","reservation_date":"2022-11-07 11:38:15","uploaded":"2022-11-07 12:02:52","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-223803.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-224177","title":"Solution on prevention of URSP rule misuse by a non-genuine application using home network anchor","source":"Intel","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":61,"status":"approved","reservation_date":"2022-11-18 15:39:49","uploaded":"2022-11-18 15:39:49","revisionof":"S3-223576","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-224177.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-224180","title":"Draft TR 33.892","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":418000,"status":"approved","reservation_date":"2022-11-23 12:37:53","uploaded":"2022-11-23 12:37:53","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.4.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_109\/Docs\/S3-224180.zip","group":"S3","meeting":"S3-109","year":2022,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]