[{"name":"S3-220727","title":"Security improvements of N32 connection","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":10,"status":"noted","reservation_date":"2022-05-08 21:58:57","uploaded":"2022-05-09 09:18:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220727.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220730","title":"Resolution EN authorization method negotiation per KI7-Sol9","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":90,"status":"noted","reservation_date":"2022-05-08 21:59:01","uploaded":"2022-05-09 09:18:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220730.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220732","title":"New sol. for KI7 on authorization mechanism negotiation","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":100,"status":"noted","reservation_date":"2022-05-08 21:59:02","uploaded":"2022-05-09 09:18:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220732.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220733","title":"Conclusion on authorization method negotiation","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":110,"status":"noted","reservation_date":"2022-05-08 21:59:02","uploaded":"2022-05-09 09:18:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220733.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220910","title":"Rapporteur update to TR 33.875","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":120,"status":"approved","reservation_date":"2022-05-09 07:45:05","uploaded":"2022-05-09 09:18:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"FS_eSBA_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220910.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220931","title":"Trust in SEPP deployment scenarios","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":40,"status":"noted","reservation_date":"2022-05-09 08:32:03","uploaded":"2022-05-09 09:18:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220931.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220932","title":"Update to KI on roaming hub","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":20,"status":"approved","reservation_date":"2022-05-09 08:32:03","uploaded":"2022-05-09 09:18:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220932.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220933","title":"Requirement to KI on roaming hub","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":30,"status":"revised","reservation_date":"2022-05-09 08:32:03","uploaded":"2022-05-09 09:18:39","revisionof":"","revisedto":"S3-221287","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220933.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220955","title":"New KI, NRF validation of NFc for access token requests","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":60,"status":"approved","reservation_date":"2022-05-09 08:46:23","uploaded":"2022-05-09 11:58:05","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"FS_eSBA_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220955.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221096","title":"Update of Solution #12","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":70,"status":"revised","reservation_date":"2022-05-09 11:24:35","uploaded":"2022-05-09 11:45:10","revisionof":"","revisedto":"S3-221232","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"FS_eSBA_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221096.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221097","title":"Update of Solution #9","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2022-05-09 11:24:35","uploaded":"2022-05-09 11:45:10","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"FS_eSBA_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221097.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221136","title":"New KI for Authentication of PLMNs over IPX","source":"CableLabs","contact":"Tao Wan","contact-id":79074,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":50,"status":"noted","reservation_date":"2022-05-09 13:51:06","uploaded":"2022-05-09 13:53:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"FS_eSBA_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221136.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221232","title":"Update of Solution #12","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":12320,"status":"approved","reservation_date":"2022-05-23 03:21:52","uploaded":"2022-05-23 06:45:59","revisionof":"S3-221096","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"FS_eSBA_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221232.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221280","title":"TR 33.875-120","source":"Nokia UK","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":12800,"status":"approved","reservation_date":"2022-05-23 10:27:20","uploaded":"2022-05-26 06:11:09","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.875,"crspecversion":"1.2.0","workitem":[{"winame":"FS_eSBA_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221280.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221287","title":"Requirement to KI on roaming hub","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.4","ainame":"Study on enhanced Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":31,"status":"approved","reservation_date":"2022-05-23 10:48:58","uploaded":"2022-05-23 15:11:13","revisionof":"S3-220933","revisedto":"","release":"Rel-18","crspec":33.875,"crspecversion":"1.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221287.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221329","title":"New solution for Key issue #1","source":"InterDigital, Inc.","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This new solution proposes a padding mechanism to protect the privacy of variable length SUPIs in NAI format.","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":70,"status":"noted","reservation_date":"2022-06-17 17:42:12","uploaded":"2022-06-19 14:55:57","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221329.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221340","title":"New key issue on users identified by Priority Access","source":"Johns Hopkins University APL, US National Security Agency, CISA ECD, Peraton Labs, Interdigital, Apple","contact":"Cherita Corbett","contact-id":81947,"tdoctype":"pCR","for":"Approval","abstract":"New key issue on users identified by Priority Access","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":10,"status":"revised","reservation_date":"2022-06-18 15:09:05","uploaded":"2022-06-18 15:12:37","revisionof":"","revisedto":"S3-221642","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221340.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221378","title":"Solution for Privacy aspects of variable length user identifiers","source":"Nokia Japan","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":90,"status":"noted","reservation_date":"2022-06-20 06:25:48","uploaded":"2022-06-20 12:03:26","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221378.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221410","title":"New solution for key issue 1","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":100,"status":"noted","reservation_date":"2022-06-20 06:42:06","uploaded":"2022-06-20 12:31:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221410.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221431","title":"SUPI padding solution on Key issue #1","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2022-06-20 06:53:50","uploaded":"2022-06-20 09:07:41","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221431.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221460","title":"Padding-based solution to the leakage of the length of SUPI through SUCI.","source":"Ericsson LM","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":40,"status":"noted","reservation_date":"2022-06-20 08:28:35","uploaded":"2022-06-20 09:37:07","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221460.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221462","title":"Hash-based solution to the leakage of the length of SUPI through SUCI","source":"Ericsson LM","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":50,"status":"noted","reservation_date":"2022-06-20 08:35:22","uploaded":"2022-06-20 09:38:31","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221462.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221463","title":"Map-based solution to the leakage of the length of SUPI through SUCI","source":"Ericsson LM","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":60,"status":"noted","reservation_date":"2022-06-20 08:36:55","uploaded":"2022-06-20 09:39:52","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221463.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221465","title":"IDPrvc - Security issue on C-RNTI","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":35,"status":"noted","reservation_date":"2022-06-20 08:44:20","uploaded":"2022-06-20 11:18:08","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.1.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221465.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221517","title":"Scope of SUPI Type IMSI in KI#1","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":20,"status":"noted","reservation_date":"2022-06-20 11:27:01","uploaded":"2022-06-20 12:08:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221517.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221518","title":"Addition of threats due to EAP in KI#1","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":30,"status":"noted","reservation_date":"2022-06-20 11:27:01","uploaded":"2022-06-20 12:08:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221518.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221641","title":"New key issue on users identified by Priority Access","source":"InterDigital, Inc.","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"The specification of multiple priority establishment causes provides an attacker with more detail to distinguish different types of priority subscribers.  This PCR adds a new KI for studying such threats.","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":16410,"status":"withdrawn","reservation_date":"2022-07-03 14:08:16","uploaded":"2022-07-03 14:16:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221641.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221642","title":"New key issue on users identified by Priority Access","source":"Johns Hopkins University APL, US National Security Agency, CISA ECD, Peraton Labs, Interdigital, Apple, CableLabs","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"The specification of multiple priority establishment causes provides an attacker with more detail to distinguish different types of priority subscribers.  This PCR adds a new KI for studying such threats.","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":16420,"status":"approved","reservation_date":"2022-07-03 14:20:04","uploaded":"2022-07-03 14:22:46","revisionof":"S3-221340","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.2.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221642.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221696","title":"TR 33.870","source":"InterDigital, Inc.","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"5.4","ainame":"Study on privacy of identifiers over radio access","tdoc_agenda_sort_order":16960,"status":"approved","reservation_date":"2022-07-05 11:30:42","uploaded":"2022-07-06 18:37:06","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.87,"crspecversion":"0.3.0","workitem":[{"winame":"FS_Id_Prvc"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221696.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]