[{"name":"S3-220708","title":"New KI on Home network triggered primary authentication","source":"China Telecomunication Corp.","contact":"JinHui Li","contact-id":95811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":110,"status":"merged","reservation_date":"2022-05-07 07:16:15","uploaded":"2022-05-08 11:54:48","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220708.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220819","title":"A use case of HONTRA in SoR protection service suspension","source":"LG Electronics France","contact":"Anbin Kim","contact-id":93429,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":50,"status":"merged","reservation_date":"2022-05-09 05:48:23","uploaded":"2022-05-09 06:23:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220819.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220820","title":"A Key issue in SoR protection service suspension","source":"LG Electronics France","contact":"Anbin Kim","contact-id":93429,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":130,"status":"merged","reservation_date":"2022-05-09 05:48:23","uploaded":"2022-05-09 06:23:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220820.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220821","title":"A use case of HONTRA in UPU protection service suspension","source":"LG Electronics France","contact":"Anbin Kim","contact-id":93429,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2022-05-09 05:48:23","uploaded":"2022-05-09 06:23:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220821.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220822","title":"A Key issue in UPU protection service suspension","source":"LG Electronics France","contact":"Anbin Kim","contact-id":93429,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":120,"status":"merged","reservation_date":"2022-05-09 05:48:23","uploaded":"2022-05-09 06:23:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220822.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220831","title":"Skeleton of HNTRA","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":10,"status":"approved","reservation_date":"2022-05-09 06:30:36","uploaded":"2022-05-09 12:53:55","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220831.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220832","title":"Scope of HNTRA","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":20,"status":"approved","reservation_date":"2022-05-09 06:30:36","uploaded":"2022-05-09 12:53:55","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220832.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220833","title":"Adding a usecase of  interworking from EPS to 5G","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":30,"status":"merged","reservation_date":"2022-05-09 06:30:37","uploaded":"2022-05-09 12:53:55","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220833.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220834","title":"KI on Scalability of the home triggered primary authentication","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":140,"status":"revised","reservation_date":"2022-05-09 06:30:37","uploaded":"2022-05-09 12:53:55","revisionof":"","revisedto":"S3-221239","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220834.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220835","title":"Adding a usecase of Kakma refresh","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2022-05-09 06:30:37","uploaded":"2022-05-09 12:53:55","revisionof":"","revisedto":"S3-221240","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220835.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220836","title":"KI on Signalling overhead","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":200,"status":"merged","reservation_date":"2022-05-09 06:30:37","uploaded":"2022-05-09 12:53:55","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220836.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220892","title":"Adding a usecase of SoR Counter Wrap around","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2022-05-09 06:31:01","uploaded":"2022-05-09 12:58:16","revisionof":"","revisedto":"S3-221261","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220892.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220903","title":"Key issue on KAF refresh without primary reauthentication","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":210,"status":"revised","reservation_date":"2022-05-09 07:12:27","uploaded":"2022-05-09 07:33:59","revisionof":"","revisedto":"S3-221219","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220903.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220904","title":"Key issue on HN triggering primary reauthentication","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":150,"status":"merged","reservation_date":"2022-05-09 07:12:27","uploaded":"2022-05-09 07:33:59","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220904.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-220905","title":"Reauthentication during the handover","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":160,"status":"merged","reservation_date":"2022-05-09 07:13:58","uploaded":"2022-05-09 07:18:14","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-220905.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221041","title":"Key Issue on Refresh of Long Lived Key KAUSF","source":"Beijing Xiaomi Mobile Software","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":170,"status":"merged","reservation_date":"2022-05-09 10:40:11","uploaded":"2022-05-09 13:15:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221041.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221042","title":"Key Issue on Security of Interworking","source":"Beijing Xiaomi Mobile Software","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":180,"status":"merged","reservation_date":"2022-05-09 10:40:11","uploaded":"2022-05-09 13:15:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221042.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221043","title":"New Use Case for Continuity of Steering of Roaming Service Delivery","source":"Beijing Xiaomi Mobile Software","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":70,"status":"merged","reservation_date":"2022-05-09 10:40:11","uploaded":"2022-05-09 13:15:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221043.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221044","title":"New Use Case for Continuity of UE Parameters Update Service Delivery","source":"Beijing Xiaomi Mobile Software","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":80,"status":"merged","reservation_date":"2022-05-09 10:40:11","uploaded":"2022-05-09 13:15:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221044.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221045","title":"New Use Case for Security of Interworking","source":"Beijing Xiaomi Mobile Software","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2022-05-09 10:40:11","uploaded":"2022-05-09 13:15:40","revisionof":"","revisedto":"S3-221205","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221045.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221083","title":"HN-auth-NAS based HN triggered authentication","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":130,"status":"noted","reservation_date":"2022-05-09 11:20:42","uploaded":"2022-05-09 11:57:30","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221083.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221093","title":"Adding a key issue of Multiple registrations","source":"Huawei,HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":220,"status":"noted","reservation_date":"2022-05-09 11:24:35","uploaded":"2022-05-09 11:52:30","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221093.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221125","title":"New Key issue on HN initiated Re-authentication","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":190,"status":"merged","reservation_date":"2022-05-09 12:51:28","uploaded":"2022-05-09 14:13:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221125.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221126","title":"New Solution on UDM initiated re-authentication based on AUSF request","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":140,"status":"noted","reservation_date":"2022-05-09 12:51:28","uploaded":"2022-05-09 14:13:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221126.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221127","title":"New solution on HN initiated re-authentication via AUSF","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":150,"status":"noted","reservation_date":"2022-05-09 12:51:28","uploaded":"2022-05-09 14:13:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221127.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221128","title":"New solution on UDM triggered  key update procecdure based on AAnF request","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":160,"status":"noted","reservation_date":"2022-05-09 12:51:28","uploaded":"2022-05-09 14:13:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221128.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221129","title":"New solution on UPU based re-authentication procedure","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":170,"status":"noted","reservation_date":"2022-05-09 12:51:28","uploaded":"2022-05-09 14:13:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221129.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221205","title":"New Use Case for Security of Interworking","source":"Beijing Xiaomi Mobile Software","contact":"zhengyi shang","contact-id":95447,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":12050,"status":"approved","reservation_date":"2022-05-21 13:41:33","uploaded":"2022-05-21 13:48:44","revisionof":"S3-221045","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221205.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221219","title":"Key issue on KAF refresh without primary reauthentication","source":"Nokia, Nokia Shanghai Bell, Huawei, HiSilicon, OPPO","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":12190,"status":"approved","reservation_date":"2022-05-22 13:35:17","uploaded":"2022-05-22 14:33:10","revisionof":"S3-220903","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221219.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221239","title":"KI on Scalability of the home triggered primary authentication","source":"Huawei, HiSilicon, China telecom, LG Electronics, Nokia, Nokia Shanghai Bell, Beijing Xiaomi Mobile Software, Samsung","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":12390,"status":"approved","reservation_date":"2022-05-23 03:44:46","uploaded":"2022-05-23 09:30:03","revisionof":"S3-220834","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221239.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221240","title":"Adding a usecase of Kakma refresh","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":12400,"status":"approved","reservation_date":"2022-05-23 03:44:46","uploaded":"2022-05-23 09:30:03","revisionof":"S3-220835","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221240.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221261","title":"Adding a usecase of SoR Counter Wrap around","source":"Huawei, HiSilicon, LG Electronics France, Beijing Xiaomi Mobile Software","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":12610,"status":"approved","reservation_date":"2022-05-23 03:44:51","uploaded":"2022-05-23 09:30:03","revisionof":"S3-220892","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221261.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221264","title":"TR 33.741","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"5.9","ainame":"New Study of Security aspect of home network triggered primary authentication","tdoc_agenda_sort_order":12640,"status":"approved","reservation_date":"2022-05-23 03:48:57","uploaded":"2022-05-27 01:20:22","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.1.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e\/Docs\/S3-221264.zip","group":"S3","meeting":"S3-107-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221320","title":"New key issue on UE privacy protection and authorization in NW exposure of UE traffic related information to AF","source":"InterDigital Communications","contact":"Zhibi Wang","contact-id":92947,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a key issue for security aspect on the NW exposure of UE traffic related information.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":10,"status":"noted","reservation_date":"2022-06-17 16:18:13","uploaded":"2022-06-19 02:00:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221320.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221322","title":"New key issue on Authorization for ACR","source":"InterDigital Communications","contact":"Zhibi Wang","contact-id":92947,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a key issue for ACR authorization.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":20,"status":"noted","reservation_date":"2022-06-17 16:22:25","uploaded":"2022-06-19 02:00:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221322.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221323","title":"New key issue on ACR security","source":"InterDigital Communications","contact":"Zhibi Wang","contact-id":92947,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a new key issue for ACR security.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":30,"status":"noted","reservation_date":"2022-06-17 16:25:58","uploaded":"2022-06-19 02:00:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221323.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221357","title":"Solution for Key Issue #2.2","source":"THALES","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes solution for Key Issue #2.2 of TR 33.739.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2022-06-19 17:50:26","uploaded":"2022-06-19 20:27:22","revisionof":"","revisedto":"S3-221704","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221357.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221377","title":"New solution Authentication mechanism selection in EDGE","source":"OPPO","contact":"Lihui Xiong","contact-id":93649,"tdoctype":"pCR","for":"Approval","abstract":"This solution addresses security requirement for authentication mechanism selection between EEC and ECS, EEC and EES in key issue #2.2.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":110,"status":"revised","reservation_date":"2022-06-20 06:20:33","uploaded":"2022-06-20 10:18:36","revisionof":"","revisedto":"S3-221694","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221377.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221379","title":"New solution Authentication mechanism selection among EEC, ECS, and EES","source":"OPPO","contact":"Lihui Xiong","contact-id":93649,"tdoctype":"pCR","for":"Approval","abstract":"This solution addresses security requirement for authentication mechanism selection between EEC and ECS, EEC and EES in key issue #2.2. It is proposed to realize the authentication mechanism selection between EEC, ECS and EES at the same time with the hel","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":120,"status":"revised","reservation_date":"2022-06-20 06:27:25","uploaded":"2022-06-20 10:19:27","revisionof":"","revisedto":"S3-221695","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221379.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221399","title":"Authentication mechanism selection between the EEC and ECS\/EES","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":130,"status":"noted","reservation_date":"2022-06-20 06:42:06","uploaded":"2022-06-20 12:31:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221399.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221411","title":"New KI on  Authentication and Authorization between V-ECS and H-ECS","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2022-06-20 06:42:06","uploaded":"2022-06-20 12:31:56","revisionof":"","revisedto":"S3-221673","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221411.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221412","title":"New KI on Transport security for the EDGE10 interface","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":50,"status":"approved","reservation_date":"2022-06-20 06:42:06","uploaded":"2022-06-20 12:31:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221412.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221413","title":"New KI on Authentication and Authorization between AC and EEC","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":60,"status":"noted","reservation_date":"2022-06-20 06:42:06","uploaded":"2022-06-20 12:31:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221413.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221438","title":"ECS EES authentication method information provisioning solution on Key issue #2.2","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":140,"status":"revised","reservation_date":"2022-06-20 06:53:50","uploaded":"2022-06-20 09:07:41","revisionof":"","revisedto":"S3-221654","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221438.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221467","title":"MEC - Negotiation procedure for the authentication and authorization","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":150,"status":"revised","reservation_date":"2022-06-20 08:44:20","uploaded":"2022-06-20 11:18:08","revisionof":"","revisedto":"S3-221678","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT3","Cc":"SA6, SA2, CT4","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221467.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221468","title":"HN-auth-NAS based HN triggered authentication","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":14680,"status":"noted","reservation_date":"2022-06-20 08:44:20","uploaded":"2022-06-20 11:18:08","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.741,"crspecversion":"0.0.0","workitem":[{"winame":"FS_HN_Auth"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221468.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221477","title":"Updates to authentication and authorization key issue","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":70,"status":"approved","reservation_date":"2022-06-20 09:06:38","uploaded":"2022-06-20 09:34:33","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221477.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221487","title":"New KI on data protection for the fast and efficient network exposure","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2022-06-20 09:31:53","uploaded":"2022-06-20 09:37:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221487.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221488","title":"New KI on how to authorize PDU session to support local traffic routing to access an EHE in the VPLMN","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2022-06-20 09:31:53","uploaded":"2022-06-20 09:37:43","revisionof":"","revisedto":"S3-221683","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221488.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221527","title":"Authentication mechanism selection between EEC and ECS","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":160,"status":"revised","reservation_date":"2022-06-20 12:08:57","uploaded":"2022-06-20 12:56:28","revisionof":"","revisedto":"S3-221599","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221527.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221528","title":"Authentication mechanism selection between EEC and EES","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":170,"status":"revised","reservation_date":"2022-06-20 12:08:57","uploaded":"2022-06-20 13:03:59","revisionof":"","revisedto":"S3-221600","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221528.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221559","title":"KI#2.1, New Sol Authentication and authorization between EEC hosted in the roaming UE and ECS","source":"Xiaomi Communication","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":180,"status":"revised","reservation_date":"2022-06-20 12:23:19","uploaded":"2022-06-20 13:34:12","revisionof":"","revisedto":"S3-221611","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221559.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221560","title":"KI#2.1, New Sol Authentication and authorization between EEC hosted in the roaming UE and EES","source":"Xiaomi Communication","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":190,"status":"revised","reservation_date":"2022-06-20 12:23:19","uploaded":"2022-06-20 13:34:12","revisionof":"","revisedto":"S3-221613","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221560.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221561","title":"KI#2.2, New Sol 5GC-based authentication mechanism selection between EEC and ECS or EES","source":"Xiaomi Communication","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":200,"status":"revised","reservation_date":"2022-06-20 12:23:19","uploaded":"2022-06-20 13:34:12","revisionof":"","revisedto":"S3-221614","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221561.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221599","title":"Authentication mechanism selection between EEC and ECS","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":15990,"status":"approved","reservation_date":"2022-07-01 15:35:56","uploaded":"2022-07-01 15:52:02","revisionof":"S3-221527","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221599.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221600","title":"Authentication mechanism selection between EEC and EES","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16000,"status":"approved","reservation_date":"2022-07-01 15:36:50","uploaded":"2022-07-01 15:54:40","revisionof":"S3-221528","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221600.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221611","title":"KI#2.1, New Sol Authentication and authorization between EEC hosted in the roaming UE and ECS","source":"Xiaomi Communication","contact":"Haoran Liang","contact-id":93122,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16110,"status":"approved","reservation_date":"2022-07-01 19:31:31","uploaded":"2022-07-01 19:51:41","revisionof":"S3-221559","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221611.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221613","title":"KI#2.1, New Sol Authentication and authorization between EEC hosted in the roaming UE and EES","source":"Xiaomi Communication","contact":"Haoran Liang","contact-id":93122,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16130,"status":"approved","reservation_date":"2022-07-01 19:44:10","uploaded":"2022-07-01 19:52:23","revisionof":"S3-221560","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221613.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221614","title":"KI#2.2, New Sol 5GC-based authentication mechanism selection between EEC and ECS or EES","source":"Xiaomi Communication","contact":"Haoran Liang","contact-id":93122,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16140,"status":"approved","reservation_date":"2022-07-01 19:46:51","uploaded":"2022-07-01 19:52:23","revisionof":"S3-221561","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221614.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221654","title":"ECS EES authentication method information provisioning solution on Key issue #2.2","source":"ZTE Corporation","contact":"Zhen Xing","contact-id":89300,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16540,"status":"approved","reservation_date":"2022-07-04 01:36:58","uploaded":"2022-07-04 01:56:55","revisionof":"S3-221438","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221654.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221673","title":"New KI on  Authentication and Authorization between V-ECS and H-ECS","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16730,"status":"approved","reservation_date":"2022-07-04 05:19:09","uploaded":"2022-07-04 05:41:28","revisionof":"S3-221411","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221673.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221678","title":"MEC - Negotiation procedure for the authentication and authorization","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16780,"status":"approved","reservation_date":"2022-07-04 05:54:37","uploaded":"2022-07-04 05:57:10","revisionof":"S3-221467","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_LISE"},{"winame":" FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221678.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221683","title":"New KI on how to authorize PDU session to support local traffic routing to access an EHE in the VPLMN","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16830,"status":"approved","reservation_date":"2022-07-04 06:55:17","uploaded":"2022-07-04 07:10:37","revisionof":"S3-221488","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221683.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221685","title":"Draft TR 33.739","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16850,"status":"approved","reservation_date":"2022-07-04 06:58:54","uploaded":"2022-07-07 14:26:07","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.2.0","workitem":[{"winame":"FS_NG_RTC_SEC"},{"winame":" FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221685.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221694","title":"New solution Authentication mechanism selection in EDGE","source":"OPPO","contact":"Lihui Xiong","contact-id":93649,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16940,"status":"approved","reservation_date":"2022-07-05 08:17:00","uploaded":"2022-07-05 08:25:58","revisionof":"S3-221377","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221694.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221695","title":"New solution Authentication mechanism selection among EEC, ECS, and EES","source":"OPPO","contact":"Lihui Xiong","contact-id":93649,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":16950,"status":"approved","reservation_date":"2022-07-05 08:22:59","uploaded":"2022-07-05 08:26:13","revisionof":"S3-221379","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221695.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221704","title":"Solution for Key Issue #2.2","source":"THALES","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"5.9","ainame":"Study on Security Enhancement of support for Edge Computing \u2014 phase 2","tdoc_agenda_sort_order":101,"status":"approved","reservation_date":"2022-07-07 14:01:19","uploaded":"2022-07-07 14:04:23","revisionof":"S3-221357","revisedto":"","release":"Rel-18","crspec":33.739,"crspecversion":"0.1.0","workitem":[{"winame":"FS_EDGE_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221704.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]