[{"name":"S3-181637","title":"Correction for TS 33.501 subclause 6.6.1","source":"InterDigital, Inc.","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"CR","for":"Approval","abstract":"The goal of this CR is to correct the misleading text in subclause 6.6.1","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18590,"status":"merged","reservation_date":"2018-05-10 15:54:59","uploaded":"2018-05-13 16:35:55","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":168.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181637.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181693","title":"Security Negotiation for RRC INACTIVE","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":16950,"status":"revised","reservation_date":"2018-05-14 04:02:17","uploaded":"2018-05-14 08:20:00","revisionof":"","revisedto":"S3-182061","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":183.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181693.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181694","title":"Key Handling at RRC state transitions","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":17050,"status":"revised","reservation_date":"2018-05-14 04:02:18","uploaded":"2018-05-14 08:20:00","revisionof":"","revisedto":"S3-182060","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":184.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181694.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181695","title":"Security Mechanisms for Dual Connectivity Architecture for MR-DC with 5GC","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":17880,"status":"revised","reservation_date":"2018-05-14 04:02:19","uploaded":"2018-05-14 08:20:00","revisionof":"","revisedto":"S3-181985","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":185.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181695.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181705","title":"Unauthenticated Emergency Calls can use NEA0","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18610,"status":"not pursued","reservation_date":"2018-05-14 06:16:28","uploaded":"2018-05-14 08:20:00","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":187.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181705.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181706","title":"Reply SA3 LS on security for inactive state","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":16940,"status":"revised","reservation_date":"2018-05-14 06:16:29","uploaded":"2018-05-14 08:20:00","revisionof":"","revisedto":"S3-181997","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181706.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181774","title":"Filling is some of the details on dual connectivity for TS 33.501","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18400,"status":"merged","reservation_date":"2018-05-14 11:25:58","uploaded":"2018-05-14 13:31:14","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181774.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181784","title":"Security handling at RRC state transitions (changes to S3-181456)","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":17740,"status":"merged","reservation_date":"2018-05-14 11:25:58","uploaded":"2018-05-14 13:31:14","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181784.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181788","title":"Correcting Figure 6.13-1 on gNB periodic local authentication procedure","source":"NEC Corporation","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"CR","for":"Approval","abstract":"This CR corrects the Figure 6.13-1","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18730,"status":"revised","reservation_date":"2018-05-14 11:28:30","uploaded":"2018-05-14 12:09:24","revisionof":"S3-181340","revisedto":"S3-181988","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":111.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181788.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181840","title":"Corrections of references to sub-clauses","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18970,"status":"agreed","reservation_date":"2018-05-14 12:24:58","uploaded":"2018-05-14 13:25:38","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":211.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-180454","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181840.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181848","title":"Dual Connectivity - introduction","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"other","for":"Agreement","abstract":"This contribution corrects the DC protocol architecture diagram and proposes simpler terms for key and counter.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18480,"status":"merged","reservation_date":"2018-05-14 12:25:01","uploaded":"2018-05-14 13:25:38","revisionof":"S3-181517","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181848.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181849","title":"Dual Connectivity - dc procedures","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"other","for":"Agreement","abstract":"This contribution defines DC procedures in the spirit of TS 37.340. The DC procedures cover SN addition\/modification inidiated by SN\/MN, SN release\/change.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18490,"status":"merged","reservation_date":"2018-05-14 12:25:01","uploaded":"2018-05-14 13:25:38","revisionof":"S3-181517","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181849.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181850","title":"Dual Connectivity - other procedures","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"other","for":"Agreement","abstract":"This contribution defines other procedures, which are handover, periodic local authentication and RLF.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18500,"status":"merged","reservation_date":"2018-05-14 12:25:01","uploaded":"2018-05-14 13:25:38","revisionof":"S3-181517","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181850.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181851","title":"Dual Connectivity - keys and algorithms","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"other","for":"Agreement","abstract":"This contributions defines security key and algorithm handling.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18510,"status":"merged","reservation_date":"2018-05-14 12:25:02","uploaded":"2018-05-14 13:25:38","revisionof":"S3-181517","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181851.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181852","title":"Dual Connectivity - other security mechanisms","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"other","for":"Agreement","abstract":"This contribution defines other mechanisms, which are common security mechanism, maintenance of counter, and avoiding key stream reuse.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18520,"status":"merged","reservation_date":"2018-05-14 12:25:02","uploaded":"2018-05-14 13:25:38","revisionof":"S3-181517","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181852.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181859","title":"Discussion on RAN2 LS on security for inactive state","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":16930,"status":"noted","reservation_date":"2018-05-14 12:38:38","uploaded":"2018-05-14 13:50:51","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181859.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181860","title":"Discussion on RAN2 LS on security keys for generation of shortResumeMAC-I","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":17840,"status":"noted","reservation_date":"2018-05-14 12:40:51","uploaded":"2018-05-14 13:50:51","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181860.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181861","title":"Discussion on RAN2 LS on reporting Integrity check failure for DRB to network","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":16280,"status":"noted","reservation_date":"2018-05-14 12:42:43","uploaded":"2018-05-14 13:50:51","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181861.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181873","title":"[DRAFT] Reply LS to S3-181619 (R2-1806490) on reporting Integrity check failure for DRB to network from RAN WG2","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"LS out","for":"","abstract":"Proposal to answer RAN2 that SA3 has no requirement for the UE to report DRB IP verification failures.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":16370,"status":"revised","reservation_date":"2018-05-14 13:09:42","uploaded":"2018-05-14 13:37:49","revisionof":"","revisedto":"S3-181998","release":"Rel-15","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-181619","lsto":"RAN WG2","Cc":"SA WG2","lsoriginalls":"R2-1806490","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181873.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181897","title":"Update in clause UP security mechanism and Xn-HO procedure","source":"OPPO","contact":"Yang Xu","contact-id":63572,"tdoctype":"CR","for":"Approval","abstract":"Simply remove \u201cand a NCC\u201d in clause 6.6.1 and 6.7.3.1.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18600,"status":"not pursued","reservation_date":"2018-05-14 14:18:30","uploaded":"2018-05-14 14:21:11","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":224.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181897.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181985","title":"Security procedures for dual connectivity","source":"Huawei, Hisilicon,Qualcomm,Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":17881,"status":"agreed","reservation_date":"2018-05-25 14:27:38","uploaded":"2018-05-25 14:27:38","revisionof":"S3-181695","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":185.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-180454","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181985.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181986","title":"Correction for TS 33.501 subclause 6.6.1","source":"InterDigital, Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18591,"status":"withdrawn","reservation_date":"2018-05-30 13:04:57","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":168.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181987","title":"Clarifications to: UP security mechanisms","source":"Interdigital,Huawei, LG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":198700,"status":"agreed","reservation_date":"2018-05-25 14:27:38","uploaded":"2018-05-25 14:27:38","revisionof":"S3-181520","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":66.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-180454","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181987.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181988","title":"Correcting Figure 6.13-1 on gNB periodic local authentication procedure","source":"NEC Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":18731,"status":"agreed","reservation_date":"2018-05-24 12:02:43","uploaded":"2018-05-24 12:02:43","revisionof":"S3-181788","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":111.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-180454","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181988.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181997","title":"Reply SA3 LS on security for inactive state","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":16941,"status":"approved","reservation_date":"2018-05-23 14:48:39","uploaded":"2018-05-23 14:48:39","revisionof":"S3-181706","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-181906","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181997.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-181998","title":"Reply LS to S3-181619 (R2-1806490) on reporting Integrity check failure for DRB to network from RAN WG2","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":16371,"status":"approved","reservation_date":"2018-05-23 16:43:57","uploaded":"2018-05-23 16:43:57","revisionof":"S3-181873","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-181619","lsto":"RAN WG2","Cc":"SA WG2","lsoriginalls":"R2-1806490","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-181998.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-182060","title":"Key Handling at RRC state transitions","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":17051,"status":"agreed","reservation_date":"2018-05-25 08:51:36","uploaded":"2018-05-25 08:51:36","revisionof":"S3-181694","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":184.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-180455","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-182060.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-182061","title":"Security Negotiation for RRC INACTIVE","source":"Huawei, Hisilicon,Ericsson,Qualcomm,Intel,Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":16951,"status":"agreed","reservation_date":"2018-05-25 08:52:19","uploaded":"2018-05-25 08:52:19","revisionof":"S3-181693","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":183.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-180455","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-182061.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-182085","title":"LS to RAN2 on Dual Connectivity","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"7.2.4","ainame":"AS security","tdoc_agenda_sort_order":208500,"status":"approved","reservation_date":"2018-05-25 14:27:38","uploaded":"2018-05-25 14:27:38","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_91Bis_LaJolla\/Docs\/S3-182085.zip","group":"S3","meeting":"S3-91","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]