Tech-invite3GPP-SpecsFeaturesEntitiesInterfacesSBIsIdentifiersTi+Search in Tech-invite

21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 23.787 (SA2) ☆ (Rel-16 draft)
Study on Encrypted Traffic Detection and Verification

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V0.4.0 (Wzip)  2018/06  46 p.

Rapporteur:  Mr. Xu, Yang

The scope is to study encrypted traffic detection and verification, including:
  • Solutions for encrypted traffic detection and verification.
  • Solutions for how to manage the information for encrypted traffic detection and verification.

full Table of Contents for  TR 23.787  Word version:   0.4.0

 

Here   Top

 

1  ScopeWord-p. 6
2  References
3  Definitions and abbreviations
4  Architectural Assumptions
5  Key Issues
6  Solutions
6.1  Solution #1: UE-Assisted Solution
6.2  Solution #2: Network-Initiated encrypted traffic detection with agreement between AF and MNOWord-p. 15
6.3  Solution #3: UE assisted encrypted traffic detectionWord-p. 22
6.4  Solution #4 to Key Issue #1: Encrypted traffic detection and verification in the presence of an agreement between AS and MNOWord-p. 25
6.5  Solution #5: Encrypted traffic detection and verification in the presence of an agreement between AS and MNOWord-p. 28
6.6  Solution #6: NW triggered encrypted traffic detection
6.7  Solution #7: Network-Controlled UE-Assisted Traffic DetectionWord-p. 33
7  ConclusionsWord-p. 45
A  Change historyWord-p. 46

Up   Top