Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TR 31.826
Study on new UICC application for NSSA
3GPP‑Page
fToC
↓
Partial Content
→
V18.0.0 (Wzip)
2023/03 17 p.
Rapporteur:
Mr. COLLET, Hervé
THALES
full Table of Contents for
TR 31.826
Word version: 18.0.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
0
Introduction
p. 6
1
Scope
p. 7
2
References
p. 7
3
Definitions of terms, symbols and abbreviations
p. 8
3.1
Terms
p. 8
3.2
Abbreviations
p. 8
4
Solutions overview
p. 8
4.1
Introduction
p. 8
4.2
Key issues
p. 8
4.2.1
Multiple NSSAA contexts
p. 8
4.2.2
Discovery of the supported features
p. 8
4.2.3
EAP framework
p. 9
4.3
Solution 1
p. 9
4.3.1
Multiple NSSAA contexts
p. 9
4.3.2
Discovery of the supported features
p. 9
4.3.2.1
EAP Identifier
p. 10
4.3.2.1.1
EFEAP-ID (EAP Identifier)
p. 10
4.3.2.2
S-NSSAI list
p. 10
4.3.2.2.1
EFS-NSSAI (S-NSSAI list)
p. 10
4.3.2.3
EAP authentication status
p. 11
4.3.2.3.1
EFEAP-STATUS (EAP Authentication STATUS)
p. 11
4.3.3
EAP framework
p. 12
4.3.3.1
NSSAA application management procedures
p. 12
4.3.3.1.1
NSSAA application selection
p. 12
4.3.3.1.2
NSSAA application initialisation
p. 12
4.3.3.1.3
NSSAA application termination
p. 12
4.3.3.1.4
NSSAA application closure
p. 13
4.3.4
Security features
p. 13
4.3.4.1
User verification and file access conditions
p. 13
4.3.5
NSSAA application commands
p. 13
4.3.5.1
AUTHENTICATE
p. 13
4.3.5.1.1
Command description
p. 13
4.3.5.1.1.1
Command parameters and data
p. 14
4.3.5.1.1.2
Specific status conditions returned
p. 15
4.3.5.1.1.3
Status words
p. 15
4.3.6
List of SFI values (annex)
p. 15
5
Evaluation criteria
p. 15
5.1
Overview
p. 15
5.2
Key issues addressed
p. 15
5.3
Impact on USIM and ISIM
p. 15
5.4
Impact on UICC
p. 15
5.5
Backward compatibility
p. 16
5.6
Impact on core and RAN networks
p. 16
6
Solutions evaluations
p. 16
6.1
Solution 1
p. 16
6.1.1
Key issues
p. 16
6.1.2
USIM and ISIM types applicable
p. 16
6.1.3
Impact on UICC
p. 16
6.1.4
Backward compatibility
p. 16
6.1.5
Impact on core and RAN networks
p. 16
7
Conclusion
p. 16
$
Change history
p. 17