Tech-invite3GPPspecsSIPRFCs
Overview21222324252627282931323334353637384‑5x

Content for  TS 31.102  Word version:  17.1.0

Top   Top   Up   Prev   Next
0…   3…   4…   4.2.9…   4.2.17…   4.2.26…   4.2.34…   4.2.44…   4.2.52…   4.2.60…   4.2.68…   4.2.76…   4.2.85…   4.2.93…   4.2.101…   4.2.107…   4.3…   4.4.2…   4.4.2.4…   4.4.3…   4.4.4…   4.4.5…   4.4.6…   4.4.8…   4.4.8.7…   4.4.9…   4.4.11…   4.4.11.7…   4.5…   4.6…   4.7   5…   5.2   5.3   5.4…   5.9…   6…   7…   7.1.2…   7.3…   A   B…   D   E…   G   H…   I…   L…   M…

 

3  Definitions, symbols, abbreviations and coding conventionsWord‑p. 19

3.1  Definitions

For the purposes of the present document, the following definition applies.
ADM:
access condition to an EF which is under the control of the authority which creates this file.
Allocation of these levels and the respective requirements for their fulfilment are the responsibility of the appropriate administrative authority
The definition of access condition ADM does not preclude the administrative authority from using ALW, PIN, PIN2 and NEV if required.
A terminal does not need to evaluate access conditions indicated as ADM in the present document.
PIN/ADM:
A terminal is required to evaluate the access condition and verify it in order to access the EF if the access condition is set to PIN or PIN2.
EHPLMN:
represents the Equivalent HPLMNs for network selection purposes. The behaviour of EHPLMNs is defined in TS 23.122.
Up

3.2  SymbolsWord‑p. 20
For the purposes of the present document, the following symbols apply:
||
Concatenation
Exclusive OR
f1
Message authentication function used to compute MAC
f1*
A message authentication code (MAC) function with the property that no valuable information can be inferred from the function values of f1* about those of f1, ..., f5 and vice versa
f2
Message authentication function used to compute RES and XRES
f3
Key generating function used to compute CK
f4
Key generating function used to compute IK
f5
Key generating function used to compute AK
Up

3.3  Abbreviations

For the purposes of the present document, the following abbreviations apply:
3GPP
3rd Generation Partnership Project
5GCN
5G Core Network
AC
Access Condition
ACDC
Application specific Congestion control for Data Communication
ACL
APN Control List
ADF
Application Dedicated File
AID
Application Identifier
AK
Anonymity key
ALW
ALWays
AMF
Authentication Management Field
AoC
Advice of Charge
APN
Access Point Name
ASME
Access Security Management Entity
ASN.1
Abstract Syntax Notation One
AuC
Authentication Centre
AUTN
Authentication token
BDN
Barred Dialling Number
BER-TLV
Basic Encoding Rule - TLV
B-TID
Bootstrapping Transaction Identifier
CAG
Closed Access Group
CCP
Capability Configuration Parameter
CK
Cipher key
CLI
Calling Line Identifier
CNL
Co-operative Network List
CPBCCH
COMPACT Packet BCCH
CS
Circuit switched
DCK
Depersonalisation Control Keys
DF
Dedicated File
DO
Data Object
EC-GSM-IoT
Extended coverage in GSM for IoT
DUCK
Discovery User Confidentiality Key
DUIK
Discovery User Integrity Key
DUSK
Discovery User Scrambling Key
eDRX
Extended Discontinuous Reception
EARFCN
Evolved Absolute Radio Frequency Channel Number
EF
Elementary File
EPC
Evolved Packet Core
ePDG
Evolved Packet Data Gateway
EPS
Evolved Packet System
FCP
File Control Parameters
FFS
For Further Study
FQDN
Full Qualified Domain Name
GCI
Global Cable Identifier
GLI
Global Line Identifier
GSM
Global System for Mobile communications
HE
Home Environment
HNB
Home NodeB
HeNB
Home eNodeB
IARI
IMS Application Reference Identifier
ICC
Integrated Circuit Card
ICE
In Case of Emergency
ICI
Incoming Call Information
ICT
Incoming Call Timer
ID
Identifier
Idi
Identity of the initiator
Idr
Identity of the responder
IEI
Information Element Identifier
IK
Integrity key
IMSI
International Mobile Subscriber Identity
K
USIM Individual key
KC
Cryptographic key used by the cipher A5
KSI
Key Set Identifier
LI
Language Indication
LSB
Least Significant Bit
MAC
Message authentication code
MAC-A
MAC used for authentication and key agreement
MAC-I
MAC used for data integrity of signalling messages
MBMS
Multimedia Broadcast/Multicast Service
MCC
Mobile Country Code
MCData
Mission Critical Data
MCPTT
Mission Critical Push To Talk
MCS
Mission Critical Services
MCVideo
Mission Critical Video
MexE
Mobile Execution Environment
MF
Master File
MGV-F
MTK Generation and Validation Function
MICO
Mobile Initiated Connection Only
MiD
Multi-iDentity
MIKEY
Multimedia Internet KEYing
MM
Multimedia Message
MMI
Man Machine Interface
MMS
Multimedia Messaging Service
MMSS
MultiMode System Selection
MNC
Mobile Network Code
MODE
Indication packet switched/circuit switched mode
MSB
Most Significant Bit
MSK
MBMS Service Key
MTC
Machine Type Communications
MTK
MBMS Traffic Key
MuD
Multi-Device
MUK
MBMS User Key
NAI
Network Access Identifier
NB-IoT
Narrowband IoT
NEV
NEVer
ngKSI
Key Set Identifier in 5G
NG-RAN
Next Generation Radio Access Network
NPI
Numbering Plan Identifier
NSI
Network Specific Identifier
OCI
Outgoing Call Information
OCT
Outgoing Call Timer
PBID
Phonebook Identifier
PGK
ProSe Group Key
PIN
Personal Identification Number
PL
Preferred Languages
PS
Packet switched
PSDK
Public Safety Discovery Key
PS_DO
PIN Status Data Object
PSM
Power Saving Mode
PTK
ProSe Traffic Key
RAND
Random challenge
RANDMS
Random challenge stored in the USIM
RES
User response
RFU
Reserved for Future Use
RLOS
Restricted Local Operator Services
RST
Reset
SDN
Service dialling number
SE
Security Environment
SEQp
Sequence number for MGV-F stored in the USIM
SFI
Short EF Identifier
SGSN
Serving GPRS Support Node
SN
Serving Network
SQN
Sequence number
SRES
Signed RESponse calculated by a USIM
SUCI
Subscription Concealed Identifier
SUPI
Subscription Permanent Identifier
SW
Status Word
TLV
Tag Length Value
TMGI
Temporary Mobile Group Identity
TV
Television
UAC
Unified Access Control
URSP
UE Route Selection Policy
USAT
USIM Application Toolkit
USD
User Service Description
USIM
Universal Subscriber Identity Module
V2X
Vehicle-to-Everything
VLR
Visitor Location Register
WLAN
Wireless Local Area Network
WSID
WLAN Specific Identifier
XRES
Expected user RESponse
Up

3.4  Coding ConventionsWord‑p. 22
The following coding conventions apply to the present document.
All lengths are presented in bytes, unless otherwise stated. Each byte is represented by bits b8 to b1, where b8 is the most significant bit (MSB) and b1 is the least significant bit (LSB). In each representation, the leftmost bit is the MSB.
The coding of Data Objects in the present document is according to TS 31.101.
'XX':
Single quotes indicate hexadecimal values. Valid elements for hexadecimal values are the numbers '0' to '9' and 'A' to 'F'.
Up


Up   Top   ToC