Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.867
Study on User Consent for 3GPP services

V17.1.0 (Wzip)  2022/03  32 p.
Rapporteur:
Mrs. Rong, Wu
HUAWEI TECHNOLOGIES Co. Ltd.

full Table of Contents for  TR 33.867  Word version:  17.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 7
2References  p. 7
3Definitions of terms, symbols and abbreviations  p. 7
3.1Terms  p. 7
3.2Symbols  p. 8
3.3Abbreviations  p. 8
4General principles for user consent  p. 8
4.1Concept of user consent  p. 8
4.2Background information to existing work  p. 8
5Use Cases and Architecture  p. 9
5.1Use Cases  p. 9
5.1.1Use Cases #1: UE Related Analytics of NWDAF  p. 9
5.1.1.1Use Case details  p. 9
5.1.1.2Individual Architecture  p. 9
5.1.2Use Cases #2: UE Information Exposure for Mobile Edge Computing  p. 10
5.1.2.1Use Case details  p. 10
5.1.2.2Individual Architecture  p. 11
5.2Common architecture  p. 11
6Key issues  p. 12
6.1Key Issue #1: User's consent for exposure of information to Edge Applications  p. 12
6.1.0Use case mapping  p. 12
6.1.1Key issue details  p. 12
6.1.2Security threats  p. 12
6.1.3Potential security requirements  p. 12
6.2Key Issue #2 User consent for UE data collection  p. 13
6.2.1Key issue details  p. 13
6.2.2Security threats  p. 13
6.2.3Potential security requirements  p. 13
6.3Key Issue #3: Modification or revocation of user consent  p. 13
6.3.1Key issue details  p. 13
6.3.2Security threats  p. 13
6.3.3Potential security requirements  p. 13
6.4Key Issue #4: KI on relationship between the subscriber and the end-users  p. 14
6.4.1Key issue details  p. 14
6.4.2Security threats  p. 14
6.4.3Potential security requirements  p. 14
6.5Key issue #5: Unambiguous naming of purposes  p. 14
6.5.0Use case mapping  p. 14
6.5.1Key issue details  p. 14
6.5.2Security threats  p. 14
6.5.3Potential security requirements  p. 14
7Potential solutions  p. 15
7.0Mapping of solutions to key issues  p. 15
7.1Solution #1: User Consent for Exposure of information to Edge Applications in Real Time  p. 15
7.1.1Solution overview  p. 15
7.1.2Solution details  p. 16
7.1.3Solution evaluation  p. 16
7.2Solution #2: User Consent for UE Related Analytics of NWDAF  p. 17
7.2.1Solution overview  p. 17
7.2.2Solution details  p. 17
7.2.2.1NF Authorization based on User Consent  p. 17
7.2.2.2User Consent Format  p. 18
7.2.2.3Obtain of User Consent  p. 18
7.2.3Solution evaluation  p. 18
7.3Solution #3: User Consent for UE Related Analytics of NWDAF  p. 18
7.3.1Solution overview  p. 18
7.3.2Solution details  p. 19
7.3.2.1NF Authorization based on User Consent  p. 19
7.3.2.2User Consent Format  p. 19
7.3.2.3Obtain of User Consent  p. 20
7.3.3Solution evaluation  p. 20
7.4Solution #4: Check of User Consent for 3GPP Service Exposure  p. 20
7.4.1Solution overview  p. 20
7.4.2Solution details  p. 21
7.4.2.1Check of user consent on NEF/CAPIF  p. 21
7.4.2.2User Consent Parameter  p. 22
7.4.3Solution evaluation  p. 22
7.5Solution #5: Privacy preservation of transmitted data  p. 22
7.5.1Solution overview  p. 22
7.5.2Solution details  p. 22
7.5.3Solution evaluation  p. 23
7.6Solution #6: Revocation for user consent  p. 23
7.6.1Solution overview  p. 23
7.6.2Solution details  p. 24
7.6.3Solution evaluation  p. 25
7.7Solution #7: Retrieving User's consent for exposure of information to the Edge Applications from UDM  p. 25
7.7.1Solution overview  p. 25
7.7.2Solution details  p. 25
7.7.3Solution evaluation  p. 26
8Conclusions  p. 26
8.1Conclusion on KI #1: User's consent for exposure of information to Edge Applications  p. 26
8.2Conclusion on KI #2: User consent for UE data collection  p. 27
8.3Conclusion on KI #3: Modification or revocation of user consent  p. 27
8.4Conclusion on KI #4: Relationship between the subscriber and the end-users  p. 27
8.5Conclusion on KI #5: Unambiguous naming of purposes  p. 28
8.6General Conclusions  p. 28
8.6.1UDM Service for User Consent Check  p. 28
8.6.2General Conclusion on Generic Requirement for the Procedures for User Consent Check  p. 28
8.6.3UDM Service for User Consent Revocation  p. 28
8.6.4Generic Requirement for the Procedures for User Consent Revocation  p. 29
AObservations related to regulations  p. 30
$Change history  p. 32

Up   Top