id stringlengths 5 12 | title stringlengths 8 250 | type stringclasses 2 values | version stringclasses 561 values | working_group stringclasses 30 values | url stringlengths 67 81 | scope stringlengths 0 65.7k |
|---|---|---|---|---|---|---|
32.225 | Telecommunication management; Charging management; Charging data description for the IP Multimedia Subsystem (IMS) | TS | 0.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.225/32225-000.zip | The present document covers both online and offline charging for the IMS. For clarity, the terms Offline Charging and Online charging as applied to the IMS are defined here in clause 3. These definitions are the same as listed in TS 32.200 [2].
The IMS charging architecture details, requirements, definitions and principles are listed in TS 32.200 [2] and therefore are not repeated here.
In the present document the charging data triggers, message content and format are specified along with the transport of these messages using the Diameter protocol. Details about charging message flows and the definitions of the Diameter AVPs are also included in the present document. This information is divided into two main clauses: Online Charging and Offline Charging. |
32.604 | Telecommunication management; Configuration Management (CM); Basic CM Integration Reference Point (IRP) Common Management Information Protocol (CMIP) Solution Set (SS) | TS | 4.2.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.604/32604-420.zip | The present document specifies the Common Management Information Protocol (CMIP) Solution Set (SS) for the Basic CM Integration Reference Point (IRP): Information Service defined in TS 32.602 [6]. In detail:
• Clause 4 provides the basic concept of the CMIP SS and the mapping between the IOCs, operations and notifications defined in TS 32.602 (Basic Configuration Management IRP: Information Service) [6] to the corresponding CMIP SS equivalents.
• Clause 5 contains the GDMO definitions for the Basic Configuration Management IRP over the CMIP interfaces,
• Clause 6 contains the ASN.1 definitions supporting the GDMO definitions provided in clause 5.
This Solution Set specification is related to 3GPP TS 32.602 V6.1.X. |
32.611 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP): Requirements | TS | 4.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.611/32611-400.zip | |
32.200 | Telecommunication management; Charging management; Charging principles | TS | 4.5.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.200/32200-450.zip | The present document describes the principles of charging and billing for the provision of service and services by a 3G‑system.
The present document elaborates on the charging requirements described in the Charging Principles in 3GPP TS 22.101 [1]. It allows the generation of accurate charging information to be used in the commercial and contractual relationships between the parties concerned. The present document is not intended to duplicate existing standards or standards being developed by other groups on these topics, and references these where appropriate.
The Charging Data Records (CDRs) generated by the network elements of the 3G network, are required for a number of telecom management activities including, but not limited to, the following:
• the billing of home subscribers, either directly or via service providers, for network utilisation charges;
- the settlement of accounts for traffic carried or services performed by fixed network operators and other operators;
- the settlement of accounts with other PLMNs for roaming traffic via the transferred account procedure;
- statistical analysis of service usage;
- as archival information in dealing with customer service and billing complaints.
In addition to the information collected from network elements, network management functions are required for the administration of charging data.
The present document is part of a series of documents specifying charging functionality in UMTS networks. The UMTS charging architecture and principles are specified in the present document which provides an umbrella for other charging documents that specify the structure and content of the CDRs and the interface protocol that is used to transfer them to the collecting node. The CDRs used in the Circuit Switched (CS) domain are specified in document3GPP TS 32.205 [5]. The CDRs content and transport within the PS domain are described in3GPP TS 32.215 [6] document, while CDRs used for application services are defined in document3GPP TS 32.235 [17].
The relationship among these charging specifications is illustrated in figure 1.1.
Figure 1.1: Charging Documents Structure
For the purpose of the present document, the charging data is considered to be generated and collected by charging functions in the network elements.
Charging data fields are collected and CDRs generated by the network elements for transfer to the billing system. For the packet switched domain, the CDRs are first sent to the Charging Gateway Function (CGF) for storage and further processing. The CGF may be a distinct network element or may be integrated into the packet domain network elements themselves.
The objectives of the present document are:
- to describe principles of charging in a 3G network;
- to provide a description of the charging architecture; and
- to provide the descriptions of events and triggers for the generation of Charging Data Records (CDRs). |
32.613 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP): Common Object Request Broker Architecture (CORBA) Solution Set (SS) | TS | 4.4.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.613/32613-440.zip | The purpose of this Bulk CM IRP: CORBA Solution Set is to define the mapping of the IRP Information Service 3GPP TS 32.612 [3] to the protocol specific details necessary for implementation of this IRP in a CORBA/IDL environment.
This Solution Set specification is related to 3GPP TS 32.612 V9.1.X. |
32.614 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP): Common Management Information Protocol (CMIP) Solution Set (SS) | TS | 4.3.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.614/32614-430.zip | The present document specifies the Common Management Information Protocol (CMIP) Solution Set (SS) for the Bulk CM Integration Reference Point (IRP): Information Service defined in TS 32.612 [4]. In detail:
• Clause 4 contains an introduction to some concepts that are the base for some specific aspects of the CMIP interfaces.
• Clause 5 contains the GDMO definitions for the Alarm Management over the CMIP interfaces
Clause 6 contains the ASN.1 definitions supporting the GDMO definitions provided in clause 5.
This Solution Set specification is related to 3GPP TS 32.612 V6.2.X. |
32.615 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP): eXtensible Markup Language (XML) file format definition | TS | 4.5.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.615/32615-450.zip | The present document provides the main part of the XML file format definition for the Bulk Configuration Management IRP IS in 3GPP TS 32.612 [1].
The other parts of this XML file format definition are NRM-specific parts.
Those NRM-specific parts are provided by 3GPP TS 32.625 [11], 32.635 [12], 32.645 [13], 32.655 [14], 32.695 [16], 32.715 [17], 32.735 [18], 32.745 [15], 32.755 [20], 32.765 [19], 32.525 [21], 32.175 [22], 32.725 [23], 32.775 [24] and 32.785 [25].
Bulk CM XML file formats are based on XML [2], XML Schema [3] [4] [5] and XML Namespace [6] standards.
This File Format Definition specification is related to 3GPP TS 32.612 V9.1.X. |
32.312 | Telecommunication management; Generic Integration Reference Point (IRP) management; Information Service (IS) | TS | 4.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.312/32312-410.zip | |
32.612 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP): Information Service (IS) | TS | 4.6.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.612/32612-460.zip | |
31.110 | Numbering system for telecommunication IC card applications | TS | 4.1.0 | C6 | https://www.3gpp.org/ftp/Specs/archive/31_series/31.110/31110-410.zip | The present document describes the numbering system for Application IDentifiers (AID) for 3G telecommunication Integrated Circuits (IC) card applications.
The numbering system described in the present document provides a means for an application and related services offered by a provider to identify if a given card contains the elements required by its application and related services.
An AID is used to address an application in the card. It consists of a Registered application provider IDentifier (RID) and a Proprietary application Identifier eXtension (PIX).
The present document describes the coding of the PIX. |
32.621 | Telecommunication management; Configuration Management (CM); Generic network resources Integration Reference Point (IRP); Requirements | TS | 4.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.621/32621-400.zip | The present document defines , in addition to the requirements defined in [1], [2] and [3], the requirements for the present IRP: Generic Network Resources IRP. |
32.631 | Telecommunication management; Configuration Management (CM); Core network resources Integration Reference Point (IRP); Requirements | TS | 4.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.631/32631-400.zip | The present document defines, in addition to the requirements defined in [1], [2] and [3], the requirements for the present IRP: Core Network Resources IRP. |
32.632 | Telecommunication management; Configuration Management (CM); Core Network Resources Integration Reference Point (IRP); Network Resource Model (NRM) | TS | 4.4.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.632/32632-440.zip | The present document is part of an Integration Reference Point (IRP) named "Core Network Resources IRP", through which an 'IRPAgent' (typically an Element Manager or Network Element) can communicate Configuration Management information to one or several 'IRPManagers' (typically Network Managers) concerning CN resources.
The present document specifies the protocol neutral Core Network Resources IRP: Network Resource Model. It reuses relevant parts of the generic NRM in 3GPP TS 32.622 [16], either by direct reuse or sub-classing, and in addition to that defines CN specific Information Object Classes.
Finally, in order to access the information defined by this NRM, an Interface IRP is needed, such as the Basic CM IRP 3GPP TS 32.60x [17]. However, which Interface IRP that is applicable is outside the scope of the present document. |
32.633 | Telecommunication management; Configuration Management (CM); Core network resources Integration Reference Point (IRP); Common Object Request Broker Architecture (CORBA) Solution Set (SS) | TS | 4.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.633/32633-410.zip | The purpose of the present document is to define the mapping of the IRP information model (see TS 32.632 [3]) to the protocol specific details necessary for implementation of this IRP in a CORBA/IDL environment.
This Solution Set specification is related to 3GPP TS 32.632 V9.1.X. |
32.602 | Telecommunication management; Configuration Management (CM); Basic CM Integration Reference Point (IRP); Information Service (IS) | TS | 4.3.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.602/32602-430.zip | |
32.641 | Telecommunication management; Configuration Management (CM); UTRAN network resources Integration Reference Point (IRP); Requirements | TS | 4.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.641/32641-400.zip | The present document defines, in addition to the requirements defined in [1], [2] and [3], the requirements for the present IRP: UTRAN Network Resources IRP. |
32.642 | Telecommunication management; Configuration Management (CM); UTRAN network resources Integration Reference Point (IRP); Network Resource Model (NRM) | TS | 4.5.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.642/32642-450.zip | The present document specifies the UTRAN network resource information that can be communicated between an IRPAgent and one or several IRPManagers for network management purposes.
The present document specifies the semantics and behaviour of information object class attributes and relations visible across the reference point in a protocol and technology neutral way. It does not define their syntax and encoding. |
32.622 | Telecommunication management; Configuration Management (CM); Generic network resources Integration Reference Point (IRP); Network Resource Model (NRM) | TS | 4.4.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.622/32622-440.zip | The present document specifies the Generic network resource information that can be communicated between an IRPAgent and one or several IRPManagers for network management purposes.
This document specifies the semantics of information object class attributes and relations visible across the reference point in a protocol and technology neutral way. It does not define their syntax and encoding.
The document specifies the information in a generic manner in that the information specified is a base from which all other NRM IRP ISs such as GERAN NRM IRP IS [20] can inherit or have associations with. |
32.644 | Telecommunication management; Configuration Management (CM); UTRAN network resources Integration Reference Point (IRP): Common Management Information Protocol (CMIP) Solution Set (SS) | TS | 4.3.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.644/32644-430.zip | The present document specifies the Common Management Information Protocol (CMIP) Solution Set (SS) for the UTRAN Network Resource Integration Reference Point (IRP): Network Resource Model defined in 3GPP TS 32.642 [4].
In detail:
• Clause 4 contains an introduction to some concepts that are the base for some specific aspects of the CMIP interfaces.
• Clause 5 contains the GDMO definitions for the Alarm Management over the CMIP interfaces
• Clause 6 contains the ASN.1 definitions supporting the GDMO definitions provided in clause 5.
This Solution Set specification is related to 3GPP TS 32.642 V6.4.X. |
32.651 | Telecommunication management; Configuration Management (CM); GERAN network resources Integration Reference Point (IRP); Requirements | TS | 4.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.651/32651-400.zip | The present document defines , in addition to the requirements defined in [1], [2] and [3], the requirements for the present IRP: GERAN Network Resources IRP. |
32.652 | Telecommunication management; Configuration Management (CM); GERAN network resources Integration Reference Point (IRP); Network Resource Model (NRM) | TS | 4.5.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.652/32652-450.zip | The present document specifies the GERAN network resource information that can be communicated between an IRPAgent and one or several IRPManagers for network management purposes.
This document specifies the semantics and behaviour of information object class attributes and relations visible across the reference point in a protocol and technology neutral way. It does not define their syntax and encoding. |
32.653 | Telecommunication management; Configuration Management (CM); GERAN network resources Integration Reference Point (IRP); Common Object Request Broker Architecture (CORBA) Solution Set (SS) | TS | 4.2.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.653/32653-420.zip | The purpose of this GERAN Network Resources IRP: CORBA Solution Set is to define the mapping of the IRP information model (see 3GPP TS 32.652 [4]) to the protocol specific details necessary for implementation of this IRP in a CORBA/IDL environment.
This Solution Set specification is related to 3GPP TS 32.652 V9.2.X. |
32.654 | Telecommunication management; Configuration Management (CM); GERAN network resources Integration Reference Point (IRP): Common Management Information Protocol (CMIP) Solution Set (SS) | TS | 4.2.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.654/32654-420.zip | The present document specifies the Common Management Information Protocol (CMIP) Solution Set (SS) for the GERAN Network Resource Integration Reference Point (IRP): Network Resource Model defined in 3GPP TS 32.652 [4]. In detail:
• Clause 4 contains an introduction to some concepts that are the base for some specific aspects of the CMIP interfaces.
• Clause 5 contains the GDMO definitions for the Alarm Management over the CMIP interfaces
• Clause 6 contains the ASN.1 definitions supporting the GDMO definitions provided in clause 5.
This Solution Set specification is related to 3GPP TS 32.652 V6.0.X. |
32.624 | Telecommunication management; Configuration Management (CM); Generic network resources: Integration Reference Point (IRP): Common Management Information Protocol (CMIP) Solution Set (SS) | TS | 4.6.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.624/32624-460.zip | The present document specifies the Common Management Information Protocol (CMIP) Solution Set (SS) for the Generic Network Resource Integration Reference Point (IRP): Network Resource Model defined in 3GPP TS 32.622 [4].
In detail:
• Clause 4 contains an introduction to some concepts that are the base for some specific aspects of the CMIP interfaces.
• Clause 5 contains the GDMO definitions for the Alarm Management over the CMIP interfaces
• Clause 6 contains the ASN.1 definitions supporting the GDMO definitions provided in clause 5.
This Solution Set specification is related to 3GPP TS 32.622 V6.4.X [4]. |
32.623 | Telecommunication management; Configuration Management (CM); Generic network resources Integration Reference Point (IRP); Common Object Request Broker Architecture (CORBA) Solution Set (SS) | TS | 4.3.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.623/32623-430.zip | The TS 32.62x-series (Generic Network Resources IRP) define an Integration Reference Point (IRP) through which an "IRPAgent" (typically an Element Manager or Network Element) can communicate Network Management related information to one or several "IRPManagers" (typically Network Managers).
This TS-family specifies a generic Network Resource Model, NRM (also referred to as a Management Information Model - MIM) with definitions of Information Object Classes (IOCs) and Managed Object Classes (MOCs).
The present document specifies the CORBA Solution Set.
This Solution Set specification is related to 3GPP TS 32.622 V9.0.X. |
32.643 | Telecommunication management; Configuration Management (CM); UTRAN network resources Integration Reference Point (IRP); Common Object Request Broker Architecture (CORBA) Solution Set (SS) | TS | 4.4.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.643/32643-440.zip | The purpose of this UTRAN Network Resources IRP: CORBA Solution Set is to define the mapping of the IRP information model (see TS 32.642 [4]) to the protocol specific details necessary for implementation of this IRP in a CORBA/IDL environment.
This Solution Set specification is related to 3GPP TS 32.642 V9.3.X. |
32.302 | Telecommunication management; Configuration Management (CM); Notification Integration Reference Point (IRP); Information Service (IS) | TS | 4.2.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.302/32302-420.zip | |
32.600 | Telecommunication management; Configuration Management (CM); Concept and high-level requirements | TS | 4.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.600/32600-400.zip | |
32.603 | Telecommunication management; Configuration Management (CM); Basic CM Integration Reference Point (IRP); Common Object Request Broker Architecture (CORBA) Solution Set (SS) | TS | 4.3.1 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.603/32603-431.zip | The purpose of this Basic Configuration Management (CM) IRP: CORBA Solution Set is to define the mapping of the Basic CM IRP: IS (see 3GPP TS 32.602 [4]) to the protocol specific details necessary for implementation of this IRP in a CORBA/IDL environment.
This document defines NRM independent data types and methods.
This Solution Set specification is related to 3G TS 32.602 V8.1.X. |
32.235 | Telecommunication management; Charging management; Charging data description for application services | TS | 4.6.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.235/32235-460.zip | The present document is part of a series of documents specifying charging functionality in UMTS network with application services. The UMTS core network charging principles are specified in document TS 32.200 [2], which provides an umbrella for other charging documents that specify the structure and content of the CDRs and the interface protocol that is used to transfer them to the collecting node. The document structure is defined in figure 1. The CDR content and transport for application services are described in the present document especially for MMS. As the basis and reference for this work is taken the functional description of the MMS specified for stage 1 in TS 22.140[3] and stage 2 in TS 23.140 [4].
Figure 1 Charging Document Structure
All references, abbreviations, definitions, descriptions, principles and requirements that are common are defined in the 3GPP Vocabulary [1] and specialised to charging in UMTS domains or subsystems are provided in the umbrella document [2]. |
33.200 | 3G Security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security | TS | 4.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.200/33200-430.zip | This technical specification covers the security mechanisms and procedures necessary to protect the MAP protocol. The complete set of enhancements and extensions to facilitate security protection for the MAP protocol is termed MAPsec and it covers transport security in the MAP protocol itself and the security management procedures.
The security mechanisms specified for MAP are on the application layer. This means that MAPsec is independent of the network and transport protocols to be used.
This technical specification contains the stage-2 specification for security protection of the MAP protocol. The actual implementation (stage-3) specification can be found in the MAP stage-3 specification, TS 29.002 [4].
NOTE: It is explicitly noted that automated key management and key distribution is not part of Rel‑5. All key management and key distribution in Rel‑5 shall therefore be carried out by other means (see Annex A). |
33.103 | 3G security; Integration guidelines | TS | 4.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.103/33103-420.zip | This technical specification defines how elements of the 3G-security architecture are to be integrated into the following entities of the system architecture.
- Home Environment Authentication Centre (HE/AuC)
- Serving Network Visited Location Register (VLR/SGSN)
- Radio Network Controller (RNC)
- Mobile station User Identity Module (UIM)
- Mobile Equipment (ME)
This specification is derived from 3G "Security architecture". [1]
The structure of this technical specification is a series of tables, which describe the security information and cryptographic functions to be stored in the above entities of the 3G system.
For security information, this is in terms of multiplicity, lifetime, parameter length and whether mandatory or optional.
For the cryptographic functions, the tables also include an indication of whether the implementation needs to be standardised or can be proprietary.
The equivalent information for the alternative Temporary Key proposal is included in an appendix to this document. |
33.106 | 3G security; Lawful interception requirements | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.106/33106-400.zip | |
33.102 | 3G security; Security architecture | TS | 4.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.102/33102-450.zip | This specification defines the security architecture, i.e., the security features and the security mechanisms, for the third generation mobile telecommunication system.
A security feature is a service capability that meets one or several security requirements. The complete set of security features address the security requirements as they are defined in "3G Security: Threats and Requirements" (TS 21.133 [1]) and implement the security objectives and principles described in TS 33.120 [2]. A security mechanism is an element that is used to realise a security feature. All security features and security mechanisms taken together form the security architecture.
An example of a security feature is user data confidentiality. A security mechanism that may be used to implement that feature is a stream cipher using a derived cipher key.
This specification defines 3G security procedures performed within 3G capable networks (R99+), i.e. intra-UMTS and UMTS-GSM. As an example, UMTS authentication is applicable to UMTS radio access as well as GSM radio access provided that the serving network node and the MS are UMTS capable. Interoperability with non-UMTS capable networks (R98-) is also covered.
GSM security functions are defined in the TS 43.020 [36].
NOTE: The usage of the authentication management field (AMF) is specified in Annex H and applies for the third (UMTS), fourth (LTE) and fifth (5G system) generation of mobile telecommunication systems. |
32.800 | Telecommunication management; Management level procedures and interaction with UTRAN | TR | 4.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.800/32800-400.zip | The principle objective of the present document is to provide supporting information for the O&M standardisation of a (multi-vendor) UTRAN network. The actual specification work relating to the O&M interface between Network and Network Manager can be found in [9], [10] and [11] and for the Iub interface in [1]. For this reason the present document may contain information or working assumptions which are not a direct part of the specifications, but are essential to the progress and informed decision making. |
34.108 | Common test environments for User Equipment (UE); Conformance testing | TS | 4.11.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.108/34108-4b0.zip | The present document contains definitions of reference conditions and test signals, default parameters, reference radio bearer configurations used in radio bearer interoperability testing, common radio bearer configurations for other test purposes, common requirements for test equipment and generic set-up procedures for use in UE conformance tests. |
33.107 | 3G security; Lawful interception architecture and functions | TS | 4.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.107/33107-430.zip | |
34.109 | Terminal logical test interface; Special conformance testing functions | TS | 4.6.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.109/34109-460.zip | |
34.121 | Terminal conformance specification, Radio transmission and reception (FDD) | TS | 4.1.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.121/34121-410.zip | The present document specifies the measurement procedures for the conformance test of the user equipment (UE) that contain transmitting characteristics, receiving characteristics and performance requirements in addition to requirements for support of RRM (Radio Resource Management) in FDD mode.
The requirements are listed in different clauses only if the corresponding parameters deviate. More generally, tests are only applicable to those mobiles that are intended to support the appropriate functionality. To indicate the circumstances in which tests apply, this is noted in the “definition and applicability” part of the test.
For example only Release 5 and later UE declared to support HSDPA shall be tested for this functionality. In the event that for some tests different conditions apply for different releases, this is indicated within the text of the test itself. |
34.122 | Terminal conformance specification; Radio transmission and reception (TDD) | TS | 4.10.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.122/34122-4a0.zip | This present document specifies the measurement procedure for the conformance test of the mobile station that contain transmitting characteristics, receiving characteristics and performance requirements in addition to requirements for support of RRM (Radio Resource Management) in both UTRATDD modes. The two options are the 3,84 Mcps TDD Option and 1,28 Mcps TDD Option, respectively.
The requirements are listed in different clauses only if the corresponding parameters deviate. More generally, tests are only applicable to those mobiles that are intended to support the appropriate functionality. To indicate the circumstances in which tests apply, this is noted in the “definition and applicability” part of the test.
For example only release 5 and later UE declared to support HSDPA shall be tested for this functionality. In the event that for some tests different conditions apply for different releases, this is indicated within the text of the test itself. |
34.123-1 | User Equipment (UE) conformance specification; Part 1: Protocol conformance specification | TS | 4.3.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-1/34123-1-430.zip | The present document specifies the protocol conformance testing for the 3rd Generation User Equipment (UE).
This is the first part of a multi-part test specification. The following information can be found in this part:
- the overall test structure;
- the test configurations;
- the conformance requirement and reference to the core specifications;
- the test purposes; and
- the description of the tests’ procedures, the specific test requirements and the messages exchanged.
The following information relevant to the tests described in the present document can be found in accompanying specifications:
- the default setting of the test parameters [9];
- the applicability of each test case and the Implementation Conformance Statement (ICS) pro-forma [11].
Note: The present document does not contain any tests on the USIM, or the interface between the UE and the USIM. These tests are documented elsewhere.
The present document is valid for UE implemented according to 3GPP releases starting from Release 1999 up to the Release indicated on the cover page of the present document. |
34.123-2 | User Equipment (UE) conformance specification; Part 2: Implementation conformance statement (ICS) proforma specification | TS | 4.3.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-2/34123-2-430.zip | The present document provides the Implementation Conformance Statement (ICS) proforma for 3rd Generation User Equipment (UE), in compliance with the relevant requirements, and in accordance with the relevant guidance given in ISO/IEC 9646-7 [2] and ETS 300 406 [3].
The present document also specifies a recommended applicability statement for the test cases included in TS 34.123-1. These applicability statements are based on the features implemented in the UE.
Special conformance testing functions can be found in 3GPP TS 34.109 [45] and the common test environments are included in 3GPP TS 34.108 [44].
The present document is valid for UE implemented according to 3GPP releases starting from Release 1999 up to the Release indicated on the cover page of the present document. |
32.634 | Telecommunication management; Configuration Management (CM); Core network resources Integration Reference Point (IRP): Common Management Information Protocol (CMIP) Solution Set (SS) | TS | 4.1.1 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.634/32634-411.zip | The present document specifies the Common Management Information Protocol (CMIP) Solution Set (SS) for the CN Network Resource Integration Reference Point (IRP): Network Resource Model defined in 3GPP TS 32.632 [4]. In detail:
• Clause 4 contains an introduction to some concepts that are the base for some specific aspects of the CMIP interfaces.
• Clause 5 contains the GDMO definitions for the Alarm Management over the CMIP interfaces
• Clause 6 contains the ASN.1 definitions supporting the GDMO definitions provided in clause 5.
This Solution Set specification is related to 3GPP TS 32.632 V6.2.X [4]. |
34.124 | Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment | TS | 4.2.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.124/34124-420.zip | |
34.926 | Electromagnetic compatibility (EMC); Table of international requirements for mobile terminals and ancillary equipment | TR | 4.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.926/34926-400.zip | |
35.201 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification | TS | 4.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-410.zip | |
35.202 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.202/35202-400.zip | |
33.105 | 3G Security; Cryptographic algorithm requirements | TS | 4.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.105/33105-420.zip | |
35.203 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.203/35203-400.zip | |
33.901 | Criteria for cryptographic Algorithm design process | TR | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.901/33901-400.zip | This report discusses the possibilities for acquisition of the cryptographic algorithms that has to be standardised in UMTS. The focus is on the encryption function used in the data confidentiality mechanism and the message authentication function used in the signalling data integrity mechanism.
First certain aspects of the process and desired results for an algorithm specification and their pro's and cons will be given. These aspects will include the possible design strategies, the evaluation strategies, the possibilities for distribution of the algorithms and the options for the liability and responsibility for the algorithm.
Then a number of the most realistic scenarios for the algorithm specification will be presented. These scenarios will be used as a basis to make a final choice for the specification process for cryptographic algorithms in third generation mobile systems. Finally, a preferred procedure will be described. |
33.909 | 3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions | TR | 4.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.909/33909-401.zip | This public report contains a detailed summary of the work performed during the design and evaluation of the 3GPP Authentication Functions denoted as the MILENAGE algorithm set. It contains all results and findings from this work and should be read as a supplement to the specifications of the algorithms in ref. [3] and the general project report, ref. [4]. |
35.206 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.206/35206-400.zip | |
35.909 | 3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation | TR | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.909/35909-400.zip | |
33.902 | Formal Analysis of the 3G Authentication Protocol | TR | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.902/33902-400.zip | This report contains formal analyses of the authentication and key agreement (AKA) protocol specified in 3G TS 33.102. These analyses are carried out using various means of formal logic suitable for demonstrating security and correctness properties of the AKA protocol.
The structure of this technical specification is as follows:
clause 2 lists the references used in this specification;
clause 3 lists the definitions and abbreviations used in this specification;
clause 4 refers to the main body of this report. The main body is only referred to because it is not available in Word-, but only in pdf-format. The corresponding .pdf-documents are attached to this document. |
41.031 | Fraud Information Gathering System (FIGS); Service requirements; Stage 0 | TR | 4.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/41_series/41.031/41031-401.zip | |
33.120 | Security Objectives and Principles | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.120/33120-400.zip | The present document gives the objectives and principles of 3GPP security.
The principles state what is to be provided by 3G security as compared to the security of second generation systems. The principles will also ensure that 3G security can secure the new services and new service environments offered by 3G systems.
The objectives give general, high level requirements for 3GPP security which will be expanded upon in 3G TS 21.133 [1].
The priorities for the implementation of 3GPP security are also given. |
35.208 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.208/35208-400.zip | |
41.101 | Technical Specifications and Technical Reports for a GERAN-based 3GPP system | TS | 4.18.0 | SP | https://www.3gpp.org/ftp/Specs/archive/41_series/41.101/41101-4i0.zip | |
33.908 | 3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms | TR | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.908/33908-400.zip | This technical report is a description of the work undertaken by SAGE Task Force for the design of the standard 3GPP Confidentiality and Integrity Algorithms (SAGE TF 3GPP), and to formally approve the release of these algorithms to 3GPP.
With regard to the design of the algorithms, the scope of the present document is confined to a description of the design criteria, the design methodology and an outline of the content and structure of the specification and test data documents.
The standard 3GPP Confidentiality and Integrity Algorithms are based on a Block Cipher named KASUMI. The algorithms specification and associated test data are documented in the Specification of the 3GPP Confidentiality and Integrity Algorithms which consists of the following four documents:
- Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 specifications (TS 35.201).
- Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI algorithm specification (TS 35.202).
- Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 3: Implementors' test data (TS 35.203).
- Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 4: Design conformance test data (TS 35.204).
With regard to the evaluation of the algorithm, the scope of this report is restricted to a description of the evaluation criteria, the method of evaluation and the main conclusions from the evaluation that led to the Task Force approving the specification. A detailed summary of conclusions of the evaluation is provided in a public evaluation report [3] produced by the Task Force. |
35.205 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.205/35205-400.zip | This report is a description of the work undertaken by an ETSI SAGE Task Force on the design of the Milenage Algorithm Set: an example set of 3GPP Authentication and Key Generation Functions.
The 3GPP Authentication and Key Generation Functions are not standardized. An example set of these algorithms has been produced on request from 3GPP with the intent that it shall be offered to the UMTS operators, to utilise instead of developing their own. An ETSI SAGE Task Force has carried out this work.
The requirement specification from 3GPP stated that operator personalisation of the example set shall be possible and that the basic kernel shall be possible to replace.
The example set is based on the block cipher Rijndael, which at the time was one of the AES candidates and the specification describes how the 7 algorithms used in 3GPP authentication and key generation are scheduled around this basic kernel. The specification and associated test data for the example algorithm set is documented in three documents:
- A formal specification of both the modes and the example kernel [3]
- A detailed test data document, covering modes and the example kernel [4]
- A "black box" test data document [5]
A detailed summary of the evaluation is provided in a public evaluation report [6]
This report gives an overview of the overall work by the task force. |
35.207 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.207/35207-400.zip | |
42.043 | Support of Localised Service Area (SoLSA); Service description; Stage 1 | TS | 4.0.0 | S1 | https://www.3gpp.org/ftp/Specs/archive/42_series/42.043/42043-400.zip | |
42.056 | GSM Cordless Telephony System (CTS), Phase 1; Service description; Stage 1 | TS | 4.0.0 | S1 | https://www.3gpp.org/ftp/Specs/archive/42_series/42.056/42056-400.zip | |
42.068 | Voice Group Call Service (VGCS); Stage 1 | TS | 4.2.0 | S1 | https://www.3gpp.org/ftp/Specs/archive/42_series/42.068/42068-420.zip | |
35.204 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.204/35204-400.zip | |
41.061 | General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/41_series/41.061/41061-400.zip | This TS constitutes a requirements specification for a cryptographic algorithm which is used to protect General Packet Radio Services (GPRS) as specified by GSM 02.60.
This TS is intended to provide the ETSI Security Algorithms Group of Experts (SAGE) with the information it requires in order to design and deliver a technical specification for such an algorithm.
The specification covers the intended use of the algorithm and use of the algorithm specification, technical requirements on the algorithm, requirements on the algorithm specification and test data, and quality assurance requirements on both the algorithm and its documentation. The specification also outlines the background to the production of this specification. |
43.010 | GSM Public Land Mobile Network (PLMN) connection types | TS | 4.2.0 | C3 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.010/43010-420.zip | |
41.033 | Lawful Interception requirements for GSM | TR | 4.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/41_series/41.033/41033-401.zip | This Technical Report describes the interface requirements of a mechanism which will deliver intercept from GSM mobile stations, including both speech and data product.
The stage 1 description of Lawful Interception will be specified in 3GPP TS 42.033.
The stage 2 description of Lawful Interception will be specified in 3GPP TS 43.033. |
43.013 | Discontinuous Reception (DRX) in the GSM system | TS | 4.0.0 | RP | https://www.3gpp.org/ftp/Specs/archive/43_series/43.013/43013-400.zip | |
43.019 | Subscriber Identity Module Application Programming Interface (SIM API) for Java Card; Stage 2 | TS | 4.3.0 | C6 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.019/43019-430.zip | The present document defines the stage two description of the Subscriber Identity Module Application Programming Interface (SIM API) internal to the SIM.
This stage two describes the functional capabilities and the information flow for the SIM API implemented on the Java Card 2.1 API specification [6].
The present document includes information applicable to network operators, service providers and SIM, server and database manufacturers. |
43.020 | Security related network functions | TS | 4.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.020/43020-450.zip | |
43.022 | Functions related to Mobile Station (MS) in idle mode and group receive mode | TS | 4.6.0 | RP | https://www.3gpp.org/ftp/Specs/archive/43_series/43.022/43022-460.zip | |
42.033 | Lawful Interception; Stage 1 | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/42_series/42.033/42033-400.zip | This Technical Specification provides the stage 1 description for a lawful interception function to be implemented in a given GSM PLMN in order for a network operator to be able to fulfil national lawful requirements. It shall be noted that national variation may exist but it is not the intention for this specification to encompass all of them. The purpose of this specification is to cover the options which may be selectable according to national regulations or as required by the GSM PLMN operator in co-operation with their suppliers.
In the preparation of this specification general reference was made to the European Union Council Resolution, January 1995: "International Requirements for the Lawful Interception of Telecommunications". |
43.033 | 3G security; Lawful Interception; Stage 2 | TS | 4.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.033/43033-400.zip | The present document gives the stage 2 description of Lawful Interception within a PLMN for circuit switched systems and GPRS. It does not address the interface between the PLMN and the LEA lawful intercepted product and related information collection functions. This is outside the scope of the GSM standard.
The structure of the present document is as follows:
- clause 4 covers the architecture of the interception system;
- clause 5 describes how interception is activated, deactivated and interrogated within the interception system;
- clause 6 describes how the system is provisioned, defines events at which interception takes place and what kind of information is generated at each event;
- clause 7 provides brief descriptions of various intercept cases;
- clause 8 reviews security requirements for access to the interception system;
- annex A provides information flows to illustrate when intercepted traffic and related data is generated;
- annex B describes an interception system for GPRS. The annex is subdivided into 5 sections that are identical in structure to clauses 4 through 8, but applicable to a GPRS clause rather than a GSM circuit switched system. |
43.045 | Technical realization of facsimile group 3 transparent | TS | 4.0.0 | C3 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.045/43045-400.zip | |
43.050 | Transmission planning aspects of the speech service in the GSM Public Land Mobile Network (PLMN) system | TS | 4.0.0 | S4 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.050/43050-400.zip | |
43.052 | GSM Cordless Telephony System (CTS), Phase 1; Lower Layers of the CTS Radio Interface, Stage 2 | TS | 4.0.0 | RP | https://www.3gpp.org/ftp/Specs/archive/43_series/43.052/43052-400.zip | |
42.019 | Subscriber Identity Module Application Programming Interface (SIM API); Stage 1 | TS | 4.1.0 | C6 | https://www.3gpp.org/ftp/Specs/archive/42_series/42.019/42019-410.zip | The present document defines the stage one description of the Subscriber Identity Module Application Programming Interface (SIM API) internal to the SIM. Stage one is an overall service description, and does not deal with the implementation details of the API.
The present document includes information applicable to network operators, service providers and terminal, SIM, switch and database manufacturers.
The present document contains the core requirements which are sufficient to provide a complete service.
It is highly desirable however, that technical solutions for a SIM API should be sufficiently flexible to allow for possible enhancements. Additional functionalities not documented in the present document may implement requirements which are considered outside the scope of the present document. This additional functionality may be on a network-wide basis, nation-wide basis or particular to a group of users. Such additional functionality shall not compromise conformance to the core requirements of the service. |
43.055 | Dual Transfer Mode (DTM); Stage 2 | TS | 4.6.0 | RP | https://www.3gpp.org/ftp/Specs/archive/43_series/43.055/43055-460.zip | |
43.005 | Technical performance objectives | TS | 4.0.0 | CP | https://www.3gpp.org/ftp/Specs/archive/43_series/43.005/43005-400.zip | |
43.059 | Functional stage 2 description of Location Services (LCS) in GERAN | TS | 4.7.0 | RP | https://www.3gpp.org/ftp/Specs/archive/43_series/43.059/43059-470.zip | |
43.064 | General Packet Radio Service (GPRS); Overall description of the GPRS radio interface; Stage 2 | TS | 4.5.0 | RP | https://www.3gpp.org/ftp/Specs/archive/43_series/43.064/43064-450.zip | |
43.068 | Voice Group Call Service (VGCS); Stage 2 | TS | 4.6.0 | C1 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.068/43068-460.zip | |
43.069 | Voice Broadcast Service (VBS); Stage 2 | TS | 4.5.0 | C1 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.069/43069-450.zip | |
43.073 | Support of Localised Service Area (SoLSA); Stage 2 | TS | 4.0.0 | C4 | https://www.3gpp.org/ftp/Specs/archive/43_series/43.073/43073-400.zip | |
44.001 | Mobile Station - Base Station System (MS - BSS) interface; General aspects and principles | TS | 4.1.0 | C1 | https://www.3gpp.org/ftp/Specs/archive/44_series/44.001/44001-410.zip | |
44.003 | Mobile Station - Base Station System (MS - BSS) Interface Channel Structures and Access Capabilities | TS | 4.0.0 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.003/44003-400.zip | |
44.004 | GSM/EDGE Layer 1; General Requirements | TS | 4.2.0 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.004/44004-420.zip | |
44.005 | GSM/EDGE Data Link (DL) Layer; General aspects | TS | 4.0.0 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.005/44005-400.zip | |
44.006 | Mobile Station - Base Station System (MS - BSS) interface; Data Link (DL) layer specification | TS | 4.3.0 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.006/44006-430.zip | |
44.012 | Short Message Service Cell Broadcast (SMSCB) support on the mobile radio interface | TS | 4.0.1 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.012/44012-401.zip | |
44.013 | Performance requirements on the mobile radio interface | TS | 4.1.0 | C1 | https://www.3gpp.org/ftp/Specs/archive/44_series/44.013/44013-410.zip | |
44.014 | Individual equipment type requirements and interworking; Special GSM/EDGE conformance testing functions | TS | 4.4.0 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.014/44014-440.zip | |
42.017 | Subscriber Identity Module (SIM); Functional characteristics | TS | 4.0.0 | C6 | https://www.3gpp.org/ftp/Specs/archive/42_series/42.017/42017-400.zip | The present document defines the functional characteristics and requirements of the Subscriber Identity Module (SIM) for use in Digital Cellular Telecommunications System (GSM) applications. All references to GSM shall apply equally to any band specified for GSM unless otherwise stated.
The SIM is the entity that contains the identity of the subscriber. When placed in a Mobile Equipment (ME), together they become a Mobile Station (MS) which may then register onto a GSM network.
The primary function of the SIM in conjunction with a GSM network is to authenticate the validity of an MS when accessing the network. In addition it provides a means to authenticate the user and may also store other subscriber-related information or applications. Subscription entitlements are stored not in the SIM, but in the network.
If the SIM functionality is incorporated into a multi-application card, the GSM application may be used in other telecommunication applications.
In addition, SIMs are permitted to contain non-GSM functionality. In the case of multi-application cards, the present document defines just the GSM application. |
44.021 | Rate adaption on the Mobile Station - Base Station System (MS - BSS) interface | TS | 4.1.0 | C3 | https://www.3gpp.org/ftp/Specs/archive/44_series/44.021/44021-410.zip | |
44.031 | Location Services (LCS); Mobile Station (MS) - Serving Mobile Location Centre (SMLC) Radio Resource LCS Protocol (RRLP) | TS | 4.14.0 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.031/44031-4e0.zip | |
44.035 | GSM/EDGE Location Services (LCS); Broadcast network assistance for Enhanced Observed Time Difference (E-OTD) and Global Positioning System (GPS) positioning methods | TS | 4.1.0 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.035/44035-410.zip | |
44.018 | Mobile radio interface layer 3 specification; GSM/EDGE Radio Resource Control (RRC) protocol | TS | 4.23.0 | RP | https://www.3gpp.org/ftp/Specs/archive/44_series/44.018/44018-4n0.zip | |
44.057 | GSM Cordless Telephony System (CTS), Phase 1; CTS supervising system layer 3 specification | TS | 4.0.0 | C1 | https://www.3gpp.org/ftp/Specs/archive/44_series/44.057/44057-400.zip | |
42.009 | Security aspects | TS | 4.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/42_series/42.009/42009-410.zip | Bearer and Teleservices, as respectively defined in GSM 02.02 and GSM 02.03, are the objects which the GSM PLMN operators offer to their customers. Besides these basic telecommunications services, features which aim at up‑grading these basic services need also to be offered. Due to the use of radiocommunications in a PLMN, which are of a special nature compared to classical distribution transmission techniques used in the fixed networks, such a category of features is related to security aspects.
In a GSM PLMN, both the users and the network operator have to be protected against undesirable intrusion of third parties. However, measures should be provided for in order to insure maximum protection of the rights of the individuals concerns. As a consequence, a security feature is either a supplementary service to Tele or Bearer services, which can be selected by the subscriber, or a network function involved in the provision of one or several telecommunication services.
The purpose of the present document is to define the security features which are to be available in a GSM PLMN, together with the associated levels of protection. The present document is only concerned with those security features which aim at the up‑grading of the security in a GSM PLMN. In particular, end‑to‑end security is outside the scope of the present document.
The implementation aspects of security features are described in GSM 03.20. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.