Resources

Filter

NG.102 IMS Profile for Converged IP Communications v2.0

Document

Thursday 11 Feb 2016 | All Documents |

This Permanent Reference Document (PRD) defines a profile that identifies a minimum mandatory set of common IMS functionalities that are defined in 3GPP specifications and other ...

IR.94 IMS Profile for Conversational Video Service v10.0

Document

Tuesday 9 Feb 2016 | All Documents | Networks Group |

IR.94 is the definition of an IMS profile by listing a number of Evolved Universal Terrestrial Radio Access Network (E-UTRAN), Evolved Packet Core, IMS core, and UE features which are ...

SGP.21 RSP Architecture v1.0

Document

Wednesday 23 Dec 2015 | All Documents | SIM Working Group |

This document provides an architecture approach as a proposed solution for the Remote SIM Provisioning of Devices across all markets. The main goal of the Architecture is to define a mechanism for the Remote SIM Provisioning of Devices ...

South Korea’s Interconnected VoLTE Service Lifts Off

Resource

Tuesday 1 Dec 2015 | All Documents |

We announced back in June that South Korea’s mobile ...

SGP.02 Remote Provisioning Architecture for Embedded UICC Technical Specification v2.1

Document

Monday 2 Nov 2015 | All Documents | SIM Working Group |

SGP.02 defines a technical solution for the remote provisioning and management of the Embedded UICC (eUICC) in machine to machine devices which are not easily reachable.

SGP.12 NFC Multi Protocol for Interoperability v2.0

Document

Tuesday 6 Oct 2015 | All Documents | SIM Working Group |

SGP.12 makes recommendations to handset manufacturers and to Proximity Coupling Device (PCD) manufacturers to ensure their interoperability.

SGP.04 NFC SP Applet Development Guideline v4.0

Document

Wednesday 30 Sep 2015 | All Documents | SIM Working Group |

The purpose of this document is to provide to Service Providers some rules, common to the Mobile Network Operators, in order to properly develop their mobile NFC service Applet (Basic Applications [7]). This document is for guidance ...

SGP.05 Embedded UICC Protection Profile v1.1

Document

Tuesday 25 Aug 2015 | All Documents | SIM Working Group |

SGP.05 defines the protection profile to be used in the remote provisioning and management of embedded UICCs machine-to-machine devices.

NG.103 VoLTE – RCS Roaming and Interconnection Guidelines v1.

Document

Tuesday 19 May 2015 | All Documents | Networks Group |

This document defines guidelines for IMS service roaing in an Inter-Service provider enviroment, and targets existing IMS service deplyments.  

NG.102 IMS Profile for Converged IP Communications v1.0

Document

Tuesday 19 May 2015 | All Documents | Networks Group |

This document defines a profile that identifies a minimun mandatory set of common IMS functionalities, defined in 3GPP specifications and other GSMA PRDs, that a wireless device and network are required ...

IR.60 Prepaid Service Roaming Test v5.0

Document

Saturday 4 Apr 2015 | All Documents | Networks Group |

IR.60 provides End2End functional test cases for CAMEL prepaid services. The template allows the user to decide which tests scenarios deem useful for inter-operator tests.

WWG.04 Network Management of Encrypted Traffic v1.0

Document

Saturday 28 Feb 2015 | All Documents | Internet Group |

Due to many factors, the use of encryption is on the rise on the Internet. The move towards encrypted protocols, such as HTTPS, poses challenges to how mobile network operators manage their networks. This document explores some options ...

IR.84 Video Share Phase 2 Interoperability Specification v3.0

Document

Friday 16 Jan 2015 | All Documents | Networks Group |

IR.84 presents the technical principles for terminal interoperable Real-Time Live Video Share services for Phase 2, and describes backward compatibility with the technical principles within Phase 1 as described in IR.74 "Video Share ...

IR.40 Guidelines for IPv4 Addressing and AS Numbering for GPRS Network Infrastructure and Mobile Terminal v8.0

Document

Monday 12 Jan 2015 | All Documents | Networks Group |

IR.40 provides the following guidelines to GSM operators for the implementation of General Packet Radio Service (GPRS).  IPv4 addressing for the GPRS network infrastructure, autonomous System  Numbering for IP network routing within ...

SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2

Document

Tuesday 23 Dec 2014 | All Documents | Fraud and Security Group |

The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...

SG.16 GPRS Security Guide for Users v3.1

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

This document presents the general security model of various GPRS connection types. The document is intended as a security primer for users of GPRS services. It is not a formal training document, but provides general high level ...

SG.01 Rules for the Management and the Distribution of the GSM A5/1 Algorithm use for Signalling and Data Privacy v4.1

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

This PRD sets out the rules under which the GSM cipher algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be administered by ...

SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5/1 Algorithm for Signalling and Data privacy in the GSM System v4.1

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...

SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

This PRD sets out the rules under which the GSM example authentication algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be ...

SG.04 Confidentiality and Restricted Usage Undertaking Related to the Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) for Authentication and Cipher Key Generation in the GSM System v3.4

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...