oSIST prEN 300 392-3-15 V1.5.0:2026
(Main)Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D) - Part 3: Interworking at the Inter-System Interface (ISI) - Sub-part 15: Transport layer independent Additional Network Feature, Mobility Management (ANF-ISIMM)
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D) - Part 3: Interworking at the Inter-System Interface (ISI) - Sub-part 15: Transport layer independent Additional Network Feature, Mobility Management (ANF-ISIMM)
REN/TCCE-03277
Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno delovanje na medsistemskem vmesniku (ISI) - 15. poddel: Neodvisnost transportnih plasti dodatne omrežne funkcije, upravljanje mobilnosti (ANF-ISIMM)
General Information
- Status
- Not Published
- Public Enquiry End Date
- 31-May-2026
- Technical Committee
- MOC - Mobile Communications
- Current Stage
- 4020 - Public enquire (PE) (Adopted Project)
- Start Date
- 07-Apr-2026
- Due Date
- 25-Aug-2026
Buy Documents
ETSI EN 300 392-3-15 V1.5.0 (2026-04) - Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 15: Transport layer independent Additional Network Feature, Mobility Management (ANF-ISIMM)
Get Certified
Connect with accredited certification bodies for this standard

BSI Group
BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.
TL 9000 QuEST Forum
Telecommunications quality management system.

NYCE
Mexican standards and certification body.
Sponsored listings
Frequently Asked Questions
oSIST prEN 300 392-3-15 V1.5.0:2026 is a standard published by the Slovenian Institute for Standardization (SIST). Its full title is "Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D) - Part 3: Interworking at the Inter-System Interface (ISI) - Sub-part 15: Transport layer independent Additional Network Feature, Mobility Management (ANF-ISIMM)". This standard covers: REN/TCCE-03277
REN/TCCE-03277
oSIST prEN 300 392-3-15 V1.5.0:2026 is classified under the following ICS (International Classification for Standards) categories: 33.070.10 - Terrestrial Trunked Radio (TETRA); 35.100.40 - Transport layer. The ICS classification helps identify the subject area and facilitates finding related standards.
oSIST prEN 300 392-3-15 V1.5.0:2026 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
EUROPEAN STANDARD
Terrestrial Trunked Radio (TETRA);
Voice plus Data (V+D);
Part 3: Interworking at the Inter-System Interface (ISI);
Sub-part 15: Transport layer independent Additional Network
Feature, Mobility Management (ANF-ISIMM)
2 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
Reference
REN/TCCE-03277
Keywords
management, mobility, TETRA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from the
ETSI Search & Browse Standards application.
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format on ETSI deliver repository.
Users should be aware that the present document may be revised or have its status changed,
this information is available in the Milestones listing.
If you find errors in the present document, please send your comments to
the relevant service listed under Committee Support Staff.
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure (CVD) program.
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2026.
All rights reserved.
ETSI
3 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
Contents
Intellectual Property Rights . 16
Foreword . 16
Modal verbs terminology . 17
1 Scope . 18
2 References . 19
2.1 Normative references . 19
2.2 Informative references . 20
3 Definition of terms, symbols and abbreviations . 20
3.1 Terms . 20
3.2 Symbols . 23
3.3 Abbreviations . 23
4 Overview . 25
4.1 General . 25
4.2 Applicability . 25
4.2.1 Entities . 25
4.2.2 Services . 25
4.3 Testability . 26
4.4 Provision/withdrawal. 26
4.5 Activation/deactivation . 26
4.6 Charging . 26
5 The generic ANF-ISIMM stage 1 service model . 26
5.1 ANF-ISIMM - the service provider . 26
5.2 SwMI MMs - the ANF-ISIMM service users. 27
5.3 Stage 1 description conventions . 28
6 Migration service description - stage 1 . 29
6.1 Pre-requisite requirements for the migration service . 29
6.2 Service definition . 29
6.3 Service description . 29
6.4 Service architecture . 30
6.5 Normal procedures . 31
6.5.1 Invocation . 31
6.5.1.1 Invocation criteria . 31
6.5.1.2 Invocation of ANF-ISIMM . 31
6.5.2 Operation . 33
6.5.2.1 General . 33
6.5.2.2 Migration with pre-defined migration profile(s) (applicable for case 1) . 34
6.5.2.2.1 Support for call restoration . 34
6.5.2.2.2 Final migration approval . 34
6.5.2.3 Migration with migration profile exchange (applicable for case 2, 3a and 3b) . 36
6.5.2.3.1 Basic migration profile exchange . 36
6.5.2.3.2 SS-migration profile(s) exchange (applicable for case 3a) . 46
6.5.2.3.3 Support for call restoration . 48
6.5.2.3.4 Final migration approval (applicable for cases 2), 3a) and 3b)) . 48
6.5.2.3.5 SS-migration profile exchange after final migration approval (applicable for case 3b)) . 49
6.6 Interactions . 49
6.6.1 Interactions with the authentication service . 49
6.6.2 Interactions with the group attachment and the group detachment services . 49
7 Restricted migration service description - stage 1 . 49
7.1 Pre-requisite requirements for the restricted migration service . 49
7.2 Service definition . 50
7.3 Service description . 50
7.4 Service architecture . 51
ETSI
4 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
7.5 Normal procedures . 51
7.5.1 Invocation . 51
7.5.1.1 Invocation criteria . 51
7.5.1.2 Invocation of ANF-ISIMM . 52
7.5.2 Operation . 54
7.5.2.1 General . 54
7.5.2.2 Operation when the individual subscriber visited SwMI MM invokes restricted migration . 55
7.5.2.3 Invocation of RSI . 56
7.5.2.4 Support for emergency call restoration . 56
7.5.2.5 Receipt of restricted migration approval . 56
7.6 Exceptional procedures . 56
7.6.1 General . 56
7.6.2 Detected by the individual subscriber visited SwMI MM . 57
7.6.3 Detected by the individual subscriber home SwMI MM . 58
7.7 Interactions . 58
7.7.1 Interactions with the authentication service . 58
7.7.2 Interactions with the group attachment and the group detachment services . 58
8 Removal of Subscriber Information (RSI) service description - stage 1 . 58
8.1 Service definition . 58
8.2 Service description . 58
8.3 Service architecture . 59
8.4 Normal procedures . 59
8.4.1 Invocation . 59
8.4.1.1 Invocation criteria . 59
8.4.1.2 Invocation of ANF-ISIMM . 60
8.4.2 Operation . 61
8.5 Exceptional procedures . 63
8.6 Interaction with authentication . 64
9 De-registration service description - stage 1 . 64
9.1 Service definition . 64
9.2 Service description . 64
9.3 Service architecture . 64
9.4 Normal procedures . 65
9.4.1 Invocation . 65
9.4.1.1 Invocation criteria . 65
9.4.1.2 Invocation of ANF-ISIMM . 65
9.4.2 Operation . 66
9.5 Exceptional procedures . 67
10 Profile update service description - stage 1 . 68
10.1 Service definition . 68
10.2 Service description . 68
10.3 Service architecture . 68
10.4 Normal procedures . 69
10.4.1 Invocation . 69
10.4.1.1 Invocation criteria . 69
10.4.1.2 Invocation of ANF-ISIMM . 70
10.4.2 Operation . 80
10.5 Exceptional operation . 90
11 SS-profile update service description - stage 1 . 90
11.1 Service definition . 90
11.2 Service description . 91
11.3 Service architecture . 91
11.4 Normal procedures . 91
11.4.1 Invocation . 91
11.4.1.1 Invocation criteria . 91
11.4.1.2 Invocation of ANF-ISIMM . 92
11.4.2 Operation . 92
11.4.2.1 Creation of temporary SS-migration profiles . 92
11.4.2.2 Informing home SwMI MM about the temporary SS-migration profiles . 93
ETSI
5 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
11.5 Exceptional operation . 94
12 Authentication service description - stage 1 . 95
12.1 Pre-requisite requirements for the authentication service. 95
12.2 Service definition . 96
12.3 Service description . 96
12.4 Service architecture . 96
12.5 Normal procedures . 96
12.5.1 Invocation . 96
12.5.1.1 Invocation criteria . 96
12.5.1.2 Invocation of ANF-ISIMM . 97
12.5.2 Operation (relevant for case 1) . 98
12.5.2.1 Exchange of authentication parameters . 98
12.5.2.2 Sending of authentication result . 98
12.6 Exceptional procedures . 99
12.6.1 General . 99
12.6.2 Detected by the individual subscriber visited SwMI MM . 100
12.6.3 Detected by the individual subscriber home SwMI MM . 100
12.7 Interaction with migration and restricted migration . 101
12.7.1 Normal operation . 101
12.7.2 Exceptional procedures . 101
13 Over The Air Re-keying (OTAR) service description - stage 1 . 102
13.1 Pre-requisite requirements . 102
13.2 Service definition . 102
13.3 Service description . 102
13.4 Service architecture . 103
13.5 Normal procedures . 103
13.5.1 Invocation . 103
13.5.1.1 Invocation criteria . 103
13.5.1.2 Invocation of ANF-ISIMM . 104
13.5.1.2.1 Case 1) . 104
13.5.1.2.2 Case 2) . 104
13.5.1.2.3 Case 3) . 104
13.5.1.2.4 Case 4) . 105
13.5.2 Operation . 105
13.5.2.1 Case 1) . 105
13.5.2.2 Case 2) . 106
13.5.2.3 Case 3) . 107
13.5.2.4 Case 4) . 108
13.6 Exceptional procedures . 108
13.6.1 General . 108
13.6.2 Detected by the individual subscriber visited SwMI MM . 109
13.6.3 Detected by the individual subscriber home SwMI MM . 110
14 Individual subscriber Database Recovery (IDR) service description - stage 1 . 110
14.1 Service definition . 110
14.2 Service description . 110
14.3 Service architecture . 111
14.4 Normal procedures . 111
14.4.1 Invocation . 111
14.4.1.1 Invocation criteria . 111
14.4.1.2 Invocation of ANF-ISIMM . 112
14.4.2 Operation (relevant for case 1 and 2 unless otherwise stated) . 114
14.4.2.1 The individual subscriber visited SwMI MM receives the HMM recovery indication . 114
14.4.2.2 The individual subscriber home SwMI MM receives the VMM recovery indication . 114
14.4.2.3 The virtual migration or restricted migration . 115
14.4.2.4 The virtual RSI . 115
14.4.2.5 The iteration . 116
14.4.2.6 The completion of the IDR . 116
14.4.2.6.1 VMM recovery . 116
14.4.2.6.2 HMM recovery . 116
14.5 Exceptional procedures . 117
ETSI
6 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
15 Group attachment service description - stage 1 . 118
15.1 Service definition . 118
15.2 Service description . 118
15.3 Service architecture . 119
15.4 Normal procedures . 119
15.4.1 Invocation . 119
15.4.1.1 Invocation criteria . 119
15.4.1.2 Invocation of ANF-ISIMM . 121
15.4.1.2.1 Case 1) . 121
15.4.1.2.2 Cases 2) to 4) . 122
15.4.1.2.3 Case 5) . 123
15.4.1.2.4 Case 6) . 128
15.4.2 Operation . 129
15.4.2.1 Case 1) . 129
15.4.2.1.1 General . 129
15.4.2.1.2 Group attachment with pre-defined migration profile(s) . 130
15.4.2.1.3 Group attachment with migration profile exchange . 132
15.4.2.1.4 SS-migration profile(s) exchange . 137
15.4.2.2 Cases 2) to 4). 140
15.4.2.2.1 Updates to G-HDB . 140
15.4.2.2.2 Sending of group attachment approval . 140
15.4.2.2.3 Receipt of group attachment approval . 141
15.4.2.3 Case 5) . 141
15.4.2.3.1 General . 141
15.4.2.3.2 Group home SwMI MM initiated group attachment with pre-defined migration profile(s) . 141
15.4.2.3.3 Group home SwMI MM initiated group attachment with migration profile exchange . 143
15.4.2.4 Case 6) . 145
15.4.2.4.1 Additional Group home SwMI MM initiated group attachment . 145
15.5 Exceptional procedures . 146
15.5.1 General . 146
15.5.2 Detected by the group visited SwMI MM . 147
15.5.3 Detected by the group home SwMI MM . 148
15.6 Interactions . 148
16 Group detachment service description (stage 1) . 149
16.1 Service definition . 149
16.2 Service description . 150
16.3 Service architecture . 151
16.4 Normal procedures . 151
16.4.1 Invocation . 151
16.4.1.1 General . 151
16.4.1.2 Invocation of ANF-ISIMM . 152
16.4.1.2.1 Cases 1) to 3) . 152
16.4.1.2.2 Case 4) . 153
16.4.2 Operation . 154
16.4.2.1 Cases 1) to 3). 154
16.4.2.2 Case 4) . 155
16.5 Exceptional procedures . 156
16.6 Interactions . 157
17 Group Database Recovery (GDR) service description - stage 1 . 158
17.1 Service definition . 158
17.2 Service description . 158
17.3 Service architecture . 159
17.4 Normal procedures . 159
17.4.1 Invocation . 159
17.4.1.1 Invocation criteria . 159
17.4.1.2 Invocation of ANF-ISIMM . 160
17.4.2 Operation (applicable for cases 1) and 2) unless otherwise stated) . 161
17.4.2.1 Verification of age information . 161
17.4.2.2 The group visited SwMI MM receives the G-HDR indication . 162
17.4.2.3 The group home SwMI MM receives the G-VDR indication . 162
ETSI
7 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
17.4.2.4 The virtual group attachment and detachment . 163
17.4.2.5 The iteration . 164
17.4.2.6 The completion of the GDR . 164
17.4.2.6.1 G-HDR . 164
17.4.2.6.2 G-VDR . 164
17.5 Exceptional procedures . 165
18 Group linking/unlinking service description - stage 1 . 166
18.1 Service definition . 166
18.2 Service description . 167
18.3 Service architecture . 167
18.4 Normal procedures . 168
18.4.1 Invocation . 168
18.4.1.1 Invocation criteria . 168
18.4.1.2 Invocation of ANF-ISIMM . 168
18.4.1.2.1 Case 1) - group linking service - Sending of Linking_req . 168
18.4.1.2.2 Case 2) - group unlinking service . 169
18.4.1.2.3 Case 3) - remote group unlinking service . 169
18.4.2 Operation . 170
18.4.2.1 General . 170
18.4.2.2 Case 1) - group linking service . 170
18.4.2.2.1 First phase of group linking service. 170
18.4.2.2.2 Second phase of group linking service . 171
18.4.2.3 Case 2) - group unlinking service . 173
18.4.2.4 Case 3) - remote group unlinking service . 174
18.5 Exceptional procedures . 174
18.5.1 General . 174
18.5.2 Case 1) - group linking service . 174
18.5.3 Case 2) - group unlinking service . 175
18.5.4 Case 3) - remote group unlinking service . 176
18.6 Interactions .
...
SLOVENSKI STANDARD
01-maj-2026
Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno
delovanje na medsistemskem vmesniku (ISI) - 15. poddel: Neodvisnost
transportnih plasti dodatne omrežne funkcije, upravljanje mobilnosti (ANF-ISIMM)
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D) - Part 3: Interworking at the
Inter-System Interface (ISI) - Sub-part 15: Transport layer independent Additional
Network Feature, Mobility Management (ANF-ISIMM)
Ta slovenski standard je istoveten z: ETSI EN 300 392-3-15 V1.5.0 (2026-04)
ICS:
33.070.10 Prizemni snopovni radio Terrestrial Trunked Radio
(TETRA) (TETRA)
35.100.40 Transportni sloj Transport layer
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
EUROPEAN STANDARD
Terrestrial Trunked Radio (TETRA);
Voice plus Data (V+D);
Part 3: Interworking at the Inter-System Interface (ISI);
Sub-part 15: Transport layer independent Additional Network
Feature, Mobility Management (ANF-ISIMM)
2 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
Reference
REN/TCCE-03277
Keywords
management, mobility, TETRA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from the
ETSI Search & Browse Standards application.
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format on ETSI deliver repository.
Users should be aware that the present document may be revised or have its status changed,
this information is available in the Milestones listing.
If you find errors in the present document, please send your comments to
the relevant service listed under Committee Support Staff.
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure (CVD) program.
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2026.
All rights reserved.
ETSI
3 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
Contents
Intellectual Property Rights . 16
Foreword . 16
Modal verbs terminology . 17
1 Scope . 18
2 References . 19
2.1 Normative references . 19
2.2 Informative references . 20
3 Definition of terms, symbols and abbreviations . 20
3.1 Terms . 20
3.2 Symbols . 23
3.3 Abbreviations . 23
4 Overview . 25
4.1 General . 25
4.2 Applicability . 25
4.2.1 Entities . 25
4.2.2 Services . 25
4.3 Testability . 26
4.4 Provision/withdrawal. 26
4.5 Activation/deactivation . 26
4.6 Charging . 26
5 The generic ANF-ISIMM stage 1 service model . 26
5.1 ANF-ISIMM - the service provider . 26
5.2 SwMI MMs - the ANF-ISIMM service users. 27
5.3 Stage 1 description conventions . 28
6 Migration service description - stage 1 . 29
6.1 Pre-requisite requirements for the migration service . 29
6.2 Service definition . 29
6.3 Service description . 29
6.4 Service architecture . 30
6.5 Normal procedures . 31
6.5.1 Invocation . 31
6.5.1.1 Invocation criteria . 31
6.5.1.2 Invocation of ANF-ISIMM . 31
6.5.2 Operation . 33
6.5.2.1 General . 33
6.5.2.2 Migration with pre-defined migration profile(s) (applicable for case 1) . 34
6.5.2.2.1 Support for call restoration . 34
6.5.2.2.2 Final migration approval . 34
6.5.2.3 Migration with migration profile exchange (applicable for case 2, 3a and 3b) . 36
6.5.2.3.1 Basic migration profile exchange . 36
6.5.2.3.2 SS-migration profile(s) exchange (applicable for case 3a) . 46
6.5.2.3.3 Support for call restoration . 48
6.5.2.3.4 Final migration approval (applicable for cases 2), 3a) and 3b)) . 48
6.5.2.3.5 SS-migration profile exchange after final migration approval (applicable for case 3b)) . 49
6.6 Interactions . 49
6.6.1 Interactions with the authentication service . 49
6.6.2 Interactions with the group attachment and the group detachment services . 49
7 Restricted migration service description - stage 1 . 49
7.1 Pre-requisite requirements for the restricted migration service . 49
7.2 Service definition . 50
7.3 Service description . 50
7.4 Service architecture . 51
ETSI
4 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
7.5 Normal procedures . 51
7.5.1 Invocation . 51
7.5.1.1 Invocation criteria . 51
7.5.1.2 Invocation of ANF-ISIMM . 52
7.5.2 Operation . 54
7.5.2.1 General . 54
7.5.2.2 Operation when the individual subscriber visited SwMI MM invokes restricted migration . 55
7.5.2.3 Invocation of RSI . 56
7.5.2.4 Support for emergency call restoration . 56
7.5.2.5 Receipt of restricted migration approval . 56
7.6 Exceptional procedures . 56
7.6.1 General . 56
7.6.2 Detected by the individual subscriber visited SwMI MM . 57
7.6.3 Detected by the individual subscriber home SwMI MM . 58
7.7 Interactions . 58
7.7.1 Interactions with the authentication service . 58
7.7.2 Interactions with the group attachment and the group detachment services . 58
8 Removal of Subscriber Information (RSI) service description - stage 1 . 58
8.1 Service definition . 58
8.2 Service description . 58
8.3 Service architecture . 59
8.4 Normal procedures . 59
8.4.1 Invocation . 59
8.4.1.1 Invocation criteria . 59
8.4.1.2 Invocation of ANF-ISIMM . 60
8.4.2 Operation . 61
8.5 Exceptional procedures . 63
8.6 Interaction with authentication . 64
9 De-registration service description - stage 1 . 64
9.1 Service definition . 64
9.2 Service description . 64
9.3 Service architecture . 64
9.4 Normal procedures . 65
9.4.1 Invocation . 65
9.4.1.1 Invocation criteria . 65
9.4.1.2 Invocation of ANF-ISIMM . 65
9.4.2 Operation . 66
9.5 Exceptional procedures . 67
10 Profile update service description - stage 1 . 68
10.1 Service definition . 68
10.2 Service description . 68
10.3 Service architecture . 68
10.4 Normal procedures . 69
10.4.1 Invocation . 69
10.4.1.1 Invocation criteria . 69
10.4.1.2 Invocation of ANF-ISIMM . 70
10.4.2 Operation . 80
10.5 Exceptional operation . 90
11 SS-profile update service description - stage 1 . 90
11.1 Service definition . 90
11.2 Service description . 91
11.3 Service architecture . 91
11.4 Normal procedures . 91
11.4.1 Invocation . 91
11.4.1.1 Invocation criteria . 91
11.4.1.2 Invocation of ANF-ISIMM . 92
11.4.2 Operation . 92
11.4.2.1 Creation of temporary SS-migration profiles . 92
11.4.2.2 Informing home SwMI MM about the temporary SS-migration profiles . 93
ETSI
5 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
11.5 Exceptional operation . 94
12 Authentication service description - stage 1 . 95
12.1 Pre-requisite requirements for the authentication service. 95
12.2 Service definition . 96
12.3 Service description . 96
12.4 Service architecture . 96
12.5 Normal procedures . 96
12.5.1 Invocation . 96
12.5.1.1 Invocation criteria . 96
12.5.1.2 Invocation of ANF-ISIMM . 97
12.5.2 Operation (relevant for case 1) . 98
12.5.2.1 Exchange of authentication parameters . 98
12.5.2.2 Sending of authentication result . 98
12.6 Exceptional procedures . 99
12.6.1 General . 99
12.6.2 Detected by the individual subscriber visited SwMI MM . 100
12.6.3 Detected by the individual subscriber home SwMI MM . 100
12.7 Interaction with migration and restricted migration . 101
12.7.1 Normal operation . 101
12.7.2 Exceptional procedures . 101
13 Over The Air Re-keying (OTAR) service description - stage 1 . 102
13.1 Pre-requisite requirements . 102
13.2 Service definition . 102
13.3 Service description . 102
13.4 Service architecture . 103
13.5 Normal procedures . 103
13.5.1 Invocation . 103
13.5.1.1 Invocation criteria . 103
13.5.1.2 Invocation of ANF-ISIMM . 104
13.5.1.2.1 Case 1) . 104
13.5.1.2.2 Case 2) . 104
13.5.1.2.3 Case 3) . 104
13.5.1.2.4 Case 4) . 105
13.5.2 Operation . 105
13.5.2.1 Case 1) . 105
13.5.2.2 Case 2) . 106
13.5.2.3 Case 3) . 107
13.5.2.4 Case 4) . 108
13.6 Exceptional procedures . 108
13.6.1 General . 108
13.6.2 Detected by the individual subscriber visited SwMI MM . 109
13.6.3 Detected by the individual subscriber home SwMI MM . 110
14 Individual subscriber Database Recovery (IDR) service description - stage 1 . 110
14.1 Service definition . 110
14.2 Service description . 110
14.3 Service architecture . 111
14.4 Normal procedures . 111
14.4.1 Invocation . 111
14.4.1.1 Invocation criteria . 111
14.4.1.2 Invocation of ANF-ISIMM . 112
14.4.2 Operation (relevant for case 1 and 2 unless otherwise stated) . 114
14.4.2.1 The individual subscriber visited SwMI MM receives the HMM recovery indication . 114
14.4.2.2 The individual subscriber home SwMI MM receives the VMM recovery indication . 114
14.4.2.3 The virtual migration or restricted migration . 115
14.4.2.4 The virtual RSI . 115
14.4.2.5 The iteration . 116
14.4.2.6 The completion of the IDR . 116
14.4.2.6.1 VMM recovery . 116
14.4.2.6.2 HMM recovery . 116
14.5 Exceptional procedures . 117
ETSI
6 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
15 Group attachment service description - stage 1 . 118
15.1 Service definition . 118
15.2 Service description . 118
15.3 Service architecture . 119
15.4 Normal procedures . 119
15.4.1 Invocation . 119
15.4.1.1 Invocation criteria . 119
15.4.1.2 Invocation of ANF-ISIMM . 121
15.4.1.2.1 Case 1) . 121
15.4.1.2.2 Cases 2) to 4) . 122
15.4.1.2.3 Case 5) . 123
15.4.1.2.4 Case 6) . 128
15.4.2 Operation . 129
15.4.2.1 Case 1) . 129
15.4.2.1.1 General . 129
15.4.2.1.2 Group attachment with pre-defined migration profile(s) . 130
15.4.2.1.3 Group attachment with migration profile exchange . 132
15.4.2.1.4 SS-migration profile(s) exchange . 137
15.4.2.2 Cases 2) to 4). 140
15.4.2.2.1 Updates to G-HDB . 140
15.4.2.2.2 Sending of group attachment approval . 140
15.4.2.2.3 Receipt of group attachment approval . 141
15.4.2.3 Case 5) . 141
15.4.2.3.1 General . 141
15.4.2.3.2 Group home SwMI MM initiated group attachment with pre-defined migration profile(s) . 141
15.4.2.3.3 Group home SwMI MM initiated group attachment with migration profile exchange . 143
15.4.2.4 Case 6) . 145
15.4.2.4.1 Additional Group home SwMI MM initiated group attachment . 145
15.5 Exceptional procedures . 146
15.5.1 General . 146
15.5.2 Detected by the group visited SwMI MM . 147
15.5.3 Detected by the group home SwMI MM . 148
15.6 Interactions . 148
16 Group detachment service description (stage 1) . 149
16.1 Service definition . 149
16.2 Service description . 150
16.3 Service architecture . 151
16.4 Normal procedures . 151
16.4.1 Invocation . 151
16.4.1.1 General . 151
16.4.1.2 Invocation of ANF-ISIMM . 152
16.4.1.2.1 Cases 1) to 3) . 152
16.4.1.2.2 Case 4) . 153
16.4.2 Operation . 154
16.4.2.1 Cases 1) to 3). 154
16.4.2.2 Case 4) . 155
16.5 Exceptional procedures . 156
16.6 Interactions . 157
17 Group Database Recovery (GDR) service description - stage 1 . 158
17.1 Service definition . 158
17.2 Service description . 158
17.3 Service architecture . 159
17.4 Normal procedures . 159
17.4.1 Invocation . 159
17.4.1.1 Invocation criteria . 159
17.4.1.2 Invocation of ANF-ISIMM . 160
17.4.2 Operation (applicable for cases 1) and 2) unless otherwise stated) . 161
17.4.2.1 Verification of age information . 161
17.4.2.2 The group visited SwMI MM receives the G-HDR indication . 162
17.4.2.3 The group home SwMI MM receives the G-VDR indication . 162
ETSI
7 Draft ETSI EN 300 392-3-15 V1.5.0 (2026-04)
17.4.2.4 The virtual group attachment and detachment . 163
17.4.2.5 The iteration . 164
17.4.2.6 The completion of the GDR . 164
17.4.2.6.1 G-HDR . 164
17.4.2.6.2 G-VDR . 164
17.5 Exceptional procedures . 165
18 Group linking/unlinking service description - stage 1 . 166
18.1 Service definition . 166
18.2 Service description . 167
18.3 Service architecture . 167
18.4 Normal procedures . 168
18.4.1 Invocation . 168
18.4.1.1 Invocation criteria . 168
18.4.1.2 Invocation of ANF-ISIMM . 168
18.4.1.2.1 Case 1) - group linking service - Sending of Linking_req . 168
18.4.1.2.2 Case 2) - group unlinking service . 169
18.4.1.2.3 Case 3) - remote group unlinking service . 169
18.4.2 Operation . 170
18.4.2.1 General . 170
18.4.2.2 Case 1) - group linking service . 170
18.4.2.2.1 First phase of group linking service. 170
18.4.2.2.2 Second phase of group linking service .
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...