The present document defines the mobility management of interworking at the Inter-System Interface (ISI) for Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D). The TETRA V+D Inter-working - basic operation part defines the Inter-System Interface (ISI) between the SwMIs as specified in the following sub-parts:
• Transport layer independent, General design [i.5].
• General design, PSS1 over E.1 [13].
• General design, SIP/IP [14].
• Transport layer independent Additional Network Feature Individual Call (ANF-ISIIC) [9].
• Transport layer independent Additional Network Feature Group Call (ANF-ISIGC) [10].
• Transport layer independent Additional Network Feature Short Data Service (ANF-ISISDS) [i.2].
• Transport layer independent Additional Network Feature, Mobility Management (ANF-ISIMM) (the present document).
• Generic Speech Format Implementation [i.4].
NOTE: These TSs are produced in analogy with the Recommendation ITU-T I.130 [4].
The present document contains the ANF-ISIMM part. The ANF-ISIMM part defines additional Mobility Management (MM) services to the SwMIs. If supported, the ANF-ISIMM services complement the intra-SwMI-MM, authentication and key management services. In support of these, the ANF-ISIMM enables the invocation and operation of these services between the SwMIs over the ISI. Thus, ANF-ISIMM offers the following services:
• Migration and restricted migration.
• Individual subscriber and group profile update.
• Supplementary Service profile update.
• De-registration.
• Group attachment/detachment.
• Linked group attachment/detachment.
• Individual subscriber and group database recovery.
• Authentication, one-directionally or mutually between the individual subscriber and the home SwMI.
• Over-The-Air-Re-keying (OTAR) for Static Cipher Key (SCK) generation and SCK delivery. For the following service are only included in the stage 1 descriptions:
• Group Linking/unlinking.
• GTSI attachment/detachment to a linking participating group from another SwMI.

Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno delovanje na medsistemskem vmesniku (ISI) - 15. poddel: Neodvisnost transportnih plasti dodatne omrežne funkcije, upravljanje mobilnosti (ANF-ISIMM)

General Information

Status
Published
Public Enquiry End Date
12-Nov-2019
Publication Date
18-May-2020
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
18-May-2020
Due Date
23-Jul-2020
Completion Date
19-May-2020

Buy Standard

Standard
SIST EN 300 392-3-15 V1.2.1:2020
English language
379 pages
sale - 10%
Preview
sale - 10%
Preview
Standard
oSIST prEN 300 392-3-15 V1.2.0:2019
English language
387 pages
sale - 10%
Preview
sale - 10%
Preview

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN 300 392-3-15 V1.2.1:2020
01-julij-2020
Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno
delovanje na medsistemskem vmesniku (ISI) - 15. poddel: Neodvisnost
transportnih plasti dodatne omrežne funkcije, upravljanje mobilnosti (ANF-ISIMM)

Terrestrial Trunked Radio (TETRA) - Voice plus Data (V+D) - Part 3: Interworking at the

Inter-System Interface (ISI) - Sub-part 15: Transport layer independent Additional

Network Feature, Mobility Management (ANF-ISIMM)
Ta slovenski standard je istoveten z: ETSI EN 300 392-3-15 V1.2.1 (2020-04)
ICS:
33.070.10 Prizemni snopovni radio Terrestrial Trunked Radio
(TETRA) (TETRA)
35.100.40 Transportni sloj Transport layer
SIST EN 300 392-3-15 V1.2.1:2020 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN 300 392-3-15 V1.2.1:2020
---------------------- Page: 2 ----------------------
SIST EN 300 392-3-15 V1.2.1:2020
ETSI EN 300 392-3-15 V1.2.1 (2020-04)
EUROPEAN STANDARD
Terrestrial Trunked Radio (TETRA);
Voice plus Data (V+D);
Part 3: Interworking at the Inter-System Interface (ISI);
Sub-part 15: Transport layer independent Additional
Network Feature, Mobility Management (ANF-ISIMM)
---------------------- Page: 3 ----------------------
SIST EN 300 392-3-15 V1.2.1:2020
2 ETSI EN 300 392-3-15 V1.2.1 (2020-04)
Reference
REN/TCCE-03263
Keywords
management, mobility, TETRA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying

and microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2020.
All rights reserved.

DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its Members.

3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and

of the 3GPP Organizational Partners.

oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and

of the oneM2M Partners.
GSM and the GSM logo are trademarks registered and owned by the GSM Association.
ETSI
---------------------- Page: 4 ----------------------
SIST EN 300 392-3-15 V1.2.1:2020
3 ETSI EN 300 392-3-15 V1.2.1 (2020-04)
Contents

Intellectual Property Rights .............................................................................................................................. 16

Foreword ........................................................................................................................................................... 16

Modal verbs terminology .................................................................................................................................. 18

Introduction ...................................................................................................................................................... 18

1 Scope ...................................................................................................................................................... 19

2 References .............................................................................................................................................. 20

2.1 Normative references ....................................................................................................................................... 20

2.2 Informative references ...................................................................................................................................... 21

3 Definition of terms, symbols and abbreviations ..................................................................................... 21

3.1 Terms ................................................................................................................................................................ 21

3.2 Symbols ............................................................................................................................................................ 24

3.3 Abbreviations ................................................................................................................................................... 24

4 Overview ................................................................................................................................................ 25

4.1 General ............................................................................................................................................................. 25

4.2 Applicability ..................................................................................................................................................... 25

4.2.1 Entities ........................................................................................................................................................ 25

4.2.2 Services ....................................................................................................................................................... 26

4.3 Testability ......................................................................................................................................................... 26

4.4 Provision/withdrawal........................................................................................................................................ 27

4.5 Activation/deactivation .................................................................................................................................... 27

4.6 Charging ........................................................................................................................................................... 27

5 The generic ANF-ISIMM stage 1 service model ................................................................................... 27

5.1 ANF-ISIMM - the service provider .................................................................................................................. 27

5.2 SwMI MMs - the ANF-ISIMM service users................................................................................................... 28

5.3 Stage 1 description conventions ....................................................................................................................... 29

6 Migration service description - stage 1 .................................................................................................. 30

6.1 Pre-requisite requirements for the migration service ........................................................................................ 30

6.2 Service definition ............................................................................................................................................. 30

6.3 Service description ........................................................................................................................................... 30

6.4 Service architecture .......................................................................................................................................... 31

6.5 Normal procedures ........................................................................................................................................... 31

6.5.1 Invocation ................................................................................................................................................... 31

6.5.1.1 Invocation criteria ................................................................................................................................. 31

6.5.1.2 Invocation of ANF-ISIMM ................................................................................................................... 31

6.5.2 Operation .................................................................................................................................................... 33

6.5.2.1 General .................................................................................................................................................. 33

6.5.2.2 Migration with pre-defined migration profile(s) (applicable for case 1) ............................................... 34

6.5.2.2.1 Support for call restoration .............................................................................................................. 34

6.5.2.2.2 Final migration approval ................................................................................................................. 35

6.5.2.3 Migration with migration profile exchange (applicable for case 2, 3a and 3b) ..................................... 36

6.5.2.3.1 Basic migration profile exchange .................................................................................................... 36

6.5.2.3.2 SS-migration profile(s) exchange (applicable for case 3a) .............................................................. 46

6.5.2.3.3 Support for call restoration .............................................................................................................. 48

6.5.2.3.4 Final migration approval (applicable for cases 2, 3a and 3b) .......................................................... 48

6.5.2.3.5 SS-migration profile exchange after final migration approval (applicable for case 3b) .................. 48

6.6 Exceptional procedures .................................................................................................................................... 49

6.6.1 General ........................................................................................................................................................ 49

6.6.2 Detected by the individual subscriber visited SwMI MM .......................................................................... 50

6.6.3 Detected by the individual subscriber home SwMI MM ............................................................................ 51

6.7 Interactions ....................................................................................................................................................... 51

6.7.1 Interactions with the authentication service ................................................................................................ 51

6.7.2 Interactions with the group attachment and the group detachment services ............................................... 52

ETSI
---------------------- Page: 5 ----------------------
SIST EN 300 392-3-15 V1.2.1:2020
4 ETSI EN 300 392-3-15 V1.2.1 (2020-04)

7 Restricted migration service description - stage 1 .................................................................................. 52

7.1 Pre-requisite requirements for the restricted migration service ........................................................................ 52

7.2 Service definition ............................................................................................................................................. 52

7.3 Service description ........................................................................................................................................... 52

7.4 Service architecture .......................................................................................................................................... 53

7.5 Normal procedures ........................................................................................................................................... 53

7.5.1 Invocation ................................................................................................................................................... 53

7.5.1.1 Invocation criteria ................................................................................................................................. 53

7.5.1.2 Invocation of ANF-ISIMM ................................................................................................................... 54

7.5.2 Operation .................................................................................................................................................... 57

7.5.2.1 General .................................................................................................................................................. 57

7.5.2.2 Operation when the individual subscriber visited SwMI MM invokes restricted migration ................. 57

7.5.2.3 Invocation of RSI .................................................................................................................................. 58

7.5.2.4 Support for emergency call restoration ................................................................................................. 58

7.5.2.5 Receipt of restricted migration approval ............................................................................................... 58

7.6 Exceptional procedures .................................................................................................................................... 58

7.6.1 General ........................................................................................................................................................ 58

7.6.2 Detected by the individual subscriber visited SwMI MM .......................................................................... 60

7.6.3 Detected by the individual subscriber home SwMI MM ............................................................................ 60

7.7 Interactions ....................................................................................................................................................... 60

7.7.1 Interactions with the authentication service ................................................................................................ 60

7.7.2 Interactions with the group attachment and the group detachment services ............................................... 60

8 Removal of Subscriber Information (RSI) service description - stage 1 ................................................ 60

8.1 Service definition ............................................................................................................................................. 60

8.2 Service description ........................................................................................................................................... 61

8.3 Service architecture .......................................................................................................................................... 61

8.4 Normal procedures ........................................................................................................................................... 62

8.4.1 Invocation ................................................................................................................................................... 62

8.4.1.1 Invocation criteria ................................................................................................................................. 62

8.4.1.2 Invocation of ANF-ISIMM ................................................................................................................... 62

8.4.2 Operation .................................................................................................................................................... 63

8.5 Exceptional procedures .................................................................................................................................... 65

8.6 Interaction with authentication ......................................................................................................................... 66

9 De-registration service description - stage 1 .......................................................................................... 66

9.1 Service definition ............................................................................................................................................. 66

9.2 Service description ........................................................................................................................................... 66

9.3 Service architecture .......................................................................................................................................... 66

9.4 Normal procedures ........................................................................................................................................... 67

9.4.1 Invocation ................................................................................................................................................... 67

9.4.1.1 Invocation criteria ................................................................................................................................. 67

9.4.1.2 Invocation of ANF-ISIMM ................................................................................................................... 67

9.4.2 Operation .................................................................................................................................................... 68

9.5 Exceptional procedures .................................................................................................................................... 69

10 Profile update service description - stage 1 ............................................................................................ 70

10.1 Service definition ............................................................................................................................................. 70

10.2 Service description ........................................................................................................................................... 70

10.3 Service architecture .......................................................................................................................................... 70

10.4 Normal procedures ........................................................................................................................................... 71

10.4.1 Invocation ................................................................................................................................................... 71

10.4.1.1 Invocation criteria ................................................................................................................................. 71

10.4.1.2 Invocation of ANF-ISIMM ................................................................................................................... 72

10.4.2 Operation .................................................................................................................................................... 82

10.5 Exceptional operation ....................................................................................................................................... 92

11 SS-profile update service description - stage 1 ...................................................................................... 92

11.1 Service definition ............................................................................................................................................. 92

11.2 Service description ........................................................................................................................................... 93

11.3 Service architecture .......................................................................................................................................... 93

11.4 Normal procedures ........................................................................................................................................... 93

11.4.1 Invocation ................................................................................................................................................... 93

ETSI
---------------------- Page: 6 ----------------------
SIST EN 300 392-3-15 V1.2.1:2020
5 ETSI EN 300 392-3-15 V1.2.1 (2020-04)

11.4.1.1 Invocation criteria ................................................................................................................................. 93

11.4.1.2 Invocation of ANF-ISIMM ................................................................................................................... 94

11.4.2 Operation .................................................................................................................................................... 94

11.4.2.1 Creation of temporary SS-migration profiles ........................................................................................ 94

11.4.2.2 Informing home SwMI MM about the temporary SS-migration profiles ............................................. 95

11.5 Exceptional operation ....................................................................................................................................... 96

12 Authentication service description - stage 1 ........................................................................................... 97

12.1 Pre-requisite requirements for the authentication service................................................................................. 97

12.2 Service definition ............................................................................................................................................. 98

12.3 Service description ........................................................................................................................................... 98

12.4 Service architecture .......................................................................................................................................... 98

12.5 Normal procedures ........................................................................................................................................... 99

12.5.1 Invocation ................................................................................................................................................... 99

12.5.1.1 Invocation criteria ................................................................................................................................. 99

12.5.1.2 Invocation of ANF-ISIMM ................................................................................................................... 99

12.5.2 Operation (relevant for case 1) ................................................................................................................. 100

12.5.2.1 Exchange of authentication parameters ............................................................................................... 100

12.5.2.2 Sending of authentication result .......................................................................................................... 101

12.6 Exceptional procedures .................................................................................................................................. 101

12.6.1 General ...................................................................................................................................................... 101

12.6.2 Detected by the individual subscriber visited SwMI MM ........................................................................ 102

12.6.3 Detected by the individual subscriber home SwMI MM .......................................................................... 103

12.7 Interaction with migration and restricted migration ....................................................................................... 103

12.7.1 Normal operation ...................................................................................................................................... 103

12.7.2 Exceptional procedures ............................................................................................................................. 103

13 Over The Air Re-keying (OTAR) service description - stage 1 ........................................................... 104

13.1 Pre-requisite requirements .............................................................................................................................. 104

13.2 Service definition ........................................................................................................................................... 104

13.3 Service description ......................................................................................................................................... 104

13.4 Service architecture ........................................................................................................................................ 105

13.5 Normal procedures ......................................................................................................................................... 105

13.5.1 Invocation ................................................................................................................................................. 105

13.5.1.1 Invocation criteria ............................................................................................................................... 105

13.5.1.2 Invocation of ANF-ISIMM ................................................................................................................. 106

13.5.1.2.1 Case 1) ........................................................................................................................................... 106

13.5.1.2.2 Case 2) ........................................................................................................................................... 106

13.5.1.2.3 Case 3) ........................................................................................................................................... 106

13.5.1.2.4 Case 4) ........................................................................................................................................... 107

13.5.2 Operation .................................................................................................................................................. 107

13.5.2.1 Case 1) ................................................................................................................................................ 107

13.5.2.2 Case 2) ................................................................................................................................................ 108

13.5.2.3 Case 3) ................................................................................................................................................ 109

13.5.2.4 Case 4) ................................................................................................................................................ 110

13.6 Exceptional procedures .................................................................................................................................. 110

13.6.1 General ...................................................................................................................................................... 110

13.6.2 Detected by the individual subscriber visited SwMI MM ........................................................................ 111

13.6.3 Detected by the individual subscriber home SwMI MM .......................................................................... 111

14 Individual subscriber Database Recovery (IDR) service description - stage 1 .................................... 112

14.1 Service definition ........................................................................................................................................... 112

14.2 Service description ......................................................................................................................................... 112

14.3 Service architecture ........................................................................................................................................ 113

14.4 Normal procedures ......................................................................................................................................... 113

14.4.1 Invocation .............
...

SLOVENSKI STANDARD
oSIST prEN 300 392-3-15 V1.2.0:2019
01-november-2019
Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno
delovanje na medsistemskem vmesniku (ISI) - 15. poddel: Neodvisnost
transportnih plasti dodatne omrežne funkcije, upravljanje mobilnosti (ANF-ISIMM)

Terrestrial Trunked Radio (TETRA) - Voice plus Data (V+D) - Part 3: Interworking at the

Inter-System Interface (ISI) - Sub-part 15: Transport layer independent Additional

Network Feature, Mobility Management (ANF-ISIMM)
Ta slovenski standard je istoveten z: ETSI EN 300 392-3-15 V1.2.0 (2019-08)
ICS:
33.070.10 Prizemni snopovni radio Terrestrial Trunked Radio
(TETRA) (TETRA)
oSIST prEN 300 392-3-15 V1.2.0:2019 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
oSIST prEN 300 392-3-15 V1.2.0:2019
---------------------- Page: 2 ----------------------
oSIST prEN 300 392-3-15 V1.2.0:2019
Draft ETSI EN 300 392-3-15 V1.2.0 (2019-08)
EUROPEAN STANDARD
Terrestrial Trunked Radio (TETRA);
Voice plus Data (V+D);
Part 3: Interworking at the Inter-System Interface (ISI);
Sub-part 15: Transport layer independent Additional
Network Feature, Mobility Management (ANF-ISIMM)
---------------------- Page: 3 ----------------------
oSIST prEN 300 392-3-15 V1.2.0:2019
2 Draft ETSI EN 300 392-3-15 V1.2.0 (2019-08)
Reference
REN/TCCE-03263
Keywords
management, mobility, TETRA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying

and microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2019.
All rights reserved.

DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its Members.

3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and

of the 3GPP Organizational Partners.

oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and

of the oneM2M Partners.
GSM and the GSM logo are trademarks registered and owned by the GSM Association.
ETSI
---------------------- Page: 4 ----------------------
oSIST prEN 300 392-3-15 V1.2.0:2019
3 Draft ETSI EN 300 392-3-15 V1.2.0 (2019-08)
Contents

Intellectual Property Rights .............................................................................................................................. 16

Foreword ........................................................................................................................................................... 16

Modal verbs terminology .................................................................................................................................. 18

Introduction ...................................................................................................................................................... 18

1 Scope ...................................................................................................................................................... 19

2 References .............................................................................................................................................. 20

2.1 Normative references ....................................................................................................................................... 20

2.2 Informative references ...................................................................................................................................... 21

3 Definition of terms, symbols and abbreviations ..................................................................................... 21

3.1 Terms ................................................................................................................................................................ 21

3.2 Symbols ............................................................................................................................................................ 24

3.3 Abbreviations ................................................................................................................................................... 24

4 Overview ................................................................................................................................................ 25

4.1 General ............................................................................................................................................................. 25

4.2 Applicability ..................................................................................................................................................... 26

4.2.1 Entities ........................................................................................................................................................ 26

4.2.2 Services ....................................................................................................................................................... 26

4.3 Testability ......................................................................................................................................................... 27

4.4 Provision/withdrawal........................................................................................................................................ 27

4.5 Activation/deactivation .................................................................................................................................... 27

4.6 Charging ........................................................................................................................................................... 27

5 The generic ANF-ISIMM stage 1 service model ................................................................................... 27

5.1 ANF-ISIMM - the service provider .................................................................................................................. 27

5.2 SwMI MMs - the ANF-ISIMM service users................................................................................................... 28

5.3 Stage 1 description conventions ....................................................................................................................... 29

6 Migration service description - stage 1 .................................................................................................. 30

6.1 Pre-requisite requirements for the migration service ........................................................................................ 30

6.2 Service definition ............................................................................................................................................. 30

6.3 Service description ........................................................................................................................................... 30

6.4 Service architecture .......................................................................................................................................... 31

6.5 Normal procedures ........................................................................................................................................... 32

6.5.1 Invocation ................................................................................................................................................... 32

6.5.1.1 Invocation criteria ................................................................................................................................. 32

6.5.1.2 Invocation of ANF-ISIMM ................................................................................................................... 32

6.5.2 Operation .................................................................................................................................................... 34

6.5.2.1 General .................................................................................................................................................. 34

6.5.2.2 Migration with pre-defined migration profile(s) (applicable for case 1) ............................................... 35

6.5.2.2.1 Support for call restoration .............................................................................................................. 35

6.5.2.2.2 Final migration approval ................................................................................................................. 35

6.5.2.3 Migration with migration profile exchange (applicable for case 2, 3a and 3b) ..................................... 37

6.5.2.3.1 Basic migration profile exchange .................................................................................................... 37

6.5.2.3.2 SS-migration profile(s) exchange (applicable for case 3a) .............................................................. 47

6.5.2.3.3 Support for call restoration .............................................................................................................. 49

6.5.2.3.4 Final migration approval (applicable for cases 2, 3a and 3b) .......................................................... 49

6.5.2.3.5 SS-migration profile exchange after final migration approval (applicable for case 3b) .................. 50

6.6 Exceptional procedures .................................................................................................................................... 50

6.6.1 General ........................................................................................................................................................ 50

6.6.2 Detected by the individual subscriber visited SwMI MM .......................................................................... 51

6.6.3 Detected by the individual subscriber home SwMI MM ............................................................................ 52

6.7 Interactions ....................................................................................................................................................... 53

6.7.1 Interactions with the authentication service ................................................................................................ 53

6.7.2 Interactions with the group attachment and the group detachment services ............................................... 53

ETSI
---------------------- Page: 5 ----------------------
oSIST prEN 300 392-3-15 V1.2.0:2019
4 Draft ETSI EN 300 392-3-15 V1.2.0 (2019-08)

7 Restricted migration service description - stage 1 .................................................................................. 53

7.1 Pre-requisite requirements for the restricted migration service ........................................................................ 53

7.2 Service definition ............................................................................................................................................. 53

7.3 Service description ........................................................................................................................................... 54

7.4 Service architecture .......................................................................................................................................... 54

7.5 Normal procedures ........................................................................................................................................... 55

7.5.1 Invocation ................................................................................................................................................... 55

7.5.1.1 Invocation criteria ................................................................................................................................. 55

7.5.1.2 Invocation of ANF-ISIMM ................................................................................................................... 55

7.5.2 Operation .................................................................................................................................................... 58

7.5.2.1 General .................................................................................................................................................. 58

7.5.2.2 Operation when the individual subscriber visited SwMI MM invokes restricted migration ................. 58

7.5.2.3 Invocation of RSI .................................................................................................................................. 59

7.5.2.4 Support for emergency call restoration ................................................................................................. 59

7.5.2.5 Receipt of restricted migration approval ............................................................................................... 59

7.6 Exceptional procedures .................................................................................................................................... 60

7.6.1 General ........................................................................................................................................................ 60

7.6.2 Detected by the individual subscriber visited SwMI MM .......................................................................... 61

7.6.3 Detected by the individual subscriber home SwMI MM ............................................................................ 61

7.7 Interactions ....................................................................................................................................................... 61

7.7.1 Interactions with the authentication service ................................................................................................ 61

7.7.2 Interactions with the group attachment and the group detachment services ............................................... 61

8 Removal of Subscriber Information (RSI) service description - stage 1 ................................................ 62

8.1 Service definition ............................................................................................................................................. 62

8.2 Service description ........................................................................................................................................... 62

8.3 Service architecture .......................................................................................................................................... 62

8.4 Normal procedures ........................................................................................................................................... 63

8.4.1 Invocation ................................................................................................................................................... 63

8.4.1.1 Invocation criteria ................................................................................................................................. 63

8.4.1.2 Invocation of ANF-ISIMM ................................................................................................................... 64

8.4.2 Operation .................................................................................................................................................... 65

8.5 Exceptional procedures .................................................................................................................................... 66

8.6 Interaction with authentication ......................................................................................................................... 67

9 De-registration service description - stage 1 .......................................................................................... 68

9.1 Service definition ............................................................................................................................................. 68

9.2 Service description ........................................................................................................................................... 68

9.3 Service architecture .......................................................................................................................................... 68

9.4 Normal procedures ........................................................................................................................................... 69

9.4.1 Invocation ................................................................................................................................................... 69

9.4.1.1 Invocation criteria ................................................................................................................................. 69

9.4.1.2 Invocation of ANF-ISIMM ................................................................................................................... 69

9.4.2 Operation .................................................................................................................................................... 70

9.5 Exceptional procedures .................................................................................................................................... 71

10 Profile update service description - stage 1 ............................................................................................ 72

10.1 Service definition ............................................................................................................................................. 72

10.2 Service description ........................................................................................................................................... 72

10.3 Service architecture .......................................................................................................................................... 72

10.4 Normal procedures ........................................................................................................................................... 73

10.4.1 Invocation ................................................................................................................................................... 73

10.4.1.1 Invocation criteria ................................................................................................................................. 73

10.4.1.2 Invocation of ANF-ISIMM ................................................................................................................... 73

10.4.2 Operation .................................................................................................................................................... 84

10.5 Exceptional operation ....................................................................................................................................... 94

11 SS-profile update service description - stage 1 ...................................................................................... 95

11.1 Service definition ............................................................................................................................................. 95

11.2 Service description ........................................................................................................................................... 95

11.3 Service architecture .......................................................................................................................................... 96

11.4 Normal procedures ........................................................................................................................................... 96

11.4.1 Invocation ................................................................................................................................................... 96

ETSI
---------------------- Page: 6 ----------------------
oSIST prEN 300 392-3-15 V1.2.0:2019
5 Draft ETSI EN 300 392-3-15 V1.2.0 (2019-08)

11.4.1.1 Invocation criteria ................................................................................................................................. 96

11.4.1.2 Invocation of ANF-ISIMM ................................................................................................................... 97

11.4.2 Operation .................................................................................................................................................... 97

11.4.2.1 Creation of temporary SS-migration profiles ........................................................................................ 97

11.4.2.2 Informing home SwMI MM about the temporary SS-migration profiles ............................................. 98

11.5 Exceptional operation ....................................................................................................................................... 99

12 Authentication service description - stage 1 ......................................................................................... 100

12.1 Pre-requisite requirements for the authentication service............................................................................... 100

12.2 Service definition ........................................................................................................................................... 100

12.3 Service description ......................................................................................................................................... 101

12.4 Service architecture ........................................................................................................................................ 101

12.5 Normal procedures ......................................................................................................................................... 101

12.5.1 Invocation ................................................................................................................................................. 101

12.5.1.1 Invocation criteria ............................................................................................................................... 101

12.5.1.2 Invocation of ANF-ISIMM ................................................................................................................. 102

12.5.2 Operation (relevant for case 1) ................................................................................................................. 103

12.5.2.1 Exchange of authentication parameters ............................................................................................... 103

12.5.2.2 Sending of authentication result .......................................................................................................... 103

12.6 Exceptional procedures .................................................................................................................................. 104

12.6.1 General ...................................................................................................................................................... 104

12.6.2 Detected by the individual subscriber visited SwMI MM ........................................................................ 105

12.6.3 Detected by the individual subscriber home SwMI MM .......................................................................... 105

12.7 Interaction with migration and restricted migration ....................................................................................... 106

12.7.1 Normal operation ...................................................................................................................................... 106

12.7.2 Exceptional procedures ............................................................................................................................. 106

13 Over The Air Re-keying (OTAR) service description - stage 1 ........................................................... 107

13.1 Pre-requisite requirements .............................................................................................................................. 107

13.2 Service definition ........................................................................................................................................... 107

13.3 Service description ......................................................................................................................................... 107

13.4 Service architecture ........................................................................................................................................ 108

13.5 Normal procedures ......................................................................................................................................... 108

13.5.1 Invocation ................................................................................................................................................. 108

13.5.1.1 Invocation criteria ............................................................................................................................... 108

13.5.1.2 Invocation of ANF-ISIMM ................................................................................................................. 109

13.5.1.2.1 Case 1) ........................................................................................................................................... 109

13.5.1.2.2 Case 2) ........................................................................................................................................... 109

13.5.1.2.3 Case 3) ........................................................................................................................................... 109

13.5.1.2.4 Case 4) ........................................................................................................................................... 110

13.5.2 Operation .................................................................................................................................................. 110

13.5.2.1 Case 1) ................................................................................................................................................ 110

13.5.2.2 Case 2) ................................................................................................................................................ 111

13.5.2.3 Case 3) ................................................................................................................................................ 112

13.5.2.4 Case 4) ................................................................................................................................................ 113

13.6 Exceptional procedures .................................................................................................................................. 113

13.6.1 General ...................................................................................................................................................... 113

13.6.2 Detected by the individual subscriber visited SwMI MM ........................................................................ 114

13.6.3 Detected by the individual subscriber home SwMI MM .......................................................................... 114

14 Individual subscriber Database Recovery (IDR) service description - stage 1 .................................... 115

14.1 Service definition ........................................................................................................................................... 115

14.2 Service description ......................................................................................................................................... 115

14.3 Service architecture ........................................................................................................................................ 116

14.4 Normal procedures ......................................................................................................................................... 116

14.4.1 Invocation ............
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.