Recommendation ITU-T X.1817 (09/2023) Security requirements for 5G messaging service
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
     6.1 5G messaging service
     6.2 Security requirements architecture for 5G messaging service
     6.2 The functional difference between the security requirements for 5G messaging service with 4G/3G/5G/WLAN
7 Security requirements for 5G messaging service access
     7.1 Security requirements of user card for make-up or change
     7.2 User authentication
          7.2.1 Personal user authentication
          7.2.2 Chatbot server authentication
     7.3 Message receive security
     7.4 Message send security
     7.5 Message access security
8 Security requirements for 5G messaging service management
     8.1 User management security
          8.1.1 Division of roles and permissions
          8.1.2 Abnormal behaviour monitor
     8.2 Key and certificate management
          8.2.1 Key management
          8.2.2 Certificate management
     8.3 Security audit
     8.4 Software management security
          8.4.1 Software development management security for 5G messaging
          8.4.2 Operation management security for 5G message system
9 Security requirements for 5G messaging service control
     9.1 Service ability restrictions
     9.2 Calling blacklist
     9.3 Called blacklist