TDoc: S4-260192

Meeting: TSGS4_135_India | Agenda Item: 9.8

Back to Agenda
Document Information
Title

[FS_Avatar_Ph2_MED] Authentication for avatar data

Source

Nokia

Type

discussion

For

Agreement

3GPP Document
View on 3GPP
TDoc S4-260192
Title [FS_Avatar_Ph2_MED] Authentication for avatar data
Source Nokia
Agenda item 9.8
Agenda item description FS_Avatar_Ph2_MED (Study on Avatar communication Phase 2)
Doc type discussion
For action Agreement
download_url https://www.3gpp.org/ftp/tsg_sa/WG4_CODEC/TSGS4_135_India/Docs/S4-260192.zip
For Agreement
Type discussion
Contact Xuan (Shane) He
Uploaded 2026-02-03T20:11:30.400000
Contact ID 79677
Revised to S4-260398
TDoc Status revised
Reservation date 03/02/2026 17:00:13
Agenda item sort order 43
Comments
Previous Comments:
manager
2026-02-09 04:56:52


  1. [Technical] The proposal introduces a “Digital Credential / Base Avatar Assertion (BAA)” but does not define its normative format, mandatory fields, cryptographic algorithms, or validation rules (Figure Y is referenced but not provided), making interoperability and conformance impossible.




  2. [Technical] Trust model is underspecified: UE2 “verifies BAA validity” via issuer signature, but there is no definition of how UE2 obtains/validates issuer trust anchors (operator PKI, WebPKI, cross-operator federation, roaming), nor how revocation/expiry is handled.




  3. [Technical] The procedure says UE2 may obtain the BAA “from UE1 or Issuer” without specifying the transport, integrity protection, and binding to the IMS session (e.g., SIP/SDP conveyance, MSRP, HTTP), leaving clear MITM/replay risks and no linkage to the authenticated IMS identity.




  4. [Technical] The key binding is unclear: UE1 generates a key pair “associated with selected avatar presentation,” but the contribution does not specify what identifier of the avatar representation is signed into the BAA, how collisions/updates are handled, or how the avatar data hash/reference is bound to prevent substitution.




  5. [Technical] There is no explicit binding between the BAA subject and the user’s IMS/3GPP identity (IMPU/IMPI/SUPI) or the access authentication (AKA), so a valid BAA could be presented in a different IMS context unless additional binding is specified.




  6. [Technical] The issuer “verifies that a Base Avatar represents its owner” is a major security claim but no verification method is described (biometrics, KYC, operator registration, device attestation), making the assurance level undefined and potentially inconsistent across deployments.




  7. [Technical] The “proof of possession of private key” is mentioned but no protocol is defined (challenge-response, signature over nonce, channel binding), and it’s unclear when UE2 verifies PoP versus only verifying issuer signature.




  8. [Technical] Lifecycle management is missing: no procedures for BAA renewal, revocation (lost device, compromised key), avatar updates, key rotation, or multiple devices per user—critical for any credential-based scheme.




  9. [Technical] Privacy implications are not addressed: a persistent BAA could enable cross-service/user tracking; there is no discussion of minimizing identifiers, using pairwise pseudonyms, selective disclosure, or limiting disclosure to UE2 vs network.




  10. [Technical] The scope is inconsistent with the stated gap: the contribution targets “avatar-related APIs” but the described mechanism is UE-to-UE credential presentation; it does not cover API authentication/authorization semantics (OAuth2/3GPP NEF-style, tokens, scopes) or network-side enforcement.




  11. [Technical] The proposal does not clarify whether authentication is end-to-end (UE1↔UE2) or network-mediated (IMS core involvement), and therefore does not specify where security termination points are and what entities are in the trust boundary.




  12. [Editorial] The document proposes adding sub-clause “8.3.4” but does not indicate which specification/TR this clause belongs to, nor how it aligns with existing clause numbering and terminology in TS/TR 26.264/26.813/33.328.




  13. [Editorial] Several key references are vague or missing (e.g., “Figure Z example implementation,” “Figure Y structure”), and terms like “Base Avatar Representation” vs “avatar presentation” are used inconsistently, which will cause ambiguity in normative text.




  14. [Editorial] The contribution states “TR 26.813 and TS 33.328 do not address these security aspects” but does not cite specific clauses or gaps; adding targeted gap statements and requirements would strengthen the justification and help SA3 alignment.



You must log in to post comment