<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.0.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hardman-verifiable-voice-protocol-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="VVP">Verifiable Voice Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hardman-verifiable-voice-protocol-02"/>
    <author fullname="Daniel Hardman">
      <organization>Provenant, Inc</organization>
      <address>
        <email>daniel.hardman@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="24"/>
    <keyword>voip</keyword>
    <keyword>telecom</keyword>
    <keyword>telco</keyword>
    <keyword>telephone number</keyword>
    <keyword>vetting</keyword>
    <keyword>KYC</keyword>
    <abstract>
      <?line 252?>

<t>Verifiable Voice Protocol (VVP) authenticates and authorizes organizations and individuals making telephone calls. This eliminates trust gaps that scammers exploit. Like related technolgies such as SHAKEN, RCD, and BCID, VVP binds cryptographic evidence to a SIP INVITE, and verifies this evidence downstream. However, VVP builds from different technical and governance assumptions, and uses stronger, richer evidence. This allows VVP to cross jurisdictional boundaries easily and robustly. It also makes VVP simpler, more decentralized, cheaper to deploy and maintain, more private, more scalable, and higher assurance than alternatives. Because it is easier to adopt, VVP can plug gaps or build bridges between other approaches, functioning as glue in hybrid ecosystems. For example, it may justify an A attestation in SHAKEN, or an RCD passport for branded calling, when a call originates outside SHAKEN or RCD ecosystems. VVP also works well as a standalone mechanism, independent of other solutions. An extra benefit is that VVP enables two-way evidence sharing with verifiable text and chat (e.g., RCS and vCon), as well as with other industry verticals that need verifiability in non-telco contexts.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dhh1128.github.io/vvp/draft-hardman-verifiable-voice-protocol.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hardman-verifiable-voice-protocol/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dhh1128/vvp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 256?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>When we get phone calls, we want to know who's calling, and why. Annoying or malicious strangers abuse expectations far too often.</t>
      <t>Regulators have mandated protections, and industry has responded. However, existing solutions have several drawbacks:</t>
      <ul spacing="normal">
        <li>
          <t>Assurance derives only from the signatures of originating service providers, with no independently verifiable proof of what they assert.</t>
        </li>
        <li>
          <t>Each jurisdiction has its own governance and its own set of signers. Sharing information across boundaries is fraught with logistical and regulatory problems.</t>
        </li>
        <li>
          <t>Deployment and maintenance costs are high.</t>
        </li>
        <li>
          <t>Market complexities such as the presence of aggregators, wholesalers, and call centers that proxy a brand are difficult to model safely.</t>
        </li>
        <li>
          <t>What might work for enterprises offers few benefits and many drawbacks for individual callers.</t>
        </li>
      </ul>
      <t>VVP solves these problems by applying three crucial innovations.</t>
      <section anchor="evidence-scope">
        <name>Evidence scope</name>
        <t>Existing solutions aim to assert variable levels of confidence about a caller's identity, plus possibly some brand attributes. These assertions rest entirely on a service provider's judgment and are testable only in the moment a call is initiated; later, they become repudiable.</t>
        <t>VVP proves more. It always proves the caller's legal identity, plus any authority that the caller has delegated to staff and service providers. It typically also proves brand attributes and right to use a phone number. If a call center is involved, it proves the constraints under which the call center operates as a representative. All VVP proof is traceable back to justifying evidence and can be evaluated in the present or the past. This guarantees accountability for all parties with a permanent, non-repudiable audit trail.</t>
      </section>
      <section anchor="evidence-format">
        <name>Evidence format</name>
        <t>VVP is rooted in an evidence format called <em>authentic chained data container</em>s (<em>ACDC</em>s) -- <xref target="TOIP-ACDC"/>. Other forms of evidence (e.g., JWTs/STIR PASSporTs, digital signatures, and optional interoperable inputs from W3C verifiable credentials <xref target="W3C-VC"/> and SD-JWTs <xref target="SD-JWT-DRAFT"/>) also contribute. However, the foundation that VVP places beneath them is unique. For a discussion of the theory behind VVP evidence, see <xref format="counter" target="appendix-a"/>. For more about additional evidence types, see <xref format="counter" target="building-blocks"/> and <xref format="counter" target="interoperability"/>.</t>
        <t>Because of innovations in format, VVP evidence is easier to create and maintain, safer, and more flexible than alternative approaches. It also lasts much longer. This drastically lowers the friction to adoption.</t>
      </section>
      <section anchor="vetting-refinements">
        <name>Vetting refinements</name>
        <t>Although VVP interoperates with governance frameworks such as SHAKEN <xref target="ATIS-1000074"/>, it allows for a dramatic upgrade of at least one core component: the foundational vetting mechanism. The evidence format used by VVP is also the format used by the Verifiable Legal Entity Identifier (vLEI) standardized in <xref target="ISO-17442-3"/>. vLEIs implement a KYC approach advocated by the G20's Financial Stability Board, and overseen by the G20's Regulatory Oversight Committee. This approach follows LEI rules for KYC (<xref target="ISO-17442-1"/>), and today it's globally required in high-security, high-regulation, cross-border banking.</t>
        <t>Millions of institutions have already undergone LEI vetting, and they already use the resulting evidence of their organizational identity in day-to-day behaviors all over the world. By adopting tooling that's compatible with the vLEI ecosystem, VVP gives adopters an intriguing option: <em>just skip the task of inventing a whole new vetting regime unique to telco, with its corresponding learning curve, costs, and legal and business adoption challenges.</em></t>
        <t>To be clear, VVP does not <em>require</em> that vLEIs be used for vetting. However, by choosing an evidence format that is high-precision and lossless enough to accommodate vLEIs, VVP lets telco ecosystems opt in, either wholly or partially (see <xref format="counter" target="interoperability"/>), to trust bases that are already adopted, and that are not limited to any particular jurisdiction or to the telco industry. It thus offers two-way, easy bridges between identity in phone calls and identity in financial, legal, technical, logistic, regulatory, web, email, and social media contexts.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="overview">
      <name>Overview</name>
      <t>Fundamentally, VVP requires a caller to curate (<xref format="counter" target="curating"/>) a dossier (<xref format="counter" target="dossier"/>) of stable evidence that proves identity and authorization. This is done once or occasionally, in advance, as a configuration precondition. Then, for each call, an ephemeral STIR-compatible VVP PASSporT (<xref format="counter" target="passport"/>) is generated that cites (<xref format="counter" target="citing"/>) the preconfigured dossier. Verifiers check the passport and its corresponding dossier, including realtime revocation status, to make decisions (<xref format="counter" target="verifying"/>).</t>
      <section anchor="roles">
        <name>Roles</name>
        <t>Understanding the workflow in VVP requires a careful definition of roles related to the protocol. The terms that follow have deep implications for the mental model, and their meaning in VVP may not match casual usage.</t>
        <section anchor="allocation-holder">
          <name>Allocation Holder</name>
          <t>An <em>allocation holder</em> controls how a phone number is used, in the eyes of a regulator. Enterprises and consumers that make calls with phone numbers they legitimately control are the most obvious category of allocation holders, and are called direct <em>telephone number users</em> (<em>TNUs</em>). Range holders hold allocations for numbers that have not yet been assigned; they don't make calls with these numbers, and are therefore not TNUs, but they are still allocation holders.</t>
          <t>It is possible for an ecosystem to include other parties as allocation holders (e.g., wholesalers, aggregators). However, many regulators dislike this outcome, and prefer that such parties broker allocations without actually holding the allocations as intermediaries.</t>
        </section>
        <section anchor="TP">
          <name>Terminating Party</name>
          <t>For a given phone call, the <em>terminating party</em> (<em>TP</em>) receives the call. A TP can be an individual consumer or an organization. The direct service provider of the TP is the <em>terminating service provider</em> (<em>TSP</em>).</t>
        </section>
        <section anchor="OP">
          <name>Originating Party</name>
          <t>An <em>originating party</em> (<em>OP</em>) controls the first <em>session border controller</em> (<em>SBC</em>) that processes a call, and therefore builds the VVP passport (<xref format="counter" target="passport"/>) that cites the evidence that authenticates and authorizes the call.</t>
          <t>It may be tempting to equate the OP with "the caller", and in some ways this perspective might reflect truth. However, this simple equivalence lacks nuance and doesn't always hold. In a VVP context, it is more accurate to say that the OP creates a SIP INVITE <xref target="RFC3261"/> with explicit, provable authorization from the party accountable for calls on the originating phone number. The OP originates the VVP protocol, <em>not</em> the call on the handset.</t>
          <t>It may also be tempting to associate the OP with an organizational identity like "Company X". While this is not wrong, and is in fact used in high-level descriptions in this specification, in its most careful definition, the cryptographic identity of an OP is more narrow. It typically corresponds to a single service operated by an IT department within (or outsourced but operating at the behest of) Company X, rather than to Company X generically. This narrowness limits cybersecurity risk, because a single service operated by Company X needs far fewer privileges than the company as a whole. Failing to narrow identity appropriately creates vulnerabilities in some alternative approaches. The evidence securing VVP <bcp14>MUST</bcp14> therefore prove a valid relationship between the OP's narrow identity and the broader legal entities that stakeholders more naturally assume and understand (see <xref format="counter" target="DE"/>).</t>
          <t>The service provider associated with an OP is called the <em>originating service provider</em> (<em>OSP</em>). For a given phone call, there may be complexity between the hardware that begins a call and the SBC of the OP -- and there may also be many layers, boundaries, and transitions between OSP and TSP.</t>
        </section>
        <section anchor="AP">
          <name>Accountable Party</name>
          <t>For a given call, the <em>accountable party</em> (<em>AP</em>) is the organization or individual (the TNU) that has the right to use the originating phone number, according to the regulator of that number. When a TP asks, "Who's calling?", they have little interest in the technicalities of the OP, and it is almost always the AP that they want to identify. The AP is accountable for the call, and thus "the caller", as far as the regulator and the TP are concerned.</t>
          <t>APs can operate their own SBCs and therefore be their own OPs. However, APs can also use a UCaaS provider that makes the AP-OP relationship indirect. Going further, a business can hire a call center, and delegate to the call center the right to use its phone number. In such a case, the business is the AP, but the call center is the OP that makes calls on its behalf. None of these complexities alter the fact that, from the TP's perspective, the AP is "the caller". The TP chooses to answer or not, based on their desire to interact with the AP. If the TP's trust is abused, the regulator and the TP both want to hold the AP accountable.</t>
          <t>VVP requires an AP to prepare a dossier (<xref format="counter" target="dossier"/>) of evidence that documents a basis for imposing this accountability on them. Only the owner of a given dossier can prove they intend to initiate a VVP call that cites their dossier (see <xref format="counter" target="delegating-signing-authority"/>). Therefore, if a verifier confirms that a particular call properly matches its dossier, the verifier is justified in considering the owner of that dossier the AP for the call. Otherwise, someone is committing fraud. Accountability, and the basis for it, are both unambiguous.</t>
        </section>
        <section anchor="verifier">
          <name>Verifier</name>
          <t>A <em>verifier</em> is a party that wants to know who's calling, and why, and that evaluates the answers to these questions by examining formal evidence. TPs, TSPs, OSPs, government regulators, law enforcement doing lawful intercept, auditors, and even APs or OPs can be verifiers. Each may need to see different views of the evidence about a particular phone call, and it may be impossible to comply with various regulations unless these views are kept distinct -- yet each wants similar and compatible assurance.</t>
          <t>In addition to checking the validity of cryptographic evidence, the verifier role in VVP <bcp14>MAY</bcp14> also consider how that evidence matches business rules and external conditions. For example, a verifier can begin its analysis by deciding whether Call Center Y has the right, in the abstract, to make calls on behalf of Organization X using a given phone number. However, VVP evidence allows a verifier to go further: it can also consider whether Y is allowed to exercise this right at the particular time of day when a call occurs, or in the jurisdiction of a particular TP, given the business purpose asserted in a particular call.</t>
        </section>
      </section>
      <section anchor="lifecycle">
        <name>Lifecycle</name>
        <t>VVP depends on three interrelated activities with evidence:</t>
        <ul spacing="normal">
          <li>
            <t>Curating</t>
          </li>
          <li>
            <t>Citing</t>
          </li>
          <li>
            <t>Verifying</t>
          </li>
        </ul>
        <t>Chronologically, evidence must be curated before it can be cited or verified. In addition, some vulnerabilities in existing approaches occur because evidence requirements are too loose. Therefore, understanding the nature of backing evidence, and how that evidence is created and maintained, is a crucial consideration for VVP. This specification includes normative statements about evidence.</t>
        <t>However, curating does not occur in realtime during phone calls. Citing and verifying are the heart of VVP, and implementers will probably approach VVP from the standpoint of SIP flows <xref target="RFC3261"/>, <xref target="RFC5626"/>. Therefore, we defer the question of curation to <xref format="counter" target="curating"/>. Where not-yet-explained evidence concepts are used, inline references allow easy cross-reference to formal definitions that come later.</t>
      </section>
    </section>
    <section anchor="citing">
      <name>Citing</name>
      <t>A call secured by VVP begins when the OP (<xref format="counter" target="OP"/>) generates a new VVP passport (<xref format="counter" target="passport"/>) that complies with STIR <xref target="RFC8224"/> requirements. In its compact-serialized JWT <xref target="RFC7519"/> form, this passport is then passed as an <tt>Identity</tt> header in a SIP INVITE <xref target="RFC3261"/>. The passport <em>constitutes</em> lightweight, direct, and ephemeral evidence; it <em>cites</em> and therefore depends upon comprehensive, indirect, and long-lived evidence (the dossier; see <xref format="counter" target="dossier"/>). Safely and efficiently citing stronger evidence is one way that VVP differs from alternatives.</t>
      <section anchor="questions-answered-by-a-passport">
        <name>Questions answered by a passport</name>
        <t>The passport directly answers the following questions:</t>
        <ul spacing="normal">
          <li>
            <t>What is the cryptographic identity of the OP?</t>
          </li>
          <li>
            <t>How can a verifier determine the OP's key state at the time the passport was created?</t>
          </li>
          <li>
            <t>How can a verifier identify and fetch more evidence that connects the OP to the asserted AP?</t>
          </li>
          <li>
            <t>What brand attributes are asserted to accompany the call?</t>
          </li>
        </ul>
        <t>The first two answers come from the <tt>kid</tt> header. The third answer is communicated in the required <tt>evd</tt> claim. The fourth answer is communicated in the optional <tt>card</tt> and <tt>goal</tt> claims.</t>
        <t>More evidence can then be fetched to indirectly answer the following additional questions:</t>
        <ul spacing="normal">
          <li>
            <t>What is the legal identity of the AP?</t>
          </li>
          <li>
            <t>Does the AP have the right to use the originating phone number?</t>
          </li>
          <li>
            <t>Does the AP intend the OP to sign passports on its behalf?</t>
          </li>
          <li>
            <t>Does the AP have the right to use the brand attributes asserted for the call?</t>
          </li>
        </ul>
      </section>
      <section anchor="sample-passport">
        <name>Sample passport</name>
        <t>An example will help. In its JSON-serialized form, a typical VVP passport (with some long CESR-encoded hashes shortened by ellipsis for readability) might look like this:</t>
        <sourcecode type="json"><![CDATA[
{
  "header": {
    "alg": "EdDSA",
    "typ": "JWT",
    "ppt": "vvp",
    "kid": "https://agentsrus.net/oobi/EMC.../agent/EAx..."
  },
  "payload": {
    "orig": {"tn": ["+33612345678"]},
    "dest": {"tn": ["+33765432109"]},
    "card": ["NICKNAME:Monde d'Exemples",
      "CHATBOT:https://example.com/chatwithus",
      "LOGO;HASH=EK2...;VALUE=URI:https://example.com/ico64x48.png"],
    "goal": "negotiate.schedule",
    "call-reason": "planifier le prochain rendez-vous",
    "evd": "https://fr.example.com/dossiers/E0F....cesr",
    "origId": "e0ac7b44-1fc3-4794-8edd-34b83c018fe9",
    "iat": 1699840000,
    "exp": 1699840030,
    "jti": "70664125-c88d-49d6-b66f-0510c20fc3a6"
  }
}
]]></sourcecode>
        <t>The semantics of the fields are:</t>
        <ul spacing="normal">
          <li>
            <t><tt>alg</tt> <em>(required)</em> <bcp14>MUST</bcp14> be "EdDSA". Standardizing on one scheme prevents jurisdictions with incompatible or weaker cryptography. The RSA, HMAC, and ES256 algorithms <bcp14>MUST NOT</bcp14> be used. (This choice is motivated by compatibility with the vLEI and its associated ACDC ecosystem, which depends on the Montgomery-to-Edwards transformation.)</t>
          </li>
          <li>
            <t><tt>typ</tt> <em>(required)</em> Per <xref target="RFC8225"/>, <bcp14>MUST</bcp14> be "passport".</t>
          </li>
          <li>
            <t><tt>ppt</tt> <em>(required)</em> Per <xref target="RFC8225"/>, <bcp14>MUST</bcp14> identify the specific PASSporT type -- in this case, "vvp".</t>
          </li>
          <li>
            <t><tt>kid</tt> <em>(required)</em> <bcp14>MUST</bcp14> be the OOBI of an AID (<xref format="counter" target="aid"/>) controlled by the OP (<xref format="counter" target="OP"/>). An OOBI is a special URL that facilitates ACDC's viral discoverability goals. It returns IANA content-type <tt>application/json+cesr</tt>, which provides some important security guarantees. The content for this particular OOBI <bcp14>MUST</bcp14> be a KEL (<xref format="counter" target="KEL"/>). Typically the AID in question does not identify the OP as a legal entity, but rather software running on or invoked by the SBC operated by the OP. (The AID that identifies the OP as a legal entity may be controlled by a multisig scheme and thus require multiple humans to create a signature. The AID for <tt>kid</tt> <bcp14>MUST</bcp14> be singlesig and, in the common case where it is not the legal entity AID, <bcp14>MUST</bcp14> have a delegate relationship with the legal entity AID, proved through Delegate Evidence <xref format="counter" target="DE"/>.)</t>
          </li>
          <li>
            <t><tt>orig</tt> <em>(required)</em> Although VVP does not depend on SHAKEN, the format of this field <bcp14>MUST</bcp14> conform to SHAKEN requirements (<xref target="ATIS-1000074"/>), for interoperability reasons (see <xref format="counter" target="interoperability"/>). It <bcp14>MUST</bcp14> also satisfy one additional constraint, which is that only one phone number is allowed. Depite the fact that a containing SIP INVITE may allow multiple originating phone numbers, only one can be tied to evidence evaluated by verifiers.</t>
          </li>
          <li>
            <t><tt>dest</tt> <em>(required)</em> For interoperability reasons, <bcp14>MUST</bcp14> conform to SHAKEN requirements.</t>
          </li>
          <li>
            <t><tt>card</tt> <em>(optional)</em> Contains one or more brand attributes. These are analogous to <xref target="RCD-DRAFT"/> or <xref target="CTIA-BCID"/> data, but differ in that they <bcp14>MUST</bcp14> be justified by evidence in the dossier. Because of this strong foundation that interconnects with formal legal identity, they can be used to derive other brand evidence (e.g., an RCD passport) as needed. Individual attributes <bcp14>MUST</bcp14> conform to the VCard standard <xref target="RFC6350"/>.</t>
          </li>
          <li>
            <t><tt>goal</tt> <em>(optional)</em> A machine-readable, localizable goal code, as described informally by <xref target="ARIES-RFC-0519"/>. If present, the dossier <bcp14>MUST</bcp14> prove that the OP is authorized by the AP to initiate calls with this particular goal.</t>
          </li>
          <li>
            <t><tt>call-reason</tt> <em>(optional)</em> A human-readable, arbitrary phrase that describes the self-asserted intent of the caller. This claim is largely redundant with <tt>goal</tt>; most calls will either omit both, or choose one or the other. Since <tt>call-reason</tt> cannot be analyzed or verified in any way, it is discouraged. However it is not formally deprecated. It is included in VVP to facilitate the construction of derivative RCD passports which have the property (see <xref format="counter" target="interoperability"/>).</t>
          </li>
          <li>
            <t><tt>evd</tt> <em>(required)</em> <bcp14>MUST</bcp14> be the OOBI of a bespoke ACDC (the dossier, <xref format="counter" target="dossier"/>) that constitutes a verifiable data graph of all evidence justifying belief in the identity and authorization of the AP, the OP, and any relevant delegations. This URL can be hosted on any convenient web server, and is somewhat analogous to the <tt>x5u</tt> header in X509 contexts. See below for details.</t>
          </li>
          <li>
            <t><tt>origId</tt> <em>(optional)</em> Follows SHAKEN semantics.</t>
          </li>
          <li>
            <t><tt>iat</tt> <em>(required)</em> Follows standard JWT semantics (see <xref target="RFC7519"/>).</t>
          </li>
          <li>
            <t><tt>exp</tt> <em>(required)</em> Follows standard JWT semantics. As this sets a window for potential replay attacks between the same two phone numbers, a recommended expiration should be 30 seconds, with a minimum of 10 seconds and a maximum of 300 seconds.</t>
          </li>
          <li>
            <t><tt>jti</tt> <em>(optional)</em> Follows standard JWT semantics.</t>
          </li>
        </ul>
        <t>For information about the signature over a passport, see <xref format="counter" target="pss"/>.</t>
      </section>
    </section>
    <section anchor="verifying">
      <name>Verifying</name>
      <section anchor="algorithm">
        <name>Algorithm</name>
        <t>When a verifier encounters a VVP passport, they <bcp14>SHOULD</bcp14> verify by using an algorithm similar to the following. Optimizations may combine or reorder operations, but <bcp14>MUST</bcp14> achieve all of the same guarantees, in order to be compliant implementations.</t>
        <ol spacing="normal" type="1"><li>
            <t>Analyze the <tt>iat</tt> and <tt>exp</tt> claims to evaluate timing. Confirm that <tt>exp</tt> is greater than <tt>iat</tt> and also greater than the reference time for analysis (e.g., <em>now</em>), and that <tt>iat</tt> is close enough to the reference time to satisfy the verifier's tolerance for replays. (A replay attack would have to call from the same <tt>orig</tt> to the same <tt>dest</tt> with the same <tt>iat</tt>, within whatever window the verifier accepts. Thirty seconds is a recommended default value.)</t>
          </li>
          <li>
            <t>Confirm that the <tt>orig</tt>, <tt>dest</tt>, and <tt>iat</tt> claims match contextual observations and other SIP metadata. That is, the passport appears aligned with what is known about the call from external sources.</t>
          </li>
          <li>
            <t>Extract the <tt>kid</tt> header.</t>
          </li>
          <li>
            <t>Fetch the key state for the OP at the reference time from the OOBI in <tt>kid</tt>. Caches may be used to optimize this, as long as they meet the freshness requirements of the verifier.</t>
          </li>
          <li>
            <t>Use the public key of the OP to verify that the signature on the passport is valid for that key state. On success, the verifier knows that the OP is at least making an assertion about the identity and authorizations of the AP. (When reference time is now, this is approximately the level of assurance provided by existing alternatives to VVP.)</t>
          </li>
          <li>
            <t>Extract the <tt>evd</tt> field, which references the dossier (<xref format="counter" target="dossier"/>) that constitutes backing evidence.</t>
          </li>
          <li>
            <t>Use the SAID (<xref format="counter" target="said"/>) of the dossier as a lookup key to see whether the dossier has already been fully validated. Since dossiers are highly stable, caching dossier validations is recommended.</t>
          </li>
          <li>
            <t>If the dossier requires full validation, perform it. Validation includes checking the signature on each ACDC in the dossier's data graph against the key state of its respective issuer at the time the issuance occurred. Key state is proved by the KEL (<xref format="counter" target="KEL"/>), and checked against independent witnesses.  </t>
            <t>
Issuance is recorded explicitly in the KEL's overall event sequence, so this check does not require guesses about how to map issuance timestamps to key state events. Subsequent key rotations do not invalidate this analysis.  </t>
            <t>
Validation also includes comparing data structure and values against the declared schema, plus a full traversal of all chained CVD (<xref format="counter" target="cvd"/>), back to the root of trust for each artifact. The verifier <bcp14>MUST</bcp14> accept the root of trust as a valid authority on the vital question answered by each credential that depends upon it. The correct relationships among evidence artifacts <bcp14>MUST</bcp14> also be checked (e.g., proving that the issuer of one piece is the issuee of another piece).</t>
          </li>
          <li>
            <t>Check to see whether the revocation status of the dossier and each item it depends on has been tested recently enough, at the reference time, to satisfy the verifier's freshness requirements. If no, check for revocations anywhere in the data graph of the dossier. Revocations are not the same as key rotations. They can be checked much more quickly than doing a full validation. Revocation checks can also be cached, possibly with a different freshness threshold than the main evidence.</t>
          </li>
          <li>
            <t>Assuming that the dossier is valid and has no breakages due to revocation, confirm that the OP is authorized to sign the passport. If there is no delegation evidence (<xref format="counter" target="DE"/>), the AP and the OP <bcp14>MUST</bcp14> be identical, and the OP <bcp14>MUST</bcp14> be the issuee of the vetting credential; otherwise, the OP <bcp14>MUST</bcp14> be the issuee of a delegated signing credential for which the issuer is the AP.</t>
          </li>
          <li>
            <t>Extract the <tt>orig</tt> field and compare it to the TNAlloc credential (<xref format="counter" target="tnalloc-credential"/>) cited in the dossier (<xref format="counter" target="dossier"/>) to confirm that the AP (<xref format="counter" target="AP"/>) -- or, if OP is not equal to AP and OP is using their own number, the OP (<xref format="counter" target="OP"/>) -- has the right to originate calls with this number.</t>
          </li>
          <li>
            <t>If the passport includes non-null values for the optional <tt>card</tt> or <tt>goal</tt> fields, extract that information and check that the brand attributes claimed for the call are justified by a brand credential (<xref format="counter" target="brand-credential"/>) in the dossier.</t>
          </li>
          <li>
            <t>Check any business logic. For example, if the delegated signer credential says that the OP can only call on behalf of the AP during certain hours, or in certain geos, check those attributes of the call.</t>
          </li>
        </ol>
      </section>
      <section anchor="planning-for-efficiency">
        <name>Planning for efficiency</name>
        <t>The complete algorithm listed above is quite rigorous. With no caches, it may take several seconds, much like a thorough validation of a certificate chain. However, much VVP evidence is stable for long periods of time and lends itself to caching, subject to the proviso that revocation freshness must be managed wisely. Since the same dossier is used to justify many outbound calls -- perhaps thousands or millions of calls, for busy call centers -- and many dossiers will reference the same issuers and issuees and their associated key states and KELs (<xref format="counter" target="KEL"/>), caching will produce huge benefits.</t>
        <t>Furthermore, because SAIDs and their associated data (including links to other nodes in a data graph) have a tamper-evident relationship, any party can perform validation and compile their results, then share the data with verifiers that want to do less work. Validators like this are not oracles, because consumers of such data need not trust shared results blindly. They can always directly recompute some or all of it from a passport, to catch deception. However, they can do this lazily or occasionally, per their preferred balance of risk/effort.</t>
        <t><em>In toto</em>, these characteristics mean that no centralized registry is required in any given ecosystem. Data can be fetched directly from its source, across jurisdictional boundaries. Because it is fetched from its source, it comes with consent. Privacy can be tuned (see <xref format="counter" target="privacy"/>). Simple opportunistic, uncoordinated reuse (e.g., in or across the datacenters of TSPs) will arise spontaneously and will dramatically improve the scale and efficiency of the system.</t>
      </section>
      <section anchor="historical-analysis">
        <name>Historical analysis</name>
        <t>Normally, the verification algorithm determines whether the passport verifies <em>now</em>. (This is the only evaluation that's valid for most JWTs, because they depend on ephemeral key state fetched just in time from <tt>x5u</tt>). However, a VVP passport can do more. Its <tt>kid</tt> header references a KEL for the delegated signer's AID, and its <tt>evd</tt> header references a dossier that links to the AP's AID, and thence to its KEL (see <xref format="counter" target="KEL"/>). These data structures provide key state transitions that are timestamped -- both by the controllers of the AIDs, and by their independent witnesses. Although the timestamps are not guaranteed to be perfectly synchronized, they can be compared to establish fuzzy transition times and to detect duplicity.</t>
        <t>Using this historical information, it becomes possible to ask whether a VVP passport verified at an arbitrary moment in the past. In such framings, the reference time from the verification algorithm is <em>then</em>, not <em>now</em>. In the normal case where <em>then</em> falls outside a fuzzy range, answers about key state are clear to all observers. In the rare cases where <em>then</em> falls inside a fuzzy range, a state transition was underway but not yet universally known, and a verifier can compute the key state (and thence, the outcome of the verification algorithm) according to their preferred interpretation.</t>
      </section>
    </section>
    <section anchor="curating">
      <name>Curating</name>
      <t>The evidence that's available in today's telco ecosystems resembles some of the evidence described here, in concept. However, existing evidence has gaps, and its format is fragile. It requires direct trust in the proximate issuer, and it is typically organized for discovery; both characteristics lead to large, centralized registries at a regional or national level. These registries become a trusted third party, which defeats some of the purpose of creating decentralized and independently verifiable evidence in the first place. Sharing such evidence across jurisdiction boundaries requires regulatory compatibility and bilateral agreements. Sharing at scale is impractical at best, if not illegal.</t>
      <t>How evidence is issued, propagated, quality-controlled, and referenced is therefore an important concern for this specification.</t>
      <section anchor="activities">
        <name>Activities</name>
        <t>The following curation activities guarantee the evidence upon which a VVP ecosystem depends.</t>
        <section anchor="witnessing-and-watching">
          <name>Witnessing and watching</name>
          <t>In an ACDC-based ecosystem, issuers issue and revoke their own evidence without any calls to a centralized registry or authority. However, KERI's decentralized witness feature <bcp14>MUST</bcp14> be active. This provides an official, uniform, and high-security methodology for curating the relationship between keys and identifiers, and between identifiers and non-repudiable actions like issuing and revoking credentials. In addition, watchers <bcp14>MAY</bcp14> be used by given verifiers, to provide efficient caching, pub-sub notifications of state changes, and duplicity detection. For more about these topics, see <xref format="counter" target="appendix-b"/>.</t>
        </section>
        <section anchor="vetting-identity">
          <name>Vetting identity</name>
          <t>The job of vetting legal entities (which includes APs <xref format="counter" target="AP"/>, but also OPs <xref format="counter" target="OP"/>) and issuing vetting credentials (<xref format="counter" target="vetting-credential"/>) is performed by a <em>legal entity vetter</em>. VVP <bcp14>MUST</bcp14> have evidence of vetted identity. It places few requirements on such vetters, other than the ones already listed for vetting credentials themselves. Vetting credentials <bcp14>MAY</bcp14> expire, but this is not particularly desirable and might actually be an antipattern. ACDCs and AIDs facilitate much longer lifecycles than certificates; proactive key rotation is recommended but creates no reason to rotate evidence. However, a legal entity vetter <bcp14>MUST</bcp14> agree to revoke vetting credentials in a timely manner if the legal status of an entity changes, or if data in a vetting credential becomes invalid.</t>
        </section>
        <section anchor="vetting-brand">
          <name>Vetting brand</name>
          <t>At the option of the AP and OP, VVP <bcp14>MAY</bcp14> prove brand attributes. When this feature is active, the job of analyzing the brand assets of a legal entity and issuing brand credentials (<xref format="counter" target="brand-credential"/>) is performed by a <em>brand vetter</em>. A brand vetter <bcp14>MAY</bcp14> be a legal entity vetter, and <bcp14>MAY</bcp14> issue both types of credentials after a composite analysis. However, the credentials themselves <bcp14>MUST NOT</bcp14> use a combined schema, the credentials <bcp14>MUST</bcp14> have independent lifecycles, and the assurances associated with each credential type <bcp14>MUST</bcp14> remain independent.</t>
          <t>A brand vetter <bcp14>MUST</bcp14> verify the canonical properties of a brand, but it <bcp14>MUST</bcp14> do more than this: it <bcp14>MUST</bcp14> issue the brand credential to the AID <xref format="counter" target="aid"/> of an issuee that is also the issuee of a vetting credential that already exists, and it <bcp14>MUST</bcp14> verify that the legal entity in the vetting credential has a right to use the brand in question. This link <bcp14>MUST NOT</bcp14> be based on mere weak evidence such as an observation that the legal entity's name and the brand name have some or all words in common, or the fact that a single person requested both credentials. Further, the brand vetter <bcp14>MUST</bcp14> agree to revoke brand credentials in a timely manner if the associated vetting credential is revoked, if the legal entity's right to use the brand changes, or if characteristics of the brand evolve.</t>
        </section>
        <section anchor="allocating-tns">
          <name>Allocating TNs</name>
          <t>At the option of the AP and OP, VVP <bcp14>SHOULD</bcp14> prove the right to use the originating phone number. When this feature is active, regulators <bcp14>MUST</bcp14> issue TNAlloc credentials (<xref format="counter" target="tnalloc-credential"/>) to range holders, and range holders <bcp14>MUST</bcp14> issue them to downstream AHs in an unbroken chain that reaches telephone number users (TNUs; see <xref format="counter" target="allocation-holder"/>). TNUs <bcp14>MAY</bcp14> in turn issue them to a delegate such as a call center. If aggregators or other intemediaries hold an RTU in the eyes of a regulator, then intermediate TNAlloc credentials <bcp14>MUST</bcp14> be created to track that RTU as part of the chain. On the other hand, if TNUs acquire phone numbers through aggregators, but regulators do not consider aggregators to hold allocations, then aggregators <bcp14>MUST</bcp14> work with range holders to assure that the appropriate TNAlloc credentials are issued to the TNUs.</t>
        </section>
        <section anchor="authorizing-brand-proxy">
          <name>Authorizing brand proxy</name>
          <t>When VVP is used to prove brand, APs (<xref format="counter" target="AP"/>) <bcp14>MAY</bcp14> issue brand proxy credentials (<xref format="counter" target="brand-proxy-credential"/>) to OPs (<xref format="counter" target="OP"/>), giving them the right to use the AP's brand. Without this credential, the OP only has the right to use the AP's phone number.</t>
          <t>Decisions about whether to issue vetting and brand credentials might be driven by large databases of metadata about organizations and brands, but how such systems work is out of scope. The credentials themselves contain all necessary information, and once credentials are issued, they constitute an independent source of truth as far as VVP is concerned. No party has to return to the operators of such databases to validate anything.</t>
        </section>
        <section anchor="delegating-signing-authority">
          <name>Delegating signing authority</name>
          <t>An AP <bcp14>MUST</bcp14> prove, by issuing a delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>), that the signer of its VVP passports does so with its explicit authorization. Normally the signer is automation under the control of the OP, but the issuee of the credential <bcp14>MAY</bcp14> vary at the AP's discretion.</t>
          <t>Since this credential merely documents the AP's intent to be accountable for the actions of the signer, the AP <bcp14>MAY</bcp14> choose whatever process it likes to issue it.</t>
        </section>
        <section anchor="revoking">
          <name>Revoking</name>
          <t>Revoking an ACDC is as simple as the issuer signing a revocation event and distributing it to witnesses (see <xref format="counter" target="appendix-b"/>). Parties that perform a full validation of a given ACDC (see <xref format="counter" target="verifying"/>) will automatically detect the revocation event in realtime, because they will contact one or more of these witnesses. Parties that are caching their validations <bcp14>MAY</bcp14> poll witnesses very efficiently to discover revocation events. Some witnesses may choose to offer the option of registering a callback, allowing interested parties to learn about revocations even more efficiently.</t>
        </section>
      </section>
      <section anchor="building-blocks">
        <name>Building blocks</name>
        <t>The term "credential" has a fuzzy meaning in casual conversation. However, understanding how evidence is built from credentials in VVP requires considerably more precision. We will start from lower-level concepts.</t>
        <section anchor="said">
          <name>SAID</name>
          <t>A <em>self-addressing identifier</em> (<em>SAID</em>) is the hash of a canonicalized JSON object, encoded in self-describing CESR format <xref target="TOIP-CESR"/>. The raw bytes from the digest function are left-padded to the nearest 24-bit boundary and transformed to base64url <xref target="RFC4648"/>. The left-pad char from the converted left-pad byte is replaced with a code char that tells which digest function was used.</t>
          <t>An example of a SAID is <tt>E81Wmjyz5nXMCYrQqWyRLAYeKNQvYLYqMLYv_qm-qP7a</tt>, and a regex that matches all valid SAIDs is: <tt>[EFGHI][-_\w]{43}|0[DEFG][-_\w]{86}</tt>. The <tt>E</tt> prefix in the example indicates that it is a Blake3-256 hash.</t>
          <t>SAIDs are evidence that hashed data has not changed. They can also function like a reference, hyperlink, or placeholder for the data that was hashed to produce them (though they are more similar to URNs than to URLs <xref target="RFC3986"/>, since they contain no location information).</t>
        </section>
        <section anchor="signature">
          <name>Signature</name>
          <t>A digital signature over arbitrary data D constitutes evidence that the signer processed D with a signing function that took D and the signer's private key as inputs: <tt>signature = sign(D, privkey)</tt>. The evidence can be verified by checking that the signature is bound to D and the public key of the signer: <tt>valid = verify(signature, D, pubkey)</tt>. Assuming that the signer has not lost unique control of the private key, and that cryptography is appropriately strong, we are justified in the belief that the signer must have taken deliberate action that required seeing an unmodified D in its entirety.</t>
          <t>The assumption that a signer has control over their private keys may often be true (or at least believed, by the signer) at the time a signature is created. However, after key compromise, an attacker can create and sign evidence that purports to come from the current or an earlier time period, unless signatures are anchored to a data source that detects anachronisms. Lack of attention to this detail undermines the security of many credential schemes, including in telco. VVP explicitly addresses this concern by anchoring signatures on non-ephemeral evidence to KELs (<xref format="counter" target="KEL"/>).</t>
        </section>
        <section anchor="aid">
          <name>AID</name>
          <t>An <em>autonomic identifier</em> (<em>AID</em>) is a short string that can be resolved to one or more cryptographic keys at a specific version of the identifier's key state. Using cryptographic keys, a party can prove it is the controller of an AID by creating digital signatures. AIDs are like W3C DIDs <xref target="W3C-DID"/>, and can be transformed into DIDs. The information required to resolve an AID to its cryptographic keys is communicated through a special form of URI called an <em>out-of-band invitation</em> (<em>OOBI</em>). An OOBI points to an HTTP resource that returns IANA content-type <tt>application/json+cesr</tt>; it is somewhat analogous to a combination of the <tt>kid</tt> and <tt>x5u</tt> constructs in many JWTs. AIDs and OOBIs are defined in the KERI spec <xref target="TOIP-KERI"/>.</t>
          <t>An example of an AID is <tt>EMCYrQqWyRLAYqMLYv_qm-qP7eKN81Wmjyz5nXQvYLYa</tt>. AIDs are created by calculating the hash of the identifier's initial state; since this state is typically a canonicalized JSON object, AIDs usually match the same regex as SAIDs (which are hashes of JSON). A noteworthy exception is that non-transferrable AIDs begin with <tt>B</tt> instead of <tt>E</tt> or another letter. Such AIDs hash only their public key, not a document. They are analogous to did:key values, and play a limited role in VVP. They are incapable of rotating keys or anchoring events to a KEL. They therefore lack OOBIs and can receive but not issue ACDCs. However, their virtue is that they can be created and used without a sophisticated wallet. This may make them a convenient way to identify the automation that signs passports and receives a delegated signer credential (see <xref format="counter" target="delegating-signing-authority"/>).</t>
          <t>An example of an OOBI for an AID is <tt>https://agentsrus.net/oobi/EMCYrQqWyRLAYqMLYv_qm-qP7eKN81Wmjyz5nXQvYLYa/agent/EAxBDJkpA0rEjUG8vJrMdZKw8YL63r_7zYUMDrZMf1Wx</tt>. Note the same <tt>EMCY...</tt> in the AID and its OOBI. Many constructs in KERI may have OOBIs, but when OOBIs are associated with AIDs, such OOBIs always contain their associated AID as the first URL segment that matches the AID regex. They point either to an agent or a witness that provides verifiable state information for the AID.</t>
          <t>AIDs possess several security properties (e.g., self-certification, support for prerotation and multisig, support for witnesses, and cooperative delegation) that are not guaranteed by DIDs in general. Such properties are vital to some of VVP's goals for high assurance.</t>
        </section>
        <section anchor="signatures-over-saids">
          <name>Signatures over SAIDs</name>
          <t>Since neither a SAID value nor the data it hashes can be changed without breaking the correspondence between them, and since the cryptographic hash function used ensures strong collision resistance, signing over a SAID is equivalent, in how it commits the signer to content and provides tamper evidence, to signing over the data that the SAID hashes. Since SAIDs can function as placeholders for JSON objects, a SAID can represent such an object in a larger data structure. And since SAIDs can function as a reference without making a claim about location, it is possible to combine these properties to achieve some indirections in evidence that are crucial in privacy and regulatory compliance.</t>
          <t>VVP uses SAIDs and digital signatures as primitive forms of evidence.</t>
        </section>
        <section anchor="x509-certificates">
          <name>X509 certificates</name>
          <t>VVP does not depend on X509 certificates <xref target="RFC5280"/> for any of its evidence. However, if deployed in a hybrid mode, it <bcp14>MAY</bcp14> be used beside alternative mechanisms that are certificate-based. In such cases, self-signed certificates that never expire might suffice to tick certificate boxes, while drastically simplifying the burden of maintaining accurate, unexpired, unrevoked views of authorizations and reflecting that knowledge in certificates. This is because deep authorization analysis flows through VVP's more rich and flexible evidence chain. See <xref format="counter" target="interoperability"/>.</t>
        </section>
        <section anchor="passport">
          <name>Passport</name>
          <t>VVP emits and verifies a STIR PASSporT <xref target="RFC8225"/> that is fully compliant in all respects, except that it <bcp14>MAY</bcp14> omit the <tt>x5u</tt> header that links it to an X509 certificate (see <xref format="counter" target="interop-certs"/>).</t>
          <t>The passport is a form of evidence suitable for evaluation during the brief interval when a call is being initiated, and it is carefully backed by evidence with a longer lifespan (<xref format="counter" target="dossier"/>). Conceptually, VVP's version is similar to a SHAKEN passport <xref target="RFC8588"/>. It <bcp14>MAY</bcp14> also reference brand-related evidence, allowing it to play an additional role similar to the RCD passport <xref target="RCD-PASSPORT"/>.</t>
          <t>Neither VVP's backing evidence nor its passport depends on a certificate authority ecosystem. The passport <bcp14>MUST</bcp14> be secured by an EdDSA digital signature <xref target="RFC8032"/>, <xref target="FIPS186-4"/>, rather than the signature variants preferred by the other passport types. Instead of including granular fields in the claims of its JWT, the VVP passport cites a rich data graph of evidence by referencing the SAID of that data graph. This indirection and its implications are discussed below.</t>
          <figure>
            <name>SHAKEN Passport compared to VVP Passport</name>
            <artset>
              <artwork type="svg" name="fig1.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="528" viewBox="0 0 528 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                  <path d="M 200,32 L 200,192" fill="none" stroke="black"/>
                  <path d="M 232,64 L 232,224" fill="none" stroke="black"/>
                  <path d="M 296,32 L 296,176" fill="none" stroke="black"/>
                  <path d="M 488,32 L 488,176" fill="none" stroke="black"/>
                  <path d="M 520,144 L 520,224" fill="none" stroke="black"/>
                  <path d="M 8,32 L 200,32" fill="none" stroke="black"/>
                  <path d="M 296,32 L 488,32" fill="none" stroke="black"/>
                  <path d="M 192,64 L 232,64" fill="none" stroke="black"/>
                  <path d="M 472,144 L 520,144" fill="none" stroke="black"/>
                  <path d="M 296,176 L 488,176" fill="none" stroke="black"/>
                  <path d="M 8,192 L 200,192" fill="none" stroke="black"/>
                  <path d="M 160,224 L 232,224" fill="none" stroke="black"/>
                  <path d="M 488,224 L 520,224" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="496,224 484,218.4 484,229.6" fill="black" transform="rotate(180,488,224)"/>
                  <polygon class="arrowhead" points="168,224 156,218.4 156,229.6" fill="black" transform="rotate(180,160,224)"/>
                  <circle cx="464" cy="144" r="6" class="opendot" fill="white" stroke="black"/>
                  <g class="text">
                    <text x="104" y="20">SHAKEN Passport</text>
                    <text x="396" y="20">VVP Passport</text>
                    <text x="56" y="52">protected</text>
                    <text x="344" y="52">protected</text>
                    <text x="108" y="68">kid: pubkey of OSP</text>
                    <text x="380" y="68">kid: AID of OP</text>
                    <text x="48" y="84">payload</text>
                    <text x="336" y="84">payload</text>
                    <text x="48" y="100">iat</text>
                    <text x="336" y="100">iat</text>
                    <text x="52" y="116">orig</text>
                    <text x="340" y="116">orig</text>
                    <text x="52" y="132">dest</text>
                    <text x="340" y="132">dest</text>
                    <text x="60" y="148">attest</text>
                    <text x="392" y="148">evd (JL to dossier)</text>
                    <text x="92" y="164">...more claims</text>
                    <text x="368" y="164">signature of OP</text>
                    <text x="84" y="180">signature of OSP</text>
                    <text x="92" y="228">pubkey in cert</text>
                    <text x="388" y="228">data graph of evidence</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig1.txt">
&lt;![CDATA[
     SHAKEN Passport                       VVP Passport
+-----------------------+           +-----------------------+
| protected             |           | protected             |
|   kid: pubkey of OSP -+---+       |   kid: AID of OP      |
| payload               |   |       | payload               |
|   iat                 |   |       |   iat                 |
|   orig                |   |       |   orig                |
|   dest                |   |       |   dest                |
|   attest              |   |       |   card                |
|   ...more claims      |   |       |   evd (JL to dossier)-+---+
| signature of OSP      |   |       | signature of OP       |   |
+-----------------------+   |       +-----------------------+   |
                            |                                   |
                            |                                   |
    pubkey in cert &lt;--------+        data graph of evidence &lt;---+
]]&gt;
    </artwork>
            </artset>
          </figure>
        </section>
        <section anchor="acdcs">
          <name>ACDCs</name>
          <t>Besides digital signatures and SAIDs, and the ephemeral passport, VVP uses long-lasting evidence in the ACDC format <xref target="TOIP-ACDC"/>. This is normalized, serialized data with an associated digital signature. Unlike X509 certificates, ACDCs are bound directly to the AIDs of their issuers and issuees, not to public keys of these parties. This has a radical effect on the lifecycle of evidence, because keys can be rotated without invalidating ACDCs (see <xref format="counter" target="appendix-a"/>).</t>
        </section>
        <section anchor="KEL">
          <name>KELs</name>
          <t>Unlike X509 certificates, JWTs <xref target="RFC7519"/>, and W3C Verifiable Credentials <xref target="W3C-VC"/>, signatures over ACDC data are not <em>contained inside</em> the ACDC; rather, they are <em>referenced by</em> the ACDC and <em>anchored in</em> a verifiable data structure called a <em>key event log</em> or <em>KEL</em> <xref target="TOIP-KERI"/>.</t>
          <figure>
            <name>X509 compared to ACDC</name>
            <artset>
              <artwork type="svg" name="fig2.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="456" viewBox="0 0 456 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                  <path d="M 200,32 L 200,192" fill="none" stroke="black"/>
                  <path d="M 248,32 L 248,192" fill="none" stroke="black"/>
                  <path d="M 248,240 L 248,288" fill="none" stroke="black"/>
                  <path d="M 376,240 L 376,288" fill="none" stroke="black"/>
                  <path d="M 432,64 L 432,272" fill="none" stroke="black"/>
                  <path d="M 448,32 L 448,192" fill="none" stroke="black"/>
                  <path d="M 8,32 L 200,32" fill="none" stroke="black"/>
                  <path d="M 248,32 L 448,32" fill="none" stroke="black"/>
                  <path d="M 400,64 L 432,64" fill="none" stroke="black"/>
                  <path d="M 8,192 L 200,192" fill="none" stroke="black"/>
                  <path d="M 248,192 L 448,192" fill="none" stroke="black"/>
                  <path d="M 248,240 L 376,240" fill="none" stroke="black"/>
                  <path d="M 376,272 L 432,272" fill="none" stroke="black"/>
                  <path d="M 248,288 L 376,288" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(180,400,64)"/>
                  <g class="text">
                    <text x="28" y="20">X509</text>
                    <text x="268" y="20">ACDC</text>
                    <text x="36" y="52">Data</text>
                    <text x="304" y="52">v (version)</text>
                    <text x="64" y="68">Version</text>
                    <text x="324" y="68">d (SAID of item)</text>
                    <text x="88" y="84">Serial Number</text>
                    <text x="328" y="84">i (AID of issuer)</text>
                    <text x="100" y="100">Issuer: DN of issuer</text>
                    <text x="340" y="100">ri (status registry)</text>
                    <text x="52" y="116">Validity</text>
                    <text x="300" y="116">s (schema)</text>
                    <text x="104" y="132">Subject: DN of issuee</text>
                    <text x="316" y="132">a (attributes)</text>
                    <text x="104" y="148">Sub PubKey Info: KeyX</text>
                    <text x="336" y="148">i (AID of issuee)</text>
                    <text x="60" y="164">Extensions</text>
                    <text x="340" y="164">dt (issuance date)</text>
                    <text x="56" y="180">Signature</text>
                    <text x="292" y="180">...etc</text>
                    <text x="256" y="228">KEL</text>
                    <text x="312" y="260">signed anchor</text>
                    <text x="292" y="276">for SAID</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig2.txt">
&lt;![CDATA[
 X509                          ACDC
+-----------------------+     +------------------------+
| Data                  |     | v (version)            |
|   Version             |     | d (SAID of item) &lt;---+ |
|   Serial Number       |     | i (AID of issuer)    | |
| Issuer: DN of issuer  |     | ri (status registry) | |
| Validity              |     | s (schema)           | |
| Subject: DN of issuee |     | a (attributes)       | |
| Sub PubKey Info: KeyX |     |  i (AID of issuee)   | |
| Extensions            |     |  dt (issuance date)  | |
| Signature             |     |  ...etc              | |
+-----------------------+     +----------------------+-+
                                                     |
                              KEL                    |
                              +---------------+      |
                              | signed anchor |      |
                              | for SAID      +------+
                              +---------------+
]]&gt;
    </artwork>
            </artset>
          </figure>
          <t>A KEL has some trust characteristics that resemble a blockchain. However, it is specific to one AID only (the AID of the issuer of the ACDC) and thus is not centralized. The KELs for two different AIDs need not (and typically do not) share any common storage or governance, and do not require coordination or administration. KELs thus suffer none of the performance and governance problems of blockchains, and incur none of blockchain's difficulties with regulatory requirements like data locality or right to be forgotten.</t>
          <t>ACDCs can be freely converted between text and binary representations, and either type of representation can also be compacted or expanded to support nuanced disclosure goals (see <xref format="counter" target="graduated-disclosure"/>). An ACDC is also uniquely identified by its SAID, which means that a SAID can take the place of a full ACDC in certain data structures and processes. None of these transformations invalidate the associated digital signatures, which means that any variant of a given ACDC is equivalently verifiable.</t>
          <t>The revocation of a given ACDC can be detected via the witnesses declared in its issuer's KEL. Discovering, detecting, and reacting to such events can be very efficient. Any number of aggregated views can be built on demand, for any subset of an ecosystem's evidence, by any party. This requires no special authority or access, and does not create a central registry as a source of truth, since such views are tamper-evident and therefore can be served by untrusted parties. Further, different views of the evidence can contain or elide different fields of the evidence data, to address privacy, regulatory, and legal requirements.</t>
        </section>
        <section anchor="cvd">
          <name>CVD</name>
          <t><em>Cryptographically verifiable data</em> (<em>CVD</em>) is data that's associated with a digital signature and a claim about who signed it. When CVD is an assertion, we make the additional assumption that the signer intends whatever the data asserts, since they took an affirmative action to create non-repudiable evidence that they processed it. CVD can be embodied in many formats, but in the context of VVP, all instances of CVD are ACDCs. When CVD references other CVD, the computer science term for the resulting data structure is a <em>data graph</em>.</t>
        </section>
        <section anchor="credential">
          <name>Credential</name>
          <t>A <em>credential</em> is a special kind of CVD that asserts entitlements for its legitimate bearer -- <em>and only its bearer</em>. CVD that says Organization X exists with a particular ID number in government registers, and with a particular legal name, is not necessarily a credential. In order to be a credential, it would have to be associated with an assertion that its legitimate bearer -- <em>and only its bearer</em> -- is entitled to use the identity of Organization X. If signed data merely enumerates properties without conferring privileges on a specific party, it is just CVD. Many security gaps in existing solutions arise from conflating CVD and credentials.</t>
          <t>ACDCs can embody any kind of CVD, not just credentials.</t>
        </section>
        <section anchor="bearer-token">
          <name>Bearer token</name>
          <t>VVP never uses bearer tokens, but we define them here to provide a contrast. A <em>bearer token</em> is a credential that satisfies binding requirements by a trivial test of possession -- like a movie ticket, the first party that presents the artifact to a verifier gets the privilege. Since Bearer Credentials can be stolen or copied, this is risky. JWTs, session cookies, and other artifacts in familiar identity technologies are often bearer tokens, even if they carry digital signatures. Although they can be protected to some degree by expiration dates and secure channels, these protections are imperfect. For example, TLS channels can be terminated and recreated at multiple places between call origination and delivery.</t>
        </section>
        <section anchor="targeted-credential">
          <name>Targeted credential</name>
          <t>A <em>targeted credential</em> is a CVD that identifies an issuee as the bearer, and that requires the issuee to prove their identity cryptographically (e.g., to produce a proper digital signature) in order to claim the associated privilege. All credentials in VVP are targeted credentials.</t>
        </section>
        <section anchor="jl">
          <name>JL</name>
          <t>A <em>justifying link</em> (<em>JL</em>) is a reference, inside of one CVD, to another CVD that justifies what the first CVD is asserting. JLs can be SAIDs that identify other ACDCs. JLs are edges in an ACDC data graph.</t>
        </section>
      </section>
      <section anchor="specific-artifacts">
        <name>Specific artifacts</name>
        <section anchor="pss">
          <name>PSS</name>
          <t>Each voice call begins with a SIP INVITE, and in VVP, each SIP INVITE contains an <tt>Identity</tt> header that <bcp14>MUST</bcp14> contain a signature from the call's OP (<xref format="counter" target="OP"/>). This <em>passpport-specific signature</em> (<em>PSS</em>) <bcp14>MUST</bcp14> be an Ed25519 signature serialized as CESR; it is NOT a JWS. The 64 raw bytes of the signature are left-padded to 66 bytes, then base64url-encoded. The <tt>AA</tt> at the front of the result is cut and replaced with <tt>0B</tt>, giving an 88-character string. A regex that matches the result is: <tt>0B[-_\w]{86}</tt>, and a sample value (with the middle elided) is: <tt>0BNzaC1lZD...yRLAYeKNQvYx</tt>.</t>
          <t>The signature <bcp14>MUST</bcp14> be the result of running the EdDSA algorithm over input data in the manner required by <xref target="RFC7519"/>: <tt>signature = sign(base64url(header) + "." + base64url(payload)</tt>. Also per the JWT spec, when the signature is added to the compact form of the JWT, it <bcp14>MUST</bcp14> be appended to the other two portions of the JWT, with a <tt>.</tt> delimiter preceding it. Per STIR conventions, it <bcp14>MUST</bcp14> then be followed by ";ppt=vvp" so tools that scan the <tt>Identity</tt> header of the passport can decide how to process the passport without doing a full parse of the JWT.</t>
          <t>The headers <bcp14>MUST</bcp14> include <tt>alg</tt>, <tt>typ</tt>, <tt>ppt</tt>, and <tt>kid</tt>, as described in <xref format="counter" target="sample-passport"/>. They <bcp14>MAY</bcp14> include other values, notably <tt>x5u</tt> (see <xref format="counter" target="interop-certs"/>). The claims <bcp14>MUST</bcp14> include <tt>orig</tt>, <tt>dest</tt>, <tt>iat</tt>, <tt>exp</tt>, and <tt>evd</tt>, and <bcp14>MAY</bcp14> include <tt>card</tt>, <tt>goal</tt>, <tt>call_reason</tt>, <tt>jti</tt>, <tt>origId</tt>, and other values (also described in <xref format="counter" target="sample-passport"/>). The signature <bcp14>MUST</bcp14> use all headers and all claims as input to the data stream that will be signed.</t>
        </section>
        <section anchor="dossier">
          <name>Dossier</name>
          <t>The <tt>evd</tt> field in the passport contains the OOBI (<xref format="counter" target="aid"/>) of an ACDC data graph called the <em>dossier</em>. The dossier is a compilation of all the permanent, backing evidence that justifies trust in the identity and authorization of the AP and OP. It is created and must be signed by the AP. It is CVD (<xref format="counter" target="cvd"/>) asserted to the world, not a credential (<xref format="counter" target="credential"/>) issued to a specific party.</t>
        </section>
        <section anchor="APE">
          <name>Accountable Party Evidence</name>
          <t>The dossier <bcp14>MUST</bcp14> include at least what is called <em>accountable party evidence</em> (<em>APE</em>).</t>
          <t>APE consists of several credentials, explored in detail below. It <bcp14>MUST</bcp14> include a vetting credential for the AP. It <bcp14>SHOULD</bcp14> include a TNAlloc credential that proves RTU. Normally the RTU <bcp14>MUST</bcp14> be assigned to the AP; however, if a proxy is the OP and uses their own phone number, the RTU <bcp14>MUST</bcp14> be assigned to the OP instead. If the AP intends to contextualize the call with a brand, it <bcp14>MUST</bcp14> include a brand credential for the AP. (In cases where callers are private individuals, "brand" maps to descriptive information about the individual, as imagined in mechanisms like VCard <xref target="RFC6350"/> or JCard <xref target="RFC7095"/>.) If no brand credential is present, verifiers <bcp14>MUST NOT</bcp14> impute a brand to the call on the basis of any VVP guarantees. APE <bcp14>MAY</bcp14> also include evidence that will aid in settlement.</t>
        </section>
        <section anchor="DE">
          <name>Delegation Evidence</name>
          <t>When a private individual makes a call with VVP, they might be both the AP and the OP. In such cases, we expect their AID to be the recipient or issuee of all the APE, and no backing evidence beyond the APE may be necessary. However, in business contexts, it will almost always be true that the OP role is played by a delegate. In such conditions, evidence must also include proof that this indirection is valid. We call this <em>delegation evidence</em> (<em>DE</em>).</t>
          <t>DE is nearly always required when the AP is an organization, because the cryptographic identifier for the organization as a legal entity is typically not the same as the cryptographic identifier for the organization's automated software that prepares SIP INVITEs. DE can thus distinguish between Acme Corporation in general, and software operated by Acme's IT department for the express purpose of signing voice traffic. The former has a vetting credential and legal accountability, and can act as the company to publish press releases, prepare invoices, spend money, and make attestations to regulators; the latter should only be able to sign outbound voice calls on Acme's behalf. Failing to make this distinction creates serious cybersecurity risks.</t>
          <t>Delegation evidence may also be used to prove that an AI-powered agent is empowered to make phone calls on behalf of an AP.</t>
          <figure>
            <name>Sample evidence graph; OP kid could bind to APE or DE</name>
            <artset>
              <artwork type="svg" name="fig3.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="528" width="512" viewBox="0 0 512 528" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 24,32 L 24,128" fill="none" stroke="black"/>
                  <path d="M 24,240 L 24,272" fill="none" stroke="black"/>
                  <path d="M 24,304 L 24,352" fill="none" stroke="black"/>
                  <path d="M 24,400 L 24,432" fill="none" stroke="black"/>
                  <path d="M 24,464 L 24,512" fill="none" stroke="black"/>
                  <path d="M 128,192 L 128,208" fill="none" stroke="black"/>
                  <path d="M 216,32 L 216,88" fill="none" stroke="black"/>
                  <path d="M 216,104 L 216,128" fill="none" stroke="black"/>
                  <path d="M 224,240 L 224,272" fill="none" stroke="black"/>
                  <path d="M 224,304 L 224,352" fill="none" stroke="black"/>
                  <path d="M 224,400 L 224,512" fill="none" stroke="black"/>
                  <path d="M 248,192 L 248,416" fill="none" stroke="black"/>
                  <path d="M 272,240 L 272,272" fill="none" stroke="black"/>
                  <path d="M 272,304 L 272,336" fill="none" stroke="black"/>
                  <path d="M 272,400 L 272,496" fill="none" stroke="black"/>
                  <path d="M 288,496 L 288,512" fill="none" stroke="black"/>
                  <path d="M 296,80 L 296,128" fill="none" stroke="black"/>
                  <path d="M 320,128 L 320,144" fill="none" stroke="black"/>
                  <path d="M 360,192 L 360,208" fill="none" stroke="black"/>
                  <path d="M 400,80 L 400,128" fill="none" stroke="black"/>
                  <path d="M 448,400 L 448,496" fill="none" stroke="black"/>
                  <path d="M 464,240 L 464,336" fill="none" stroke="black"/>
                  <path d="M 464,440 L 464,512" fill="none" stroke="black"/>
                  <path d="M 488,112 L 488,144" fill="none" stroke="black"/>
                  <path d="M 488,192 L 488,464" fill="none" stroke="black"/>
                  <path d="M 24,32 L 216,32" fill="none" stroke="black"/>
                  <path d="M 296,80 L 312,80" fill="none" stroke="black"/>
                  <path d="M 360,80 L 400,80" fill="none" stroke="black"/>
                  <path d="M 88,96 L 296,96" fill="none" stroke="black"/>
                  <path d="M 400,112 L 488,112" fill="none" stroke="black"/>
                  <path d="M 24,128 L 216,128" fill="none" stroke="black"/>
                  <path d="M 296,128 L 400,128" fill="none" stroke="black"/>
                  <path d="M 128,192 L 360,192" fill="none" stroke="black"/>
                  <path d="M 24,240 L 224,240" fill="none" stroke="black"/>
                  <path d="M 272,240 L 464,240" fill="none" stroke="black"/>
                  <path d="M 272,336 L 464,336" fill="none" stroke="black"/>
                  <path d="M 24,352 L 224,352" fill="none" stroke="black"/>
                  <path d="M 24,400 L 224,400" fill="none" stroke="black"/>
                  <path d="M 272,400 L 448,400" fill="none" stroke="black"/>
                  <path d="M 224,416 L 248,416" fill="none" stroke="black"/>
                  <path d="M 448,416 L 464,416" fill="none" stroke="black"/>
                  <path d="M 448,432 L 488,432" fill="none" stroke="black"/>
                  <path d="M 464,464 L 488,464" fill="none" stroke="black"/>
                  <path d="M 272,496 L 448,496" fill="none" stroke="black"/>
                  <path d="M 24,512 L 224,512" fill="none" stroke="black"/>
                  <path d="M 288,512 L 464,512" fill="none" stroke="black"/>
                  <circle cx="320" cy="80" r="6" class="opendot" fill="white" stroke="black"/>
                  <g class="text">
                    <text x="124" y="20">VVP Passport</text>
                    <text x="72" y="52">protected</text>
                    <text x="12" y="68">..</text>
                    <text x="96" y="68">...kid: AID of OP</text>
                    <text x="8" y="84">:</text>
                    <text x="64" y="84">payload</text>
                    <text x="340" y="84">f-OP</text>
                    <text x="8" y="100">:</text>
                    <text x="64" y="100">evd</text>
                    <text x="336" y="100">SAID of</text>
                    <text x="8" y="116">:</text>
                    <text x="96" y="116">signature of OP</text>
                    <text x="348" y="116">data graph</text>
                    <text x="8" y="132">:</text>
                    <text x="8" y="148">:</text>
                    <text x="8" y="164">:</text>
                    <text x="228" y="164">Accountable Party Evidence</text>
                    <text x="424" y="164">Delegation Evidence</text>
                    <text x="12" y="180">v?</text>
                    <text x="312" y="180">(APE)</text>
                    <text x="484" y="180">(DE)</text>
                    <text x="100" y="228">vetting credential</text>
                    <text x="348" y="228">TNAlloc credential</text>
                    <text x="52" y="260">SAID</text>
                    <text x="300" y="260">SAID</text>
                    <text x="104" y="276">AID of issuer</text>
                    <text x="352" y="276">AID of issuer</text>
                    <text x="124" y="292">..:...AID of AP............:..</text>
                    <text x="312" y="292">..:...AID of AP</text>
                    <text x="8" y="308">:</text>
                    <text x="92" y="308">legal name</text>
                    <text x="344" y="308">TNAllocList</text>
                    <text x="8" y="324">:</text>
                    <text x="116" y="324">legal identifier</text>
                    <text x="372" y="324">...more attributes</text>
                    <text x="8" y="340">:</text>
                    <text x="124" y="340">...more attributes</text>
                    <text x="8" y="356">:</text>
                    <text x="8" y="372">:</text>
                    <text x="8" y="388">:</text>
                    <text x="92" y="388">brand credential</text>
                    <text x="340" y="388">more credentials</text>
                    <text x="8" y="404">:</text>
                    <text x="8" y="420">:</text>
                    <text x="52" y="420">SAID</text>
                    <text x="8" y="436">:</text>
                    <text x="104" y="436">AID of issuer</text>
                    <text x="360" y="436">e.g., delegate RTU,</text>
                    <text x="64" y="452">:.:...AID of AP</text>
                    <text x="352" y="452">vet for call ctr,</text>
                    <text x="92" y="468">brand name</text>
                    <text x="364" y="468">proxy right to brand</text>
                    <text x="68" y="484">logo</text>
                    <text x="124" y="500">...more attributes</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig3.txt">
&lt;![CDATA[
         VVP Passport
  +-----------------------+
  | protected             |
......kid: AID of OP      |
: | payload               |         +--of-OP-----+
: |   evd --------------------------+ SAID of    |
: | signature of OP       |         | data graph +----------+
: +-----------------------+         +--+---------+          |
:                                      |                    |
:              Accountable Party Evidence  Delegation Evidence
v?                                  (APE)                 (DE)
               +--------------+--------+----+               |
               |              |             |               |
   vetting credential         |   TNAlloc credential        |
  +------------------------+  |  +-----------------------+  |
  | SAID                   |  |  | SAID                  |  |
  |   AID of issuer        |  |  |   AID of issuer       |  |
..:...AID of AP............:..|..:...AID of AP           |  |
: |   legal name           |  |  |   TNAllocList         |  |
: |   legal identifier     |  |  |   ...more attributes  |  |
: |   ...more attributes   |  |  +-----------------------+  |
: +------------------------+  |                             |
:                             |                             |
:  brand credential           |   more credentials          |
: +------------------------+  |  +---------------------+    |
: | SAID                   +--+  |                     +-+  |
: |   AID of issuer        |     | e.g., delegate RTU, +----+
:.:...AID of AP            |     | vet for call ctr,   | |  |
  |   brand name           |     | settlement, AI ok,  | +--+
  |   logo                 |     | proxy right to brand| |
  |   ...more attributes   |     +-+-------------------+ |
  +------------------------+       +---------------------+
]]&gt;
    </artwork>
            </artset>
          </figure>
          <t>Where DE exists, the APE will identify and authorize the AP, but the OOBI in the <tt>kid</tt> claim of the passport will identify the OP, and these two parties will be different. Therefore, the DE in the dossier <bcp14>MUST</bcp14> include a delegated signer credential that authorizes the OP to act on the AP's behalf and that stipulates the constraints that govern this delegation. In addition to the vetting credential for the AP, which is required, it <bcp14>SHOULD</bcp14> also include a vetting credential for the OP, that proves the OP's identity. If the APE includes a brand credential, then the DE <bcp14>MUST</bcp14> also include a brand proxy credential, proving that the OP not only can use the AP's allocated phone number, but has AP's permission to project the AP's brand while doing so.</t>
          <t>The passport-specific signature <bcp14>MUST</bcp14> come from the OP, not the OSP or any other party. The OP can generate this signature in its on-prem or cloud PBX, using keys that it controls. It is crucial that the distinction between OP and AP be transparent, with the relationship proved by strong evidence that the AP can create or revoke easily, in a self-service manner.</t>
        </section>
        <section anchor="vetting-credential">
          <name>Vetting credential</name>
          <t>A vetting credential is a targeted credential that enumerates the formal and legal attributes of a unique legal entity. It <bcp14>MUST</bcp14> include a legal identifier that makes the entity unique in its home jurisdiction (e.g., an LEI), and it <bcp14>MUST</bcp14> include an AID for the legal entity as an AP. This AID is globally unique.</t>
          <t>The vetting credential is so called because it <bcp14>MUST</bcp14> be issued according to a documented vetting process that offers formal assurance that it is only issued with accurate information, and only to the entity it describes. A vetting credential confers the privilege of acting with the associated legal identity if and only if the bearer can prove their identity as issuee via a digital signature from the issuee's AID.</t>
          <t>A vetting credential <bcp14>MUST</bcp14> include a JL to a credential that qualifies the issuer as a party trusted to do vetting. This linked credential that qualifies the issuer of the vetting credential <bcp14>MAY</bcp14> contain a JL that qualifies its own issuer, and such JLs <bcp14>MAY</bcp14> be repeated through as many layers as desired. In VVP, the reference type of a vetting credential is an LE vLEI; see <xref target="ISO-17442-3"/> and <xref format="counter" target="vet-cred-sample"/>. This implies both a schema and a governance framework. Other vetting credential types are possible, but they <bcp14>MUST</bcp14> be true credentials that meet the normative requirements here. They <bcp14>MUST NOT</bcp14> be bearer tokens.</t>
          <t>To achieve various design goals, a vetting credential <bcp14>MUST</bcp14> be an ACDC, but this ACDC <bcp14>MAY</bcp14> be a transformation of a credential in another format (e.g., W3C VC, SD-JWT, X509 certificate). See <xref format="counter" target="interoperability"/>.</t>
        </section>
        <section anchor="tnalloc-credential">
          <name>TNAlloc credential</name>
          <t>A TNAlloc credential is a targeted credential that confers on its issuee the right to control how one or more phone numbers are used. Regulators issue TNAlloc credentials to range holders, who in turn issue them to TNUs. TNUs often play the AP role in VVP. If an AP delegates RTU to a proxy (e.g., an employee or call center), the AP <bcp14>MUST</bcp14> also issue a TNAlloc credential to the proxy, to confer the RTU. With each successive reallocation, the set of numbers in the new TNAlloc credential may get smaller.</t>
          <t>Except for TNAlloc credentials issued by regulators, all TNAlloc credentials <bcp14>MUST</bcp14> contain a JL to a parent TNAlloc credential, having an equal or bigger set of numbers that includes those in the current credential. This JL in a child credential documents the fact that the child's issuer possessed an equal or broader RTU, from which the subset RTU in child credential derives.</t>
          <t>To achieve various design goals, a TNAlloc credential <bcp14>MUST</bcp14> be an ACDC, but this ACDC <bcp14>MAY</bcp14> be a transformation of a credential in another format (e.g., a TNAuthList from <xref target="RFC8226"/>). See <xref format="counter" target="interop-creds"/>.</t>
          <t>An example TNAlloc credential and its schema are described in <xref format="counter" target="tn-cred-sample"/>.</t>
        </section>
        <section anchor="brand-credential">
          <name>Brand credential</name>
          <t>A brand credential is a targeted credential that enumerates brand properties such as a brand name, logo, chatbot URL, social media handle, and domain name. It <bcp14>MUST</bcp14> be issued to an AP as a legal entity, but it does not enumerate the formal and legal attributes of the AP; rather, it enumerates properties that would be meaningful to a TP who's deciding whether to take a phone call. It confers on its issuee the right to use the described brand by virtue of research conducted by the issuer (e.g., a trademark search).</t>
          <t>This credential <bcp14>MUST</bcp14> be issued according to a documented process that offers formal assurance that it is only issued with accurate information, and only to a legal entity that has the right to use the described brand. A single AP <bcp14>MAY</bcp14> have multiple brand credentials (e.g., a fictional corporation, <tt>Amce Space Travel Deutschland, GmbH</tt>, might hold brand credentials for both <tt>Sky Ride</tt> and for <tt>Orbítame Latinoamérica</tt>). Rights to use the same brand <bcp14>MAY</bcp14> be conferred on multiple APs (<tt>Acme Space Travel Deutschland, Gmbh</tt> and <tt>Acme Holdings Canada, Ltd</tt> may both possess brand credentials for <tt>Sky Ride</tt>). A brand credential <bcp14>MUST</bcp14> contain a JL to a vetting credential, that shows that the right to use the brand was evaluated only after using a vetting credential to prove the identity of the issuee.</t>
          <t>An example brand credential and its schema are described in <xref format="counter" target="bcred-sample"/>.</t>
        </section>
        <section anchor="brand-proxy-credential">
          <name>Brand proxy credential</name>
          <t>A brand proxy credential confers on an OP the right to project the brand of an AP when making phone calls, subject to a carefully selected set of constraints. This is different from the simple RTU conferred by TNAlloc. Without a brand proxy credential, a call center could make calls on behalf of an AP, using the AP's allocated phone number, but would be forced to do so under its own name or brand, because it lacks evidence that the AP intended anything different. If an AP intends for phone calls to be made by a proxy, and wants the proxy to project the AP's brand, the AP <bcp14>MUST</bcp14> issue this credential.</t>
          <t>An example brand proxy credential and its schema are shown in <xref format="counter" target="bprox-cred-sample"/>.</t>
        </section>
        <section anchor="delegated-signer-credential">
          <name>Delegated signer credential</name>
          <t>A delegated signer credential proves that automation running under the control of the OP has been authorized by the AP to originate VVP traffic (and thus, sign VVP passports) on its behalf.</t>
          <t>An example delegated signer credential and its schema are shown in <xref format="counter" target="dsig-cred-sample"/>.</t>
        </section>
        <section anchor="additional-credential-types">
          <name>Additional credential types</name>
          <t>New credential types can be added to a dossier, to answer any number of novel questions for verifiers, without changing the core characteristics of VVP.</t>
          <t>For example, a credential could be attached to a dossier to prove that the caller is a human being instead of an AI (see <xref target="F2F-SCHEMA"/> and <xref target="PERSONHOOD-CRED"/>), or a credential could be attached to a dossier to prove that the AP empowered an AI agent to make calls on its behalf (analogous to how chatbots represent companies in RCS contexts). An additional credential could assist with questions about settlement (how the terminating service provider will be paid to connect the call). It might document the relationship between an AP and one or more financial clearinghouses.</t>
        </section>
      </section>
    </section>
    <section anchor="interoperability">
      <name>Interoperability</name>
      <t>VVP can achieve its goals without any dependence on RCD, SHAKEN, or similar mechanisms. However, it also provides easy bridges so value can flow to and from other ecosystems with similar goals.</t>
      <section anchor="chat-and-conversations">
        <name>Chat and conversations</name>
        <t>The dossier cited in a VVP passport may also be cited by an RCS verification authority (VA), may include evidence that is also submitted to a VA, or may consist of evidence created by a VA. This unlocks synergies between vetting for RCS (<xref target="GSMA-RCS"/>) and vetting for voice. It may also allow properly vetted RCS chatbots to make verifiable voice calls, including calls that carry brand information (see <xref target="RCD-DRAFT"/> and <xref target="CTIA-BCID"/>), distinguishing them with 100% confidence from AI-driven voice scams.</t>
        <t>When conversations are captured in rich containers such as vCon (<xref target="VCON-DRAFT"/>), a VVP passport may be included (e.g., in the <tt>stir</tt> field of a vCon), proving the identity of a calling party. As long as signatures over the data structure assert truthfully that the passport was verified at the time of attachment, no replay attack is possible, and all of VVP's guarantees transfer. A VVP dossier by itself can also provide permanent evidence of assertions as attachments to a conversation.</t>
      </section>
      <section anchor="interop-certs">
        <name>Certificates</name>
        <t>Certificates can add value to VVP, and VVP can add value to certificate-based ecosystems or stacks. In the rest of this section, note the difference between normative language (imposing requirements on VVP implementations) and non-normative language (suggesting how other solutions could react).</t>
        <section anchor="cascaded-mode">
          <name>Cascaded mode</name>
          <t>Verifiers who prefer to operate in certificate ecosystems such as SHAKEN and RCD can be satisfied by having an intermediary verify according to VVP rules (see <xref format="counter" target="verifying"/>), and then signing a new passport in a certificate-dependent format (e.g., for SHAKEN and/or RCD). In such cases, the new passport contains an <tt>x5u</tt> header pointing to the certificate of the new signer.</t>
          <t>This form of trust handoff is called <em>cascaded mode</em>. In cascaded mode, if the certificate fetched from the <tt>x5u</tt> URL satisfies enough trust requirements of the verifier, the goals of the new context are achieved. For example, if this intermediary is the OSP, the standard assumptions of SHAKEN are fully met, but the OSP's attestation can always be <tt>A</tt>, since VVP conclusively proves the identity of the AP and OP.</t>
        </section>
        <section anchor="foundation-mode">
          <name>Foundation mode</name>
          <t>In another pattern called <em>foundation mode</em>, a VVP passport <bcp14>MAY</bcp14> itself contain an <tt>x5u</tt> header. If it does, the <tt>x5u</tt> header <bcp14>MUST NOT</bcp14> be used to achieve any VVP verification guarantees; the key state of the OP's AID <bcp14>MUST</bcp14> still justify any acceptance of the signature. However, the associated X509 certificate <bcp14>SHOULD</bcp14> be issued to the public key of the party that plays the OP role in VVP. If and only if it does so, the full weight of VVP evidence about the OP's status as a trusted signer for the AP could be transferred to the certificate, even if the certificate is self-issued or otherwise chains back to something other than a known, high-reputation certificate authority.</t>
          <t>Valid VVP passports that obey this requirement can thus be used to enable VVP-unaware but certificate-based checks without certificate authorities (or without prior knowledge of them). Such certificate-based checks should be done in real-time, since the binding between a key and the owner of a cert cannot be known to be valid except at the current moment.</t>
        </section>
      </section>
      <section anchor="interop-creds">
        <name>Other credential formats</name>
        <t>The stable evidence that drives VVP -- vetting credential (<xref format="counter" target="vetting-credential"/>), TNAlloc credential (<xref format="counter" target="tnalloc-credential"/>), brand credential (<xref format="counter" target="brand-credential"/>), brand proxy credential (<xref format="counter" target="brand-proxy-credential"/>), and delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>) -- <bcp14>MUST</bcp14> all be ACDCs. This is because only when the data in these credentials is modeled as an ACDC is it associated with permanent identities that possess appropriate security guarantees.</t>
        <t>However, VVP can easily be driven by other approaches to evidence, treating the ACDCs as a somewhat secondary format transformation. In such a case, a <em>bridging party</em> plays a pivotal role. This party <bcp14>MUST</bcp14> verify foreign evidence (e.g., W3C verifiable credentials <xref target="W3C-VC"/>), and then issue ACDCs that derive from it (e.g., using <xref target="CITATION-SCHEMA"/>). It <bcp14>MAY</bcp14> radically transform the data in the process (e.g., combining or splitting credentials, changing schemas or data values).</t>
        <t>This transformation from foreign evidence to ACDCs is very flexible, and allows for tremendous interoperability. On the calling side, any ecosystem that deals in cryptographic evidence can provide input to VVP, no matter what evidence mechanisms they prefer.</t>
        <t>(On the receiving side, the information carried via ACDCs in VVP could be transformed again, with a second bridging party, to enable even more interoperability. However, the goals of such a secondary transformation are undefined by VVP, so the constraints and rules of the transformation are out of scope here.)</t>
        <t>All VVP stakeholders need to understand that accepting foreign evidence does much more than alter format. Bridging is not a simple conversion or reissuance. It replaces identifiers (e.g., DIDs as specified in <xref target="W3C-DID"/> with AIDs as specified in <xref target="TOIP-KERI"/>). The new identifiers have different lifecycles and different trust bases than the original. Bridging also changes the <em>meaning</em> of the credential. Foreign evidence directly asserts claims backed by the reputation of its original issuer. A new ACDC embodies a claim by the bridging party, that they personally verified foreign evidence according to foreign evidence rules, at a given moment. It cites the foreign evidence as a source, and may copy claims into the ACDC, but the bridging party is only asserting that they verified the original issuer's commitment to the claims, not that the bridging party commits to those claims.</t>
        <t>Verifiers <bcp14>MAY</bcp14> choose to accept such derivative ACDCs, but the indirection <bcp14>SHOULD</bcp14> color their confidence. They <bcp14>MUST NOT</bcp14> assume that identifiers in the foreign evidence and in the ACDC have the same referents or controllers. They <bcp14>MUST NOT</bcp14> hold the bridging party accountable for the claims -- only for the claim that they verified the original issuer's commitment to the claims. Unless additional governance offers guarantees beyond those explicitly provided by VVP, they <bcp14>MUST</bcp14> accept that there is no defined relationship between revocation of the foreign evidence and revocation of the ACDC.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Complying with a specification may forestall certain easy-to-anticipate attacks. However, <em>it does not mean that vulnerabilities don't exist, or that they won't be exploited</em>. The overall assurance of VVP requires reasonable vigilance. Given that a major objective of VVP is to ensure security, implementers are strongly counseled to understand the underlying principles, the assumptions, and the ways that choices by their own or other implementations could introduce risk.</t>
      <t>Like most cryptographic mechanisms, VVP depends on the foundational assumption that people will manage cryptographic keys carefully. VVP enforces this assumption more thoroughly than many existing solutions:</t>
      <ul spacing="normal">
        <li>
          <t>Parties that issue credentials <bcp14>MUST</bcp14> be identified with AIDs (<xref format="counter" target="aid"/>) that use witnesses (<xref format="counter" target="appendix-b"/>). This guarantees a non-repudiable, publicly accessible audit log of how their key state evolves, and it makes key rotation easy. It also offers compromise and duplicity detection. Via prerotation, it enables recovery from key compromise. AIDs can be upgraded to use quantum-proof signing algorithms without changing the identifier.</t>
        </li>
        <li>
          <t>Parties that issue credentials <bcp14>MUST</bcp14> do so using ACDCs (<xref format="counter" target="acdcs"/>) signed by their AID rather than a raw key. This makes evidence revocable. It also makes it stable across key rotation, and prevents retrograde attacks by allowing verifiers to map an issuance or revocation event to an unambiguous key state in the KEL (<xref format="counter" target="KEL"/>).</t>
        </li>
        <li>
          <t>Parties that issue credentials <bcp14>SHOULD</bcp14> employ threshold-based multi-signature schemes. This enhances security by distributing signing authority across multiple key holders, reducing the risk of single-point compromise. Threshold-based signatures ensure that no single key compromise undermines the system’s integrity while enabling controlled key recovery and rotation without disrupting credential validity.</t>
        </li>
      </ul>
      <t>Nonetheless, it is still possible to make choices that weaken the security posture of the ecosystem, including at least the following:</t>
      <ul spacing="normal">
        <li>
          <t>Sharing keys or controlling access to them carelessly</t>
        </li>
        <li>
          <t>Issuing credentials with a flimsy basis for trust</t>
        </li>
        <li>
          <t>Delegating authority to untrustworthy parties</t>
        </li>
        <li>
          <t>Delegating authority without adequate constraints</t>
        </li>
        <li>
          <t>Failing to fully verify evidence</t>
        </li>
      </ul>
      <t>Generally understood best practices in cybersecurity will avoid many of these problems. In addition, the following policies that are specific to VVP are strongly recommended:</t>
      <ol spacing="normal" type="1"><li>
          <t>Passports <bcp14>SHOULD</bcp14> have an aggressive timeout (e.g., 1 minute). Signatures on passports are not anchored in a KEL, and must therefore be evaluated for age with respect to the time they were received. Overly old passports could be a replay attack (a purported second call with the same orig and dest numbers, using the same backing evidence, soon after the first.)</t>
        </li>
        <li>
          <t>Witnesses (which <bcp14>MUST</bcp14> be used) <bcp14>SHOULD</bcp14> be used in such a way that high availability is guaranteed, and in such a way that duplicity by the controller of an AID is detected. See <xref format="counter" target="appendix-b"/>. (Verifiers will be able to see the witness policy of each AID controller, and <bcp14>SHOULD</bcp14> decide for themselves whether the party is reliable, depending on what they observe.)</t>
        </li>
        <li>
          <t>Revocations <bcp14>SHOULD</bcp14> be timely, and the timeliness guarantees of issuers <bcp14>SHOULD</bcp14> be published.</t>
        </li>
        <li>
          <t>Watchers <bcp14>SHOULD</bcp14> propagate events to local caches with a low latency, and <bcp14>MUST</bcp14> provide information that allows verifiers to decide whether that latency meets their freshness requirements.</t>
        </li>
      </ol>
    </section>
    <section anchor="privacy">
      <name>Privacy</name>
      <t>Both institutions and individuals that make phone calls may have privacy goals. Although their goals might differ in some ways, both will wish to disclose some attributes to the TP, and both may wish to suppress some of that same information from intermediaries. Both will want control over how this disclosure works.</t>
      <section anchor="graduated-disclosure">
        <name>Graduated Disclosure</name>
        <t>ACDCs support a technique called <em>graduated disclosure</em> that enables this.</t>
        <t>The hashing algorithm for ACDCs resembles the hashing algorithm for a merkle tree. An ACDC is a hierarchical data structure that can be modeled with nested JSON. Any given layer of the structure may consist of a mixture of simple scalar values and child objects. The input to the hashing function for a layer of content equals the content of scalar fields and the <em>hashes</em> of child objects.</t>
        <figure>
          <name>ACDC hashes like a Merkle tree</name>
          <artset>
            <artwork type="svg" name="fig4.svg">
      <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="432" width="408" viewBox="0 0 408 432" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,272" fill="none" stroke="black"/>
                <path d="M 72,320 L 72,328" fill="none" stroke="black"/>
                <path d="M 72,368 L 72,376" fill="none" stroke="black"/>
                <path d="M 112,48 L 112,272" fill="none" stroke="black"/>
                <path d="M 152,48 L 152,160" fill="none" stroke="black"/>
                <path d="M 216,320 L 216,328" fill="none" stroke="black"/>
                <path d="M 216,344 L 216,360" fill="none" stroke="black"/>
                <path d="M 224,80 L 224,88" fill="none" stroke="black"/>
                <path d="M 224,104 L 224,120" fill="none" stroke="black"/>
                <path d="M 256,48 L 256,160" fill="none" stroke="black"/>
                <path d="M 296,48 L 296,80" fill="none" stroke="black"/>
                <path d="M 400,48 L 400,80" fill="none" stroke="black"/>
                <path d="M 8,48 L 112,48" fill="none" stroke="black"/>
                <path d="M 152,48 L 256,48" fill="none" stroke="black"/>
                <path d="M 296,48 L 400,48" fill="none" stroke="black"/>
                <path d="M 296,80 L 400,80" fill="none" stroke="black"/>
                <path d="M 152,160 L 256,160" fill="none" stroke="black"/>
                <path d="M 8,272 L 112,272" fill="none" stroke="black"/>
                <path d="M 240,96 C 248.83064,96 256,103.16936 256,112" fill="none" stroke="black"/>
                <path class="jump" d="M 224,104 C 218,104 218,88 224,88" fill="none" stroke="black"/>
                <path class="jump" d="M 216,344 C 210,344 210,328 216,328" fill="none" stroke="black"/>
                <g class="text">
                  <text x="56" y="20">Fully</text>
                  <text x="208" y="20">Partially</text>
                  <text x="344" y="20">Fully</text>
                  <text x="56" y="36">Expanded ACDC</text>
                  <text x="204" y="36">Compact ACDC</text>
                  <text x="348" y="36">Compact ACDC</text>
                  <text x="40" y="68">a = {</text>
                  <text x="184" y="68">a = {</text>
                  <text x="348" y="68">a = H(...)</text>
                  <text x="60" y="84">b = N,</text>
                  <text x="200" y="84">b = N</text>
                  <text x="56" y="100">C = {</text>
                  <text x="200" y="100">c = H</text>
                  <text x="232" y="100">c</text>
                  <text x="76" y="116">d = M,</text>
                  <text x="200" y="116">g = Q</text>
                  <text x="76" y="132">e = O,</text>
                  <text x="212" y="132">i = H(i)</text>
                  <text x="72" y="148">f = P</text>
                  <text x="168" y="148">}</text>
                  <text x="44" y="164">},</text>
                  <text x="60" y="180">g = Q,</text>
                  <text x="56" y="196">i = {</text>
                  <text x="76" y="212">j = R,</text>
                  <text x="72" y="228">k = S</text>
                  <text x="40" y="244">}</text>
                  <text x="24" y="260">}</text>
                  <text x="48" y="308">H(a) = H(</text>
                  <text x="192" y="308">H(a) = H(</text>
                  <text x="344" y="308">H(a) = SAID</text>
                  <text x="48" y="324">b = N</text>
                  <text x="192" y="324">b = N</text>
                  <text x="64" y="340">c = H(c),</text>
                  <text x="192" y="340">c = H</text>
                  <text x="232" y="340">c),</text>
                  <text x="72" y="356">recurse</text>
                  <text x="192" y="356">g = Q</text>
                  <text x="48" y="372">g = Q</text>
                  <text x="204" y="372">i = H(i)</text>
                  <text x="60" y="388">i = H(i)</text>
                  <text x="188" y="388">) = SAID</text>
                  <text x="72" y="404">recurse</text>
                  <text x="44" y="420">) = SAID</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" name="fig4.txt">
&lt;![CDATA[
    Fully            Partially          Fully
Expanded ACDC      Compact ACDC      Compact ACDC
+------------+    +------------+    +------------+
| a = {      |    | a = {      |    | a = H(...) |
|   b = N,   |    |   b = N,   |    +------------+
|   C = {    |    |   c = H(c),|
|     d = M, |    |   g = Q,   |
|     e = O, |    |   i = H(i) |
|     f = P  |    | }          |
|   },       |    +------------+
|   g = Q,   |
|   i = {    |
|     j = R, |
|     k = S  |
|   }        |
| }          |
+------------+

 H(a) = H(         H(a) = H(         H(a) = SAID
   b = N,            b = N,
   c = H(c),         c = H(c),
     recurse         g = Q,
   g = Q,            i = H(i)
   i = H(i)        ) = SAID
     recurse
 ) = SAID
]]&gt;
    </artwork>
          </artset>
        </figure>
        <t>This means is that any given child JSON object in an ACDC can be replaced with its hash, <em>without altering the hash of the parent data</em>. Thus, there can be expanded ACDCs (where all data inside child objects is visible) or compacted ACDCs (where some or all of the child objects are opaquely represented by their equivalent hashes). A signature over an expanded ACDC is also a signature over any of the compacted versions of the same ACDC, and a revocation event over any of the versions is guaranteed to mean the same thing.</t>
        <t>In combination with the <tt>evd</tt> claim in a passport, graduated disclosure can be used to achieve privacy goals, because different verifiers can see different variations on an ACDC, each of which is guaranteed to pass the same verification tests and has the same revocation status.</t>
        <t>For example, suppose that company X wants to make a call to an individual in jurisdiction Y, and further suppose that auditor Z requires proof that X is operating lawfully, without knowing the name of X as a legal entity. In other words, the auditor needs to <em>qualify</em> X but not necessarily <em>identify</em> X. Company X can serve the KEL for its dossier from a web server that knows to return the expanded form of the vetting credential in the dossier to the individual or the individual's TSP in Y, but a compacted form of the vetting credential (revealing just the vetter's identity and their signature, but not the legal identity of the issuee, X) to auditor Z. Later, if law enforcement sees the work of the auditor and demands to know the legal identity of X, discovery of the expanded form can be compelled. When the expanded form is disclosed, it will demonstrably be associated with the compact form that Z recorded, since the qualifying and identifying forms of the ACDC have the same hash.</t>
        <t>Company X doesn't have to engage in sophisticated sniffing of traffic by geography to achieve goals like this. It can simply say that anonymous and unsigned HTTP requests for the dossier return the compact form; anyone who wants the expanded form must make an HTTP request that includes in its body a signature over terms and conditions that enforce privacy and make the recipient legally accountable not to reshare.</t>
        <t>Importantly, transformations from expanded to compact versions of an ACDC can be performed by anyone, not just the issuer or holder. This means that a verifier can achieve trust on the basis of expanded data, and then cache or share a compacted version of the data, meaning that any subsequent or downstream verifications can have equal assurance but higher privacy. The same policy can be applied to data any time it crosses a regulatory, jurisdictional boundary where terms and conditions for disclosure have weaker enforcement. It can also be used when business relationships should be redacted outside of a privileged context.</t>
        <t>Schemas for credentials should be designed to allow graduated disclosure in increments that match likely privacy goals of stakeholders. ACDC schema design typically includes a salty nonce in each increment, avoiding rainbow attacks on the hashed data. VVP encourages but does not require this.</t>
      </section>
      <section anchor="correlation">
        <name>Correlation</name>
        <t>Privacy theorists will note that, even with contractually protected graduated disclosure and maximally compact ACDCs, verifiers can still correlate by using some fields in ephemeral passports or long-lived ACDCs, and that this may undermine some privacy goals.</t>
        <t>There are three correlators in each passport:</t>
        <ol spacing="normal" type="1"><li>
            <t>Any brand information in <tt>card</tt> (may strongly identify an AP)</t>
          </li>
          <li>
            <t>the <tt>kid</tt> header (identifies the OP)</t>
          </li>
          <li>
            <t>the <tt>evd</tt> claim (uniquely identifies a dossier used by an AP)</t>
          </li>
        </ol>
        <t>We discount the first correlator, because if it is present, the AP is explicitly associating its correlated reputation with a call. It has asserted this brand publicly, to every stakeholder in the SIP pipeline. In such cases, any question of the AP's privacy is off the table, and no privacy protections on the other two correlators will be effective. However, if the first correlator is missing, the other two correlators become more interesting.</t>
        <section anchor="kid">
          <name>kid</name>
          <t>In VVP, the OP role that's identified by <tt>kid</tt> is played by automation. Automation is unlikely to have any direct privacy goal. The company that operates it is likely to be either a service provider, or a large corporation capable of significant IT investments. Either way, the OP is in the business of servicing phone calls, and is likely to be content for its traffic to be correlated publicly. Therefore, the fact that <tt>kid</tt> correlates the OP is not particularly interesting.</t>
          <t>However, could the OP be used as an indirect correlator for the AP?</t>
          <t>The OP's SBC can service many thousands or millions of callers, providing a some herd privacy. This is not a perfect protection, but it is a beginning. We add to this the crucial observation that <em>the OP doesn't need to have a stable reputation to support VVP goals</em>. Trust in the OP comes from the existence of a delegated signer credential (see <xref format="counter" target="delegated-signer-credential"/>), not from a certificate or any other long-term identity. Therefore, the AID that provides cryptographic identity for an OP <bcp14>MAY</bcp14> be rotated often (as often as APs are willing to delegate to a new one). Further, even without rotation, an OP organization <bcp14>MAY</bcp14> provide multiple instances of its automation, each using a different AID. Also, an AP <bcp14>MAY</bcp14> delegate signing authority to multiple OP organizations, each of which is using various strategies to mitigate correlation. Taken together, these measures offers reasonable protection -- protection that an AP can tune -- against correlating an AP via <tt>kid</tt>.</t>
        </section>
        <section anchor="evd">
          <name>evd</name>
          <t>The other correlator, <tt>evd</tt>, tracks an AP more directly, because a dossier is uniquely identified by its SAID, and can only be used by a single AP. Furthermore, if someone resolves <tt>evd</tt> to an actual dossier (something that might be avoidable with judicious use of graduated disclosure), the dossier will at a minimum have an issuer field that ties it to the AP as a perfect correlator.</t>
          <t>One answer here is to introduce an <em>AP blinding service</em>. This service creates <em>derived dossiers</em> on a schedule or by policy. Each derivation includes the hash of the original dossier, in a field that is hidden but available (along with a salty nonce) via graduated disclosure. The derived dossier is signed by the blinding service rather than the original AP. It embodies an assertion, by the blinding service, that it has verified the original dossier according to published rules, and that it will revoke the derivative if the original is revoked. AP blinding services would have to be trusted by verifiers, much like root CAs in SHAKEN. However, unlike CAs, their actions could be trivially audited for correctness, since every derivation would have to be backed by a dossier that has the associated hash. Such a mechanism is probably unnecessary for b2c calling, but may be justified when VVP is used by individual APs if they wish to merely qualify without identifying themselves to some intermediaries or TPs.</t>
        </section>
      </section>
    </section>
    <section anchor="appendix-a">
      <name>Appendix A: Evidence theory</name>
      <t>Most existing approaches to secure telephony uses X509 certificates <xref target="RFC5280"/> for foundational identity. Certificates have great virtues. Notably, they are well understood, and their tooling is ubiquitous and mature. However, they also have some serious drawbacks. They are protected by a single key whose compromise is difficult to detect. Recovery is cumbersome and slow. As a result, <em>certificates are far more temporary than the identities they attest</em>.</t>
      <t>This has numerous downstream consequences. When foundational evidence of identity has to be replaced constantly, the resulting ecosystem is fragile, complex, and expensive for all stakeholders. Vulnerabilities abound. Authorizations can only be analyzed in a narrow <em>now window</em>, never at arbitrary moments in time. This creates enormous pressure to build a centralized registry, where evidence can be curated once, and where the cost of reacting to revocations is amortized. The entire fabric of evidence has to be rebuilt from scratch if quantum security becomes a requirement.</t>
      <t>In contrast, the issuers and holders of ACDCs -- and thus, the stakeholders in VVP passports -- are identified by autonomic identifiers, not raw keys. This introduces numerous security benefits. Keys, key types, and signing algorithms can all change (even for post-quantum upgrades) without invalidating evidence. Signing and rotation operations are sequenced deterministically, making historical audits possible. Key compromises are detected as soon as an attacker attempts consequential actions. Recovery from compromise is trivial. Multisig signing policies allow diffuse, nuanced control.</t>
      <t>The result is that <em>identities in ACDCs are as stable as identities in real organizations</em>. This makes delegations and chaining mechanisms far more robust than their analogs in certificates, and this in turn makes the whole ecosystem safer, more powerful, and easier to maintain. Revocations are cheap and fast. No central registries are needed, which eliminates privacy concerns and regulatory hurdles. Adoption can be opportunistic; it doesn't require a central mandate or carefully orchestrated consensus throughout a jurisdiction before it can deliver value.</t>
      <t>ACDCs make it practical to model nuanced, dynamic delegations such as the one between Organization X and Call Center Y. This eliminates the gap that alternative approaches leave between accountable party and the provider of call evidence. Given X's formal approval, Y can sign a call on behalf of X, using a number allocated to X, and using X's brand, without impersonating X. They can also prove to any OSP or any other party, in any jurisdiction, that they have the right to do so. Furthermore, the evidence that Y cites can be built and maintained by X and Y, doesn't get stale or require periodic reissuance, and doesn't need to be published in a central registry.</t>
      <t>Even better, when such evidence is filtered through suballocations or crosses jurisdictional boundaries, it can be reused, or linked and transformed, without altering its robustness or efficiency. Unlike W3C verifiable credentials and SD-JWTs, which require direct trust in the proximate issuer, ACDCs and the JWTs that reference them verify data back to a root through arbitrarily long and complex chains of issuers, with only the root needing to be known and trusted by the verifier.</t>
      <t>The synergies of these properties mean that ACDCs can be permanent, flexible, robust, and low-maintenance. In VVP, no third party has to guess who's accountable for a call; the accountable party is transparently and provably accountable, period. (Yet notwithstanding this transparency, ACDCs support a form of pseudonymity and graduated disclosure that satisfies vital privacy and data processing constraints. See <xref format="counter" target="privacy"/>.)</t>
    </section>
    <section anchor="appendix-b">
      <name>Appendix B: Witnesses and Watchers</name>
      <t>A full description of witnesses and watchers is available in <xref target="TOIP-KERI"/>. Here, we merely summarize.</t>
      <t>A KERI <em>witness</em> is a lightweight server that acts as a notary. It exposes a standard interface. It receives signed events from the controller of an identifier that it services. If these events are properly sequenced and aligned with the identifier's signing policy and key state, they are recorded and become queryable, typically by the public. KERI allows the controller of an autonomic identifier to choose zero or more witnesses. The witnesses can change over the lifecycle of the identifier. However, the relationship between an identifier and its witnesses cannot be changed arbitrarily; the controller of the identifier makes a cryptographic commitment to its witnesses, and can only change that commitment by satisfying the signing policy of the identifier. In VVP, identifiers used by issuers <bcp14>MUST</bcp14> have at least one witness, because this guarantees viral discoverability, and <bcp14>SHOULD</bcp14> have at least 3 witnesses, because this guarantees both high availability and the detection of duplicity by the controller of the identifier.</t>
      <t>Witnesses provide, for VVP, many of the security guarantees that alternate designs seek from blockchains. However, witnesses are far more lightweight than blockchains. They can be run by anyone, without coordination or approval, and can be located in any jurisdiction that the owner of the identifier prefers, satisfying regulatory requirements about data locality. Although a single witness may service mulptiple identifiers, the records related to any single identifier are independent, and no consensus algorithm is required to order them relative to others. Thus, every identifier's data evolves in parallel, without bottlenecks, and any identifier can be deleted without affecting the integrity of other identifiers' records, satisfying regulatory requirements about erasure. Witnesses only store (and thus, can only expose to the public) what a given data controller has instructed them to store and publish. Thus, witnesses do not create difficulties with consent or privacy.</t>
      <t>In VVP, when a party shares an identifier or a piece of evidence, they do so via a special URL called an OOBI (out of band invitation). The OOBI serves a tamper-evident KEL (<xref format="counter" target="KEL"/>) that reveals the full, provable history of the key state and other witnesses for the identifier, and even includes a forward reference to new witnesses, if they have changed. It also allows the discovery of issuance and revocation events, and their sequence relative to one another and to key state changes.</t>
      <t>An additional and optional feature in KERI is enabled by adding <em>watchers</em>. Watchers are lightweight services that synthesize witness data. They may <bcp14>MAY</bcp14> monitor multiple witnesses and enable hyper-efficient caching. They <bcp14>SHOULD</bcp14> also compare what multiple witnesses for a given identifier are saying, which prevents controllers of an identifier from forking reality in a duplicitous way, and which can detect malicious attempts to use stolen keys.</t>
      <t>Witnesses are chosen according to the preference of each party that controls an identifier, and a mature ecosystem could have dozens, hundreds, or thousands. Watchers, on the other hand, address the needs of verifiers, because they distill some or all of the complexity in an ecosystem down to a single endpoint that verifiers can query. Any verifier can operate a watcher at any time, without any coordination or approval. Viral discoverability can automatically populate the watcher's cache, and keep it up-to-date as witness data evolves.</t>
      <t>Verifiers can share watchers if they prefer. Anything that watchers assert must be independently verified by consulting witnesses, so watchers need not have a complete picture of the world, and they are a convenience rather than an oracle that must be trusted. The data that watchers synthesize is deliberately published by witnesses for public consumption, at the request of each data stream's associated data controllers, and does not represent surveillance (<xref format="counter" target="privacy"/>). If a watcher can no longer find witness data to back one of its assertions, it <bcp14>MUST</bcp14> delete the data to satisfy its contract. This means that acts of erasure on witnesses propagate to watchers, again satisfying regulatory erasure requirements.</t>
    </section>
    <section anchor="appendix-c">
      <name>Appendix C: Sample Credentials</name>
      <section anchor="common-fields">
        <name>Common fields</name>
        <t>Some structure is common to all ACDCs. For details, consult <xref target="TOIP-ACDC"/>. Here, we provide a short summary.</t>
        <ul spacing="normal">
          <li>
            <t><tt>v</tt> <em>(required)</em> Contains a version statement.</t>
          </li>
          <li>
            <t><tt>d</tt> <em>(required)</em> Contains the SAID (<xref format="counter" target="said"/>) of the ACDC. (Nested <tt>d</tt> fields contain SAIDs of nested JSON objects, as discussed in <xref format="counter" target="graduated-disclosure"/>.</t>
          </li>
          <li>
            <t><tt>i</tt> <em>(required)</em> In the outermost structure, contains the AID (<xref format="counter" target="aid"/>) of an issuer. Inside <tt>a</tt>, contains the AID of the issuee.</t>
          </li>
          <li>
            <t><tt>ri</tt> <em>(optional)</em> Identifies a registry that tracks revocations that might include one for this credential.</t>
          </li>
          <li>
            <t><tt>s</tt> <em>(required)</em> Contains the SAID of a schema to which the associated ACDC conforms.</t>
          </li>
          <li>
            <t><tt>a</tt> <em>(required)</em> Contains additional attributes for this specific ACDC, as allowed by its schema.</t>
          </li>
          <li>
            <t><tt>dt</tt> <em>(optional)</em> Contains the date when the issuer claims to have issued the ACDC. This data will correspond closely with a timestamp saved in the issuer's KEL, at the point where the signature on the ACDC was signed and anchored there. The ordering of the signature in the KEL, relative to other key state events, is what is definitive here; the timestamp itself should be viewed more as a hint.</t>
          </li>
          <li>
            <t><tt>e</tt> <em>(optional)</em> Contains edges that connect this ACDC to other data upon which it depends.</t>
          </li>
          <li>
            <t><tt>r</tt> <em>(optional)</em> Contains one or more rules that govern the use of the ACDC. Holding the credential requires a cryptographically nonrepudiable <tt>admit</tt> action with a wallet, and therefore proves that the holder agreed to these terms and conditions.</t>
          </li>
        </ul>
        <t>All ACDCs are validated against a schema that conforms to <xref target="JSON-SCHEMA"/>. Below we show some sample credentials and their corresponding schemas. VVP does not require these specific schemas, but rather is compatible with any that have roughly the same information content.</t>
      </section>
      <section anchor="vet-cred-sample">
        <name>Vetting credential</name>
        <t>The schema of a vetting credential (<xref format="counter" target="vetting-credential"/>) can be very simple; it needs to identify the issuer and issuee by AID, and it needs to identify the vetted legal entity in at least one way that is unambiguous. Here is a sample LE vLEI that meets these requirements. The issuer's AID appears in the first <tt>i</tt> field, the issuee in the second <tt>i</tt> field, and the connection to a vetted legal entity in the <tt>LEI</tt> field. (The validity of this credential depends on its issuer having a valid, unrevoked QVI credential; the specifc credential it links to is conveyed in <tt>e</tt>. The full text of rules has been elided to keep the example short.)</t>
        <sourcecode type="json"><![CDATA[
{
  "v":"ACDC10JSON0005c8_",
  "d":"Ebyg1epjv7D4-6mvl44Nlde1hTyL8413LZbY-mz60yI9",
  "i":"Ed88Jn6CnWpNbSYz6vp9DOSpJH2_Di5MSwWTf1l34JJm",
  "ri":"Ekfi58Jiv-NVqr6GOrxgxzhrE5RsDaH4QNwv9rCyZCwZ",
  "s":"ENPXp1vQzRF6JwIuS-mp2U8Uf1MoADoP_GqQ62VsDZWY",
  "a":{
    "d":"EdjPlxlRyujxarfXHCwFAqSV-yr0XrTE3m3XdFaS6U3K",
    "i":"Eeu5zT9ChsawBt2UXdU3kPIf9_lFqT5S9Q3yLZvKVfN6",
    "dt":"2024-09-19T13:48:21.779000+00:00",
    "LEI":"9845006A4378DFB4ED29"
  },
  "e":{
    "d":"EeyVJC9yZKpbIC-LcDhmlS8YhrjD4VIUBZUOibohGXit",
    "qvi":{
      "n":"EmatUqz_u9BizxwOc3JishC4MyXfiWzQadDpgCBA6X9n",
      "s":"EBfdlu8R27Fbx-ehrqwImnK-8Cm79sqbAQ4MmvEAYqao"
    }
  },
  "r":{
    "d":"EgZ97EjPSINR-O-KHDN_uw4fdrTxeuRXrqT5ZHHQJujQ",
    "usageDisclaimer":{
      "l":"Usage of a valid...fulfilled."
    },
    "issuanceDisclaimer":{
      "l":"All information...Governance Framework."
    }
  }
}
]]></sourcecode>
        <t>The schema that governs this credential, <tt>ENPX...DZWY</tt>, is shown in the <tt>s</tt> field. LE vLEI credential schemas are managed by GLEIF and published at <xref target="LE-VLEI-SCHEMA"/>.</t>
        <t>As fundamentally public artifacts that are issued only to organizations, not individuals, vLEIs are not designed for graduated disclosure (<xref format="counter" target="graduated-disclosure"/>). Vetting credentials for individuals would require a different schema -- perhaps one that documents their full legal name but allows disclosure strategies such as first name + last initial, or first initial plus last name.</t>
      </section>
      <section anchor="tn-cred-sample">
        <name>TNAlloc credential</name>
        <t>A TNAlloc credential needs to identify its issuer and issuee. If and only if it isn't issued by a national regulator that acts as a root of trust on allocation questions, it also needs to cite an upstream allocation that justifies the issuer's right to pass along a subset of the numbers it controls.</t>
        <t>Here is a sample TNAlloc credential that meets these requirements.</t>
        <sourcecode type="json"><![CDATA[
{
  "v": "ACDC10JSON0003cd_",
  "d": "EEeg55Yr01gDyCScFUaE2QgzC7IOjQRpX2sTckFZp1RP",
  "u": "0AC8kpfo-uHQvxkuGZdlSjGy",
  "i": "EANghOmfYKURt3rufd9JNzQDw_7sQFxnDlIew4C3YCnM",
  "ri": "EDoSO5PEPLsstDr_XXa8aHAf0YKfPlJQcxZvkpMSzQDB",
  "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
  "a": {
      "d": "ECFFejktQA0ThTqLtAUTmW46unVGf28I_arbBFnIwnWB",
      "u": "0ADSLntzn8x8eNU6PhUF26hk",
      "i": "EERawEn-XgvmDR_-2ESVUVC6pW-rkqBkxMTsL36HosAz",
      "dt": "2024-12-20T20:40:57.888000+00:00",
      "numbers": {
          "rangeStart": "+33801361002",
          "rangeEnd": "+33801361009"
      },
      "channel": "voice",
      "doNotOriginate": false
  },
  "e": {
      "d": "EI9qlgiDbMeJ7JTZTJfVanUFAoa0TMz281loi63nCSAH",
      "tnalloc": {
          "n": "EG16t8CpJROovnGpgEW1_pLxH5nSBs1xQCbRexINYJgz",
          "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
          "o": "I2I"
      }
  },
  "r": {
      "d": "EJFhpp0uU7D7PKooYM5QIO1hhPKTjHE18sR4Dn0GFscR",
      "perBrand": "Issuees agree not to share..."
  }
}
]]></sourcecode>
        <t>The schema used by this particular credential, <tt>EFvn...GgSQ</tt>, is published at <xref target="TN-ALLOC-SCHEMA"/>.</t>
      </section>
      <section anchor="bcred-sample">
        <name>Brand credential</name>
        <t>TODO
~~~json
~~~</t>
      </section>
      <section anchor="bprox-cred-sample">
        <name>Brand proxy credential</name>
        <t>A brand proxy credential (<xref format="counter" target="brand-proxy-credential"/>) is very similar to a delegated signer credential, in that it proves carefully constrained delegated authority. The difference lies in what authority is delegated (proxy a brand vs. sign passports).</t>
        <t>A Generalized Cooperative Delegation (GCD) credential embodies delegated but constrained authority in exactly this way. A GCD credential suitable for use as a brand proxy in VVP might look like this:</t>
        <sourcecode type="json"><![CDATA[
{
    "v": "ACDC10JSON00096c_",
    "d": "EWQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFx",
    "u": "0ADE6oAxBl4E7uKeGUb7BEYi",
    "i": "EC4SuEyzrRwu3FWFrK0Ubd9xejlo5bUwAtGcbBGUk2nL",
    "ri": "EM2YZ78SKE8eO4W1lQOJeer5xKZqLmJV7SPr3Ji5DMBZ",
    "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
    "a": {
        "d": "EPQhEk5tfXvxyKe5Hk4DG63dSgoP-F2VZrxuIeIKrT9B",
        "u": "0AC9kH8q99PTCQNteGyI-F4g",
        "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
        "dt": "2024-12-27T13:11:29.062000+00:00",
        "c_goal": ["ops.telco.*.proxybrand"],
        "c_proto": ["VVP:OP,TP"]
    },
    "r": {
        "d": "EFthNcTE20MLMaCOoXlSmNtdooGEbZF8uGmO5G85eMSF",
        "noRoleSemanticsWithoutGfw": "All parties agree...",
        "issuerNotResponsibleOutsideConstraints": "Although verifiers...",
        "noConstraintSansPrefix": "Issuers agree...",
        "useStdIfPossible": "Issuers agree...",
        "onlyDelegateHeldAuthority": "Issuers agree..."
    }
}
]]></sourcecode>
        <t>Note the <tt>c_goal</tt> field that limits goals that can be justified with this credential, and the <tt>c_proto</tt> field that says the delegate can only exercise this authority in the context of the "VVP" protocol with the "OP" or "TP" role. The wildcard in <tt>c_goal</tt> and the addition of the "TP" role in <tt>c_proto</tt> are complementary changes that allow this credential to justify proxying the brand on both outbound and inbound calls. (Branding on inbound calls is out of scope for VVP, but is included here just to show that the same credentials can be used for both VVP and non-VVP solutions. To convert this credential to a purely outbound authorization, replace the wildcard with <tt>send</tt>, and limit the roles in <tt>VVP</tt> to <tt>OP</tt>.)</t>
        <t>The schema for GCD credentials, and an explanation how to add additional constraints, is documented at <xref target="GCD-SCHEMA"/>.</t>
      </section>
      <section anchor="dsig-cred-sample">
        <name>Delegated signer credential</name>
        <t>A delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>) must prove that the issuer is giving authority to the issuee. This authority should be carefully constrained so that it applies only to outbound voice calls, not to signing invoices or legal contracts. It can also be constrained so it only applies on a particular schedule, or when the call originates or terminates in a particular geo or jurisdiction.</t>
        <t>A Generalized Cooperative Delegation (GCD) credential embodies delegated but constrained authority in exactly this way. A GCD credential suitable for use as a delegated signer credential in VVP might look like this:</t>
        <sourcecode type="json"><![CDATA[
{
    "v": "ACDC10JSON00096c_",
    "d": "EDQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFR",
    "u": "0ADE6oAxBl4E7uKeGUb7BEYi",
    "i": "EC4SuEyzrRwu3FWFrK0Ubd9xejlo5bUwAtGcbBGUk2nL",
    "ri": "EM2YZ78SKE8eO4W1lQOJeer5xKZqLmJV7SPr3Ji5DMBZ",
    "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
    "a": {
        "d": "EPQhEk5tfXvxyKe5Hk4DG63dSgoP-F2VZrxuIeIKrT9B",
        "u": "0AC9kH8q99PTCQNteGyI-F4g",
        "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
        "dt": "2024-12-27T13:11:29.062000+00:00",
        "c_goal": ["ops.telco.send.sign"],
        "c_proto": ["VVP:OP"]
    },
    "r": {
        "d": "EFthNcTE20MLMaCOoXlSmNtdooGEbZF8uGmO5G85eMSF",
        "noRoleSemanticsWithoutGfw": "All parties agree...",
        "issuerNotResponsibleOutsideConstraints": "Although verifiers...",
        "noConstraintSansPrefix": "Issuers agree...",
        "useStdIfPossible": "Issuers agree...",
        "onlyDelegateHeldAuthority": "Issuers agree..."
    }
}
]]></sourcecode>
        <t>Note the <tt>c_goal</tt> field that limits goals that can be justified with this credential, and the <tt>c_proto</tt> field that says the delegate can only exercise this authority in the context of the "VVP" protocol with the "OP" role.</t>
        <t>The schema for GCD credentials, and an explanation how to add additional constraints, is documented at <xref target="GCD-SCHEMA"/>.</t>
      </section>
      <section anchor="dossier-1">
        <name>Dossier</name>
        <t>A dossier (<xref format="counter" target="dossier"/>) is almost all edges -- that is, links to other credentials. Here's what one might look like:</t>
        <sourcecode type="json"><![CDATA[
{
  "v": "ACDC10JSON00036f_",
  "d": "EKvpcshjgjzdCWwR4q9VnlsUwPgfWzmy9ojMpTSzNcEr",
  "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
  "ri": "EMU5wN33VsrJKlGCwk2ts_IJi67IXE6vrYV3v9Xdxw3p",
  "s": "EFv3_L64_xNhOGQkaAHQTI-lzQYDvlaHcuZbuOTuDBXj",
  "a": {
    "d": "EJnMhz8MJxmI0epkq7D1zzP5pGTbSb2YxkSdczNfcHQM",
    "dt": "2024-12-27T13:11:41.865000+00:00"
  },
  "e": {
    "d": "EPVc2ktYnZQOwNs34lO1YXFOkT51lzaILFEMXNfZbGrh",
    "vetting": {
      "n": "EIpaOx1NJc0N_Oj5xzWhFQp6EpB847yTex62xQ7uuSQL",
      "s": "ENPXp1vQzRF6JwIuS-mp2U8Uf1MoADoP_GqQ62VsDZWY",
      "o": "NI2I"
    },
    "alloc": {
      "n": "EEeg55Yr01gDyCScFUaE2QgzC7IOjQRpX2sTckFZp1RP",
      "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
      "o": "I2I"
    },
    "brand": {
      "n": "EKSZT4yTtsZ2AqriNKBvS7GjmsU3X1t-S3c69pHceIXW",
      "s": "EaWmoHDYbkjG4BaI0nK7I-kaBBeKlbDLGadxBdSQjMGg",
      "o": "I2I"
    },
    "bproxy": {
      "n": "EWQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFx",
      "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
      "o": "I2I"
    },
    "delsig": {
      "n": "EMKcp1-AvpW0PZdThjK3JCbMsXAmrqB9ONa1vZyTppQE",
      "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
      "o": "NI2I"
    }
  }
}
]]></sourcecode>
        <t>Notice how each named edge references one of the previous sample credentials in its <tt>n</tt> field, and that other credential's associated schema in the <tt>s</tt> field.</t>
        <t>The schema for this credential is documented at <xref target="DOSSIER-SCHEMA"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This specification requires no IANA actions. However, it does depend on OOBIs (see <xref format="counter" target="aid"/>) being served as web resources with IANA content type <tt>application/json+cesr</tt>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
            <author fullname="A. Johnston" initials="A." surname="Johnston"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Schooler" initials="E." surname="Schooler"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC5626">
          <front>
            <title>Managing Client-Initiated Connections in the Session Initiation Protocol (SIP)</title>
            <author fullname="C. Jennings" initials="C." role="editor" surname="Jennings"/>
            <author fullname="R. Mahy" initials="R." role="editor" surname="Mahy"/>
            <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>The Session Initiation Protocol (SIP) allows proxy servers to initiate TCP connections or to send asynchronous UDP datagrams to User Agents in order to deliver requests. However, in a large number of real deployments, many practical considerations, such as the existence of firewalls and Network Address Translators (NATs) or the use of TLS with server-provided certificates, prevent servers from connecting to User Agents in this way. This specification defines behaviors for User Agents, registrars, and proxy servers that allow requests to be delivered on existing connections established by the User Agent. It also defines keep-alive behaviors needed to keep NAT bindings open and specifies the usage of multiple connections from the User Agent to its registrar. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5626"/>
          <seriesInfo name="DOI" value="10.17487/RFC5626"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8224">
          <front>
            <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
              <t>This document obsoletes RFC 4474.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8224"/>
          <seriesInfo name="DOI" value="10.17487/RFC8224"/>
        </reference>
        <reference anchor="RFC8225">
          <front>
            <title>PASSporT: Personal Assertion Token</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8225"/>
          <seriesInfo name="DOI" value="10.17487/RFC8225"/>
        </reference>
        <reference anchor="FIPS186-4" target="https://doi.org/10.6028/NIST.FIPS.186-4">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2013" month="July"/>
          </front>
        </reference>
        <reference anchor="TOIP-CESR" target="https://trustoverip.github.io/tswg-cesr-specification/">
          <front>
            <title>Composable Event Streaming Representation (CESR)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TOIP-KERI" target="https://trustoverip.github.io/tswg-keri-specification/">
          <front>
            <title>Key Event Receipt Infrastructure (KERI)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="TOIP-ACDC" target="https://trustoverip.github.io/tswg-acdc-specification/">
          <front>
            <title>Authentic Chained Data Containers (ACDC)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="ISO-17442-1" target="https://www.iso.org/standard/78829.html">
          <front>
            <title>Financial services – Legal entity identifier (LEI) – Part 1: Assignment</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="ISO-17442-3" target="https://www.iso.org/standard/85628.html">
          <front>
            <title>inancial services – Legal entity identifier (LEI) – Part 3: Verifiable LEIs (vLEIs)</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="ATIS-1000074" target="https://atis.org/resources/signature-based-handling-of-asserted-information-using-tokens-shaken-atis-1000074-e/">
          <front>
            <title>Signature-Based Handling of Asserted Information Using toKENs (SHAKEN)</title>
            <author>
              <organization>Alliance for Telecommunications Industry Solutions</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8226">
          <front>
            <title>Secure Telephone Identity Credentials: Certificates</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8226"/>
          <seriesInfo name="DOI" value="10.17487/RFC8226"/>
        </reference>
        <reference anchor="RFC8588">
          <front>
            <title>Personal Assertion Token (PaSSporT) Extension for Signature-based Handling of Asserted information using toKENs (SHAKEN)</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="M. Barnes" initials="M." surname="Barnes"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document extends the Personal Assertion Token (PASSporT), which is a token object that conveys cryptographically signed information about the participants involved in communications. The extension is defined based on the "Signature-based Handling of Asserted information using toKENs (SHAKEN)" specification by the ATIS/SIP Forum IP-NNI Task Group. It provides both (1) a specific set of levels of confidence in the correctness of the originating identity of a call originated in a SIP-based telephone network as well as (2) an identifier that allows the Service Provider (SP) to uniquely identify the origin of the call within its network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8588"/>
          <seriesInfo name="DOI" value="10.17487/RFC8588"/>
        </reference>
        <reference anchor="RFC6350">
          <front>
            <title>vCard Format Specification</title>
            <author fullname="S. Perreault" initials="S." surname="Perreault"/>
            <date month="August" year="2011"/>
            <abstract>
              <t>This document defines the vCard data format for representing and exchanging a variety of information about individuals and other entities (e.g., formatted and structured name and delivery addresses, email address, multiple telephone numbers, photograph, logo, audio clips, etc.). This document obsoletes RFCs 2425, 2426, and 4770, and updates RFC 2739. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6350"/>
          <seriesInfo name="DOI" value="10.17487/RFC6350"/>
        </reference>
        <reference anchor="RFC7095">
          <front>
            <title>jCard: The JSON Format for vCard</title>
            <author fullname="P. Kewisch" initials="P." surname="Kewisch"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This specification defines "jCard", a JSON format for vCard data. The vCard data format is a text format for representing and exchanging information about individuals and other entities, for example, telephone numbers, email addresses, structured names, and delivery addresses. JSON is a lightweight, text-based, language- independent data interchange format commonly used in Internet applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7095"/>
          <seriesInfo name="DOI" value="10.17487/RFC7095"/>
        </reference>
        <reference anchor="VCON-DRAFT">
          <front>
            <title>The JSON format for vCon - Conversation Data Container</title>
            <author fullname="Daniel Petrie" initials="D." surname="Petrie">
              <organization>SIPez LLC</organization>
            </author>
            <author fullname="Thomas McCarthy-Howe" initials="T." surname="McCarthy-Howe">
              <organization>Strolid</organization>
            </author>
            <date day="19" month="March" year="2025"/>
            <abstract>
              <t>   A vCon is the container for data and information relating to a real-
   time, human conversation.  It is analogous to a [vCard] which enables
   the definition, interchange and storage of an individual's various
   points of contact.  The data contained in a vCon may be derived from
   any multimedia session, traditional phone call, video conference, SMS
   or MMS message exchange, webchat or email thread.  The data in the
   container relating to the conversation may include Call Detail
   Records (CDR), call meta data, participant identity information (e.g.
   STIR PASSporT), the actual conversational data exchanged (e.g. audio,
   video, text), realtime or post conversational analysis and
   attachments of files exchanged during the conversation.  A
   standardized conversation container enables many applications,
   establishes a common method of storage and interchange, and supports
   identity, privacy and security efforts (see [vCon-white-paper])

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-vcon-vcon-container-03"/>
        </reference>
        <reference anchor="GSMA-RCS" target="https://www.gsma.com/solutions-and-impact/technologies/networks/wp-content/uploads/2019/10/RCC.07-v11.0.pdf">
          <front>
            <title>Rich Communication Suite - Advanced Communications Services and Client Specification, version 11.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="RCD-DRAFT">
          <front>
            <title>SIP Call-Info Parameters for Rich Call Data</title>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos</organization>
            </author>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>TransUnion</organization>
            </author>
            <date day="21" month="April" year="2025"/>
            <abstract>
              <t>   This document specifies a usage of the SIP Call-Info header field
   that incorporates Rich Call Data (RCD) associated with the identity
   of the originating party in order to provide to the terminating party
   a description of the caller (including details about the reason for
   the session).  RCD includes information about the caller beyond the
   telephone number such as a calling name, a logo, photo, or jCard
   object representing the caller, which can help the called party
   decide how to handle the session request.

   This document defines three new parameters 'call-reason', 'verified',
   and 'integrity' for the SIP Call-Info header field and also a new
   token ("jcard") for the 'purpose' parameter of the Call-Info header
   field.  It also provides guidance on the use of the Call-Info
   'purpose' parameter token, "icon".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sipcore-callinfo-rcd-19"/>
        </reference>
        <reference anchor="RCD-PASSPORT">
          <front>
            <title>PASSporT Extension for Rich Call Data</title>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos Inc.</organization>
            </author>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>Neustar Inc.</organization>
            </author>
            <date day="5" month="June" year="2023"/>
            <abstract>
              <t>   This document extends PASSporT, a token for conveying
   cryptographically-signed call information about personal
   communications, to include rich meta-data about a call and caller
   that can be signed and integrity protected, transmitted, and
   subsequently rendered to the called party.  This framework is
   intended to include and extend caller and call specific information
   beyond human-readable display name comparable to the "Caller ID"
   function common on the telephone network and is also enhanced with a
   integrity mechanism that is designed to protect the authoring and
   transport of this information for different authoritative use-cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-stir-passport-rcd-26"/>
        </reference>
        <reference anchor="SD-JWT-DRAFT">
          <front>
            <title>Selective Disclosure for JWTs (SD-JWT)</title>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete</organization>
            </author>
            <author fullname="Kristina Yasuda" initials="K." surname="Yasuda">
              <organization>Keio University</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="1" month="March" year="2025"/>
            <abstract>
              <t>   This specification defines a mechanism for the selective disclosure
   of individual elements of a JSON-encoded data structure used as the
   payload of a JSON Web Signature (JWS).  The primary use case is the
   selective disclosure of JSON Web Token (JWT) claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-selective-disclosure-jwt-17"/>
        </reference>
        <reference anchor="CTIA-BCID" target="https://api.ctia.org/wp-content/uploads/2022/11/Branded-Calling-Best-Practices.pdf">
          <front>
            <title>Branded Calling ID Best Practices</title>
            <author>
              <organization>CTIA</organization>
            </author>
            <date year="2022" month="November"/>
          </front>
        </reference>
        <reference anchor="W3C-DID" target="https://www.w3.org/TR/2022/REC-did-core-20220719/">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author fullname="Amy Guy" role="editor"/>
            <author fullname="Drummond Reed" role="editor"/>
            <author fullname="Manu Sporny" role="editor"/>
            <author fullname="Markus Sabadello" role="editor"/>
            <date day="19" month="July" year="2022"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-did-core-20220719"/>
          <seriesInfo name="W3C" value="REC-did-core-20220719"/>
        </reference>
        <reference anchor="W3C-VC" target="https://www.w3.org/TR/2022/REC-vc-data-model-20220303/">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author fullname="Brent Zundel" role="editor"/>
            <author fullname="Daniel Burnett" role="editor"/>
            <author fullname="Dave Longley" role="editor"/>
            <author fullname="Grant Noble" role="editor"/>
            <author fullname="Kyle Den Hartog" role="editor"/>
            <author fullname="Manu Sporny" role="editor"/>
            <date day="3" month="March" year="2022"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-vc-data-model-20220303"/>
          <seriesInfo name="W3C" value="REC-vc-data-model-20220303"/>
        </reference>
        <reference anchor="ARIES-RFC-0519" target="https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0519-goal-codes/README.md">
          <front>
            <title>Aries RFC 0519: Goal Codes</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="JSON-SCHEMA" target="https://json-schema.org/specification">
          <front>
            <title>JSON Schema Specification 2020-12</title>
            <author>
              <organization>JSON Schema Community</organization>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="LE-VLEI-SCHEMA" target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/legal-entity-vLEI-credential.json">
          <front>
            <title>Legal Entity vLEI Credential</title>
            <author>
              <organization>GLEIF</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TN-ALLOC-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/tn-alloc/tn-alloc.schema.json">
          <front>
            <title>TN Allocation Credential</title>
            <author>
              <organization>Provenant</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="PERSONHOOD-CRED" target="https://arxiv.org/pdf/2408.07892">
          <front>
            <title>Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online</title>
            <author initials="S." surname="Adler" fullname="Steven Adler">
              <organization/>
            </author>
            <author initials="Z." surname="Hitzig" fullname="Zoë Hitzig">
              <organization/>
            </author>
            <author initials="S." surname="Jain" fullname="Shrey Jain">
              <organization/>
            </author>
            <author initials="C." surname="Brewer" fullname="Catherine Brewer">
              <organization/>
            </author>
            <author initials="W." surname="Chang" fullname="Wayne Chang">
              <organization/>
            </author>
            <author initials="R." surname="DiResta" fullname="Renée DiResta">
              <organization/>
            </author>
            <author initials="E." surname="Lazzarin" fullname="Eddy Lazzarin">
              <organization/>
            </author>
            <author initials="S." surname="McGregor" fullname="Sean McGregor">
              <organization/>
            </author>
            <author initials="W." surname="Seltzer" fullname="Wendy Seltzer">
              <organization/>
            </author>
            <author initials="D." surname="Siddarth" fullname="Divya Siddarth">
              <organization/>
            </author>
            <author initials="N." surname="Soliman" fullname="Nouran Soliman">
              <organization/>
            </author>
            <author initials="T." surname="South" fullname="Tobin South">
              <organization/>
            </author>
            <author initials="C." surname="Spelliscy" fullname="Connor Spelliscy">
              <organization/>
            </author>
            <author initials="M." surname="Sporny" fullname="Manu Sporny">
              <organization/>
            </author>
            <author initials="V." surname="Srivastava" fullname="Varya Srivastava">
              <organization/>
            </author>
            <author initials="J." surname="Bailey" fullname="John Bailey">
              <organization/>
            </author>
            <author initials="B." surname="Christian" fullname="Brian Christian">
              <organization/>
            </author>
            <author initials="A." surname="Critch" fullname="Andrew Critch">
              <organization/>
            </author>
            <author initials="R." surname="Falcon" fullname="Ronnie Falcon">
              <organization/>
            </author>
            <author initials="H." surname="Flanagan" fullname="Heather Flanagan">
              <organization/>
            </author>
            <author initials="K. H." surname="Duffy" fullname="Kim Hamilton Duffy">
              <organization/>
            </author>
            <author initials="E." surname="Ho" fullname="Eric Ho">
              <organization/>
            </author>
            <author initials="C. R." surname="Leibowicz" fullname="Claire R. Leibowicz">
              <organization/>
            </author>
            <author initials="S." surname="Nadhamuni" fullname="Srikanth Nadhamuni">
              <organization/>
            </author>
            <author initials="A. Z." surname="Rozenshtein" fullname="Alan Z. Rozenshtein">
              <organization/>
            </author>
            <author initials="D." surname="Schnurr" fullname="David Schnurr">
              <organization/>
            </author>
            <author initials="E." surname="Shapiro" fullname="Evan Shapiro">
              <organization/>
            </author>
            <author initials="L." surname="Strahm" fullname="Lacey Strahm">
              <organization/>
            </author>
            <author initials="A." surname="Trask" fullname="Andrew Trask">
              <organization/>
            </author>
            <author initials="Z." surname="Weinberg" fullname="Zoe Weinberg">
              <organization/>
            </author>
            <author initials="C." surname="Whitney" fullname="Cedric Whitney">
              <organization/>
            </author>
            <author initials="T." surname="Zick" fullname="Tom Zick">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="F2F-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/face-to-face/index.md">
          <front>
            <title>Face-to-Face Credentials</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="CITATION-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/citation/index.md">
          <front>
            <title>Citation Schema</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="GCD-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/gcd/index.md">
          <front>
            <title>Generalized Cooperative Delegation (GCD) Credentials</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="DOSSIER-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/vvp-dossier/vvp-dossier.schema.json">
          <front>
            <title>Verifiable Voice Dossier</title>
            <author initials="A." surname="Singh" fullname="Arshdeep Singh">
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1395?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much of the cybersecurity infrastructure used by VVP depends on KERI, which was invented by Sam Smith, and first implemented by Sam plus Phil Fairheller, Kevin Griffin, and other technical staff at GLEIF. Thanks to logistical support from Trust Over IP and the Linux Foundation, and to a diverse community of technical experts in those communities and in the Web of Trust group.</t>
      <t>Techniques that apply KERI to telco use cases were developed by Daniel Hardman, Randy Warshaw, and Ruth Choueka, with additional contributions from Dmitrii Tychinin, Yaroslav Lazarev, Arshdeep Singh, and many other staff members at Provenant, Inc. Thanks as well to Ed Eykholt for multiple editorial improvements.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
