<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-07" category="info" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title>Token Status List</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-07"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization/>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization>SPRIND</organization>
      <address>
        <email>chris.bormann@gmx.de</email>
      </address>
    </author>
    <date year="2025" month="February" day="02"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 119?>

<t>This specification defines a mechanism, data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption (COSE), such as JWT, SD-JWT VC, CBOR Web Token and ISO mdoc. It also defines an extension point and a registry for future status mechanisms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oauth-wg.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 123?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="IANA.JOSE"/> or COSE <xref target="RFC9052"/>, such as JWTs <xref target="RFC7519"/>, SD-JWT VCs <xref target="SD-JWT.VC"/>, CWTs <xref target="RFC8392"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token or its validity may change over time. Communicating these changes to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer is important for many of these applications.</t>
      <t>This document defines a Status List data structure that describes the individual statuses of multiple Referenced Tokens. A Referenced Token may be of any format, but is most commonly a data structures secured by JOSE or COSE. The Referenced Token is referenced by the Status List, which describes the status of the Referenced Token. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index corresponds to the Referenced Token's status. A Status List is provided within a Status List Token protected by cryptographic signature or MAC and this document defines its representations in JWT and CWT format.</t>
      <t>The following diagram depicts the relationship between the artifacts:</t>
      <artwork type="ascii-art"><![CDATA[
┌────────────────┐  describes status ┌──────────────────┐
│  Status List   ├──────────────────►│ Referenced Token │
│ (JSON or CBOR) │◄──────────────────┤ (JOSE, COSE, ..) │
└─────┬──────────┘    references     └──────────────────┘
      │
      │ embedded in
      ▼
┌───────────────────┐
│ Status List Token │
│  (JWT or CWT)     │
└───────────────────┘

]]></artwork>
      <t>An Issuer issues Referenced Tokens to a Holder, the Holder uses and presents those Referenced Tokens to a Relying Party. The Issuer gives updated status information to the Status Issuer, who creates a Status List Token. The Status Issuer provides the Status List Token to the Status Provider, who serves the Status List Token on a public, resolvable endpoint. The roles of the Issuer (of the Referenced Token), the Status Issuer and the Status Provider may be fulfilled by the same entity. If not further specified, the term Issuer may refer to an entity acting for all three roles. This document describes how an Issuer references a Status List Token and how a Relying Party fetches and validates Status Lists.</t>
      <t>The following diagram depicts the relationship between the involved roles (Relying Party is equivalent to Verifier of <xref target="SD-JWT.VC"/>):</t>
      <artwork type="ascii-art"><![CDATA[
           issue                 present
           Referenced            Referenced
┌────────┐ Token      ┌────────┐ Token      ┌───────────────┐
│ Issuer ├───────────►│ Holder ├───────────►│ Relying Party │
└─┬──────┘            └────────┘            └──┬────────────┘
  ▼ update status                              │
┌───────────────┐                              │
│ Status Issuer │                              │
└─┬─────────────┘                              │
  ▼ provide Status List                        │
┌─────────────────┐         fetch Status List  │
│ Status Provider │◄───────────────────────────┘
└─────────────────┘

]]></artwork>
      <t>Status Lists may be composed to express a range of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types.</t>
      <t>Furthermore, the document defines an extension point that enables other specifications to describe additional status mechanisms and creates an IANA registry.</t>
      <section anchor="example-use-cases">
        <name>Example Use Cases</name>
        <t>An example of the usage of a Status List is to manage the status of issued access tokens as defined in section 1.4 of <xref target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> defines another way to determine the status of an issued access token, but it requires the party trying to validate the state of access tokens to directly contact the token issuer, whereas the mechanism defined in this specification does not have this limitation.</t>
        <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>.</t>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part of most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again. Another alternative is short-lived Referenced Tokens with regular re-issuance, but this puts additional burden on the Issuer's infrastructure.</t>
        <t>This specification seeks to find a balance between scalability, security and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Status Provider.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy-to-understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large-scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall define an extension point that enables other mechanisms to convey information about the status of a Referenced Token</t>
          </li>
        </ul>
      </section>
      <section anchor="prior-work">
        <name>Prior Work</name>
        <t>Representing a status with bits in array is a rather old and well-known concept in computer science and there has been prior work to use this for revocation and status management such as a paper by Smith et al. <xref target="smith2020let"/> that proposed a mechanism called Certificate Revocation Vectors based on xz compressed bit vectors for each expiration day and the W3C bit Status List <xref target="W3C.SL"/> that similarly uses a compressed bit representation.</t>
      </section>
      <section anchor="status-mechanisms-registry">
        <name>Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "Status Mechanisms" registry for status mechanisms and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
        <t>Other status mechanisms may have different tradeoffs regarding security, privacy, scalability and complexity. The privacy and security considerations in this document only represent the properties of the Status List mechanism.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token.</t>
        </dd>
        <dt>Status Issuer:</dt>
        <dd>
          <t>An entity that issues the Status List Token about the status information of the Referenced Token. This role may be fulfilled by the Issuer.</t>
        </dd>
        <dt>Status Provider:</dt>
        <dd>
          <t>An entity that provides the Status List Token on a public endpoint. This role may be fulfilled by the Status Issuer.</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that receives Referenced Tokens from the Issuer and presents them to Relying Parties.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Referenced Token and fetches the corresponding Status List Token to validate the status of that Referenced Token. Also known as Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a bit array that lists the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT or CWT representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure that contains a reference to a Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> with JOSE as defined in <xref target="RFC7515"/> or CBOR <xref target="RFC8949"/> with COSE as defined in <xref target="RFC9052"/>. The information from the contained Status List gives the Relying Party additional information about the current status of the Referenced Token. Examples for Referenced Tokens are SD-JWT VC and ISO mdoc.</t>
        </dd>
        <dt>base64url:</dt>
        <dd>
          <t>Denotes the URL-safe base64 encoding without padding as defined in Section 2 of <xref target="RFC7515"/> as "Base64url Encoding".</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a byte array that contains the statuses of many Referenced Tokens represented by one or multiple bits. A common representation of a Status List is composed by the following algorithm:</t>
      <ol spacing="normal" type="1"><li>
          <t>Each status of a Referenced Token <bcp14>MUST</bcp14> be represented with a bit-size of 1,2,4 or 8. Therefore up to 2,4,16 or 256 statuses for a Referenced Token are possible, depending on the bit-size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error-prone.</t>
        </li>
        <li>
          <t>The overall Status List is encoded as a byte array. Depending on the bit-size, each byte corresponds to 8/(#bit-size) statuses (8,4,2 or 1). The status of each Referenced Token is identified using the index that maps to one or more specific bits within the byte array. The index starts counting at 0 and ends with "size" - 1 (being the last valid entry). The bits within an array are counted from the least significant bit "0" to the most significant bit ("7"). All bits of the byte array at a particular index are set to a status value.</t>
        </li>
        <li>
          <t>The byte array is compressed using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
        </li>
      </ol>
      <t>The following example illustrates a Status List that represents the statuses of 16 Referenced Tokens, requiring 16 bits (2 bytes) for the uncompressed byte array (1 bit status):</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 0
status[2] = 0
status[3] = 1
status[4] = 1
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 1
status[10] = 0
status[11] = 0
status[12] = 0
status[13] = 1
status[14] = 0
status[15] = 1
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1               2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
values   |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|  |0|...
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
index     7 6 5 4 3 2 1 0   15   ...  10 9 8   23
         \_______________/  \_______________/
                0xB9               0xA3

]]></artwork>
      <t>In this example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the "bits" is required to be 2.</t>
      <t>This example Status List represents the status of 12 Referenced Tokens, requiring 24 bits (3 bytes) of status (2 bit status):</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 2
status[2] = 0
status[3] = 3
status[4] = 0
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 2
status[10] = 3
status[11] = 3
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1                  2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values   |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
          \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status     3   0   2   1      1   0   1   0      3   3   2   1
index      3   2   1   0      7   6   5   4      11  10  9   8
           \___________/      \___________/      \___________/
                0xC9               0x44               0xF9

]]></artwork>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the data structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. JSON Object that contains a Status List. It <bcp14>MUST</bcp14> contain at least the following claims:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the Status List (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1,2,4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. JSON String that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token or Issuer. See section <xref target="aggregation"/> for further details.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List with bit-size 1 from the example above:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
        <t>The following example illustrates the JSON representation of the Status List with bit-size 2 from the example above:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
        <t>See section <xref target="test-vectors"/> for more test vectors.</t>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the data structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a map (Major Type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (Major Type 0) that contains the number of bits per Referenced Token in the Status List. The allowed values for <tt>bits</tt> are 1, 2, 4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. Byte string (Major Type 2) that contains the Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. Text string (Major Type 3) that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="aggregation"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the CBOR representation of the Status List in Hex:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
        <t>See section <xref target="test-vectors"/> for more test vectors.</t>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds the Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>OPTIONAL</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by the Status Issuer.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number encoded in JSON as a number.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1",
  "ttl": 43200
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the protected header of the CWT:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>statuslist+cwt</tt> as defined in <xref target="RFC9596"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The subject claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The issued at claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>OPTIONAL</bcp14>. As generally defined in <xref target="RFC8392"/>. The expiration time claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer.</t>
          </li>
          <li>
            <t><tt>65534</tt> (time to live): <bcp14>OPTIONAL</bcp14>. Unsigned integer (Major Type 0). The time to live claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number.</t>
          </li>
          <li>
            <t><tt>65533</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28453a20126106e7374617475736c6973742b637774a1044231325850a502782168
747470733a2f2f6578616d706c652e636f6d2f7374617475736c697374732f31061a
648c5bea041a8898dfea19fffe19a8c019fffda2646269747301636c73744a78dadb
b918000217015d5840b973b7e73c75316630cc7c28caad342638a91c6b68299d59c4
dcbf9b6162b526e7e5511e54cf5453fc39180896a96f9107bf6a5cdb1cacc5589909
f0fc4bf023
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    53                          #     bytes(19)
      a20126106e7374617475736c  #       "¢\x01&\x10nstatusl"
      6973742b637774            #       "ist+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 50                       #     bytes(80)
      a502782168747470733a2f2f  #       "¥\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31061a648c5bea041a8898df  #       "1\x06\x1ad\x8c[ê\x04\x1a\x88\x98ß"
      ea19fffe19a8c019fffda264  #       "ê\x19ÿþ\x19¨À\x19ÿý¢d"
      6269747301636c73744a78da  #       "bits\x01clstJxÚ"
      dbb918000217015d          #       "Û¹\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      b973b7e73c75316630cc7c28  #       "¹s·ç<u1f0Ì|("
      caad342638a91c6b68299d59  #       "Ê\xad4&8©\x1ckh)\x9dY"
      c4dcbf9b6162b526e7e5511e  #       "ÄÜ¿\x9babµ&çåQ\x1e"
      54cf5453fc39180896a96f91  #       "TÏTSü9\x18\x08\x96©o\x91"
      07bf6a5cdb1cacc5589909f0  #       "\x07¿j\Û\x1c¬ÅX\x99\x09ð"
      fc4bf023                  #       "üKð#"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. The claim contains members used to reference to a Status List Token as defined in this specification. Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in Section 3.1 of <xref target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jose">
        <name>Referenced Token in JOSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/> or other formats based on JOSE.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It contains a reference to a Status List Token. It <bcp14>MUST</bcp14> at least contain the following claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
        <t>SD-JWT-based Verifiable Credentials <xref target="SD-JWT.VC"/> introduce the usage of a status mechanism in Section 3.2.2.2. The "status" object uses the same encoding as a JWT as defined in <xref target="referenced-token-jose"/>.</t>
        <t>The following is a non-normative example of a Referenced Token in SD-JWT-VC serialized form as received from an Issuer:</t>
        <artwork type="ascii-art"><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb
Ikh2cktYNmZQVjB2OUtfeUNWRkJpTEZIc01heGNEXzExNEVtNlZUOHgxbGciXSwgImlz
cyI6ICJodHRwczovL2V4YW1wbGUuY29tL2lzc3VlciIsICJpYXQiOiAxNjgzMDAwMDAw
LCAiZXhwIjogMTg4MzAwMDAwMCwgInN1YiI6ICI2YzVjMGE0OS1iNTg5LTQzMWQtYmFl
Ny0yMTkxMjJhOWVjMmMiLCAic3RhdHVzIjogeyJzdGF0dXNfbGlzdCI6IHsiaWR4Ijog
MCwgInVyaSI6ICJodHRwczovL2V4YW1wbGUuY29tL3N0YXR1c2xpc3RzLzEifX0sICJf
c2RfYWxnIjogInNoYS0yNTYifQ.-kgS-R-Z4DEDlqb8kb6381_gHHNatsoF1fcVKZk3M
06CrnV8F8k9d2w2V_YAOvgcb0f11FqDFezXBXH30d4vcw~WyIyR0xDNDJzS1F2ZUNmR2
ZyeU5STjl3IiwgInN0cmVldF9hZGRyZXNzIiwgIlNjaHVsc3RyLiAxMiJd~WyJlbHVWN
U9nM2dTTklJOEVZbnN4QV9BIiwgImxvY2FsaXR5IiwgIlNjaHVscGZvcnRhIl0~WyI2S
Wo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgInJlZ2lvbiIsICJTYWNoc2VuLUFuaGFsdCJd~
WyJlSThaV205UW5LUHBOUGVOZW5IZGhRIiwgImNvdW50cnkiLCAiREUiXQ~WyJRZ19PN
jR6cUF4ZTQxMmExMDhpcm9BIiwgImFkZHJlc3MiLCB7Il9zZCI6IFsiNnZoOWJxLXpTN
EdLTV83R3BnZ1ZiWXp6dTZvT0dYcm1OVkdQSFA3NVVkMCIsICI5Z2pWdVh0ZEZST0NnU
nJ0TmNHVVhtRjY1cmRlemlfNkVyX2o3NmttWXlNIiwgIktVUkRQaDRaQzE5LTN0aXotR
GYzOVY4ZWlkeTFvVjNhM0gxRGEyTjBnODgiLCAiV045cjlkQ0JKOEhUQ3NTMmpLQVN4V
GpFeVc1bTV4NjVfWl8ycm8yamZYTSJdfV0~
]]></artwork>
        <t>The resulting payload of the example above:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "_sd": [
    "HvrKX6fPV0v9K_yCVFBiLFHsMaxcD_114Em6VT8x1lg"
  ],
  "iss": "https://example.com/issuer",
  "iat": 1683000000,
  "exp": 1883000000,
  "sub": "6c5c0a49-b589-431d-bae7-219122a9ec2c",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  },
  "_sd_alg": "sha-256"
}
]]></artwork>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in COSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "COSE Web Token (CWT)" object according to <xref target="RFC8392"/> or other formats based on COSE.</t>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim is encoded as a <tt>Status</tt> CBOR structure and <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key must be a CBOR text string (Major Type 3) specifying the identifier of the status mechanism and the corresponding value defines its contents. This specification defines the following data items:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jose"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (Major Type 0) The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Text string (Major Type 3). The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a Referenced Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28443a10126a1044231325866a502653132333435017368747470733a2f2f657861
6d706c652e636f6d061a648c5bea041a8898dfea19ffffa16b7374617475735f6c69
7374a2636964780063757269782168747470733a2f2f6578616d706c652e636f6d2f
7374617475736c697374732f315840e6285be7a7829ff5f87cc4137099f2008c25f6
947294b628f83076f2eb8eef232545e4b2e5d9602978bc8cdfdf8aa9e216ded4066c
c75a6f0a617dbf4285b13d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    43                          #     bytes(3)
      a10126                    #       "¡\x01&"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a50265313233343501736874  #       "¥\x02e12345\x01sht"
      7470733a2f2f6578616d706c  #       "tps://exampl"
      652e636f6d061a648c5bea04  #       "e.com\x06\x1ad\x8c[ê\x04"
      1a8898dfea19ffffa16b7374  #       "\x1a\x88\x98ßê\x19ÿÿ¡kst"
      617475735f6c697374a26369  #       "atus_list¢ci"
      647800637572697821687474  #       "dx\x00curix!htt"
      70733a2f2f6578616d706c65  #       "ps://example"
      2e636f6d2f7374617475736c  #       ".com/statusl"
      697374732f31              #       "ists/1"
    58 40                       #     bytes(64)
      e6285be7a7829ff5f87cc413  #       "æ([ç§\x82\x9fõø|Ä\x13"
      7099f2008c25f6947294b628  #       "p\x99ò\x00\x8c%ö\x94r\x94¶("
      f83076f2eb8eef232545e4b2  #       "ø0vòë\x8eï#%Eä²"
      e5d9602978bc8cdfdf8aa9e2  #       "åÙ`)x¼\x8cßß\x8a©â"
      16ded4066cc75a6f0a617dbf  #       "\x16ÞÔ\x06lÇZo\x0aa}¿"
      4285b13d                  #       "B\x85±="
]]></artwork>
        <t>ISO mdoc <xref target="ISO.mdoc"/> may utilize the Status List mechanism by introducing the <tt>status</tt> parameter in the Mobile Security Object (MSO) as specified in Section 9.1.2. The <tt>status</tt> parameter uses the same encoding as a CWT as defined in <xref target="referenced-token-cose"/>.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> to use <tt>status</tt> for the label of the field that contains the <tt>Status</tt> CBOR structure.</t>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of an IssuerAuth as specified in ISO mDL (also referred to as signed MSO) in Hex:</t>
        <artwork type="ascii-art"><![CDATA[
8443a10126a118215901f3308201ef30820195a00302010202140bfec7da97e048e
15ac3dacb9eafe82e64fd07f5300a06082a8648ce3d040302302331143012060355
04030c0b75746f7069612069616361310b3009060355040613025553301e170d323
4313030313030303030305a170d3235313030313030303030305a30213112301006
035504030c0975746f706961206473310b300906035504061302555330593013060
72a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d9648c5a72a9
a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d3a539f4d5883
65e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a5301c0603551d1f0415
30133011a00fa00d820b6578616d706c652e636f6d301e0603551d1204173015811
36578616d706c65406578616d706c652e636f6d301d0603551d0e0416041414e290
17a6c35621ffc7a686b7b72db06cd12351301f0603551d2304183016801454fa238
3a04c28e0d930792261c80c4881d2c00b300e0603551d0f0101ff04040302078030
150603551d250101ff040b3009060728818c5d050102300a06082a8648ce3d04030
20348003045022100b7103fd4b90529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f
9fa1f5c2e5aa0a0220070b2822ec7ce6c56804923a85b2cfbffd054cf9a915f070c
fef7179a4bc6569590320d81859031ba766737461747573a16b7374617475735f6c
697374a26369647819019c63757269782168747470733a2f2f6578616d706c652e6
36f6d2f7374617475736c697374732f3167646f6354797065756f72672e69736f2e
31383031332e352e312e6d444c6776657273696f6e63312e306c76616c696469747
9496e666fa3667369676e6564c074323032342d31302d30315431333a33303a3032
5a6976616c696446726f6dc074323032342d31302d30315431333a33303a30325a6
a76616c6964556e74696cc074323032352d31302d30315431333a33303a30325a6c
76616c756544696765737473a1716f72672e69736f2e31383031332e352e31ac005
820a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c923da7a6f243
01582048701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3efe98069
0a4025820d11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b110985329
2a8f62035820a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc99
41095fb7a045820ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c62
6e94457b7d8b055820bacddb4142b3842bd555206eb5acb27ded063294995c7e7fe
fbf93ece522604d065820bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab6
9eb9311650a48d325307582027dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c
5b7544fb809e02ccb3e6a0858200dbd7ccc9c7727d3d17295f1b6f1914071670ee2
3d4d33530c31f1f406b8e3b7095820a5beb5efadf37f21637209abc519830681cc5
1f334818a823fec13b29552f5ba0a5820d8047c95f9272d7d07b2c13a9f5ac2ee02
380ab272a165e569391d89a2152c3c0b582004939930ffb4911ef03487a153605a3
0368b69f2437d6d21b4c90f92bc144c3e6d6465766963654b6579496e666fa16964
65766963654b6579a40102200121582096313d6c63e24e3372742bfdb1a33ba2c89
7dcd68ab8c753e4fbd48dca6b7f9a2258201fb3269edd418857de1b39a4e4a44b92
fa484caa722c228288f01d0c03a2c3d66f646967657374416c676f726974686d675
348412d3235365840b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a
85ed800ba7acb59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50
fe8a1c4cafe
]]></artwork>
        <t>The following is the CBOR Diagnostic Notation of the example above:</t>
        <artwork><![CDATA[
[
  << {
    1: -7
  } >>,
  {
    33: h'308201ef30820195a00302010202140bfec7da97e048e15ac3dacb9ea
    fe82e64fd07f5300a06082a8648ce3d04030230233114301206035504030c0b
    75746f7069612069616361310b3009060355040613025553301e170d3234313
    030313030303030305a170d3235313030313030303030305a30213112301006
    035504030c0975746f706961206473310b30090603550406130255533059301
    306072a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d964
    8c5a72a9a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d
    3a539f4d588365e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a530
    1c0603551d1f041530133011a00fa00d820b6578616d706c652e636f6d301e0
    603551d120417301581136578616d706c65406578616d706c652e636f6d301d
    0603551d0e0416041414e29017a6c35621ffc7a686b7b72db06cd12351301f0
    603551d2304183016801454fa2383a04c28e0d930792261c80c4881d2c00b30
    0e0603551d0f0101ff04040302078030150603551d250101ff040b300906072
    8818c5d050102300a06082a8648ce3d0403020348003045022100b7103fd4b9
    0529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f9fa1f5c2e5aa0a0220070b2
    822ec7ce6c56804923a85b2cfbffd054cf9a915f070cfef7179a4bc6569'
  },
  << 24( << {
    "status": {
      "status_list": {
        "idx": 412,
        "uri": "https://example.com/statuslists/1"
      }
    },
    "docType": "org.iso.18013.5.1.mDL",
    "version": "1.0",
    "validityInfo": {
      "signed": 2024-10-01 13:30:02+00:00,
      "validFrom": 2024-10-01 13:30:02+00:00,
      "validUntil": 2025-10-01 13:30:02+00:00
    },
    "valueDigests": {
      "org.iso.18013.5.1": {
        0: h'a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c92
        3da7a6f243',
        1: h'48701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3e
        fe980690a4',
        2: h'd11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b11098
        53292a8f62',
        3: h'a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc9
        941095fb7a',
        4: h'ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c626e
        94457b7d8b',
        5: h'bacddb4142b3842bd555206eb5acb27ded063294995c7e7fefbf93
        ece522604d',
        6: h'bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab69eb93116
        50a48d3253',
        7: h'27dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c5b7544fb809
        e02ccb3e6a',
        8: h'0dbd7ccc9c7727d3d17295f1b6f1914071670ee23d4d33530c31f1
        f406b8e3b7',
        9: h'a5beb5efadf37f21637209abc519830681cc51f334818a823fec13
        b29552f5ba',
        10: h'd8047c95f9272d7d07b2c13a9f5ac2ee02380ab272a165e569391
        d89a2152c3c',
        11: h'04939930ffb4911ef03487a153605a30368b69f2437d6d21b4c90
        f92bc144c3e'
      }
    },
    "deviceKeyInfo": {
      "deviceKey": {
        1: 2,
        -1: 1,
        -2: h'96313d6c63e24e3372742bfdb1a33ba2c897dcd68ab8c753e4fbd
        48dca6b7f9a',
        -3: h'1fb3269edd418857de1b39a4e4a44b92fa484caa722c228288f01
        d0c03a2c3d6'
      }
    },
    "digestAlgorithm": "SHA-256"
  } >> ) >>,
  h'b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a85ed800ba7acb
  59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50fe8a1c4cafe'
]
]]></artwork>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines the statuses of Referenced Tokens as Status Type values. A status describes the state, mode, condition or stage of an entity that is represented by the Referenced Token.</t>
      <t>A Status List can not represent multiple statuses per Referenced Token. If the Status List contains more than one bit per token (as defined by <tt>bits</tt> in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. Status Types <bcp14>MUST</bcp14> have a numeric value between 0 and 255 for their representation in the Status List. The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> value (bit size) to be able to describe the required Status Types for its application.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>This document creates a registry in <xref target="iana-status-types"/> that includes the most common Status Type values. Additional values may defined for particular use cases. Status Types described by this document comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Referenced Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Referenced Token is temporarily invalid, hanging, debarred from privilege. This state is reversible.</t>
          </li>
        </ul>
        <t>The Status Type value 0x03 and Status Type values in the range 0x0B until 0x0F are permanently reserved as application specific. Meaning the processing of Status Types using these values is application specific. All other Status Type values are reserved for future registration.</t>
        <t>The processing rules for Referenced Tokens (such as JWT or CWT) precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired.</t>
        <t>See <xref target="privacy-status-types"/> for privacy considerations on status types.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>To obtain the Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token.</t>
        <t>The HTTP endpoint <bcp14>SHOULD</bcp14> support the use of Cross-Origin Resource Sharing (CORS) <xref target="CORS"/> and/or other methods as appropriate to enable Browser-based clients to access it.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept-Header to indicate the requested response type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicitly or out-of-band.</t>
        <t>A successful response that contains a Status List Token <bcp14>MUST</bcp14> use an HTTP status code in the 2xx range.</t>
        <t>A response <bcp14>MAY</bcp14> also choose to redirect the client to another URI using an HTTP status code in the 3xx range, which clients <bcp14>SHOULD</bcp14> follow. A client <bcp14>SHOULD</bcp14> detect and intervene in cyclical redirections (i.e., "infinite" redirection loops).</t>
        <t>The following are non-normative examples of a request and response for a Status List Token with type <tt>application/statuslist+jwt</tt>:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.-bnvYY-t7smPXMU87krNWSB7i4t-IJ3OOwvpljf9cmxLN7ue-DvX
jDwjOzClGDcl8YNf3NVnkxteSYACkWVAug
]]></artwork>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>In the successful response, the Status Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/>.</t>
        <t>If caching-related HTTP headers are present in the HTTP response, Relying Parties <bcp14>SHOULD</bcp14> prioritize the exp and ttl claims within the Status List Token over the HTTP headers for determining caching behavior.</t>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>Upon receiving a Referenced Token, a Relying Party <bcp14>MUST</bcp14> first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature and expiration time. The processing rules for Referenced Tokens (such as JWT or CWT) precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired. As this is out of scope for this document, this validation is not described here, but is expected to be done according to the format of the Referenced Token.</t>
        <t>If this validation is not successful, the Referenced Token <bcp14>MUST</bcp14> be rejected. If the validation was successful, the Relying Party <bcp14>MUST</bcp14> perform the following validation steps to evaluate the status of the reference token:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for the existence of a <tt>status</tt> claim, check for the existence of a <tt>status_list</tt> claim within the <tt>status</tt> claim and validate that the content of <tt>status_list</tt> adheres to the rules defined in <xref target="referenced-token-jose"/> for JOSE-based Referenced Tokens and <xref target="referenced-token-cose"/> for COSE-based Referenced Tokens. Other formats of Referenced Tokens may define other encoding of the URI and index.</t>
          </li>
          <li>
            <t>Resolve the Status List Token from the provided URI</t>
          </li>
          <li>
            <t>Validate the Status List Token:
            </t>
            <ol spacing="normal" type="1"><li>
                <t>Validate the Status List Token by following the rules defined in section 7.2 of <xref target="RFC7519"/> for JWTs and section 7.2 of <xref target="RFC8392"/> for CWTs. This step might require the resolution of a public key as described in <xref target="key-management"/>.</t>
              </li>
              <li>
                <t>Check for the existence of the required claims as defined in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/> depending on the token type</t>
              </li>
            </ol>
          </li>
          <li>
            <t>All existing claims in the Status List Token <bcp14>MUST</bcp14> be checked according to the rules in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/>
            </t>
            <ol spacing="normal" type="1"><li>
                <t>The subject claim (<tt>sub</tt> or <tt>2</tt>) of the Status List Token <bcp14>MUST</bcp14> be equal to the <tt>uri</tt> claim in the <tt>status_list</tt> object of the Referenced Token</t>
              </li>
              <li>
                <t>If the Relying Party has custom policies regarding the freshness of the Status List Token, it <bcp14>SHOULD</bcp14> check the issued at claim (<tt>iat</tt> or <tt>6</tt>)</t>
              </li>
              <li>
                <t>If the expiration time is defined (<tt>exp</tt> or <tt>4</tt>), it <bcp14>MUST</bcp14> be checked if the Status List Token is expired</t>
              </li>
              <li>
                <t>If the Relying Party is using a system for caching the Status List Token, it <bcp14>SHOULD</bcp14> check the <tt>ttl</tt> claim of the Status List Token and retrieve a fresh copy if (time status was resolved + ttl &lt; current time)</t>
              </li>
            </ol>
          </li>
          <li>
            <t>Decompress the Status List with a decompressor that is compatible with DEFLATE <xref target="RFC1951"/> and ZLIB <xref target="RFC1950"/></t>
          </li>
          <li>
            <t>Retrieve the status value of the index specified in the Referenced Token as described in <xref target="status-list"/>. Fail if the provided index is out of bounds of the Status List</t>
          </li>
          <li>
            <t>Check the status value as described in <xref target="status-types"/></t>
          </li>
        </ol>
        <t>If any of these checks fails, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
      </section>
      <section anchor="historical-resolution">
        <name>Historical resolution</name>
        <t>By default, the status mechanism defined in this specification only conveys information about the state of Reference Tokens at the time the Status List Token was issued. The validity period for this information, as defined by the issuer, is explicitly stated by the <tt>iat</tt> (issued at) and <tt>exp</tt> (expiration time) claims for JWT and their corresponding ones for the CWT representation. If support for historical status information is required, this can be achieved by extending the request for the Status List Token as defined in <xref target="status-list-request"/> with a timestamp. This feature has additional privacy implications as described in <xref target="privacy-historical"/>.</t>
        <t>To obtain the Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token with the additional query parameter <tt>time</tt> and its value being a unix timestamp. The response for a valid request <bcp14>SHOULD</bcp14> contain a Status List Token that was valid for that specified time or an error.</t>
        <t>If the Server does not support the additional query parameter, it <bcp14>SHOULD</bcp14> return a status code of 501 (Not Implemented) or if the requested time is not supported it <bcp14>SHOULD</bcp14> return a status code of 406 (Not Acceptable). A Status List Token might be served via static file hosting (e.g., leveraging a Content Delivery Network), which would result in the client not being able to retrieve those status codes. Thus, the client <bcp14>MUST</bcp14> verify support for this feature by verifying that the requested timestamp is within the valid time of the returned token signaled via <tt>iat</tt> (<tt>6</tt> for CWT) and <tt>exp</tt> (<tt>4</tt> for CWT).</t>
        <t>The following is a non-normative example of a GET request using the <tt>time</tt> query parameter:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1?time=1686925000 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <t>The following is a non-normative example of a response for the above Request:</t>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.-bnvYY-t7smPXMU87krNWSB7i4t-IJ3OOwvpljf9cmxLN7ue-DvX
jDwjOzClGDcl8YNf3NVnkxteSYACkWVAug
]]></artwork>
      </section>
    </section>
    <section anchor="aggregation">
      <name>Status List Aggregation</name>
      <t>Status List Aggregation is an optional mechanism to retrieve a list of URIs to all Status List Tokens, allowing a Relying Party to fetch all relevant Status Lists for a specific type of Referenced Token or Issuer. This mechanism is intended to support fetching and caching mechanisms and allow offline validation of the status of a reference token for a period of time.</t>
      <t>If a Relying Party encounters an invalid Status List referenced in the response from the Status List Aggregation endpoint, it <bcp14>SHOULD</bcp14> continue processing the other valid Status Lists referenced in the response.</t>
      <t>There are two options for a Relying Party to retrieve the Status List Aggregation.
An Issuer <bcp14>MAY</bcp14> support any of these mechanisms:</t>
      <ul spacing="normal">
        <li>
          <t>Issuer metadata: The Issuer of the Referenced Token publishes an URI which links to Status List Aggregation, e.g. in publicly available metadata of an issuance protocol</t>
        </li>
        <li>
          <t>Status List Parameter: The Status Issuer includes an additional claim in the Status List Token that contains the Status List Aggregation URI.</t>
        </li>
      </ul>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>The Issuer <bcp14>MAY</bcp14> link to the Status List Aggregation URI in metadata that can be provided by different means like .well-known metadata as is used commonly in OAuth and OpenID or via a VICAL extension for ISO mDoc / mDL. If the Issuer is an OAuth Authorization Server according to <xref target="RFC6749"/>, it is <bcp14>RECOMMENDED</bcp14> to use <tt>status_list_aggregation_endpoint</tt> for its metadata defined by <xref target="RFC8414"/>.</t>
        <t>The concrete specification on how this is implemented depends on the specific ecosystem and is out of scope of this specification.</t>
      </section>
      <section anchor="status-list-parameter">
        <name>Status List Parameter</name>
        <t>The URI to the Status List Aggregation <bcp14>MAY</bcp14> be provided as the optional parameter <tt>aggregation_uri</tt> in the Status List itself as explained in <xref target="status-list-cbor"/> and <xref target="status-list-json"/> respectively. A Relying Party may use this URI to retrieve an up-to-date list of relevant Status Lists.</t>
      </section>
      <section anchor="status-list-aggregation-in-json-format">
        <name>Status List Aggregation in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List Aggregation:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_lists</tt>: <bcp14>REQUIRED</bcp14>. JSON array of strings that contains URIs linking to Status List Tokens.</t>
          </li>
        </ul>
        <t>The Status List Aggregation URI provides a list of Status List URIs. This aggregation in JSON and the media type return <bcp14>SHOULD</bcp14> be <tt>application/json</tt>. A Relying Party can iterate through this list and fetch all Status List Tokens before encountering the specific URI in a Referenced Token.</t>
        <t>The following is a non-normative example for media type <tt>application/json</tt>:</t>
        <sourcecode type="json"><![CDATA[
{
   "status_lists" : [
      "https://example.com/statuslists/1",
      "https://example.com/statuslists/2",
      "https://example.com/statuslists/3"
   ]
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="x509-certificate-extensions">
      <name>X.509 Certificate Extensions</name>
      <section anchor="eku">
        <name>Extended Key Usage Extension</name>
        <t><xref target="RFC5280"/> specifies the Extended Key Usage (EKU) X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used.</t>
        <t>The following OID is defined for usage in the EKU extension</t>
        <t>```
   id-kp  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) 3 }</t>
        <t>id-kp-oauthStatusListSigning             OBJECT IDENTIFIER ::= { id-kp TBD }
```</t>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>The Status List as defined in <xref target="status-list"/> only exists in cryptographically secured containers which allows checking the integrity and origin without relying on other aspects like transport security (e.g., the web PKI).</t>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded Status List</name>
        <t>Implementers should be particularly careful for the correct parsing and decoding of the Status List. Incorrect implementations might check the index on the wrong data or miscalculate the bit and byte index leading to an erroneous status of the Referenced Token. Beware, that bits are indexed (bit order) from least significant bit to most significant bit (also called "right to left") while bytes are indexed (byte order) in their natural incrementing byte order (usually written for display purpose from left to right). Endianness does not apply here because each status value fits within a single byte.</t>
        <t>Implementations are <bcp14>RECOMMENDED</bcp14> to verify correctness using the test vectors given by this specification.</t>
      </section>
      <section anchor="security-guidance-for-jwt-and-cwt">
        <name>Security Guidance for JWT and CWT</name>
        <t>A Status List Token in the JWT format should follow the security considerations of <xref target="RFC7519"/> and the best current practices of <xref target="RFC8725"/>.</t>
        <t>A Status List Token in the CWT format should follow the security considerations of <xref target="RFC8392"/>.</t>
      </section>
      <section anchor="key-management">
        <name>Key Resolution and Trust Management</name>
        <t>This specification does not mandate specific methods for key resolution and trust management, however the following recommendations are made:</t>
        <t>If the Issuer of the Referenced Token is the same entity as the Status Issuer, then the same key that is embedded into the Referenced Token may be used for the Status List Token. In this case the Status List Token may use:
- the same <tt>x5c</tt> value or an <tt>x5t</tt>, <tt>x5t#S256</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for JOSE.
- the same <tt>x5chain</tt> value or an <tt>x5t</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for COSE.</t>
        <t>Alternatively, the Status Issuer may use the same web-based key resolution that is used for the Referenced Token. In this case the Status List Token may use:
- an <tt>x5u</tt>, <tt>jwks</tt>, <tt>jwks_uri</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for JOSE.
- an <tt>x5u</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for COSE.</t>
        <artwork type="ascii-art"><![CDATA[
┌────────┐  host keys  ┌──────────────────────┐
│ Issuer ├────────┬───►│ .well-known metadata │
└─┬──────┘        │    └──────────────────────┘
  ▼ update status │
┌───────────────┐ │
│ Status Issuer ├─┘
└─┬─────────────┘
  ▼ provide Status List
┌─────────────────┐
│ Status Provider │
└─────────────────┘
]]></artwork>
        <t>If the Issuer of the Referenced Token is a different entity than the Status Issuer, then the keys used for the Status List Token may be cryptographically linked, e.g. by an Certificate Authority through an x.509 PKI. The certificate of the Issuer for the Referenced Token and the Status Issuer should be issued by the same Certificate Authority and the Status Issuer's certificate should utilize <xref target="eku">extended key usage</xref>.</t>
        <artwork type="ascii-art"><![CDATA[
┌───────────────────────┐
│ Certificate Authority │
└─┬─────────────────────┘
  │ authorize
  │  ┌────────┐
  ├─►│ Issuer │
  │  └─┬──────┘
  │    ▼ update status
  │  ┌───────────────┐
  └─►│ Status Issuer │
     └─┬─────────────┘
       ▼ provide Status List
     ┌─────────────────┐
     │ Status Provider │
     └─────────────────┘
]]></artwork>
      </section>
      <section anchor="status-list-caching">
        <name>Status List Caching</name>
        <t>When fetching a Status List Token, Relying Parties must carefully evaluate how long a Status List is cached for. Collectively the <tt>iat</tt>, <tt>exp</tt> and <tt>ttl</tt> claims when present in a Status List Token communicate how long a Status List should be cached and should be considered valid for. The following diagram illustrates the relationship between these claims and how they are designed to influence caching.</t>
        <artwork type="ascii-art"><![CDATA[
Time of fetching

         │
         │            Check for        Check for        Check for
         │             updates          updates          updates
         │
 iat     │                │                │                │    exp
         │                │                │                │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │      ttl       │      ttl       │      ttl       │     │
  │      │ ─────────────► │ ─────────────► │ ─────────────► │ ──► │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │                                                               │
──┼───────────────────────────────────────────────────────────────┼─►
  │                                                               │
]]></artwork>
        <t>It is essential to understand the distinct purposes of the <tt>ttl</tt> and <tt>exp</tt> claims. The <tt>ttl</tt> claim represents a duration to be interpreted relative to the time the Status List is fetched, indicating when a new version of the Status List may be available. In contrast, the <tt>exp</tt> claim specifies an absolute timestamp, marking the point in time when the Status List expires and <bcp14>MUST NOT</bcp14> be relied upon any longer. Together, these claims provide guidance on when to check for updates (<tt>ttl</tt> claim) and when the Status List must be refreshed or replaced (<tt>exp</tt> claim).</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Observability of Issuers</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable him to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
        <t>Additionally, the Issuer may analyse data from the HTTP request to identify the Relying Party, e.g. through the sender's IP address.</t>
        <t>This behaviour may be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>private relay protocols or other mechanisms hiding the original sender like <xref target="RFC9458"/>.</t>
          </li>
          <li>
            <t>using trusted Third Party Hosting, see <xref target="third-party-hosting"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="malicious-issuers">
        <name>Malicious Issuers</name>
        <t>A malicious Issuer could bypass the privacy benefits of the herd privacy by generating a unique Status List for every Referenced Token. By these means, he could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests. This malicious behaviour could be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Observability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, this enables them to request the Status List to validate its status through the provided <tt>uri</tt> parameter and look up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>regular re-issuance of the Referenced Token, see <xref target="implementation-lifecycle"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="privacy-outsider">
        <name>Observability of Outsiders</name>
        <t>Outside actors may analyse the publicly available Status Lists to get information on the internal processes of the Issuer and his related business. This data may allow inferences on the total number of issued Reference Tokens and the revocation rate. Additionally, actors may regularly fetch this data or use the historic data functionality to learn how these numbers change over time.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>disable the historical data feature <xref target="historical-resolution"/></t>
          </li>
          <li>
            <t>disable the Status List Aggregation <xref target="aggregation"/></t>
          </li>
          <li>
            <t>choose non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>The tuple of uri and index inside the Referenced Token are unique and therefore is traceable data.</t>
        <section anchor="colluding-relying-parties">
          <name>Colluding Relying Parties</name>
          <t>Two or more colluding Relying Parties may link two transactions involving the same Referenced Token by comparing the status claims of received Referenced Tokens and therefore determine that they have interacted with the same Holder.</t>
          <t>To avoid privacy risks for colluding Relying Parties, it is <bcp14>RECOMMENDED</bcp14> that Issuers provide the ability to issue batches of one-time-use Referenced Tokens, enabling Holders to use in a single interaction with a Relying Party before discarding. See <xref target="implementation-lifecycle"/> to avoid further correlatable information by the values of <tt>uri</tt> and <tt>index</tt>, Status Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
          <ul spacing="normal">
            <li>
              <t>choose non-sequential, pseudo-random or random indices</t>
            </li>
            <li>
              <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
            </li>
            <li>
              <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
            </li>
          </ul>
        </section>
        <section anchor="colluding-status-issuer-and-relying-party">
          <name>Colluding Status Issuer and Relying Party</name>
          <t>A Status Issuer and a Relying Party Issuer may link two transaction involving the same Referenced Tokens by comparing the status claims of the Referenced Token and therefore determine that they have interacted with the same Holder. It is therefore recommended to use Status Lists for Referenced Token formats that have similar unlinkability properties.</t>
        </section>
      </section>
      <section anchor="third-party-hosting">
        <name>External Status Provider for Privacy</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may give additional privacy assurances as the Issuer has no means to identify the Relying Party or its request.</t>
        <t>Third-Party hosting may also allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs, while still ensuring authenticity and integrity of Token Status List, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="privacy-historical">
        <name>Historical Resolution</name>
        <t>By default, this specification only supports providing Status List information for the most recent status information and does not allow the lookup of historical information like a validity state at a specific point in time. There exists optional support for a query parameter that allows these kind of historic lookups as described in <xref target="historical-resolution"/>. There are scenarios where such a functionality is necessary, but this feature should only be implemented when the scenario and the consequences of enabling historical resolution are fully understood.</t>
        <t>There are strong privacy concerns that have to be carefully taken into consideration when providing a mechanism that allows historic requests for status information - see <xref target="privacy-relying-party"/> for more details. Support for this functionality is optional and Implementers are <bcp14>RECOMMENDED</bcp14> to not support historic requests unless there are strong reasons to do so and after carefully considering the privacy implications.</t>
      </section>
      <section anchor="privacy-status-types">
        <name>Status Types</name>
        <t>As previously explained, there is the potential risk of observability by Relying Parties (see <xref target="privacy-relying-party"/>) and Outsiders (see <xref target="privacy-outsider"/>). That means that any Status Type that transports special information about a Token can leak information to other parties. This documents defines one additional Status Type with "SUSPENDED" that conveys such additional information. Depending on the use-case, suspended could for example provide information that an authorization in the Token is suspended, but the token itself is still valid.</t>
        <t>A concrete example would be a driver's license, where the digital driver's license might still be useful to prove other information about its holder, but suspended could signal that it should not be considered valid in the scope of being allowed to drive a car. This case could be solved by either introducing a special status type, or by revoking the Token and re-issuing with changed attributes. For such a case, the status type suspended might be dangerous as it would leak the information of a suspended driver's license even if the driver's license is used as a mean of identification and not in the context of driving a car. This could also allow for the unwanted collection of statistical data on the status of driver's licenses.</t>
        <t>Ecosystems that want to use other Status Types than "VALID" and "INVALID" should consider the possible leakage of data and profiling possibilities before doing so and evaluate if revocation and re-issuance might a better fit for their use-case.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Referenced Token Lifecycle</name>
        <t>The lifetime of a Status List Token depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List Token.</t>
        <t>Referenced Tokens may be regularly re-issued to mitigate the linkability of presentations to Relying Parties. In this case, every re-issued Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry in order to prevent this from becoming a possible source of correlation.</t>
        <t>Referenced Tokens may also be issued in batches, such that Holders can use individual tokens for every transaction. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry. Revoking batch-issued Referenced Tokens might reveal this correlation later on.</t>
      </section>
      <section anchor="default-values-and-double-allocation">
        <name>Default Values and Double Allocation</name>
        <t>Implementations producing Status Lists are <bcp14>RECOMMENDED</bcp14> to initialize the Status List byte array with a default value and provide this as an initialization parameter to the Issuer. The Issuer is <bcp14>RECOMMENDED</bcp14> to use a default value that represents the most common value for its Referenced Tokens to avoid an update during issuance.</t>
        <t>Implementations producing Status Lists are <bcp14>RECOMMENDED</bcp14> to prevent double allocation, i.e. re-using the same <tt>uri</tt> and <tt>index</tt> for multiple Referenced Tokens. The Issuer <bcp14>MUST</bcp14> prevent any unintended double allocation by using the Status List.</t>
      </section>
      <section anchor="status-list-size">
        <name>Status List Size</name>
        <t>The storage and transmission size of the Status Issuer's Status List Tokens depends on:
- the size of the Status List, i.e. the number of Referenced Tokens
- the revocation rate and distribution of the Status List data (due to compression, revocation rates close to 0% or 100% create lowest sizes while revocation rates closer to 50% and random distribution create highest sizes)
- the lifetime of Referenced Tokens (shorter lifetimes allows for earlier retirement of Status List Tokens)</t>
        <t>The Status List Issuer may increase the size of a Status List if it requires indices for additional Referenced Tokens. It is <bcp14>RECOMMENDED</bcp14> that the size of a Status List in bits is divisible in bytes (8 bits) without a remainder, i.e. <tt>size-in-bits</tt> % 8 = 0.</t>
        <t>The Status List Issuer may chunk its Referenced Tokens into multiple Status Lists to reduce the transmission size of an individual Status List Token. This may be useful for setups where some entities operate in constrained environments, e.g. for mobile internet or embedded devices. The Status List Issuer may chunk the Status List Tokens depending on the Referenced Token's expiry date to align their lifecycles and allow for easier retiring of Status List Tokens, however the Status Issuer must be aware of possible privacy risks due to correlations.</t>
      </section>
      <section anchor="external-status-issuer">
        <name>External Status Issuer</name>
        <t>If the roles of the Issuer of the Referenced Token and the Status Issuer are performed by different entities, this may allow for use case that require revocations of Referenced Tokens to be managed by a different entities, e.g. for regulatory or privacy reasons. In this scenario both parties must align on:</t>
        <ul spacing="normal">
          <li>
            <t>the key and trust management as described in <xref target="key-management"/></t>
          </li>
          <li>
            <t>parameters for the Status List
            </t>
            <ul spacing="normal">
              <li>
                <t>number of <tt>bits</tt> for the Status Type as described in <xref target="status-list"/></t>
              </li>
              <li>
                <t>update cycle of the Issuer used for <tt>ttl</tt> in the Status List Token as described in <xref target="status-list-token"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="external-status-provider-for-scalability">
        <name>External Status Provider for Scalability</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs. At the same time the authenticity and integrity of Token Status List is still guaranteed, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="relying-parties-avoiding-correlatable-information">
        <name>Relying Parties avoiding correlatable Information</name>
        <t>If the Relying Party does not require the Referenced Token and the Status List Token after the presentation, e.g. for subsequent status checks or audit trail, it is <bcp14>RECOMMENDED</bcp14> to delete correlatable information, in particular:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>status</tt> claim in the Referenced Token</t>
          </li>
          <li>
            <t>the Status List Token itself</t>
          </li>
        </ul>
        <t>The Relying Party should instead only keep the relevant payload from the Referenced Token.</t>
      </section>
      <section anchor="status-list-formats">
        <name>Status List Formats</name>
        <t>This specification defines 2 different token formats of the Status List:</t>
        <ul spacing="normal">
          <li>
            <t>JWT</t>
          </li>
          <li>
            <t>CWT</t>
          </li>
        </ul>
        <t>This specification states no requirements to not mix different formats like a CBOR based Referenced Token using a JWT for the Status List, but the expectation is that within an ecosystem, a choice for specific formats is made.
Within such an ecosystem, only support for those selected variants is required and implementations should know what to expect via a profile.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the JWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "JWT Status Mechanisms" registry for JWT "status" member values and adds it to the "JSON Web Token (JWT)" registry group at https://www.iana.org/assignments/jwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>JWT Status Mechanisms are registered by Specification Required <xref target="RFC5226"/> after a three-week
review period on the jwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts.
However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve
registration once they are satisfied that such a specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register JWT Status Mechanism: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-jose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the CWT.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65535)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65533)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65534)</t>
            </li>
            <li>
              <t>Claim Value Type: unsigned integer</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "CWT Status Mechanisms" registry for CWT "status" member values and adds it to the "CBOR Web Token (CWT) Claims" registry group at https://www.iana.org/assignments/cwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>CWT Status Mechanisms are registered by Specification Required <xref target="RFC5226"/> after a three-week
review period on the cwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts. However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve registration once they are satisfied that such a
specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register CWT Status Mechanism: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-cose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-status-types">
        <name>OAuth Status Types Registry</name>
        <t>This specification establishes the IANA "OAuth Status Types" registry for Status List values and adds it to the "OAuth Parameters" registry group at https://www.iana.org/assignments/oauth-parameters. The registry records a human readable label, the bit representation and a common description for it.</t>
        <t>Status Types are registered by Specification Required <xref target="RFC5226"/> after a two-week
review period on the oauth-ext-review@ietf.org mailing list, on the advice of one or more Designated Experts. However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve registration once they are satisfied that such a
specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register Status Type name: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template-2">
          <name>Registration Template</name>
          <t>Status Type Name:</t>
          <ul empty="true">
            <li>
              <t>The name is a human-readable case insensitive label for the Status Type that helps to talk about the status of Referenced Token in common language.</t>
            </li>
          </ul>
          <t>Status Type Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the Status Type and optional examples.</t>
            </li>
          </ul>
          <t>Status Type value:</t>
          <ul empty="true">
            <li>
              <t>The bit representation of the Status Type in a byte hex representation. Valid Status Type values range from 0x00-0xFF. Values are filled up with zeros if they have less than 8 bits.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-2">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: VALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is valid, correct or legal.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x00</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: INVALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x01</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: SUSPENDED</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is temporarily invalid, hanging or debarred from privilege. This state is reversible.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x02</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x03</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x0B-0xOF</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
        </section>
      </section>
      <section anchor="oauth-parameters-registration">
        <name>OAuth Parameters Registration</name>
        <t>This specification requests registration of the following values in the IANA "OAuth Authorization Server Metadata" registry <xref target="IANA.OAuth.Params"/> established by <xref target="RFC8414"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: status_list_aggregation_endpoint</t>
          </li>
          <li>
            <t>Metadata Description: URL of the Authorization Server aggregating OAuth Token Status List URLs for token status management.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="aggregation"/> of this specification</t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-jwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-cwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
      <section anchor="x509-certificate-extended-key-purpose-oid-registration">
        <name>X.509 Certificate Extended Key Purpose OID Registration</name>
        <t>IANA is also requested to register the following OID "1.3.6.1.5.5.7.3.TBD" in the "SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3), this OID is defined in section <xref target="eku"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5226">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication transform for IPsec). To ensure that such quantities have consistent values and interpretations across all implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).</t>
              <t>In order for IANA to manage a given namespace prudently, it needs guidelines describing the conditions under which new values can be assigned or when modifications to existing values can be made. If IANA is expected to play a role in the management of a namespace, IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a namespace and provides guidelines for authors on the specific text that must be included in documents that place demands on IANA.</t>
              <t>This document obsoletes RFC 2434. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5226"/>
          <seriesInfo name="DOI" value="10.17487/RFC5226"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.OAuth.Params" target="https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#authorization-server-metadata">
          <front>
            <title>OAuth Authorization Server Metadata</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CORS" target="https://fetch.spec.whatwg.org/#http-cors-protocol">
          <front>
            <title>Fetch Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="3" month="December" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-08"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="smith2020let" target="https://www.ndss-symposium.org/ndss-paper/lets-revoke-scalable-global-certificate-revocation/">
          <front>
            <title>Let's revoke: Scalable global certificate revocation</title>
            <author initials="T." surname="Smith" fullname="Trevor Smith">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="L." surname="Dickinson" fullname="Luke Dickinson">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="K." surname="Seamons" fullname="Kent Seamons">
              <organization>Brigham Young University</organization>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Network and Distributed Systems Security (NDSS) Symposium 2020" value=""/>
        </reference>
        <reference anchor="W3C.SL" target="https://www.w3.org/TR/vc-bitstring-status-list/">
          <front>
            <title>W3C Bitstring Status List v1.0</title>
            <author initials="D." surname="Longley" fullname="Dave Longley">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="M." surname="Sporny" fullname="Manu Sporny">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="O." surname="Steele" fullname="Orie Steele">
              <organization>Transmute</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1509?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Brian Campbell,
Filip Skokan,
Francesco Marino,
Guiseppe De Marco,
Kristina Yasuda,
Markus Kreusch,
Martijn Haring,
Michael B. Jones,
Michael Schwartz,
Mike Prorock,
Oliver Terbu,
Orie Steele,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
    <section numbered="false" anchor="test-vectors">
      <name>Test vectors for Status List encoding</name>
      <t>All examples here are given in the form of JSON or CBOR payloads. The examples are encoded according to <xref target="status-list-json"/> for JSON and <xref target="status-list-cbor"/> for CBOR. The CBOR examples are displayed as hex values.</t>
      <t>All values that are not mentioned for the examples below can be assumed to be 0 (VALID). All examples are initialized with a size of 2^20 entries.</t>
      <section numbered="false" anchor="bit-status-list">
        <name>1 bit Status List</name>
        <t>The following example uses a 1 bit Status List (2 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=1
status[25460]=1
status[159495]=1
status[495669]=1
status[554353]=1
status[645645]=1
status[723232]=1
status[854545]=1
status[934534]=1
status[1000345]=1
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 1,
  "lst": "eNrt3AENwCAMAEGogklACtKQPg9LugC9k_ACvreiogE
  AAKkeCQAAAAAAAAAAAAAAAAAAAIBylgQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAXG9IAAAAAAAAAPwsJAAAAAAAAAAAAAAAvhsSAAAAAAAAAAA
  A7KpLAAAAAAAAAAAAAAAAAAAAAJsLCQAAAAAAAAAAADjelAAAAAAAAAAAKjDMAQAAA
  ACAZC8L2AEb"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747301636c737458bd78daeddc010dc0200c0041a88249400ad2903e0f4b
ba00bd93f002beb7a2a2010000a91e09000000000000000000000000000000807296
04000000000000000000000000000000000000000000000000000000000000000000
000000000000005c6f4800000000000000fc2c240000000000000000000000be1b12
000000000000000000ecaa4b000000000000000000000000000000009b0b09000000
00000000000038de9400000000000000002a30cc010000000080642f0bd8011b
]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-1">
        <name>2 bit Status List</name>
        <t>The following example uses a 2 bit Status List (4 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=2
status[25460]=1
status[159495]=3
status[495669]=1
status[554353]=1
status[645645]=2
status[723232]=1
status[854545]=1
status[934534]=2
status[1000345]=3
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 2,
  "lst": "eNrt2zENACEQAEEuoaBABP5VIO01fCjIHTMStt9ovGV
  IAAAAAABAbiEBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEB5WwIAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID0ugQAAAAAAAAAAAAAAAAAQG12SgAAA
  AAAAAAAAAAAAAAAAAAAAAAAAOCSIQEAAAAAAAAAAAAAAAAAAAAAAAD8ExIAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwJEuAQAAAAAAAAAAAAAAAAAAAAAAAMB9S
  wIAAAAAAAAAAAAAAAAAAACoYUoAAAAAAAAAAAAAAEBqH81gAQw"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-2">
        <name>4 bit Status List</name>
        <t>The following example uses a 4 bit Status List (16 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=2
status[35460]=3
status[459495]=4
status[595669]=5
status[754353]=6
status[845645]=7
status[923232]=8
status[924445]=9
status[934534]=10
status[1004534]=11
status[1000345]=12
status[1030203]=13
status[1030204]=14
status[1030205]=15
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 4,
  "lst": "eNrt0EENgDAQADAIHwImkIIEJEwCUpCEBBQRHOy35Li
  1EjoOQGabAgAAAAAAAAAAAAAAAAAAACC1SQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABADrsCAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAADoxaEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIIoCgAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACArpwKAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAGhqVkAzlwIAAAAAiGVRAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAABx3AoAgLpVAQAAAAAAAAAAAAAAwM89rwMAAAAAAAAAA
  AjsA9xMBMA"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-3">
        <name>8 bit Status List</name>
        <t>The following example uses a 8 bit Status List (256 possible values):</t>
        <artwork><![CDATA[
status[233478] = 0
status[52451] = 1
status[576778] = 2
status[513575] = 3
status[468106] = 4
status[292632] = 5
status[214947] = 6
status[182323] = 7
status[884834] = 8
status[66653] = 9
status[62489] = 10
status[196493] = 11
status[458517] = 12
status[487925] = 13
status[55649] = 14
status[416992] = 15
status[879796] = 16
status[462297] = 17
status[942059] = 18
status[583408] = 19
status[13628] = 20
status[334829] = 21
status[886286] = 22
status[713557] = 23
status[582738] = 24
status[326064] = 25
status[451545] = 26
status[705889] = 27
status[214350] = 28
status[194502] = 29
status[796765] = 30
status[202828] = 31
status[752834] = 32
status[721327] = 33
status[554740] = 34
status[91122] = 35
status[963483] = 36
status[261779] = 37
status[793844] = 38
status[165255] = 39
status[614839] = 40
status[758403] = 41
status[403258] = 42
status[145867] = 43
status[96100] = 44
status[477937] = 45
status[606890] = 46
status[167335] = 47
status[488197] = 48
status[211815] = 49
status[797182] = 50
status[582952] = 51
status[950870] = 52
status[765108] = 53
status[341110] = 54
status[776325] = 55
status[745056] = 56
status[439368] = 57
status[559893] = 58
status[149741] = 59
status[358903] = 60
status[513405] = 61
status[342679] = 62
status[969429] = 63
status[795775] = 64
status[566121] = 65
status[460566] = 66
status[680070] = 67
status[117310] = 68
status[480348] = 69
status[67319] = 70
status[661552] = 71
status[841303] = 72
status[561493] = 73
status[138807] = 74
status[442463] = 75
status[659927] = 76
status[445910] = 77
status[1046963] = 78
status[829700] = 79
status[962282] = 80
status[299623] = 81
status[555493] = 82
status[292826] = 83
status[517215] = 84
status[551009] = 85
status[898490] = 86
status[837603] = 87
status[759161] = 88
status[459948] = 89
status[290102] = 90
status[1034977] = 91
status[190650] = 92
status[98810] = 93
status[229950] = 94
status[320531] = 95
status[335506] = 96
status[885333] = 97
status[133227] = 98
status[806915] = 99
status[800313] = 100
status[981571] = 101
status[527253] = 102
status[24077] = 103
status[240232] = 104
status[559572] = 105
status[713399] = 106
status[233941] = 107
status[615514] = 108
status[911768] = 109
status[331680] = 110
status[951527] = 111
status[6805] = 112
status[552366] = 113
status[374660] = 114
status[223159] = 115
status[625884] = 116
status[417146] = 117
status[320527] = 118
status[784154] = 119
status[338792] = 120
status[1199] = 121
status[679804] = 122
status[1024680] = 123
status[40845] = 124
status[234603] = 125
status[761225] = 126
status[644903] = 127
status[502167] = 128
status[121477] = 129
status[505144] = 130
status[165165] = 131
status[179628] = 132
status[1019195] = 133
status[145149] = 134
status[263738] = 135
status[269256] = 136
status[996739] = 137
status[346296] = 138
status[555864] = 139
status[887384] = 140
status[444173] = 141
status[421844] = 142
status[653716] = 143
status[836747] = 144
status[783119] = 145
status[918762] = 146
status[946835] = 147
status[253764] = 148
status[519895] = 149
status[471224] = 150
status[134272] = 151
status[709016] = 152
status[44112] = 153
status[482585] = 154
status[461829] = 155
status[15080] = 156
status[148883] = 157
status[123467] = 158
status[480125] = 159
status[141348] = 160
status[65877] = 161
status[692958] = 162
status[148598] = 163
status[499131] = 164
status[584009] = 165
status[1017987] = 166
status[449287] = 167
status[277478] = 168
status[991262] = 169
status[509602] = 170
status[991896] = 171
status[853666] = 172
status[399318] = 173
status[197815] = 174
status[203278] = 175
status[903979] = 176
status[743015] = 177
status[888308] = 178
status[862143] = 179
status[979421] = 180
status[113605] = 181
status[206397] = 182
status[127113] = 183
status[844358] = 184
status[711569] = 185
status[229153] = 186
status[521470] = 187
status[401793] = 188
status[398896] = 189
status[940810] = 190
status[293983] = 191
status[884749] = 192
status[384802] = 193
status[584151] = 194
status[970201] = 195
status[523882] = 196
status[158093] = 197
status[929312] = 198
status[205329] = 199
status[106091] = 200
status[30949] = 201
status[195586] = 202
status[495723] = 203
status[348779] = 204
status[852312] = 205
status[1018463] = 206
status[1009481] = 207
status[448260] = 208
status[841042] = 209
status[122967] = 210
status[345269] = 211
status[794764] = 212
status[4520] = 213
status[818773] = 214
status[556171] = 215
status[954221] = 216
status[598210] = 217
status[887110] = 218
status[1020623] = 219
status[324632] = 220
status[398244] = 221
status[622241] = 222
status[456551] = 223
status[122648] = 224
status[127837] = 225
status[657676] = 226
status[119884] = 227
status[105156] = 228
status[999897] = 229
status[330160] = 230
status[119285] = 231
status[168005] = 232
status[389703] = 233
status[143699] = 234
status[142524] = 235
status[493258] = 236
status[846778] = 237
status[251420] = 238
status[516351] = 239
status[83344] = 240
status[171931] = 241
status[879178] = 242
status[663475] = 243
status[546865] = 244
status[428362] = 245
status[658891] = 246
status[500560] = 247
status[557034] = 248
status[830023] = 249
status[274471] = 250
status[629139] = 251
status[958869] = 252
status[663071] = 253
status[152133] = 254
status[19535] = 255
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 8,
  "lst": "eNrt0WOQM2kYhtGsbdu2bdu2bdu2bdu2bdu2jVnU1my
  -SWYm6U5enFPVf7ue97orFYAo7CQBAACQuuckAABStqUEAAAAAAAAtN6wEgAE71QJA
  AAAAIrwhwQAAAAAAdtAAgAAAAAAACLwkAQAAAAAAAAAAACUaFcJAACAeJwkAQAAAAA
  AAABQvL4kAAAAWmJwCQAAAAAAAAjAwBIAAAB06ywJoDKQBARpfgkAAAAAAAAAAAAAA
  AAAAACo50sJAAAAAAAAAOiRcSQAAAAAgAJNKgEAAG23mgQAAAAAAECw3pUAQvegBAA
  AAAAAAADduE4CAAAAyjSvBAAQiw8koHjvSABAb-wlARCONyVoxtMSZOd0CQAAAOjWD
  RKQmLckAAAAAACysLYEQGcnSAAAAAAQooUlAABI15kSAIH5RAIgLB9LABC4_SUgGZN
  IAABAmM6RoLbTJIASzCIBAEAhfpcAAAAAAABquk8CAAAAAAAAaJl9SvvzBOICAFWmk
  IBgfSgBAAAANOgrCQAAAAAAAADStK8EAAC03gASAAAAAAAAAADFWFUCAAAAMjOaBEA
  DHpYAQjCIBADduFwCAAAAAGitMSSI3BUSAECOHpAA6IHrJQAAAAAAsjeVBAAAKRpVA
  orWvwQAAAAAAAAAkKRtJAAAAAAAgCbcLAF0bXUJAAAAoF02kYDg7CYBAAAAAEB6NpQ
  AAAAAAAAAAAAAAEr1uQQAAF06VgIAAAAAAAAAqDaeBAAQqgMkAAAAAABogQMlAAAAA
  AAa87MEAAAQiwslAAAAAAAAAAAAAAAAMrOyBAAAiekv-hcsY0Sgne6QAAAAAAAgaUt
  JAAAAAAAAAAAAAAAAAAAAAAAAAADwt-07vjVkAAAAgDy8KgFAUEaSAAAAAJL3vgQAW
  dhcAgAAoBHDSUDo1pQAAACI2o4SAABZm14CALoyuwQAAPznGQkgZwdLAAAQukclAAA
  AAAAAAAAAgKbMKgEAAAAAAAAAAAAAAAAAAECftpYAAAAAAAAAAAAACnaXBAAAAADk7
  iMJAAAAAAAAAABqe00CAnGbBBG4TAIAgFDdKgFAXCaWAAAAAAAAAAAAAAAAAKAJQwR
  72XbGAQAAAKAhh0sAAAAAAABQgO8kAAAAAAAAAAAAACAaM0kAAAC5W0QCAIJ3mAQAx
  GwxCQAA6nhSAsjZBRIAANEbWQIAAAAAaJE3JACAwA0qAUBIVpKAlphbAiAPp0iQnKE
  kAAAAAAAgBP1KAAAAdOl4CQAAAAAAAPjLZBIAAG10RtrPm8_CAEBMTpYAAAAAAIjQY
  BL8z5QSAAAAAEDYPpUAACAsj0gAAADQkHMlAAjHDxIA0Lg9JQAAgHDsLQEAAABAQS6
  WAAAAgLjNFs2l_RgLAIAEfCEBlGZZCQAAaIHjJACgtlskAAAozb0SAAAAVFtfAgAAA
  AAAAAAAAAAAAAAAAAAAAKDDtxIAAAAAVZaTAKB5W0kAANCAsSUgJ0tL0GqHSNBbL0g
  AZflRAgCARG0kQXNmlgCABiwkAQAAAEB25pIAAAAAAAAAAAAAoFh9SwAAAAAAADWNm
  OSrpjFsEoaRgDKcF9Q1dxsEAAAAAAAAAAAAAAAAgPZ6SQIAAAAAAAAAgChMLgEAAAA
  AAAAAqZlQAsK2qQQAAAAAAAD06XUJAAAAqG9bCQAAgLD9IgEAAAAAAAAAAAAAAAAAA
  EBNe0gAAAAAAAAAAEBPHSEBAAAAlOZtCYA4fS8B0GFRCQAo0gISAOTgNwmC840EAAA
  AAAAAAAAAAAAAAAAAUJydJfjXPBIAAAAAAAAAAAAAAABk6WwJAAAAAAAAAAAAAAAAq
  G8UCQAAgPpOlAAAIA83SQAANWwc9HUjGAgAAAAAAACAusaSAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAqHKVBACQjxklAAAAAAAAAKBHxpQAAAAAACBME0lAdlaUAACyt7sEAAAA0
  Nl0EgAAAAAAAAAAAABA-8wgAQAAAAAAAKU4SgKgUtlBAgAAAAAAAAAAgMCMLwEE51k
  JICdzSgCJGl2CsE0tAQAA0L11JQAAAAAAAAjUOhIAAAAAAAAAAAAAAGTqeQkAAAAAA
  AAAAAAAKM8SEjTrJwkAAAAAAACocqQEULgVJAAAACjDUxJUKgtKAAAAqbpRAgCA0n0
  mAQAAAABAGzwmAUCTLpUAAAAAAAAAAEjZNRIAAAAAAAAAAAAAAAAAAAAA8I-vJaAlh
  pQAAAAAAHrvzjJ-OqCuuVlLAojP8BJAr70sQZVDJYAgXS0BAAAAAAAAAAAAtMnyEgA
  AAAAAFONKCQAAAAAAAADorc0kAAAAAAAAgDqOlgAAAAAAAAAAAADIwv0SAAAAAAAAA
  AAAAADBuV0CIFVDSwAAAABAAI6RAAAAAGIwrQSEZAsJAABouRclAAAAAKDDrxIAAAA
  0bkkJgFiMKwEAAAAAAHQyhwRk7h4JAAAAAAAAAAAgatdKAACUYj0JAAAAAAAAAAAAQ
  nORBLTFJRIAAAAAkIaDJAAAAJryngQAAAAAAAAAAAA98oQEAAAAAAAAAEC2zpcgWY9
  LQKL2kwAgGK9IAAAAAPHaRQIAAAAAAAAAAADIxyoSAAAAAAAAAAAAAADQFotLAECz_
  gQ1PX-B"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-07</t>
      <ul spacing="normal">
        <li>
          <t>add considerations about External Status Issuer or Status Provider</t>
        </li>
        <li>
          <t>add recommendations for Key Resolution and Trust Management</t>
        </li>
        <li>
          <t>add extended key usage extensions for x509</t>
        </li>
        <li>
          <t>Relying Parties avoiding correlatable Information</t>
        </li>
        <li>
          <t>editorial changes on terminology and Referenced Tokens</t>
        </li>
        <li>
          <t>clarify privacy consideration around one time use reference tokens</t>
        </li>
        <li>
          <t>explain the Status List Token size dependencies</t>
        </li>
        <li>
          <t>explain possibility to chunk Status List Tokens depending on Referenced Token's expiry date</t>
        </li>
        <li>
          <t>add short-lived tokens in the Rationale</t>
        </li>
        <li>
          <t>rename Status Mechanism Methods registry to Status Mechanisms registry</t>
        </li>
        <li>
          <t>changes as requested by IANA review</t>
        </li>
        <li>
          <t>emphasize that security and privacy considerations only apply to Status List and no other status mechanisms</t>
        </li>
        <li>
          <t>differentiate unlinkability between Issuer-RP and RP-RP</t>
        </li>
        <li>
          <t>add more test vectors for the status list encoding</t>
        </li>
        <li>
          <t>add prior art</t>
        </li>
        <li>
          <t>updated language around application specific status type values and assigned ranges for application specific usage</t>
        </li>
        <li>
          <t>add short security considerations section for mac based deployments</t>
        </li>
        <li>
          <t>privacy considerations for other status types like suspended</t>
        </li>
        <li>
          <t>fix aggregation_uri text in referenced token</t>
        </li>
        <li>
          <t>mention key resolution in validation rules</t>
        </li>
      </ul>
      <t>-06</t>
      <ul spacing="normal">
        <li>
          <t>iana registration text updated with update procedures</t>
        </li>
        <li>
          <t>explicitly mention that status list is expected to be contained in cryptographically secured containers</t>
        </li>
        <li>
          <t>reworked and simplified introduction and abstract</t>
        </li>
        <li>
          <t>specify http status codes and allow redirects</t>
        </li>
        <li>
          <t>add status_list_aggregation_endpoint OAuth metadata</t>
        </li>
        <li>
          <t>remove unsigned options (json/cbor) of status list</t>
        </li>
        <li>
          <t>add section about mixing status list formats and media type</t>
        </li>
        <li>
          <t>fixes from IETF review</t>
        </li>
        <li>
          <t>update guidance around ttl</t>
        </li>
        <li>
          <t>add guidance around aggregation endpoint</t>
        </li>
      </ul>
      <t>-05</t>
      <ul spacing="normal">
        <li>
          <t>add optional support for historical requests</t>
        </li>
        <li>
          <t>update CBOR claim definitions</t>
        </li>
        <li>
          <t>improve section on Status Types and introduce IANA registry for it</t>
        </li>
        <li>
          <t>add Status Issuer and Status Provider role description to the introduction/terminology</t>
        </li>
        <li>
          <t>add information on third party hosting to security consideration</t>
        </li>
        <li>
          <t>remove constraint that Status List Token must not use a MAC</t>
        </li>
      </ul>
      <t>-04</t>
      <ul spacing="normal">
        <li>
          <t>add mDL example as Referenced Token and consolidate CWT and CBOR sections</t>
        </li>
        <li>
          <t>add implementation consideration for Default Values, Double Allocation and Status List Size</t>
        </li>
        <li>
          <t>add privacy consideration on using private relay protocols</t>
        </li>
        <li>
          <t>add privacy consideration on observability of outsiders</t>
        </li>
        <li>
          <t>add security considerations on correct parsing and decoding</t>
        </li>
        <li>
          <t>remove requirement for matching iss claim in Referenced Token and Status List Token</t>
        </li>
        <li>
          <t>add sd-jwt-vc example</t>
        </li>
        <li>
          <t>fix CWT status_list map encoding</t>
        </li>
        <li>
          <t>editorial fixes</t>
        </li>
        <li>
          <t>add CORS considerations to the http endpoint</t>
        </li>
        <li>
          <t>fix reference of Status List in CBOR format</t>
        </li>
        <li>
          <t>added status_list CWT claim key assigned</t>
        </li>
        <li>
          <t>move base64url definition to terminology</t>
        </li>
      </ul>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>remove unused reference to RFC9111</t>
        </li>
        <li>
          <t>add validation rules for status list token</t>
        </li>
        <li>
          <t>introduce the status list aggregation mechanism</t>
        </li>
        <li>
          <t>relax requirements for status_list claims to contain other parameters</t>
        </li>
        <li>
          <t>change cwt referenced token example to hex and annotated hex</t>
        </li>
        <li>
          <t>require TLS only for fetching Status List, not for Status List Token</t>
        </li>
        <li>
          <t>remove the undefined phrase Status List endpoint</t>
        </li>
        <li>
          <t>remove http caching in favor of the new ttl claim</t>
        </li>
        <li>
          <t>clarify the sub claim of Status List Token</t>
        </li>
        <li>
          <t>relax status_list iss requirements for CWT</t>
        </li>
        <li>
          <t>Fixes missing parts &amp; iana ttl registration in CWT examples</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y9aW8cW3Yg+D1/RTQf7CLLzFREZOSmrrKLmyTqiaREUtRS
VfMUy81kiJkZWRGZXPSsglHwYICBgfGHgqem25ieNtrj8UwD022ge7qNmjHw
9E/ql8xZ7r1xY0ku0nuvqtyPWpgZy13OPffs59xms9mYx/OxuG+tHCdnYmod
zf35IrOexNl8pRH6czFK0qv7VjwdJo2xPx3dt8S00YiScOpP4K0o9YfzZizm
w2biL+anzYzeb47h/abda2SLYBJnWZxM51czeH535/iBZX1m+eMsgT7x68o6
/N7YhF9JCp8O4UrDT4UPt49EuEjj+dVK4yJJz0ZpspjB1RcisDagrySN3/lz
aNp6mibzJEzGK414lt635ukim7u2PbDdRmO6mAQivd+IYC73G+f3rXbjXEwX
8NmybtOiZfHIV17AEOLpyHqIL+H1iR+P4TrN+0cIglaSjvCGn4ancON0Pp9l
9+/dw+fwUnwuWuqxe3jhXpAmF5m4Ry3cwzdH8fx0EahGmxeje9cBGN8Yw7Sy
udGberPFbbXi5No2rr3ZOp1PAAQNn2ADEGtCj5Y1XIzHvPzHSRD7gC0J4E5K
92Bu/lRC8b61t3F8fEjXBUNrTi+0xvTCjyb+fJ62RuMk8MfVxp/6i7G16Wfz
2J+abczgeivg6z+aJdlcJK1IVN/fOk1jesjaTNKJP53WDPDo6eHu/rbZeohv
tQJ+40ejySW23Zji9zmsIKLN4YMtZ9Cx76sP+pKjLjl8ybW97n31gS+1B32+
hB/4Usd1+RJ+4Evdfrt/X33gS72O07mvPuhLA3VpwJf6bocv4Qd5qT1w76sP
8lLP5bbwg7w08OSL8IEvDewOv4gf5CXH4WnjBzX6vn1ffZBPdQY8IfwAl3Y3
9jdaeyKK/WPYStl9ArfGKUuuCpIDeHCFriiiRG9Z9Jq84acjYeL7xcVFC9bY
510FpGY0nYjpPLs3wVebuHkLn1uXjNRyWI8PjnbuMqDHRwf71kHwVoRz6wj6
QorgTyNrZxqmVzOiHavY5tpdh/s2AUqA/5UH+OL4zuNDesbkfGvsx5M7g+7t
xRz/lUaydbeRbG0eHBojWYXX1z5yPCGMJ6yM5wBJduupn/qTO+EUvVei90ci
PReptSfmPjAK/64DZMo5w6GIuUirF3jon/lmp82MOm1OjE63Dg6Pls/lxaON
4xcPi7N5IObhKfDrc8RE4N7TyE+jJeMf4rOtbCbC1sWpPwcmgRP5DG83wyTN
mjPN9hrI8Ys0r9uTJAI/SArU7TKJwA/yUt9meoAfJG3xHO+++iBJhNdhAocf
4NLRdhMQvXWyBSJCc7tlsqOoCajYPA9x2Y8OWhOQPa5Z7aODe7s7W9bj4y3L
uXcE//WK4FIPOH3baTc7913bdbBdmP9kNobFnYNMw8Acx6GYhgLfzybATOFR
ewzwrOm8aTHLWTlOxTmIMUf4/Iq8qca2mcajU39ivUoW0PrzKUA2zUi6KTXy
ZHEmrO04BHEjS6Yf3czngJqA2P4kmWZ3a0QB64mYfy+zcEpn8PUo9Md+MBYW
M2wrFOk8HsYoJNIzIWE1twCoHYsMcQia2RdzlN+ITm4DS07jYDEXkXV0Bbx7
kllKzLNW97ePjtbg+gTYeryYWAjya/biNMqyZqaeJmSmSzN/JtJ7sFZZkwff
zOTYmzz2pjH2Zj52ksFetLdaR0+uW+Vt/1yAzDMdjcVVEa7bMUhdPkot73w/
Lb22508X1tEsSad3eesAAAn7WoixKL51nPrTbAKANJcMBm9txnOEMZMDJcxb
507LXg7JizZB7/jw3nnYDFQDBUGR14HEaGvF6bcctwXL4wGpaDSbTcsP4B0/
nDcax6dxZiGRYQAjeY3EMJ6KzPKtiQhPQf7KJuvYlG/BS4twvkjxJqAHEKBQ
AGGFwaeLMVwEIgTINYP7gM14eX4qLB6WlQxBngTeAr0hBgFGBVfWrRk0qhvE
o254eAsfXreyBZBZkHWBTK1LcmWdbK1bJTaHbwM5sZBMtazdOWk6+fynlric
w4ix5VkSwwbFF3yY4gg3xhXNd7hAgKhZaohlLYb0JI4iQIbGZ9budJ4mEcAP
mgO40wCYahdBAjOwvvxSyzvv39Pc+aqU796/L0wx4zsoWOIdPV+8rmk13tnS
z6J4CS2bAMBOJcnGZ09x35yD4A5ThzVGUuLPgOgykmQt6yiZCFrVU1juwj0r
BNDF0/NkDE2AQrmgleLlty5ORSpgnrip/XgKUwfZfR6HAO8gWcwJZfhJmDbg
NoxhHEdIcCY+vAXQHUG3yP/n8US0rK1kMllMqWtGOBgMP5VBO7BW4yu8Adx9
DkQOhmXR4IDPJ0B3iESi8iDSHKQwRGgnNYYCeySEicWRwFWCqeGYfCSLMMhs
AftnGvHy4YhxyvA6vBQDtYNpAuYgqkA/V/UQa8mNCLBfoJBi7EGTLBQ3IbTj
45NZCDQaZwvDjacR8MNoAQSKMVLQzpssxvN4BlM9FEOYAjDKiLcArONG5SJB
OqDFxREzkq5bwAdwThNQ4gAaE+BU4ysYYJkylHFZYm/LOj6t9o8Npvk1eAdn
Ycx5HVYjhmUpTtOgKTWNclfm/P3xuDp1UP0FLuu5uIJr56C6+BZQU7icwvwB
UUpDaVk7PoykbgrQPnIluETIFYlLK1oQVUdc8OFhXixNHDNCFGSFRLcuQAKh
DqEtPQSeBqDaQu0zvLearVn+nB/lnkAYhEZnCXBTxPg6iIBgwODA5TYxChoB
Kg4YA0/KQRRRjqeIoiaQXV4horbJKPVnsDIWytU+oSMs9N7GFtGUeS0y45Q1
BCSpgA6RWOFLQJ0krtF2EPAFwHqBUASFEPqbQEuzOJwzDsDO5jZO4xlg6/xC
CF4y3OlDYG6gZzR+/vOfw44O47gJVxuN3/zyL37zyz+749+/tAzsk5j3UQ3J
5mAUv7AKQLagvb/+yPb+6h+xuQpSwkXqZ5VYrOSea3j5N//zn3/s0P8dc+N1
2tDrVqu1Jvv5ZeXRf39TW79CAUVv/YxEpbqGbvn3V1LewvHoT5aYBCKKiGSr
q3/164/DgtL6VfeIgjjACBAZIY46tBrTJ0yNZoeY3GhsTK1dxVzgV1ZD1IAC
+NajZBwhR8PtwJ8tIoUstUkKBNJyVsMRuIVDyTdBY59LSiR7HoH6kVmLGfM/
uR+0AgrETNIgCSF+C8l4ApRDoAW0jsRwF4V3FGXKyoRYArzYz1N+WPZE2vqy
FxMkcrNFAOx3HVAwAzmF5ABg4iTm8VjSZCw0i5EjWl3CcdbWq1OWhLAyQMVd
h4vxMB6Pc66XgQphoeCMAN8dWtMExIZFSqKIlNBFxB2B9DJR3WBztI9o4aay
BQsIIK4fyh3I/eanqZBzwukVybMibqfJBbYgGzY2Zx1PwOnRC0VcschuIXFN
yUmZ+X72aeRdCpaRXKDVYu8wMfGzRQwd49QAIieg3ALgUlzJgji8VmUPVv5D
+8sq/8i9Yz5ooELt1eupzV9KYEo68bU8eQ3Vkit7K27DjEVSjzu8UVwPk/bV
8oRfmWC7lkoue/JGVqNoKFF/SbkU4br2hwd/Z1DfptFflIgFcY6bX7sGkDfD
rL5RhoqktSWx5GuEShk2RCaK3ZUgownmpwkt16LEx7JlxZBNsqYIOxongbNG
SH3EJZIMJKApK65DNTtyk1RJMUvKgZ+BaG0+SYQcyZ+hfiFPB12bGDtorQLI
vG+aLYJ4THqzsklQG+EimyeT4igajQfMZyZJKpjDVDXRqjWEVBoxRd4JjNLk
U8oQME80d7H8KCJlR6umhrGEmIWWDqbkMtBmFhjeZ59ZO5f+BDXY5zDnLZwz
SUNCXpV8eZH5DGS/rOXASED9xrtF/ZHoPKhtIVqylIUKoMjTRsERFVqSa5yW
x0xEWtXfv29JmkymHZw6PcfGmG4XDSw59Bg+F4AiBBTk4HCnNBrUHqsDkqo3
qo/A2lIp18yIvgJ8yO6RaF6rm2RAFCaGXUMD4Rw0d9B85yAkFKwcSlQD3uVz
LznyGBCZ1xgNExgWSixkN6IHxvEkZjWvhWvFANDGJIW7GrGrC6Y2TxFG58TQ
SWADjIlQ3PHHJAeUBNk1BUuQr3KpRur1/K3J7K2phYRJEolxUU5g9Dv0GXdF
o3GoTdAFDAYNGPdIlvGIaH3I9oIbNo6kWCbCJGNLOsh4U7mQaObIDdv40stW
xx5Yx0+OTMM9CGiwKoFghfwcfkXxEG4txiiypr7eX/XGfmtMVGp16/AJwIbW
iZYIpXiyuBO5+JfWwXSMmLllNJJTZPI4WasHW0dP12g4xraepSB3hSCNxtlZ
tm5lMds9YJ3GMZISxAnhnynDMGKzyLD7CxFkMWIuah6AO2nE2N2ysB9c+9mY
jSnYXSptzlnBAAkQAZTAhWCUDhHscHeMGLSYNedJk3YHmqta1h6sczpFG1ya
+CSuIj7CZllMFiB3JmkTSDDKmDn0JDmKpWj7WqRJ8/NpcgES/Eg0ATTJkHWn
kKgzdca4TUYWBs3In/FuHvoAGwPsSqHzR34MypDaLv4YCMWUHHs4++w0SefN
cYzib1VxQwMODhNmgNJ7U9meuEcex2JeWLJgkUasEeWb4nukzqW+tum1at0E
mRBnNGEgC2gVD2AuuOBKVjcmt85GQVJLSANlYMC+BBoIKPiu5CsoaZMTmCea
vjLUv+aoeiBujcZ0cY15B/BchReMWxmaPOFbEE/99Eou+zEbn9dL/IEsy0gO
kdqbZlM0f4KaDGwFjWtowgWNjThbDfRP4zF2PIFWyOANAJv4zJMV1WtZT8d+
SP5KdOxY/iRZoCoOfVUbBBab5Iohbl72TyiOC3PJYcnq0rlYohUzEdsWaK2z
tqQpm5k0K2MRLG3GPNsnXlBL5f14wih+Gotz3tuGFsetjxIYJehW3+exF3Hm
FAEy9NHtiotIvBvXD9jNFW7RxRTGlc15SQEYs/k17YBQge+tQ4MZ+2bY9oxD
pKZJgEGTJjw88d8mZFJATXPCSzAdLUAiyK7vIpnNEUVZnssWM7ToXyeJ4WY4
T+LIWkynApkvoh85rMUl7gBY6zBJp7C56QXZuYmO3DXuH2CTM9oBCu1yL5ox
GMKlJj8/QtcIBTogugr0cwCKZDm/Xd4h4xU8BKuLHpNkHIeK2iXDITEF2eU1
EFODIrsjmXXR58bUlId+zcsoQPD1K+tMXLFxZsFMMeVQQWuIYRroor6uIRZW
bim0GlwcoMoegQINyj1ThqhW2bG0xZ6mMYwUww9RUDBcob56l6g0UTPETPY1
sIJAgwGBhMCG4nzzDPjLVO0EfB7xaDFHQRuWBqmtNDIB0huyAQ6BnPgwHVx3
2snsnNXsjLaLlMNJMCacUS4w3yK3PJJoCo+wBBKfFkhGZnQFCLgETthVrPEY
LmPAIzJumWKEITmdgBCapJlEDLhw+U4TcRTZQNo9l4/gwAV6XkAejFMpbvpX
2r6GbnR83sToL7/kyAA1QiA1GNcJYi/bQct9Fd0STC1le3s5dhxKjaSWH4Io
A0gVZ6dSPicdZqXSyErRfVyvCvEjQAmlDI5RsblOQvbCcv8gK9VpYOiKVa1p
dOfmFjh5YwypQOkG1AiYvmyrMjjklCQ5ouSJ2A/bAgRPAfQBGxj5aUSimWT3
64o/rRdkHcWxmSKyuVUxMk3G8cGwwKk0U9LKKbkg9dqxNE1+XfL1SqWwwOnV
VHCJkRGe4/bEtineBQEcG1wRaRBsJOD9K3vPj44x+hl/W/sH9Plw59nz3cOd
bfx89GjjyRP9oSGfOHp08PzJdv4pf3PrYG9vZ3+bX4arVuFSY2Vv4xXcwVGt
HDw93j3Y33iyUgWAz9wuEOzSBkCQEzJrKLWb9LXNradf/W+OB7viX2B8q4Nx
AvJL3+l58AVUvin3RiDlrwC8qwaIyMJPFRcN/RlGv4B075M0CtQJiQ9A8/s/
Rsj89L71gyCcOd4fyws44cJFBbPCRYJZ9UrlZQZizaWabjQ0C9dLkC6Od+NV
4buCu3HxB39CbLDp9P/kjxuIQsekxyfjZARUgeXn+4371oa2wxP5kcJ9rbNa
G5Fu83aNGb7Mm0zGdY2DHB3vCQU/1HsjeDT56JQkWTO+G/w0hrul4GK5aQQF
sMBAWFev6T8FMYucUlUZepgmE9OBU3KACRJnTYt1TOawgg27tscxEZhpLXip
F+UGYV1UeejLgV7ak1Wx3qjwBuitunwbqAewcAD7UFkvWgV7pBx2wgFT6Gc3
PMElhqe0HxZU8iAI6p7NBvm4DN2oGk5SGAJfpIEoExO7+9k7Wh4E9SZHQjza
DDQA6nOlY0vMqAxcreIouMPlb9eF0Rjdar8X2yNqXJW7ZMswyIgStAjEHGDl
dpDIkrBHYTBFm6IK2OrI8C5cEn5v4On3tpa8xyFgzDbN3a6RXU6mCCjpuGWE
NV00hjmgXugFqBGnvynqRppoWWKrD7fRsWnF2LtGA+XArrdIx7h42wIUATnW
54dPmpk/FBY/AdswTGgbIYhwhDMcP+vbBqCOpDHW1SZbCW14bGVTdYaxg9Ta
CskDBQnyMyOe8n2jUYmbgX1yNRfmRtE4dLu9kqM/07xkSjE0OlYLdQSM15Eq
Zmmz1Bm5tedBUtBcN/fHowQkqtMJKOaODGS6TpexiHcHojBGQkoiD80MFGJ8
01l31z0cdV8aV2DpldIKd9adLt50O90cHuSRrqGZ8J4yk6yjJ1gwtZQ0VnUq
GUduW6YwOxgeBeBBr3SHSBhAPZ4t2Its5ao4bWplP7qSRjoBWjOswEyKmlK3
AOicCTEj06OyJ0hRlG0XzFDIxCjSNEkxJn+K0pDLuxOVcRSbSutEOExyWgGL
WoD4S6a9zhoQPVuK9+rfW/1MPbaWg3m1D+B3EfrOmhkQh6smlsWxsZka4wyA
nClbGkeZEYZP/Bn1qVAVF1spHKzT6kg2UZjYsW4HRpHOEVUXUi+eWzabgHA+
hGIrOJUVq2k51mog1DDGaOQhNomsOL2SszJ79ZVCzZF9C8JaTRXHAltAGxXp
R1PGkhV7RdnMyKBTvr+60ltZQ4475q5UJF6+92EGPseXhmR55XniEDIxl+jG
oKdYPsCOthx63obcvFIjZdhv7zx4snEsw34xT03xBez/9ZPdTX3HRk8TMjUZ
PmftlrAVB1PDrrCh03gEYso8t6CiowC2w9jyzzEXEq2W5XgN5XUDcW2BgeTV
mJ5ytGOZIgJdqNDDdenfwh7gPht8XYJStqbdRIupqbrnEFx1aLm4k5rYDr7x
Y/un1g8tR31z8JutvrmFb+3Ck17hW6fwrVt4r1e41y98GxR7twsvOsXROMXh
OMXxOF7xrhwROaWPySFC8JMhrmh9mWK8VhUuBELzx656/J3Sd7eBoOafntW1
OpZntYHVOvxy3aU8ZOaPmqU/yy61Wq0G7RiM0vhT509t+OfQb/ykL9nyAl2y
/xTf+ri+eN/WT8DpwH/wEHyyrYHVRyC0835+8kXx517NJTNoiAF9uTmoXNpo
y8iCXanqy71WCDCjLZaLbWO0VobjRUkFQ9++tXL0/OgpGxWAiFXvc3gxbi7j
SSRH9qXtEl3Wnt1hPGefBO00HtAKYtkKR3GTbzqS5ghXOY0UrTCHXksYiCy4
15MF15Nkoa3IArwkX0dS8XEEwL2GALQLBMD+WgiAWyQA7SIBaH9Lm/jj9nHx
0kfstOKfwgZXW1tvcHN74//yKZMMfPoIcnD8xLpX+HerSw0jkKwtIe/m4Hbk
JfVbPtVWTxlUJ7+YP9uDf134h+THky06RIQspB19k6j8pEiAbnOphiZtVWmS
51UuPRhIMvVZUWtSZoYHJIgUlajm2yyZvle2c6mfqQAZijkq6uWsKGBzTSUw
F8wbje9bb7j5L7D5N/ctZVtsFRLLyvp9IaUDVHlSdZT7F+0dJCcW9aeQUqEp
txB6xV1Z7W4XxM2RtsBfKbmVa1ogoaLNjF6VquhdSTaxVt+MYU5SyMX8kgsR
WXK3IGR4EEQbWAlDWt1vyRGO6+BxxImGy3RVs3UOGa6LDo/n0kOWFVQ6M1lF
6Y4kJytVu24NyYisIpsRCD/+6aqJMWtqOv5ohM4FxJgvFmkMU1O22eum5lvP
D3c5CYw8G6IC5I283TxWAysP1HnkUeORxkjrSAiNwjhoY4BrMi2QA7cjAWMZ
V0Oe60RoHB3NpqrqlweunIisiDu5kqPa9YMEc8Fxk8ofYhJfsLD8Q+vH9mUw
WIed7AOba8i1ud/4EgDOPP0+oBV+AUyCzytiPw0Wh6ONjdNw8+WzlcZ7s+Vv
cm7uR80tpLl5Hv4/HCyboVucYdLrDnePNzaeDjdGYXmK5RXHSi5N6aLkJSdt
GC8rz2WrjjySqa+WPIZBkt6ZPGJzS8kjLssbvojX3hhvkwEL1HlrdY8CI0gY
7HAwjdmpsapTCn5CGlhHAp9PUXOmbcxk0GzYXquhOh9HGG9HEGFpLYMk1lDE
zSsKAieyYQ7VrRvqXWnWDSTrWFzO6/pul/v+minYnenWrclWnU+hZmsDuB6J
y7uTJd/tel23O+h5vbbtdNvdsNfueZ7f60d+FAQDp2/btuv0bKcTXUOYYmOw
G1PQaSiFCUZkJYv5bDFXQ76G0PhuWWQq/nyGm2rVXQMk6JbFptKDlkSBVW+N
5DA1wWVPK7oFD9s1wnzx4QVsw1WHhlHbYM0w2nIYBNvlT0uKCc96/k0tk5K2
6tjcct1qlVq+/PCvPvzrr/7rTy6d/k8ubRv+ufC5B7+dn658HfS4xvtWpMLk
p6rY+/lJSiesUgRSilV+u/TY1rmfmD7KygmYT6tytoFgpjI0rIbayfziizwH
oNaDCALXaZLNdXyIDKIlP2VK4hjWoACCkMqwDxXTpSPDWiXmo8hcVu0w05K+
UTToMSY86pCvcjUhndr7Wd0iSMdgLWMkwGJhmfe8oatvK4mzYFgvl1ei8a1Q
fC5HqQDQjMIJFVqHVJhiLDBRX+jcahzmI+GTKxpVECC2BcZyLJ8hIqwGJhUV
nM4fwUTe3KUzLsMEpFvpPIug0OFGZo3ElBwNV3U+xoHyFdKb1ir8j3rRGis1
PEQVdMcet9062m2kaRbFfPEzLDdAA/Y1CX2DPE/2kLsjJTsvqG3yoWVeRZxx
7M8/csb4prWqciqWzxlrSaDux8UG6vfYhS9LO0Q0KHE5KzD12w8K37RWjWg2
7F0Obd2KhypCYf3jxlksVkHdLA2qQPydj4vCCQ4RL1qr1Bv51M5vOb6JfxlP
FhMZ2EyLCm2syzQadFmtM5rUDx2j1QIOQZV5GzSVxQRDEdm36IM+ILJTuD67
smTwD/kpWUCKaqomGGuOeUiy7MK5lkAV1VAkjagH32tdZ2Q4rqDyqtSkSRBc
hmvmtGF2SBclNcK7XEkH5JGxQqCSgElmlLUKATG8+NwEUpIrdvcqkrS38Uob
OjgWkO0aucOSnpKAUuES7I3yb6z7oFzMrXJADbeYCrLGUL0a9iRPVSWVvDF2
jt34PqEQSvpol+YmZIAaTwv9o8RfUalYwgeKpN+DDZwXZCGnuAFQgSJSmAcK
5rHRqVAJJ1GchYCFhbArM4e+RhgFLEumTV2u0sxmq8u4ljySGWlRLCWtFlYA
FdmdI7fTXSHV9iyO8Irj8ldgSfi1yItQ0W1xA0ArUCt2B07PtUE+o5eAhKIx
oNvvDvKLBtbDzS8buXQq7QbLLQeW9Z6bWAQrRmErOfdWmEzu5QPM7jly6PMx
PO21XdsuKebLxImt68WJ8M7iRJ1UUydOcG2l23L4vLTKKQkVCnmogCNSH6eL
lBiEibUy7VFqnny8VtiAab6pjSHqDLq3H+RWjRjiGqLErZmzhA3HI/DLvz9i
SLcgSnzUnPXrX6Mg4tUIE7cWTMzBlRr55gWSvFgWw7fTaXtlscOcyQ02Jrkr
jLf/2cosGl7tktBRphHGvW9KHkG75d3lka1bySNb37g8svWJ8sjW3eWRekZS
5B2/J/JIXrOr1rYXuX2v0/ZBbnC7jt0VaFnqOj2v1+m1u2F3gN/doNvu9Xqe
79ie57adttvpd2y/Y7u9vgtiRwMe93p2rw3tDN1ht9Prd51u1LOhgY4ruu3u
sBu5w7qme2132IZ+Hb/R9fphJxC+7Tl+vz/oR0PhO4PhcCicgd8PbfocXW9n
bBRNV52+ZwfQT9CDeYW9Ttvpdtt2GPZCtx/6ftT23G677w+csBt0++5gEHUG
odeIwmA4CGAKbtBxASSi03Ec0fHCYQdgNQzb2El/0PUH3eHAsXvBsOt3wihw
gMKEnU5/MLAHjaE9DL1gaLvtb9bcGd1o7pz7o1Wnjwa+/o32TrLyKnNn5xq7
JFsDpfVwsCbd1MvwSD0PYuJXf4Omwj/8yaVjT6UUpKrpFrGt2huKuiww8Rv+
NTZWfgMtvY4anL109qp5Msl66nlvKWTV8zx9V71gWbg3rnvBIkmfgdu3OjUx
IMbj3Hrf1sDVG66430zg/i3aYy//hRLZNWSXbEnjVVO6V68t27HGa6YioF7j
DV3dz8ZrDoyzCzjgRz+57Ic//vB/wncPv8PX/k8uB/0P/0a1towKGK3h687g
wz99+P/w91f/x4c/k9//36/+JtIwWEI1jHZQPULsDEExenz54V+pV5eZxM0h
LLeJy9X2brPaXY19y+iWudr/Nfvq//nwdz9YOEP7w1/86aoa7jLSZg73f/zJ
pR95f9j/6u9hpOHZ6RoAPXqlW/DqaaDZwp9/+Ouv/gneCvzgq//0hx/+7sPf
PoOmhGpiGbk0mjj+8D8dH3349UDCDde9+9XfJ/DLUa3UE9ehbbQCb/a++qe3
P/nwr3EmX/37D//9S2gBGrUHH/6DakfR4mXQxwn9+vMP/+Gzogvjs6q/88vP
8mqo2hWRa7ikg+XqLElL8MCmCgBkwUhumxUp8FFNz3JP62ZWlFGElVvIs3hN
36OUJeuSROJq8hULcAXVKyvmnlLb1+falFTX5WmvqmHJ0jQIZPqTzDEzMmjr
6hVJbwtKQiBmJaNkQRrwSjgdGsBUqSXtlpMnl8D+ff8e78pytTo9FquSY1B9
KPNZh7GC3UTMT5MoUwqEDOGMZL2ZGk84l4auYEgTD6KQtoxqHgeI2J/oGEGB
mqGlylXrpG0c0Se5MmiVlhlVtWpTa0r1rwvyUlFcmKhQwjGJxUYmMPnr6428
lAlrxkjdth5SzDhOAWZ3zS2jaeopKAVpaUAajj6OLqtQxIvWKgUY1kNwqmPW
6uL1Zd5HYoFiG56ZmeImBagJXVNuSpU3Vk8ZtLrL48xVXdJBKChBq7vrxQRF
/eo7kSaIniMqHZa2FDg44KIEDjIFrT4/3F2CTjKGjBtnN65Kh1mW2mqMysCR
Qk6ehMVNMKDB5TBA41dRF6cNiecQkXr4O6YbRoLJizRhUrf+1Tjxo/r0smoE
8w0GbMewUkvSrs3OdbZoFOajS/hqr6vvAOHb2Zvphfdop2ZLc6PBWYuyJNRJ
Xn9sy6g/VqgZhgYqKvbPATtGWboKGSkwFJf+EGqUORgFWhKScZlYmQVJBJ0q
aJdsvPVcomrxvWlp6xiRhMfJFh0d4o+pOg7iKo5CZmPLxCtdeK265OLq8Wnw
MIwP4o348GTvav/4VfxkayOOHo0vdt8mo93JiffqhXMRPHyehu4zLApk707t
Frw3hO/w3mbQ2D07dcOz+av9yetnJ2833YPn86F4vv/i8Ozx7Hjn9S7I9Kfi
4f7Oy3c7l/s7J/P98evnB49Gl9jxy6ML6GT8rhFe7XZ3tx4n0aPDi/Bdcv7E
1T0vXrmD+RN3/C5sn4zDeDeD52avXmLvG5f7b0fv9rY3LvBfA4f++uUpDX3v
eOTtveMbe1vQy3TfeRVjJ7vuq3cnb/ce7tgHR068fzzqPDl+9m7vxbP5q8mD
cWP/yr7aOz673Hv7+PTgBTw42SOYhO3D0+jRyTtsHOb/Lnr4wI5e7g+Dh+N3
0RY0/CiL/ReHHt5vcI8nV/7RDdNq79uvXh46oXs5gw7ePXm3Ew9f2jjFYSN0
D4evXlxOaSWm+8mrI5tWaPis1TwbHTUPm6+97Z3t8c+C/hno1H3ni9GjR/sg
HSQPnGF48vnrs/Zew+5updOT/oP+2SByL9yTL15tHJyPwsAeOs6Dn20/EO9e
br581LYj7zy8+PmLq92rQ/tye3/78bsj54H7+vn+5NBtvL4SzztHx2/H7d2Y
QGmHk5Nx9GBw+vrh4dXrl/vv6Pp4/63/6CSDiVw9gbXZix9H0OLjcfDo5MV+
4/lguudGx8dn48cHOyevg+m+9+xksElvTi7PX7kPMv/lYafQ0sPX5+H08HR3
bOPQ3KPGi6Qd7djzV8cns5Px5qNXk8Hx/svDeTR+zQ1NH49fu+PzgNHk+NWL
/SR0TxZPnj9Y+A8fZNEWDKmBYzo6PvVPXLvz/EXnyfNHmwfPH54cvH7R2X39
8PSQh7R/Hr3o2OH0jJb/cOd5/PIZTufwtTN4ut94e9gNnz/wXh8/u9yb7Fzu
bZ/OwomazoOz148ej8M2os5mb3c8ePcaUeRBFu9PXycHLx5fPnk5O95v7ERP
jk/67cP25vS18zp+8XLWjY5fnx/b0atw4hycnEXPjh5stPdPTs72tnBKu53X
7uxFdHJqv955fXRs70+fN6aP7ePJ/qOTk9P54dtXTjg5HIvJeLh/dnL10k3a
+5P5/MXL8T6N7Gx+8vzs8Jm/feg/e7cDmL9v+y+T+WHj4at3ByevvNcvxmfi
+MH5ydv90z17dHn4cOfq+O3m9GB7RGA4sb1O+HZ89sx+/PnBzunzZ+39473J
7Mmzk33vpPFw9kCchE5wfOLtvz0Zvhj3r8JJ/8qfvH51fPQ4Gp7YP9epNUaB
OINRLTGGVfjUFxlypR8z+3l0nn7+sjt8emKfDz7/4mrr5MFm/OTBo2zPvwy3
v3Acb2fSPTnuXzpjOm/yp+xUzbJlzIgdIitF32vbpp/13Evr9AsXpTe1G3ZC
2/cGzQB02abXdiLgWqLXdJ2B47r+QIRuuLL+7XLRdQmyLyR7z079JjJ4xV2X
aDtbS7Sd8K7aDjVUMbdLtrrMfXuN0rN1B6WnznGKbptOrtss8dhIdbOULC6j
ud+wUTcP50aJi6RHqUUWNSCKHI/nWO2E5fwhlZaq1Ya4NkD+hvKVLumYknFj
rql1Jq6aLNHO/FjVkaW3sY7SBIu3kXBLTcyXx0CXEmi0FK594xUhSpUCKxZa
4bGYp4/IVVKKfv25V0VFS0NCRb4vD/j5mtXGU98Q+CJdmsqSl+u819I7Vyv7
rVEV0NrQBiNHYBd0jsoi66zzHCywHONouf55UzbAd/ppUT9duhm+012/ad21
lvfc7Nb02r6D7ijTbdntohel28Fv7Xbba3dsp9cue1TYXdIo+0vqvRrSPzH0
nW5gOkw6Q3SZNPCS70IDg66HNshuG26iK6LGk7PMTdNY7jpFF6foun0YU8+H
NmEonWG/F4ae0+7Zg8HQte1+6MJgGgOv5w68AB4egmDS6w5dEfSFGLoAGK8j
vMAVnWjQtV0YWxD2w2gYDfs+SCQwUCBEnt3tho2w1/G7Q9uH0UTB0MOOnfY3
nNHxDbo4vVu6ONvaCUcotfxxdMv8W/Jw/vPwUXZr52qVHMC2azop67ZXxUkp
HLftdRBS2elcOxyXbAbjbVOqzd2b9VvUdG+iAFzndFRtLNvOBU+T6Z/UTsd/
+urfnmV6CsXtn+9+ox0tFHz1N2Gs31tCHYz3okv0LmLhTfLwaqAtoR/Gm6Ym
oF5bFphhvGYqDUUnPROfegRaMfWLuzs+l1Ez01X3v6/++MPfffV3sBguLMbw
w3/68F/+9MOfw3q0c6CYtC8nfSZQ0E344R/YY9sP/+DDf4YLXor/ffWftTN1
Ga00h/Nf7PMP//Dh/4JWxIf/+7M/2Pnw7776B+2+XkJTzff/9sP/8mbt8qtf
4zAAsf4N/Pa/+vsPf6NxU9PfIvkt4mb3w//64ZeI4uMP/8PrBD74/vuv/mlF
Uwom1cuWAdrYhH47X/3HHxZ9oLWnj5K7bjGP0bBYkV5yURojCKWdVUkx2nOk
T/NWAuBeEmB9dn18sfQbre4dHaxVcjqVRXbQcpQ9tqbl60yyW7cxyYbKJLu0
oKDuVcliYz8QY8XVSAivSVddoqz9zsleyjZMZ7yX14AwY/uJtUpF7wl2srwM
PsnaBS2eKaGZphpTRnOA4nUGtjNst+2+aztiyL8HHd+22zZ8svFwcc8OhiLs
Rf6gJ2yvLxpOxw/bkR8GA+EPRR+omjeM7N6w07Zt3+5CG34fOYJoR7aHDeHf
tuN4begX7rc7nQbdCO0ACKDXHQL1HHTxHvwPJNJpO3YAjQ34YXgWLtluB0M7
YZhOz46A2TU84HnQivxf/un48nan/i60A80DJ4TZ2d2GbB/HMiiNBSjudePo
DKCJNtxp9Iz5ItCKEMCOenbbA8poe34IVBaYHEiQSKSQbfrw+qABJKbT7Xmd
sOf7kdfu+nbb99qwvn6vF3SGfi/o94ewNL2o04uAa7aFE7R7UdvvtAdDL+r0
++1GtyPa/TAIhp1g4EVdaNuDd4EG9tpOFALXcbxu4Lf7wHdhoR141XZCnpoT
OUOQrzsNnBP8cwADhvAvAnwI6mVkXAn9sgsvY5xPp+84jXbxBYDasgYi1YAN
mOV04R/8Ee7Abjg9vxu2O13XGQ4BJt0+iAZBz40CaAK6a3cA9DBk+Tqspuf0
Mc6obztexxv6brvfaIM8Erp9YUewVL2B63adsG+HXr8Pb4Q2La2egg3QhRYB
CoyzNsgGbRhHR/fR0Q8onOi50BSAObLxnrsE/RsurH4fd5QHkpoLaBf0HLs9
jLwAi5YOhh07iBDvABdEBxBk6A3bkRfBNvMEtNZ3QB0ZgHQ07ISgL/g+9OIC
NvXswO27LmzNUHTDDkzdG7htH3iOGw6DIWxJDAga+AOnM4SHw8ZQDHtOb+B7
AaxCdwBbv+3CCjt9/OQEfq/bNeWSOu2qYcpXKD85QD8G4Z00rMaNwandXhc2
YrcN+DvoIfZ0ADxutwcvw1MoGTRgW/dpc7dd0YZW2w7cjDzPC7s9mAeMpocj
HHYB2fAebNQQrjvYETSOYWmgnQ3gdrc79Ns4c7jRg++drhfaPQ8oCIAHtm2E
FAT+h846SHFgWvAPtifeb4BsMMjb9WCMOLnbNwDvN/y8gU6nKwAqAxA78iY6
NzYRNrgJAFTH82giHQYnUEOnDLwq7HzYDZ0G7HUftgaQkahj9zrDIOoJAaK5
3+0KNwCk93oCCAJ86XUHQFRETwBihYB0kQ9bdOh67QaSACAG/Z7t+IOO1wWU
dPte5EITgGlA2eBp24dnYMs7Q9jldt8PEAN9JHaDPhDfhu17QGShmchxhgJ2
EhC3DnQfDIN2f9AJ27BtgERG0TDotofwKjAiGGjfCRzHHvQ7bXfQgD047MLG
w2b8nucEQ7sjcH4BUJWBaLseB81Gdn8wgA0D8mLXDcO2HyIyR1E4GDQ8aA2g
AGP0qJmg2wOeBw1jO4Bhw15vaLuEaT1oJwr7otMbBv1BJAKgtLAt3EZXDDyv
A6Qr6gd2B5sJ/DCKAqBzLswG/ouAnQC3EQFw1cDtgdgJKgmIzgOYaQ+IgWjA
Zh60RSg6QMFsD25TM7C/oQVfBIBtnaDTDoArIY0L2327349gw/W9wAadbAgD
bwxEMAC21+0AcPvAHoH297AZ6BD4kT0UPSfyu23RAb7kDAaiD6Qo6A3CQPQH
NhAMYJANuADYBRO0B8IGYAVtAXyqj83YESBLGIaDsAfwiNqRA9J/Z+gE3aEz
AAkCkLBnC+E2kLC1gTfbYRuWfwi8AYT8NoxgQCAGLSToiKEfDdu9IdCSds+1
YX3DjgMsz+72nTDsNFBg8YBs+X23DZKJ0w6gr44LbM8n1AKaBqgaQv8DWJ0I
1qYHK+y0fSC1PpBQGHwDgOQDtF0gcjDl7qA9cICt+iAQuWEb5BKalAeXgXUM
h4E3cEA8Qjre851Ou4uCBMgO3X7QHSDe9wDerhN44cCGToPQAUIE0ImA1HRg
aw6AXHY8ZKQ5zXFwvzfKtwH1HaLujks7CW6BBgHEoS1cT7QBHhiuPYwCByhA
4Lthf9DoAXPvwjbqY9yqgAWKYIlDH6g3UH+XdpIDWwfos4gi4JOAuxGKD9CZ
8HwP2JDbGAJaeKEPwogbwo51SdqIQCoCIg7CHgy4a9AVD8lVj+gKUFJgzlG3
B7IDNOG4LHt1KRGgF7qRB8J5H7gWrE4fmPtw0ImE3e4DciM3duEmSJMg7IB4
6fiNPhAf4JXAjGA3dAD/gF8C5/FAAhiGNgwQeCgg5TCCRe8AvwxhGwJ1gLW2
fYHbrGMDn+v7Tgizgb1zg3lsO/ZH0ySbx6G1nxRLtFxjHUMn5w9+IP2Bzn2r
iZU831t//Mfo1eOr7fZ96/R7d5KrTbGa2vhI2VqJ1lxe5OPla2Q01Manytjc
xifJ2QxTErk+WtamNpTA/ZHyNo/DELo/QuZmrCkJ3neUu7koTY3wfQfZm9dl
iQB+S/nbHEetEH4LGZzHcYMgfoMczmt7C2H8Glmcx3FLgXyJPM7juINQXpLJ
v6diA4C8uN5qTmXKoQlLgxN0eAKQ4vX82t1CFDhIQQ4FzaBJiK43bCFJR604
S1oOLHK71Wk5rcn2kxX53LlIsVY2RSe2bH0Vc//i+RW6UQsTIHsFJtfbrtd0
7KbtWE77ftu+b7t/ZMP/eYQFNfEgTSa3f/r5dB6P+fFO7eOFGZLjbjseiWxe
AHJlugVQ20jkP05mzp0DWnj+Xr5eDjb8cVK0bkOK0yDwGQ272PDHydW6DRSw
Wb42GiZ+93GStm5joCVuo2GPGv4I2bsrjIaVDG403MGG7yyNkzCu28ilcqPh
LjV8J/lcief54LScbjTcw4bvILEbAns+Yi25Gw33seHbyvBFET5HNy3LGw0P
aPFuI9VXhHrdRi7dmxuEtt7Ngn6NnK/bMAR+s2XaezfI/vWifw6LXAf4Xj1B
FedxKD4XFZqobxTojCPLcvJP09H1ROgr7elbKApVPSHfZLnCYICiSZv6Jt2h
VnXIgZzrEEtAQUR3QyWmI+84erTBwXAsVVtrUrSGXXVnjaKgUEAbH6dTGCrF
9xo/LSWsSUcMH0mv89CwEEmmSpdWTo7Po0vEkpNu/cxsWBb1xKNvZFCKOswu
b0us01HdFHfDLgyLw39GyrNQPECtfNZOfY2PUtE/TMzChP78gEF9No+eT13V
0pa1W61bkqfAJXzm1JRC87AAO7bBxQNX/cIpj7KkaTWEaY3S9/jyxSkeoqaj
caiWKgXjKKhRP3z0SHH96Ck6zZHKXYkUVENuR53hzCezAKYo/1Oclqt8LqvQ
ymGsdRVcuN72aZJkdECrH2HllrlQs+URrFItfzrShmsbUsIFnl+vZkXFKdSh
A4V54Vipbn7u7CqUHeSnTgjLykgbUqQWp2rJYzplUF3sT/2mifCyWGvh6AXz
TOBalM4dbrJ0Lbo61ZLjwI2DZPLCjMWR52c7qpNA8+HLcExQ4q0mnuFgw6+V
k40nu9t4oI4RX7qk0A3uFZIp1zmYMqRzhMdihMeCcpMONrm7f8dG8ejZMxHh
IZPTBR7zty5Pmgax5AzPeJDnxSZ4LjK8il9Ujy72aBxPcds+52IyS1I/jemE
DDkt2HmjeDrCM6YCn4thYqIKnj8awzzVCVNEZeTAUdTnc3Co48rC4hjbtFWq
a642SArd0oObFp58NMaPD/jUK5FO/CmsHp1lmon0XMZlGr5aFSXasvaEr2P2
ZmkSykPPAQoFHNHHN2X5QJY1uaHrlNQMH0eoR8UVgikmVG4PtbuOi8Phki/1
58CtqkOG85MA17A8DzyCBOHKwjNoF8YpZ+UmvqdKz7ewwFd+Qko81FVYMW6a
W2FY8jFSqvTQ/DRNFiMOaaVwemt1J699dEzVGDFYljzPp+TPz5GNNtWq3FNM
iPNOq3WOWlyqFimIPOK2RERo08vDb0vn3SbqOHoq9cX1azn9zDjE+amGeqUW
2iGQR1E+y66Z8lXk14mVBDq5tBIiul718Mu4U4GHnE+tR8fHT62HO8eWbFJF
vWMEqDwUVBfbquG2iDPUhDoVVNVGMk9ZRyIIUN9KkyxrHqQx7F1oK0sWaQhD
PvU5Znbr4PBozfryS/yNh/xNo3tJft4x51nzlkoTADYdtJmoE8830+QCEFzm
94XjmEOM8Zx7hCzwkpbKNzBBoQYrZPB5bnbdCPG87iZXiaXT6EFICdXpnhJY
IrI4Vj3jSm5AsoHKGTvUsFZQnT7ClBuqAl7TRHhtE3nEa6OxWxPakR8DpBaf
JylL4a7LmRnzIXqTYR0sdSYQH1iKB+dhNjxQO1yixbyZDAH004jkL6ANCPPh
Ymy0tvwAD7Ng34LlCcIolUQBMqJCQPfykokw9aMbx5QR2udSIqGiBFGcclK5
kOhA2DBlfELsljWolvfWVr2ty4oACq0k1jCy0PGO3IG8Hok5paVMOXQeqO6U
2gyvQlzUsR4cEYjVuCVa69ZKPKXsALFi3rbGSTLLaipzUZ2qmpgceRak2sx8
ELkEE582UFOLjlIDcLnfLEfdN9XgHKQaRXMcgfKe03Iaj0CIum8ZdrsG49p9
a3kX7P0o96KatFyg2QefN7Y4/6OJDO7a1ozk1McPnr/bdfYxp28yn1Em3dud
q934QiWq6uRMTsac/yxqP8M0SdG4ejwWjzbig7e7VwfHO+29txuX++82oJ3x
KSZt7h2/8vbfnl3tbcO9rYvYx1RGaM9/dGiHj/a6T64GY9F4+GAePrwcP5ns
nwdHMIipTNp0Bhm8YO++nfV2J49n0aM96GgHGr/kjNDJyUE4eew8n0Sbzxov
Tt8+G58e7k7tTOeiTk7t6NHmu4O4f/765elp8HIze33UeRu49nlhRo/2zvew
48b00A6g5f3tPRjy5qDVDKbnr141571s8vTl3vN+7yzdf3G02Yu9eXP3cfvg
4OJ8Nn47HISTyyf7vYVobp+/bLzdvnh78G5r/HA7HPdf7Q/b+yfTs8u5OHq1
sXX24mRjMao9WOhQIWKZl/Hl9/LANFFHQApnp6lzrHOaUSqsIFHkd4wk8+RQ
G8BNet2YSqRY5WWgmIzblHLF8XxqmrFZ4m9YqeynC68DEbnlCMKbR7B15xGE
NIJcXtBNS6KJqzh6F88stb93jFjMSuVTx7E56HJIRRvhMUCjMScOYOtcxIAl
X6X4S6pe6H29UhdQDgcEDDTwqOBVEAQ5QW0+lmU7zFNSq0uPh8bmvanRIJog
c8CkGsJTHjoAFjR46I813BM+Rhyp/yHCtNF4PqOzgzEnn5OTqpWA/DoZbxin
GZkmKK9/zgk/qu1lOlfTEq0RMCTKyKI0MZLPZ1zg1p/PQW1dgHq9bpXqLPIJ
sMX6o2xH+E6pqFMq+ChHrlWUcJpLFiYzkZ8Bo0wC6/zVWLyY5bjcioBpmus0
NjqvUa4Wy2wRGo8KSbJMLik3ammxXBYha7vN6fN6PQ7lJ0+/pYFoa5rRFlbA
rTZUwWETe3MKb7QDUjgfaKzW1UyFk7MzS/Zw6RKnZW3plEPe4bB76RFCLR20
LavPhrd4uJDGaZCHYlu0TeT4pVzMaa+cfIzJeIXm/AjXVmcj8wYyCOI1yaI4
XCzvJLWiGqMtDKX2/VC/v3XN+6pwl0qvrjUM58YxqcvpIHu5OCiLs6wcicsW
Vo1F3XBcc1ASI5c+S0yrp9AClng9yYFa8x7nuTo3PYb2uBzPaiGuzlbptQon
02OZLYI4VpPFCdU9JzPTh0zedBIz4LA1iUenc2UOVew3GS9yejdbBMCvKRPb
N02IEgswd3viT/0RHRvNB+9Z7rWIXjDASsbmV9CrXp7Q2FPP7Kvnv8vDdUB+
oNK44zGPJS+FVZfoWyQotA2RcpepGS/Sp4xXoQeZJQtlzVf50BU8n8x9s7a0
oHldFfNi9fLamuWyiMESOqzWsFafRw4ULrI5mj5VpgceBSYhgxQTa1ZP0QCy
bNTreBqkFHqYyM1PqzXOV/kUFgRB9w2Dqq0HVa45HucItMoHpeB73ps16qu8
lPEycDIjQ8zkRMwlQIgzXU06u8qw3MGQ7M8sWt1hznxgSqGEfE0tQ1KoZTHF
Qk1wmAdXPZes54LqKBEhi6w/IsnxBzpdnQq8Nzota1uoo9ArHXJBa6rLxU8k
qXaF4SWAOFq+6LG6c+ZxqOUj5htdpK7GOXRysIW65ZyUX0jkqeXydTTI2Ftr
IIX58VgtsGFMxOZzoSdIFtOoDkEbPUW7KiO9pms2yZL4gjIjN5tJfAPRE4/y
XAcxhr0D5HFRFTBv9EfIMo8TPxK6XkXlIbM4vBR/SK5/BFMCnYINQJqwf/nZ
qb7ezK9zRVDYRv5iLM/pvmMZimQ6vtLHvNbV+5Re2ALX1oIBP8B1+Gs3gnGA
gSolQFFTKLDFSZQLsUbX61bRN6opTboud7uyKmacBC6fqR4BhcC/9gymTLFi
tU5xWqoskkxFfhob6rNFpyhRG2XExsfyZaotUZGfni6ldYkrSIfwfACci7ic
S45o2JCvORHuek4s319ThAJnD/cnMylUDAWrZaSn5D5L5adgG670UtTtJ+Xq
yCdOCvxv0d+QFzEx5gOtpFdGRucbhMMblijnmXaGM4dYTOPLIqBE2T7KWq0a
neIS6mjpunP7kCbjduA3h4pM5wSUthE2PrVEmpKer6IL0DqcGoZ5w2uyfI4m
/wJmtEinuSJKBmzY0h3bsVb3ocld1IEnFDWxhoOIhyb2qdHFhf5xCW7swbO7
3ANbdtENs4bG8CqEWLKl4x/IBXkec2Mgyw4xoRfPPCQXEFsexuit9Ue8YtIc
BIwSDwMBKOyL+UWSnq0po/xFshhHshaYQhxpj8cZyZWXkQfGGazoKDBmRKL4
Ils33yfEPUdn3VWBFMzN7QX7mh/Rh1dXwUvYhjA2tELGFkYNtSQIaFLbEWpk
WBlLcEkSiOfXDJVpxCCCeICMun7n6inmbtQ+Z7WPSqh3Gy/An+CbP+TTpjq2
bX8dXoG7zaiwpWkvYVaE8qVW5/Cdj+H318ew9CjlL82TkUGeWvYclQq3kpmk
tfV1030+fgewCxgVO5ZBf62QOqAfvvbRldggvDMUc7RwjlECBCrno88wbyKT
HEjJcbc6xZ5YvVGKNiOf4zRi65+mWtgxuzsjrRvpt9hcQQPXJ8pWLcW5bOyX
DWpy4FL0k6cvMZcrQwGtPwv0imbmYT0mIHNjlI670dtZmX6WraWKQihoeLCZ
4+miYIbGNtgaVek/u2YATFrR1I0WmotEYo1auMp63+bI71ZjQ9VQIEe2WrKC
8pIvFfmz5ONAkX2sbXef5JjdQrReBWfIeJSdCoI7SlvMPmGxzwiflwxvndwB
CAi2PoFw7p+DDkUcVQ1AxmuigI5xX3QgXhImYxiq2exTzUXMGCx1gIGKwaN4
Qi36FCwnS4Svpee8m6gBU2Y9TMFajp15i7EACBEllV7TGI5Jz5+HwRK/lmJB
MsjPEJgIf4o1Bs+E1boQ43GTIyl0C6RO8ZkKHHtI8W7WAdfVgO15MBPT3W3c
+igP+NbJ7tbGE1YpMlXpjettJKF1D8tuaINJfkSEr1rE/0Cof8fTkWJotZBm
t+cN3r+n3XRtcROyZX1h0Nsv1E58o0M59VQNDZBtop7j6arWsJZYnkRUtFmQ
Ei+0vyTOhVppZ8yUlVFTTxEm0iBEukDJyZIMa5Tm6snWGmV5dLjuN6CGrF+q
sUCWetT8xdBUTHiRmbAGzQFyYjzEVlA99q89wK3WwklHzarTy0BSGl+hkF4k
VVSrh9zoABE5x5z1Ta3FrDlPmmQ0V2ywloFV4VdgtPJs3gfSIV44qLwYaa6q
VjJdxbeaqtrlktbNwygIG4tHUvChwFjYjVCASi1mJepBnB13v9wBVe7eqp42
WqYKct0zQ2IwH8c+1IHwNaBRRqWJiGCTE/+X6lduVSoE6eDqvqkuKJKieI5B
iMJwasbyEEHy3GtRpDpNdeah5tW6wKTaW5L+VV2wd1E+cHGNiVbnJQV1/MxV
mwtZhNmKpQo4W7c9g/ZWj7q3f5Srif1Ul0G2XrY69sDaEumciYqwdhSFzmhz
0FfE48/FlfWcDhXQT4DIKs4WIKoSWey4fTyPRpkReGvUvL668/nzNdlxaHRc
ZA0Ug0kCkkqrMJ7N1OGh6g0V7JhR4gGuE+LDbJHOkkyazfLTQmVDMCjDQaUc
x9wyDNFoXTJKYnYxVTF9u5gyGdAWHmN+OD39slL78xESYgo2JfsZdF88VBKI
vYrFXTZsKm3MpwtR5d4yDh8A3zWcGgxOHJqk14XZNRpv3rxBrIij5tnMsg42
H+9sHVu72zv7x7sPdncOLev+/R+qhKMvoeFk1VnLa71GzSQdgazHrHm1vWZF
SbTaXeNYwqmY57Ug4SeTtdBWO2uGkIjfZmfx5WpvzWpbgFBqOM0EzzLiHY8b
/igeUSSK+VMdMIwXB0rzOd7chgZxiqh6qUpsW8Wg5y8/U3dqzme+1qq5xnZr
cgySP6+wmHT8rTpDVJ0FDJoELyopMFkeuMK+jLkY0RCR6CUce4xIhsJAKmlm
oo4u9eURnySmzVOQ2EgUV0BWBips+EIE1tPPd9eY5W3JPAs6REXpWcDpVVw/
ucmqDAw0JC3IwDSyU7JlofSgM0jQiA/aBsbC6ZrHsjPVPvalO666UUAMnKpX
tNwkF4otc4bfj3wzUpK6SBNVPBspQJwB/HFM0nWO2T3YNZZnlC+Oha/ER2nr
nAo8gOt6t0rL2hQXfirkEb2U/YQKFrWJTkTsCQRTARIOaYBcFR3tY0S/pvQO
dkqpO+XrXHxOpqaspDRjPFtYDOcra4g6Y8ElJkud4rRkr7zP49SiSCcQ4mIU
UhGOFL6ln7RWF6ABIZJeAL7MpWIcxRlIbleKfKo5DGkYNJ61lrUD9MyfkqtW
W4PpuF0K7QGcCH0k4QIruxdcYUMEl7Qr+hYihJxPy8AuZeaHlkpCvDRvSgSh
/nMb4BxNgudwPQHsHAHvnup0pTq5WW2Th4s4Ij3Q9MFsvTguJ+fpMEnsK4+2
VPvACC7UO7CcXVEMv1DiU4DjVr7WWeoDbwlF/nS/53a4jPXy4Wx9ynD0EcAA
FWRkh7m/D4d4nGId/T0dqgH0shi7ofIwS8XtFV7AgySLa3FMpUcgvJGZpcX+
5tRf3vw66lJChSjmfC5FVzM8EBnogr7O+9pfcYONIS7U0iQpwy9o5bvS2zfX
tfXxURyy8mzjGYAR+4CkolXpxWDVy51nSPWUIy5b5sSUes/9RjMfzJvLTqgy
GNlnA1fmb9bp12d4rBXHM5zFkVlI1Dx8UQ5cz83PtKxTOyEVp9Uqj+MU+FvN
WL6J/uWJGBtjFDJ8VhTXq0tnqIqyA2CEMj6shHlqRQvrVJNne6dlYhAscDne
Xpxl6jerzzeDhQ64MAhcaQbmvrnDmqlBfesDkItW9Gb85pd/8Ztf/tmSv39p
kbcNR5FZ1rWP3v7vX0Kfv1AI8ptf/vXyJ/99/vmv/hFfqrWFwQ1o8ZflN/K/
v1KyKjZBv375dczjVyAn/+avfm0tZkxeGRF5NHcF1F/K935R2j8KPL+6fobX
jk/aGAqS5Mcu5V+aY9SJFeYK3B2KqAvfmmH4hpE0T/ifXss1CHuvp/+KS1T1
B7TwYJQG2bUDOqLE1NelZZSGwYYTeOCStGuQ9+WJuMbzSWGiy+icFk2K2JBL
/DK4RUa8EFmoH1VtQ9/LCmOSzary2z8WymrAxAfEANC6xNli7W7E4yMQq34O
N27wu29b6MuXNm0hv1vXU0J6ijYjkyK9QX+Rv38dDWrk5KdMM241gGtG9ct8
VGXq8YuGZVK8uxEPS422joLIdj+WjGh6XEdLrE+h0r+qzSbbYi9mo/ECqULu
4KyLSSon+dA5VlKtHl/lmQPoYhgnlVZIOgElmchNC5R9UCWlLT2PT1uXsRgU
lZGHkmZ8jpSRhFQXQ4Ry92LK22TJIHJSIcdCIeb5xTzBRMchMbEyzsGKfSCE
EysejxeU9y+tZ5Q6hRL/aTzTdUNk1KSMCYe+2P+C4mSKZ1nJ8u2UGT0EARX1
PelZrlCVYxnlolapkRuwNHYY7Fz95IHrN15Y2obcmNnNF0pjgjWtbe+ulwAp
lg/uLpcaxo1PHdR37ckPGJb9MZdq2rstPfurf/z2Hudvv08r89E/LFMwGH79
UXzmd+fvr3ntvja48DEtbF/JMj7umjz4U8xLnSuRMqJsHLQsK0ePFG6Zn+Xx
hswV5KEqRtqEcbofiPULFZZNWYjkvpihaz+SDOdcKEtFbZw5xVjOkdWtK28P
MjFip741FReWrN9Zl60hpX8dqkJ2BvQYpH4m4+mNqRhONow+CUgJF3no5jq0
l2qfAtc5iWW2iz4m0uyeE1ey/EzP/QOZEDlGh9NiRpa5K+LzFMWVjAR6INaL
bFeJaSNlUEUPGfVnnpioGNqqsRQcC1A7NnWIJ0g/mL3C9Zpg5cZ+mGfscCNU
reapDBgv+nhIHjsIMKLXD0DNmJNjncVUdACp6HGO75duoAnGUNcWyqkWpwAF
jVaFdDYV14txmZfzos7VfJSMoZkmV9VBE1USiXHxMHfKLwCgzbAS1HRe0Ngo
piz1c5+RPuq9Pga9dCxorJKIZUITRd3oY3Ewno5cO9WUgeCqYBwy4/5UJD1G
DJOAJ6vcnMYUlcgFzjDgLk0ogFppnVKJnKtERrLqj3nf0Aan1zAaJpKqNkUX
FoRj6YXhmlEUL1s8XrImBoJK8qBQmkn0rc0x4KOexCj1Sy0WoAIDmuDOqCaS
aoMwKcdjVaUupViFdXNJtaF8LPx0arh9K4s5ryQryEQOY9oFVxpOXc1OYgij
H76IYW+ceC3VeH+aTK8mCGcj8Fv6qusmWO5v3TJ9VzDXSHUuY0jG8SSWR6kC
wc5i2omxJNwKp+VgZMQoL5/ZFvu2S8mafCgqtkOYgm0uqXggR4fjwGJ/GIwy
9lM88RW/ysh8mh2oFmgSVd3qTHpAEz9U0+B8b6J2vqy0SEZBOkqXOAk5ZvOj
pGAzRJWFajTyMn3KkG1YsH24fJXJlnVUqSwNofNSpE/+qoom0npk1gvABBcy
xOw+xfhFTNhrSTeOrO+wSBVbgkWLRzLDiQI6CSRz1sSudPhklp9gbcTqnsY6
hYj92ZiRRJ2z35orZHidPnqgmsrWjC4gRLXTGBaeUf0Rp12sw9tc3GyON5vo
e75qypwM6d/e8zEzK9GGiAx9Z5PSRSA3pIxezXyZzqhXWkwF+SnllilgH6Dn
CO5LskA5OrACldN+BWV/1PiOryTRoQjLdYvYBI4DmY1M2pkAheJCG6zb1mfC
F4KAWSbCsm24jYp8ofp6oM6645XBkGzZpSbNU9Dx2clG+KWiwHIg5lgSKqU+
Ejk9Kdsw5HHKjKy04Sx/guFaS/LwiR3ARtPBXPkOzw2wNSBAtzduZBncV2H5
5XHlrF+GVzBCgQRwQPHiFYrLhU2kKaJa2YSgyfyPHpFx+XKTlmgROrRVej8R
JL5n7lMdmMmZ2bmnBqc7TpIzkKfyMAudLviGAgPetGDXkOu0LtENd/cMZVJM
sOc0xkSm8nNnJEFzQ0vli2tm548InecYW4hnUcsSK5gomuAo6Iy9EUeNLBtf
RXZYMo7vZXlKp2T8Vj0x0/kGVA9FpkVJAslS3eevtlTwfY62JB/L4eZdcZYu
VzLh4BTiEFQ8VseLYT1VfTI9BwQjt88HAmBeTNmpJGUGZtJyVDx1LYQsQPCa
KkUC9JaUy+zAvhSYdIDZ5GZIkQChJrkiv72REjGV1wW6HETEOlaVAeitXWEB
ChSpaOo4+iVrk1PsYjxPcxwPBVaZE2tLNuvBYk4yt7lNE3kNdyh/tHyO+DA5
JW2dagZAgWAArEGNKYpzU0n9yK08VmiQq5aSdZCBkWQvruIUINtCFspIR3ya
hkMxGNADAyTLa0vMofWcpElJuJrYLFVdLGUrwyrQDmpW9cW9YwBA7ygZMjvX
45FRlcTQZI6sFChkNKNPYKdYI5RDpQE1U6QXQ9WooixXi+KUmVvjCyjrnNVo
dA8g4AHI3EREkdr08rVSA8simrEBI04ZX5M1FjGkN0M6RYi+bs0ysYiSJohm
EUhTqFHyJ9LcRUaCiKAwNcwBwtBywpckGC4yo6xmYRGrTEzHOZmOi6ZR9xHk
WNiETAGk90sX/C7gahbjdZ/i08ZXtFueT9E1KHcLi8nzhcwpBPKdF6mB/2mb
1Dv6AO5ShJHIxhoKaaAgSwgCOi4T7dHPyJ2wIB5TYqUwBEwxksG34bLHCEs5
aQUeJ+HYl7Ul4+l5Mj4vxBpUxluRC1RSLJsgKNSfGPSyAkL5DCNZ2ywva3TF
tclp+/skyegAXxoNk2VOK/fPkziXCtM4O+OApqUTr01LwY6VFUKZT0gVk0QQ
xXq8bQX+nDRWmGAyFU3cfk1E0cok11n6wI55uJlKfjEj7tQUdRBzOR1MxtTj
8btcoKVlHd1ExSlihMAyXKSkByiNnpCoZE3AacqKz1hFqixxrBd9iXXRgERY
/tlucHOrFd2q2FphtYzQQOOR8pIaCmXd/rvN9quRyyv777p4gk/deRZbhfOW
dAwgK9e4ppUU1bpYJCoARp1TvwD9mOrfmzQVN+RM0N5t6WQIEgvKPmPsRdkd
v6zTS9/rkMQ0GYty9RhjzYyrunVZsR1HXU7TU8aOdaXFXVHca10BDSyMnPok
hMggR9ktWiqmicz4u9aMYMnUOCnwM/uHqcryTrIsAss9WSKFH4TNiKR4UMyA
rUvgrpdCLc18Himpy/ILMGFOikARh7BCNZfKotwwfTIlbG3vZ+syRBrGghW7
pjBp0tMXGI0zx3otV7rUMUfaw1rISjgFS1YmybV0HEuCVVixSqGcQ7NQTrUg
SaVKTn0VHJlSqxiCsf/Z0WCQUaWuUyQ5Mr5cyi/U0MGQex2mreOCUX0E7REA
YEhk5nsEVb+oWQnW6LT1t+BekCZOlRChswjNchR+pQYKW3A5HYIlTtBeInNc
cqj1lV/qRUY1FNw9GQAGKFai1DCu3FkSfFEtEyjt++kVa3SFwhkydoFWCNVI
I6Uzt7HLfvRWRqcBMSUZz61ZswFwM4gScwgpxkO6upIkKiRxZ3NKcjB8EiFQ
JJOSsc0xDxbhEy/IGF30YMg4D4VhvllJwFgPvQLKEERrWINjTa3l1RpUuDzj
RFJ/rGoFAkWlSEl5QTQCIUALySc1uQFmRZrqsIG0y7JlRVgCLckSpnxRgjYJ
Yp1DxMscigp02qdW4zGoOfDly9oDGIAMbGTk24mJ2eepsutyeLGykc+l8xPF
SxL9ChpyjZlt9fpFYD9brlZXHlfa9RrtH18lgjNGTK8Kx3Uw71ZpR5KUlSgI
V+/yjYJkoFyeFR5BqYuExRnPQenQsppspnNtqS5sztjMoRBbMM9rUamyVE6M
t3v+ptE7lrQruRJAhmiizWZdmloiSt7ilApdpVcL64WZMJR0ZF/huCIdQapb
VURG193l3GkqsInMixMSUbbTWeaq9wulZ7P9hwz50gC0rk1NKL2PYjQ0lJ+R
tiruhnMTMGOLPI5YeYbXo7qOyPxPpWkKx14GENcAYjjEOgaM6xpVQ76Ug0kl
uMvaR0h3WJqjYcMUYR9KpKCoe21kkNUKsVRZLEcMezpamA7KvP4Z7r11FGHI
k3meaAuZWSqRjFnkt0eMYoOHWUaaSzVL/sFYYgjBlBicA0UXkoqwmRSt5ixW
8PLRTmBzU8Gh6BtNVFYOHcKqKFblpkpfINMm7lyyLclUTeMAFzY/Kg6lfNTK
klgAOI20JM7RLple+MT8QhleyGOnOll44rOy7SQF77PsxRw00s0dVftAUhps
WonzlWOC6JmpPmIK55OfDSVRTuGa4WqEXYMAlz4RLmKBWY/auFr0SCr9V1mq
qVq4CryMh6ZFzsAcMoNKQ7DyHw5jXTQvTjV1oViFYsJbNS21qGm/JwZT0Wae
KP278kKumsuABvyuSnjVxXWWalOYj+PWr6uoTI7P8bjO2JIKVRG14tAE5jwj
+X5p0VOAT31xZgoFUTZOCXYmF8rmKMee63EwfLNWIvH6EuMsJvasS/dd3nx9
zXB5kh2XVS0E1EzlMW6cZ1kI5UA5B124gZAuNj/HUHnIEAxYx0Iky0GhfA1y
jOiyZivROlMo2kvKCIS8l61AEWzziGv+UlO5u9KwBtQD5FowAL2ikOCoCgos
4yopLg1xGVgzXVb6XBAjIRKkISH9SCqDc5s1KXmuHu3D7WSBcNwAWsW7s5pV
OtMsoug+rAqUeMANMBB1qoI5K0qi5QIduvAtD0ZWfGXSIu15MR8FNc1b5OkY
KlBiBj2YBZLqC9mU+5N+Kh3PppVCeTKgTL6VCnwV7NpyR+VTyCEZseasyFpN
fu7tIamwP+Ll8fXyrFt4nhButFKSWdUDSfqDsp3VkCIDZlyKX/aJYutiqr1t
lSGQNzyrIUTV8jBHmK1BlBS1C2QlnK8Ku2YCcMLGKIikzrzzvazO1JFTXJ3V
WW2ALRIEqKInvAIF2UbJXcT6f5yxELMkBJE44mq0IBVS1XCmFSq1hrY+ad20
/wDlKceG39JRi7JbxsdoZtISU/86oXwHXiTuybbZwhBlg6dAD3SLa3J+JmOq
O5jjFIuCpvqxTCmzROmAccRkPJrHnBRfLnrDzaxVA8cMBkYZ9SoFVC1ZKQ0D
mWbuO5aGZzaB5LpIDSLv1rsJrulpylUIUGsC2s6sBC9SmYDVPt1d03UksB4e
RpuQGE9Y9QbbbcbTJp+H+gdW3/qhZdeEzhkQCE8X07Ml1ITMDfV2bj7sbCFD
K2q3jj81mVRNqvSxsnXmqgsZJcQcTUTSxJOopG6KL5txcSEu34LJJFTQQ0zP
4zSZkppphABMkiBWPpKpoONIdZ43HyEtyc21oFli3KyErtWEMpDYdMXxj1S7
EfQqKT9qkc6sgsh4nWm0lpU1qr0XU+lLqdIy0NbH4hYkMymppOjk0iRCs+Ul
5nFut97yfUOiZX364d0M4Tlo1Km2hWgOgy4tCUFiUxrXIaDuKrmf1KFGGxZL
gTGQoVwDje1LuTyljYQBqDbK6MHQ54Wm6mBM6CgdvqYkwm0O1MA4PSVf5KXD
iyl0TYOZyMOQSw+SeeWm0vnUkhQbWBUpLrPOfeWQ76XlEW/oh4+/WLvZF3OU
+xm+PcfLb8Xd0bI25rnQpBMT7ujuyG1OowWgDDxLxybf2gVStkKSKElB5qb/
dzc3c9x04qd5rMxNxMHEn+Fc6fyGvmds0WwRSCex9lvyOQvIlBdRTPbMeLyk
gmQkxmiEW+bUXqeyo7oUkt7EpQOVllRIkA/XVHghs2DdcbDS2BEDQ8OgYnJN
nAkxkzKgrHg486/GiR/lccM1RfBKci6XPMzo8OlqXRdpjnWN7aDL6qqDlUpT
4cPBH784xl9UWqemYfIukS9SLv9EnYpLVWTiS6ND1ZX0UG1tHhxa9cc+6eNW
ZMWeqmCtrLB8DpmussyWKOngn+b1OfH0uvA0iWXBIO0IU0MichCBvvSC32Vj
YaEB080nx0T13cWY42fPgT/4U25Ln3dE27ikgUkMwNhBkHt8MprxNGTZVRk2
ydamjf2NurQYKuX4QgQSXlvsyT80TtuuXS7tWTHP5VZrn2fxbplnJTVoDCu1
Pa6ohrDOKj7XghV7/97CnCauBZzXYOUCSjIi6VC9JuugZ1hbk9q09oEq3tcb
UF/eJiZDvqX7RtAdFTxRlkojyjP3jMkibjgvo8hoXV6IrhLVwl45cA7Hl6K5
NL1v7e4cP4A7RwWQbkufx2q2dt9kfjJHqrYIbKPxgyC998dL5synNtVPfEMN
nKps3mVqWrSfyzqjnz7FnL/z6Vd3mitKFfVzpFRuWNcn8bn49kaJmwqojaQy
e3kyhEbVLz+DDe43FcbXV9DKMV8GbPDmqWvZ2DyqipksProC6Esi3nluJQP9
k3i7tDqV9+MqvL5mtDhKk8UM3f6qvujFxUULx99K0tE9P0P5gGj1PQCKOqVE
vosBOmmkCuXSqPPtJEfGwUpmkXZ+vAAMIseK99D56PUg5kww7J1cTUAxikt7
qOiprFrqdrESGwkOWBg7FaJ5IcRZA92z4kIXief9DPPDNWvyzR/FYj5EGGDy
xpiDsJGhyIf9CFVFGbGnAyO3BR9BCiPYucTwItg+eZB+2c1imKmgnamPxgw6
7JWsahTgLGUPfLrSNuAvy6Yzcuw1iqRaJjhwiYQMHTd8/gsdB8MuruIaXEh/
oSrOHpFp2mhS84RMnmBOdkgDOFJRItCqsi98iDoNEaZGVEceaCcLWK4c5klO
amlrN5g+rGMFI8pf5AlghcW8BlY0QelMlDCz6BTc6ZVspzrZdaMchs6niQBs
VF5VHfjHA9D1jIm/wRimsT/OckGOasqTsIAhAVPtX+JDYbngcDAm1/RohEl/
8jQk6IXCtRMA9pmKXaTRNfJDS9GCixSEVE0SQXw6ziTfrCo1V4uKtUAyKnnI
U+v5iAgjPqQApyIITGwoMnB++hgTE6BHfQKGXl2286Moaf0xERncDsbRNQpb
DM63wmFA/KTyH2eYPoH53C3iH6yAcaFCjJhnh6NBQnjXUZgnvt8EeVu1gCr5
VKRGcEnN/pZhU8qIx/EdPtlYxXgc6xiUfPcTAuDSsPenAgiTxTE4NtNYDKXy
PDMFsTLNheaqTJDbQM82ckPYVjCgiQXkkVRNmdqDt9j9TRCCWxRqOFfg1ccC
0eETbDhCNUUduyrDftQyzZIMQxNk7iHoaIgY+ddTtN/N0MT+/HB3reju4m2C
xGc51+YpHZZ5iooqoV2tI0yMA7B4nxtnV82IL8Guu5Id44LxqSrGKQpk4TDL
0IfJLM7tDbor0Nd1uWpjlbSyJuvLZ7UTVgcmGxpyJLfQLjuW6mXhJRupIiNe
i2e/I+LikrODlwtipBp+q9pNqcdVOv1qmY6ztVTHMaqy1uo414n9vwVVZ4tV
HWTL1w7oc3F1n8pyr+aUOxchrW6n0+6s6acJUy0+2Griz67FHD273zfdaQnM
Sv3fAnDtjwPcnXWf8JvT0CqwKLx5Cxh49TBYTKUVkyyhIv32AII06CZlEN5v
frRCWNt6SSHcuptCeDsSdnu9MPw29cJ6aH+jemH4jeiF1relF1p31Qsbv7t6
Yd3qf6cXfqcXfqcXfqcXfqcX/rejF4Y36IV8sGAhrrxsnS8l7dxaIKs2XZLG
TF/rNVIYt6PP9Ps40YuOUGrmkSBL5DDfOl0A0aLyVOTYHvuBGDNLDGIjtjSP
efdVcKlJXjjENCdODNlPE74ukmtEL56fuJx/J3z99oUvM2hoSvrbd4LXPzvB
i1aXtPOSyBVrMtLUZIQkK1MyIrpSG2XGSaxiPCPwgRBwJtPODHml7njpeKoI
EazQaAGyQZH83EUsKkS9YQ6ySkCVeJyVmj4viZ41pLKmZZIZKYXgVFyWnm8h
F87PeM57yTBMeiTP47IvbbtpXz540NLZD5g7HFNtQ+AMFDj2TqRJJpPFZIEF
KY4CQnNU8Hdi33+zYl++jS1KnivdKRrpCjuwNipPnaC5rg/8A5iOxQjLin2/
is0gZSIOv/ka7HAkn91sj6xOW2YNfvrEKZ2UQian0wVuwXWZdx/44RkmUMii
o1geCHNp8Ms1UHF+q1DRWdSfDpc5sI4k9dOYdotED5wXBagjDQh8qotKNA0j
pmPAGCEj/Fk9ZvBimUKsi70caO5vFWgbT58+2d3aON492P8CwLe1+2B369Ph
ZxwxrMdyDQja34FgE5jiwYNvDQ5aj8yVtK/NtSiZvhSYTc1yo1Bf4AjjxlPQ
zvk4sqqLkV5q0QizZb5Gdab993U7clUNU8AX5gHwYhpR5RfzjcLyPj98ouZU
O17dGEyVp1UNS4c2ZOYC3VI2K53jcL3FoOQPNAsDXmMX2KMjvgmv6lZSprrf
cg3z88IzBrRre6jaxqCHoIafd1bjGqabdI/ekGob2RV1lkQDrlPD3X6bKihj
aTp12LQ2LXKW/5SkBRBQHr84lgf4lUK0re+bqpux9ejW0SKY53d5MRAv/ujt
xZwe0Fp8bm24b03v+XTzQEnSdTd3pvI84OIJpfd1zbk7xV/SYOvPPM1bVA9c
18guZoBRNobMJC83psb/VOnexUbuL2t4Y2ZUmqdV4tKcGDuuUeZ+8TGVo1qh
J/mhCtGSEvVsX6OeH6T+iCRefYJ3unRWG7UlU4xZwxpCB38ImtG/LArsnCAG
Gk3IxgVVD7DQzFN/MbY2fVCa/SkI1vCtFfC3H6E2IJJWJPQyUO4ulbS+b2FS
xsG+RDlMGZVCcjJVT0yTKb/KpOcOfUlyEpbJCc0XE4MyBoi57//E2k9utfG2
vuaNF/42Nt41vu7vNt53G+/b33jAtF/SgZfm6Y076gxJPND6qTzK/GB3u8TU
SazCzTnOdCFzpbpLm2aRo2MTK06r3eq2nFYH/vTg8/Hm9ori0CtHe7v5JqDK
kJ/vvqwdj8HyV0tNrsnEQuwuViWwKCdSSSA/zs/EbDabpGliks9GiMlAoF8S
smWNL+9zhqeIfrgyhFmKlfeNxgtVQYrSp8gW4k/PGpuYdWRtAVYFoKKuNx7A
3ptZR2fJGaxd4wFXjwwTaw+rfybrjYeLOBMzkuvxWgiXPk9jrALpW6/8bBH5
6w24fgb74vNULLLwlL7P47dT6xFVEIXvcXjqC0CRlvUYcCfLrxyFpxfw8Du8
AqMEHEgT0KYbB2MsIGQdizRYwLc0RtuaEGOxjgf3JdbDsY/r2/CnEdDkFIvb
W0+SiOrpiWjeaOTFeKieD1kpEetk5YFsnareLigpnR0zQyGigM5VSGroACVX
HZtnz5d9PEJR2S8/wzPqm/K597A6i6laHywLN84NjZYuVMcn2Uv0wm2MlIVS
NjCwByN1ZIqf9O3oFqgCD3aNUVIh+nliPta5TNjfZigTU+IINotTLj8SBknK
j2CP3BH1XegNADcb+1dcggptm6zEtHhqUqPRB/aQbx2JYTIV+dm4ukFAwuRC
WdSwfOmEdyZ8s61VMt2stawCzLDVvGpLpGqzqMoC7n/n2qraL2c9OmSxNdaq
vCTHhd2v6q8tsCS8X33bWnXztHmeLtoef65/GgzTH9s//aGjPjuDQdv46na8
buF2Z+ANOsYF+NbtDowLnY7X7phNdL0O/DUu9Nw2/DEu9Dtep/DEoO112p7Z
rW3bbX7EGH6DEEThc3FqXwKtXkGj8sp9y1nHL+NsDp9XxH46b2/s7F9sbext
7DxMRmfjja3558+ejgZPFqOtwdkXG1vnqYiT0Q68tbHx+ZnYerZR/dndvBqP
6m6UfqiRys/Lh4Nd/eXpRfa4dP/8NDsqNdL7fPaktofH2ZPCCLffirHx9fO3
23sbz2QjWxuvt/pP3I2dYKXxvgBL3j+1sPTdrtd1u4Oe12vbTrfdDXvtntfp
B1GvH/kiikLbseE/17ZD2/Ycv993vYFn237kDuy2sIde0Ah82w6iQXto224g
gp7v+q6N62r7A0fYA/van77dcwfdhu1d/9htfhrFr52wO/T6xWvD0A3dJV0F
wgkct1G9IULf94Kbeh8EdqAmW2ik3Y/EoNKn67ftMGQ44U/f7nruEADZtx0n
KCwgEBD3kwhI5W1r1ftYAuLeREDadycg7t0JiFshIO2PISBumYC473b2N7Z2
nm3s7CwSf3Nj82nnZPfAdoZbb3cfHe8dzeeD5PzhCbwld/nmRhDvbN5MLeTP
zmbnxcVuvvc/+edWjexu24sakvbsoeMeja5v5GDraPfZzpKb2/2dS03tbjOS
i8c7i41ltHVvc3AEjVzs1tzbSl49T4qXdjZ/9qjvjDaeXXwsxXM1xRvYTlvR
vKANNA82qIOo5Tmu8B0fyZM3FJ2Oa4uo0e70Qrcf9p2o3XbcoBsNu/0g7HZM
auPZXeE6+f4u/9TQmbofz+4NOgES4E9o5Pqfr6uRPnID/zpCDjCJel3Pv8NI
gH+414HR/BmGTruWgN/lJ7QHsOSN2/UY2r3Iu3l1/H7XWTZrgInvDMOoa0OX
YZnue59E9ytvgwLY/WTC32bCn9N5Sfg9Tecl4e9osi4Jf1eTdUn4e5qsS8Lf
zy94Hj4xqEiOtkH55aUaadLgD7DPbeQ67eIlfNErXsIXOx/DRrwyG7F3dvZH
20Dptjd2H13sTs52d3ce71xsPZ9t7WxuPjt8dHDV7jyJ4S1n521y8OyhH2yM
6sjelnO0lPrege7e+PP72sjmxnaabX2TI9lOLv0bVuDmRm79s7ubbFUR4faN
bG2ks4vPP2YkD09/dnK28W4s2W/88OTwTo1sXrY3ko3Rk9lJmcFf7PUH6cVe
sZG32cbgcm9zb+NjmbdnMG/X60vmDQzbBhG6TfS7DUzJGdouvGL3YccDTQkb
ttsB3aXvwZOe4zihCIOe8IJ+0HHctm8LIMjdwVKarim7awcdb3A7NnEDe/iU
n+8aubYREEZEcMNifjsjgYH0w47/Efjy7QG277p9e6l09okjgZbFILT9r3M6
/39pV9bbSI6k3/UrDCywO1iMt3mT+Zg6fMqHrLKryjuDQZ6ybNmydVh2/fqN
IJlJSlZND2YT3Y12iknGHR8zyaAyKgMkQThPdFCyMUrKf0HQf0KJpmWB0jAk
z6T8nad3ClLUvMxqjDY7l6kKwstCFAT+2YV25v8F7b48ffAXJv9FbMc4F9r8
HYuvtpCNCUnxTpisa6VdoxZKSQoTH4m3AvZThhKFt1ooxRKYVjG81eI/RkUi
NN5qESA1iPjwVosBjREG4BzcalGgUkraRi0MVBDqE0towIGJEoltFYCgkEZS
O2JAgpAjEmbJD1BQgvW47lr6BVVJYumnLQPwpE4sm1QF1hlL3BABxgoAka6/
lgcJTBErSNpyQbliTrYtF6ATw+yjLLz9MNDMDsvCKxJQgrTDssCFYZq7/lo2
OFNEWWkyGaRC8W0K3mvZ0EQaJ1GmI31xSew9E6QsJLFiYS0bIBOtnEG0fDDC
jOONh/fCknnN8uhVD+XM8sEjbQgt7Li85SOhlNlhectGokBWVuG8ZYMpqrVl
g+tAHjfCDRvYUJJJR3KwKQrd2WcFCSQDQrBjiGBUhDNpWRNhegGWpiwbggf6
IFbYW8GogDjumrVsgH5M4toFt1Cac0ueaNkQxlBnaMIEDVFDXbtIGxq8yjoe
iSwjke5eeIUmidF2XBm0oSBgWtZkywZHeOTatXxoDb5tx5VhdgeGIa2VyuAc
POHK9aeDdhPj/FQGdQgAczbwyJYPLkEstp0KfFBwIjuuooE+ppzKFQuiBxd0
93iQi9QubKkwRVWKMjuuCt6hgA3Lh2r5UAbygJWBavmgVHMnF2WCjmDeaflV
waygmSVFt2zAqNKpQwcnF5Q7dnWItGCSTlQ6zFq5McSagQ5mBZBWuXbBrCSE
L9cuqANAsiNZBzYAQSf+4ZYPMBftbFeHmTcEOmdXJnh5AnftsyZ6vSs90Sa8
JE7gUStTE7ycgu9bfZigD8zXVlgmBN3ECOcfJrw44Fo5YZng5sCbsro0QR8g
BKcPkwRaIIdbPpLoHQIHC7TSSqL3HUS58JcEwwIndLdaPiD8J75ZFHWJ5JaW
pOUDHFq6HJkEPozk3GW2oBDOmVNcEvRBVOJklSThHuHU5TtCAn1UapfBSdAI
00z6lkElgjiGgffoHnM5G6wi8lep/c3g7EBl4hNwCL5wT/jBW3bQ1KlwN8Nr
HXAeFxcoCQ7PKfiZS+CBIchVTho0pHVo5hJ4yOrgT9x5LQ1pHWaFSvkeAzBh
nPrkHDK7gohuHJVRaqeaCt+njlXbENTyo8F7pX884geRhgMfwdKoF1tI7xC9
DHEPs+h9Fbi0l0bI8IAgXOKmIcMzLrwv0JDiNcQ1D3JCjldCJE3LEI4Jo8pD
pBCPIfV76whpHsI7dXmUhjwPiZQqj6aC5wAicMmf8ogjmtDENw3hDMCIh14h
2QNy9ECGhnQPs3fm8gsN+R7ij+b+8aAiwGQepoWMD2HJKE998CED47ibIecL
AYp3YoqSPqMeRNCQ9QGVauoGCmnfcKUdyqUh8WvDKfUIMwAYarRyBhJSfwJq
d6mfhtwP7qs98SH5SwqJ1LdsORIaFO9ahvQPomXehUP+1wQCoSM+AABgnfqG
wegMOIcbJyAAoajHqTRAABjSm2yAAECwcSiNBgxA0WidjGScPKm32YACQAU+
o9IAA5Q03joDDADrSKRvGMEyA2jD3Yw+SCbUBWcaIQHAeS7z0AAFwGTBN/1I
URaFbOZvBg1p7SdTNMABGIh5BavIjRLl8g8NiABaGm+yESSQENL8zfDaPUk4
dQNFoCDRHgfSgAoY4FRPUoAFEAASh5ZowAVacNI8Hs3DDPcTlggYKJwUuJsB
GWhAW06gJgp0XPkoHbABI4r7yVIABxCMqE9kAR2As3GvzgAPoJ1Ufl4V4gKD
1OgfbzmSGMCcKQaEIFCdvqUJ8jSN5ANGSCDQujxPkwjsQFv3eBLNzWCu4kgK
KAFiivEqTqLZGeQIJ6UAFOz7Cn9TBuIB4/nHgx9JQzzxSfS9BIzBtwyTAsAe
3jUDWoA0TRI7EAtogZPE0c5IhHowULqbISwgBODuZjQxMH6uxQJaMEC8o4iR
2I+MB6gswAWEesJ4moKSINy4nM0CXgDREeF7DSyB5l0QYQEvcCGZ8vPnEOoS
4cMni94DSOaGCXjBgLG4yM9ohH9gTumoDHghkYIxfzMYXWIY9X1GbqRpczPk
V9C6B84sAgyI4h2X0QsB6NQlHhZBBgZB3g3PIobwfZe7ySMhKRc/WYAM4HHG
TUMZiyYMGqbx7mbQEdiV8aNHUwYAZb5lFOsgG/k+IwgEKcYxz2MIxFw+YRFk
wCmWvxn5EfiHk1KMGLhyGIoFxABJWbq0xwJigGmIn6gzHn1zbF9o8Si/Qgee
zii/Ku7lGSEGzr02AmAA80hcQmEBMAD2o36cCDAoLtwclAXAICHjK38z5FcG
OMLZQvSqAN/R+IGC1YHcvIxFNMkGwXk6gxdxQrzRBcDAtBDevANgAPxEHaxi
8QsDY7xryZgj0jweVATh101rWEAMEFgcrmHy3/q4ar58XP1+NbpgTz8fVsfL
vFyz3X8f715u6fMnHhcz/v7zWd3K6uXo+q7W6yrR88XRz3Sue6NumvZG63Xx
lKbd8erttv3Gt7pUm8EkHWg6Omu+d50uNg8b/1mrXKXtt9recPO09bmrd5sd
FWf4Ha46a39ynXRH70PxhH9/fz7bhIV9j+mmi9/cukR9bs7m/XMg7ea1njzt
//LWm0sSrSq8mt4UY9fXJD27PJ8AH8eMPzfLfQa9DX+9TUfv1aQbf77rl+uB
sB9OPx/H7/DTaLoxT/OTx/cxrmk63MzSm97V5efd/GN1Mb6/Koml+Orxex86
uTkfPQ8LT2Hvczn8ORgdFy9+ZeNoPr+dAUOnVD6N09MTeZOeTobdZJh2e+If
49vJ8f2lW0HVTZ8v1M18mH87O03Hv3qn3XSQPtSvRfNR8W39ZNrPu9nZLBm/
v//qXp320qPvz0/YSXdSjyd2Adbl1WQRxNofr84NCKNH+CSNllz2j74f3dou
Lx6vsu4AZdI/ef2Zjh5xeJDL0caNeDwFzsenvHs7BjFenbymqTo9WZz5IZaP
1R2Oe37zeoedzBff3zfBFp7Ob1aNmia9vBimRyT/cWtvzY8I2G9/ons/3dKx
QVddvo6+fFwdLOh6BF0eEXU3Ccui3vpZhRp7m1x4FXTnk9HFLNhJZvQFGjQo
dTlLd66LxdUnDjutnt4PH4rlTzKevFSqIX2S3eJ+n92Fq9HV36wOiX5/vLOj
T/qf5nxylN4OMifmsyF/B/P7Dp2UDwX6yrx70h/f9uf0FQfpnbK5gKbd+2cK
Jjicf65Rbte/Xo5HT5P7TYmrYUfrp2KWbn9wnpznF9bAd69Br16BBuOr95L9
cLLtP2noZHoRMdR9qwjppS/Hebd7LL6lp+nkqF8iEz962fcv3Z+nZ6PNDXSi
2Y/82Dr1efrwQJZNd6PJldl2116aXRC81ZPfyaiXnp7xZ3jwAzo53nyglaqX
hzHY0H33BhR7Oci/j5yCs7MBP4PnNyl5S2+7p3ev5+ns9SFPp+n1K5mOXs5x
+XIz2qR7Te3n/vJqJlrjv34c3mNMOabkZrW4fjb/6IGJXXxrZHT6OPoJnXSH
5pccOaUN+j+vIU7AwMtHguGtP3o6QZN6POl/nKZkOEnQ8Ccn/eXQrkjppqOx
gk6suCbDx8ujJZv942YyBGkO6t6gOzu+v0eKstOTR2Bospotker5r5zYIe+O
VnX6T1Yfnvf7K7+68O4++5aed0GU0MMlkAgx5IyshuT47WR82c2HZIKd3Nez
G/C19OaYPI1+XD7P4P+7Ux+GB10mX7eXFs6PHpLxxv/R/375DJ1cjRevj0fL
wTy7mfTPi6NkRMuP5Rebm1zfq/EodDfpPVwMnWk27Lzdz0bp8py9jRq19Iny
AeDtOMlRNpNhPzndZ9HQyaB7WZFoLcige30ydktNZ1f3q97PVNRj0yXHRzfQ
1ZxMTsfp1bfJ5ea5B3PawW8Ee3v2WZ7Vjz+uu7vLLLtP6vvmi9e/ocWaW0vs
9esVuuRpajimnMvvmyI5uX08DukwXS+z8W4XO5S8nZxD3OyNHj+eQmg67558
vHo59boXAzJLy1mG9vi50k78BDq5nJHB1vKYbnpoNpM2BZ/fivHkfHK7mnXj
9VSTi97FcDMYSIop4+y0V/4aT3pnxzPWWw7ICh8nQ0rPQk6+vXrYkc/xt7dq
9LTLzvmFGQ8evy0w2Xvq58XbaHA7nNxZWfYe+7cfZ7fnk5V107f81ZooeUF2
nh3h3fT41+Y5ve19G6ILNtfg8f7yZt9i2DQ1p4fvZ1k6e4BOGrGdLN5/PZ4d
Xr311uu72TCdP16b7lm60GQ5ur/rn/1MJz/GZGup8uri5RPk2bBzdHV5HiXQ
+aIgbVSb9N+uZlui759u3klQdtNJv7u+I73To7u+cy0Y8FS5pUTHp5vFaDy4
TxG/dOfrm8IZAHj6wnk6dELyp6ezydH04nzj/eJk9PmwuXnSDyK2zkm2Ks8R
cP18JFtWi2n05eqmO/x2dObF93Sa9W2bs8Xny/ZC6MTMowV2gx779VpMvv9M
oJPh6HzInjbp5Pjc7+m4PsluRrFG+qcfn/Mdg++PjuarIXT16x/QyWREr38c
dv/dVU4mWuWkc+JXOcEEJSEcpkMUkHlJs0KVZZ6r8N9O/EeuTCmTUpRKFXkl
EgW9V4moZJUUkpdS13meVLXOM5bj2wZmKtwkQe36iITkWaXdngnJcpXJ7RW+
uSirnFBcfCGqWoqw38NkNTE63tlBy1yQ7cU4jNX4xJ5Fw/g+VGrXXccA54kl
aruRJDmw1OzokJlimuzsODEFKSx9lh0tqpwVJMkIZ3ZcAYL+000qmam0sLs7
dlb0wFSPhv0kMJNlomSZo1KVuU621kMLkpOySiR0Ilitsy98g7KMqBoJFRkX
IEOBK4NNTmomMhBDZTe1wCRU1aAmSSj8WHHNpDJgBpyC9VRat3qoTKlISYHZ
xOQ63vuSs5yAnRAhiNIwG2wXr1OSwTwdukaSTanxbaZdSZdAU8YIK2iN+2Eo
yU1dMtlhBJcIuw5gYFNUCc1IDtQw+263KJjdEQRPU13hF8ZwqSzPRE22l20r
kyS6BObzmoNZMZSIBO0muE2G6JKZxhC4qAz7uu+mZLkXnbNQ4ix06yqkNFI2
wub4EStDYXQIp1WiUEfgfwY7Qb3IIliuMhlKWhhTFlRi1wKUAE9ZgRta5R0n
vkbSXCfeb2CCjauJGPSg8nrXABKSCVU2WrLsgD+qsgCbpRp+0rLhNSOytBGA
VAQMQQXXEERn8EvcSXyBYGSeuJGhi0yq3fVxmYHHK2d4GXqKiDpR+CWUx+zR
rOY5dx1aS83jX8PVcXLOec5cY5NUCavrjGpWKC7AvJOyqmJfZAT4yEWy08nv
r5rkuip5nlccF4bZyxBe5AW6pYCAAQ4fjA2G17nlFAJkq2JoSQuOG93QexpB
grIhDjg7kkmSd6T11DwDlnLHUF1UmoKnAdmaaLdnDLwkE3qfRAzJVKcomnjx
uws8qs4VGuSeK9MQv6IYW4mqArP9Es9UpsEPgF4GBAK1lEKksewakEkJQatj
xQOG9JuR3HAYl0HVOi8TrYrW6DLwbAMMb2kHPwpV9f7tdhAPMs4bxeaJzDG2
4BJErTuJdbpCqIJTx0qVaYhIEHlMmRDpdFACD7j2t2URojG3Ec5AxO+Q0mlc
GAkaNyRRicGdNNC+ziDagZqKjMbUoRvXZbNRAzJF0tFmW5S1KXIl3PjgjAI8
MivqJC/qwgYBUYgqlh/YDARqCD51Ac1ECEKClIZDKnDjAl/tVsUSRtTOv0yh
SY3PQCe54aUzIsiF6PBlI3thNyk1oxoIygUAhKLMZF1CdMhtXhK6YJDQKWRV
BUJLnMAgUnGUAAZrmTtZMHg8LxtKpZC5rOMA8U8cMCMFz3VgUkoQOsf7uInJ
KbtECimERzRFcO28BNsE0wFBAQVWCkrWiaTONoUNh/hdVlnDxJ+ZBwIdx71W
FSh4Pz3S2A060cUlmJCpBKQdxUFMHcqMjaKABwoKrbnUmua/38ZkSK10JpIv
MkHgJApW7XpzluA6EdAxoqdku+MazKUJ6R27UQhis/sTNQfZlf1ZcBAleHab
uzvRDzUtw9YpwHsABiE5Ew4yAdRFQfCQu3AwZkrQBuoNwgfhEE8Sw2oOKvmT
XblAeZGAWdaAEnixnWK3Ezq6RfF7mIWMU9EwXmfC75jtoLcC+rU/QEQvaFEL
jZ+aDNna2ouLdIvfmMFvLBasjrmsDLCipsluiM7QabbTKOStgtrEoJX0PwGM
0nlrLyUpcUXbXjoAWtR5gYFiS6WZ5AaCDkQryUqIEV9Xq2M8MwXqDMCQ7kib
YSBQcoxVBgFFiSAIoKcPCiXJASnsMGTAtrOGsi8yAQ1lOtmvIQgJEIbw2z2A
Zx3adBoxZmBtAMUNlU08hUe4BIgkBfCVNzE1S/Ks8eySgRkqP8tw4qE5t0AG
DIEzHxy3BAiuy+U+4e6wAxOPOquZBKlKo+LN1zqrIElzpisOyCarIPMkuIPP
AIsdEDDQD6izZIWgiRT4GQn3hZUh2sZXLoqkZjE9VHQq1MqOGCtAe0W5nQnB
EQFO7E+2nQLVXe43I8iMFMguMZXhluoQ37B/6JK2MlEABTLwYiOUaHanK5PD
rCXYBgbtrG6G4kLBDBHDhASRsHxrI6QGgRgNCApAxr6d/QB7MkiKVtmQaBgv
28gWX4JpDkRC8C/ARgOT4IbK8EZKCSjQgdCWnebiZc1wA89Ot5DEYOahcQk2
pFOYamastvkHYihMRjFI+k4gMmZC7tsWAoIHc/6d4MEKQHwdlDiMxmsgD6y8
1LXZLl/R+Y+24OPByXS5mi8+95fIOSQaqyFmZblTpcnXpMZ6PgusRzS239IO
TpfLdbU4CIVfbM2i0h40hZ1gnf1nGLb0vWC1EywFdFMt57N1W1P/2wJrgV+0
FQ7901VTPegJHrGlltytZdvXB0R8W/MwHBCPBYez9/nU1/eKDq0/DdWg4Jmq
nIIcsFxwYWsw2XpOwN3z9GU+m08+LWG7tTmX8GAxyxZYIhkLt2bFTpGug2wx
X2MF7ZfqYIVnfGGhrfgsJ9+JLazui9t40dldE64apK3cUlavyP1LARxFT7gt
Fa4+GJa9eli/PH3tYukftyVnX77w8V9L7G+6+DzAOl5e3MuH+WJ1iHWGSk9o
U37nJnN1ubAldIOFrv2I4XSMi2r1MC+XobgTELfbKPyKcvRiz5ZRCar809X8
dFXake3n14fMysPVp25KTKF29mpg6WvKv77OYhqGTcn7l7k/08Z9Dg5nwaCQ
y2ltBbWytf/XL7Ppy1NTjC2vVpsKlONs/vDm2lnINfyfF6A9VGG1WxIpquM+
i8si+YfcEQpguPB3U1atqejeWNO+crBNn6uoVLo9n2Lpj3xbOPEiCXuftw4V
qz4Id0egTfEt7Oo5Kw5cMT8wsNn809Xb+u/f6aJuKqXH5C5dBa7lemktvITH
6+nHQVxoFegASX6s0ALDISfOLKG5r59kA8MixBJobMst+4qz6xl4DsQ0hTEN
jwnZORAA+29EbmsmuT+AlzkMtl60fjctpqvZZzuqs8RIpVPrTiCltlSTPxDG
FS8rFp+vq/lkkb0+TLEm9qeTdFW2zRZL61mb+eIJq0jhyQbTZxjXHoIxxdpw
5boIR5DkyEOBFtPUa8cDURqSsPSVtwV7gAcMZM9HWDbKts1+X9zWF6Z99gVu
LWXPeARFe5qgOx9gefAXLKH1hyuSNa9jkTRDectx2eN5+oHxKJaci8iO2lCK
0BlEcwKELcffBgSvo8ka1Iwh1bvIajXzY+7+ErF40NbvBauQTaZrTztYrl9f
0Q/QaB9smkR1tVVvw+D2bbk9YtPVqLNlC/F3UJo9rKPhe/4Sl2x2bDbqrJpI
Fx2RM20Et51f8bGdBHuwmM+qrbMcfHH/2Fr+iPKZ7/jLGabTRemOKDh4mC9X
vlTa/kgQLAFvgwmisVhn+JrC7OkeWOrMnqlycJH2UOaikflzf9huIcyWX2tg
I8c4yNx6sz1n1d6zkm/OB2hYwl6e25MntvMxSrVf1dl6tvJnRvwVsNAa8UAa
DrSJBGx5GEPCCfF5T5q3tR9RWPbnlT28IENMMF/Ni/ls+WcPz/NltXhvUgue
y7Ne2RbL4Dl7Y7Fl0J00AFqzJCDxZdUmFa8ifzaCxXwucK+KB2w+XS697U6/
AoMvkvjmI66lqcT6w4fvRaM6H7hROVFQwZNX4ywXkJZ1at9Z7+pmvMucN2Eb
zKJS2zhGwFAgrJhAYMIahTNr13m1FeQsfY5jzBdNgsQ0goLCbKbEejGLfNlS
EvkOmC7vxIHQHnWxdUbnzVEvwa0hjrvdNGRVEAe+JpOFaLCLE+K41YIUS8Ms
+4jVG3fuGC7c+cxNVVQQkcvBoRZui7/wEM8vGbZ1TTzQp/pwueQFvNmmSrhj
ybAEHHwbjh3isoVXK29kkYb+asPAbnHIxq68RJF5CNa+4OfrwwIP0InbR+bg
H7FWUmTeqMHTAfUvmmLkL9UGU4KTRATarZDXuTeHHVMKNKGEY4Giz3yROJgV
ND6yieoZWthwkOERh//p0AYSsIU4prYYclu4Ec2KNRGxpXYXtDq/dLp8B/v1
LO+3hPleuNRwD4EQzzQ6+OPg12ya2zMXsXyuC+32yKY9B896vHsyn4GjHt5V
C1fF9xlQxsxKsH+Ixxff9VrHHg/+ADb/2PqmjLzSjp2r2fnDChBVe1xOucjq
JvOV9qynnYi5J7eFIvgN7GmEtwcyhtPMFtUhZqSAS7fwf1q6M7HCETKR3261
XGAlYKBkvfCe25xZ05R3bk672QIZ/nSc9QIDbcBTkbobttzstdWPQ0KTX9NX
7AK1F/gHxGSZ3jOPbC09Agqezcyex+XFky3daV/tnv5DPMEKdUZQZ83BOlZP
/oQ6xKpIpD+Tr5w3nXuMlO2U5G1mjuVBa0IYNaOZ+2cbvK0KtqFH52//64Y/
xJPuDt35d04xtlTrwd/+3pqYrWMN3YTE43GZ8xF/aJmbbTZ1d20Z3v/Zz3Hn
/wCLNlVyEqoBAA==

-->

</rfc>
