<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.5) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-vcon-overview-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="vCon Overview">The vCon - Conversation Data Container - Overview</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-vcon-overview-00"/>
    <author fullname="Thomas McCarthy-Howe">
      <organization>Strolid</organization>
      <address>
        <email>thomas.howe@strolid.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="20"/>
    <area>Applications and Real-Time</area>
    <workgroup>Virtualized Conversations</workgroup>
    <keyword>conversation</keyword>
    <keyword>vcon</keyword>
    <keyword>CDR</keyword>
    <keyword>call detail record</keyword>
    <keyword>call meta data</keyword>
    <keyword>call recording</keyword>
    <keyword>email thread</keyword>
    <keyword>text conversation</keyword>
    <keyword>video recording</keyword>
    <keyword>video conference</keyword>
    <keyword>conference recording</keyword>
    <abstract>
      <?line 142?>

<t>A vCon is the container for data and information relating to a real-time, human conversation.
It is analogous to a <xref target="vCard"/> which enables the definition, interchange and storage of an individual's various points of contact.
The data contained in a vCon may be derived from any multimedia session, traditional phone call, video conference, SMS or MMS message exchange, webchat or email thread.
The data in the container relating to the conversation may include Call Detail Records (CDR), call meta data, participant identity information (e.g. STIR PASSporT), the actual conversational data exchanged (e.g. audio, video, text), realtime or post conversational analysis and attachments of files exchanged during the conversation.
A standardized conversation container enables many applications, establishes a common method of storage and interchange, and supports identity, privacy and security efforts (see <xref target="vCon-white-paper"/>)</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://vcon-dev.github.io/draft-ietf-vcon-vcon-overview/draft-ietf-vcon-overview.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-vcon-overview/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Virtualized Conversations Working Group mailing list (<eref target="mailto:vcon@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/vcon/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/vcon/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/vcon-dev/draft-ietf-vcon-vcon-overview"/>.</t>
    </note>
  </front>
  <middle>
    <?line 150?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The generation of conversational data, contained in transcripts and multi-media files, is common in business, especially in customer facing organizations.
However, the storage, analysis and sharing of the data they contain is not currently a standard, hampering efforts for both system interoperation and responsible data handling.
Standardizing a container for conversation data (vCon) has numerous advantages, and enables the management of the conversation's content.</t>
      <t>Often the system providing the communications service, the consumer and/or owner of the communications data and the communications analysis services are distinct systems and in many case separate business entities.
vCons provide a standard means of exchanging communications data between these systems and services.
The use of vCons can ease service integration by using a common container and format for enterprise communications, becoming the standardized input to communication analysis tools and machine learning and categorization.</t>
      <ul spacing="normal">
        <li>
          <t>For organizations in dialog with customers or citizens, a vCon can be the container of where  conversations are stored and personal data protections are expressed, managed and governed.</t>
        </li>
        <li>
          <t>For conversations of record, the vCon can be a legal instrument, providing a testable expression of conversational fact, while enabling conversational trust and transparency.</t>
        </li>
        <li>
          <t>For machine learning efforts, vCons can track what information was used in the training of models. As the result of a customer right to know request, an accurate answer to how their data was processed can be derived and communicated, and as the result of customer correction or deletion request, the responsible organization can properly and ethically respond as required by governing law.</t>
        </li>
      </ul>
      <section anchor="whats-in-a-vcon">
        <name>What's in a vCon?</name>
        <t>A vCon contains four major categories of data (parties , dialog , analysis and attachments), with descriptive identifiers and metadata (unique id, timestamps, subject and summaries, references to related or earlier versions of the vCon), inside a JSON container that can be signed and encrypted.
The parties portion allows for an expanded set of data from a typical call detail record (<xref target="CDR"/>), with identifications of the participants or parties to the conversation.
The dialog portion contains a set of multimedia and media type elements, each representing the actual, physical conversation in original media form: text, audio, video and imagery.
The analysis portion contains data derived from the party and dialog portions, intended to carry items like transcripts, translations, summaries, text to speech, sentiment analysis and other semantic tagging.
Finally, the attachment portion contains any other documents, such as slide deck or sales lead information, expressions of consent or authenticity, which provides context and support for the conversation itself.
In addition to these four major categories, the vCon itself has metadata, such as unique identifiers, timestamps and references to other vCons through redaction or grouping.  The vCon may also contain integrity checking information such as the issuer of the vCon and tamper-proof features such as signatures.</t>
      </section>
      <section anchor="data-responsibility-privacy-vs-utility">
        <name>Data Responsibility: Privacy vs Utility</name>
        <t>Since vCons are designed to carry conversational data between systems, they must provide the ability to balance the utility and sensitivity of the information they contain.
The transmission of information outside of a security boundary does not release the controller of the data from the responsibility of handing personal data.
vCons enable the best practices of personal data management through approaches such as data minimization, consent validation and integrity protection.</t>
        <t>The parties section carries significant privacy implications and responsibilities; the very definition of the sensitive biometric data addressed by the GDPR.
Each party identified in a vCon represents an individual or entity whose personal information is being captured and potentially shared.
The vCon creator and any subsequent processors of the vCon have a responsibility to ensure that the collection, storage, and sharing of party information complies with applicable privacy laws and regulations (such as GDPR, CCPA, or other regional privacy frameworks).
This includes obtaining appropriate consent for data collection, implementing data minimization practices, and providing mechanisms for data subjects to exercise their rights regarding their personal information.</t>
        <t>At the same time, the conversations defined by the vCon carry the most authentic and important data in many scenarios from healthcare to commerce; a powerful addition to any data set.
To enable adoption, the JSON format implemented by the vCon is the lingua franca of modern software; a frictionless integration to applications that require the human conversation.
It is expected that JavaScript handling of vCons in the front end and RESTful interfaces and back end platforms will be used for operations and manipulation of vCons.
Many media analysis services which will be used with vCons, such as transcription, already use JSON based interfaces.
For these reasons, JSON has been chosen for the initial format binding of vCons and the scope of this document.
Other bindings (e.g. <xref target="CBOR"/> or <xref target="CDDL"/>) may be consider for vCon in the future in other documents.</t>
        <t>For most application architectures, JSON objects are created by applications, for applications.
However, most of the initial set of use cases for differ from this established pattern, and are expected to be in the interchange between front end and back end application and lower layers of the network stack, critical for enablement of analysis of conversations.
Thus, the contents of the vCon, if not the vCon itself, are generated by various and diverse network and communications elements like SIP user agents and SMTP servers, and then delivered across networks, and sometimes across security boundaries.
This diversity of conversational data creates difficulty in creating unified views of customer conversations, especially as they traverse conversational modes.
By providing a common mechanism to describe conversations, appropriate to the various network elements that create them, enables new scenarios and usage kinds.</t>
      </section>
      <section anchor="use-cases-and-requirements">
        <name>Use Cases and Requirements</name>
        <section anchor="contact-center-use-case">
          <name>Contact Center Use Case</name>
          <t>Contact centers typically handle customer interactions across multiple communication channels including voice telephony, web-based chat systems, electronic mail, Short Message Service (SMS), and video conferencing platforms.  Each interaction channel generates conversational data that is often stored in disparate systems using incompatible formats, creating operational challenges for organizations seeking to maintain comprehensive customer interaction records, perform cross-channel analytics, or implement consistent privacy management practices.</t>
          <t>A vCon-based implementation addresses these challenges by establishing a standardized container format for each interaction while maintaining referential relationships between related conversations.  When a customer interaction spans multiple channels (e.g., initial web chat escalated to video conference with email follow-up), each communication system generates a vCon containing the conversation parties, dialog content, automated analysis results, and relevant attachments.  These vCons are linked through common case identifiers and sequential references, enabling downstream systems to reconstruct complete customer interaction timelines while preserving the integrity and context of each individual conversation component.</t>
          <t>The implementation of vCons in contact center environments provides several operational benefits: unified customer journey tracking across all communication channels, enhanced analytics capabilities through standardized data formats, simplified regulatory compliance through consistent consent tracking and audit trails, efficient privacy rights management with granular data deletion and redaction capabilities, and improved quality assurance processes through comprehensive evaluation of multi-channel customer service interactions.  This standardization reduces operational complexity while ensuring compliance with applicable privacy regulations.</t>
        </section>
        <section anchor="messaging-use-case">
          <name>Messaging Use Case</name>
          <t>Healthcare organizations providing patient communication services across multiple messaging platforms including SMS, secure patient portals, electronic mail, and integrated telehealth systems face significant challenges in maintaining complete medical communication records while ensuring compliance with healthcare privacy regulations such as the Health Insurance Portability and Accountability Act (HIPAA).  Patient conversations frequently span multiple communication channels over extended periods, resulting in fragmented medical records that impede clinical decision-making and complicate regulatory compliance efforts.</t>
          <t>A vCon implementation in healthcare messaging environments employs privacy-preserving design principles including explicit consent management, data minimization capabilities, healthcare-grade encryption standards, and role-based access controls.  Each communication channel creates a vCon instance containing conversation participants, message content, automated analysis results, and relevant medical attachments, while maintaining integration pathways with Electronic Health Record (EHR) systems.  This architecture enables authorized healthcare providers to access complete patient communication histories for care coordination purposes while implementing granular privacy controls to protect sensitive health information in accordance with applicable regulations.</t>
          <t>The deployment of vCons in healthcare messaging systems delivers measurable improvements including comprehensive patient communication records integrated with clinical data systems, enhanced privacy protection through granular control mechanisms for sensitive health information, improved care coordination between multiple healthcare providers, built-in regulatory compliance capabilities with automated audit trails and consent management, and enhanced clinical decision support through access to complete patient communication context.  This standardization enables healthcare organizations to improve patient care delivery while maintaining strict privacy protection and regulatory compliance requirements.</t>
        </section>
        <section anchor="ecrit-emergency-context-resolution-with-internet-technologies-use-case">
          <name>ECRIT (Emergency Context Resolution with Internet Technologies) Use Case</name>
          <t>Emergency services organizations require rapid access to comprehensive situational information during crisis response operations.  Traditional emergency communication systems create information silos where critical multimedia content, geographic location data, and inter-agency coordination communications are distributed across multiple systems and jurisdictional boundaries.  This fragmentation delays access to vital operational information, complicates multi-agency coordination efforts, and produces incomplete documentation for subsequent legal proceedings and incident investigations.</t>
          <t>A vCon implementation for emergency services enables real-time creation and maintenance of linked conversation containers that capture initial emergency calls, multimedia updates from incident witnesses, location tracking data, multi-agency coordination communications, and post-incident investigation records.  Each vCon contains conversation participants (emergency callers, dispatchers, response personnel), dialog content (voice recordings, text messages, radio communications), automated analysis results (emergency classification, resource requirements, incident reconstruction), and relevant attachments (photographs, videos, location coordinates, official reports).  Critical operational features include real-time vCon creation and updates, priority processing mechanisms, cryptographic integrity protection, and secure multi-jurisdictional information sharing capabilities.</t>
          <t>The implementation of vCons in emergency services environments provides operational improvements including complete situational awareness for emergency response personnel, reduced response times through expedited access to critical information, enhanced inter-agency coordination through standardized information sharing protocols, regulatory compliance through complete tamper-evident record keeping, and improved public safety outcomes through enhanced information management capabilities.  Integration with existing emergency services infrastructure including Computer-Aided Dispatch (CAD) systems, Geographic Information Systems (GIS), and Next Generation 911 (NG911) platforms ensures that vCon implementation enhances rather than replaces current emergency response capabilities.</t>
        </section>
      </section>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>An outline of the vCon requirements derived from the explored use case follows:</t>
        <ul spacing="normal">
          <li>
            <t>Standardize container for conversational data exchange</t>
          </li>
          <li>
            <t>Consolidation of data and information for a conversation</t>
          </li>
          <li>
            <t>Multiple modes of communication, changing over time</t>
          </li>
          <li>
            <t>Snapshots of conversation during or once completed along with analysis</t>
          </li>
          <li>
            <t>Ease of integration of services and analysis</t>
          </li>
          <li>
            <t>Better organize conversational data so that it can be handled in a consistent, privacy safer means</t>
          </li>
          <li>
            <t>Immutable</t>
          </li>
          <li>
            <t>Hiding of PII or entire conversation</t>
          </li>
          <li>
            <t>Amendable with additional information and data elements</t>
          </li>
        </ul>
        <t>Define a standard for exchange of conversational data in a sea of modes, platforms and service offerings for conversations.</t>
        <t>Example conversational modes and protocols:</t>
        <ul spacing="normal">
          <li>
            <t>SMS</t>
          </li>
          <li>
            <t>MMS</t>
          </li>
          <li>
            <t>JABBER</t>
          </li>
          <li>
            <t>SIMPLE</t>
          </li>
          <li>
            <t>Proprietary web chat</t>
          </li>
          <li>
            <t>SMTP</t>
          </li>
          <li>
            <t>PSTN</t>
          </li>
          <li>
            <t>SIP</t>
          </li>
          <li>
            <t>WEBRTC</t>
          </li>
          <li>
            <t>Proprietary video conferencing</t>
          </li>
        </ul>
        <t>The following  are considered not in scope or non-requirements:</t>
        <ul spacing="normal">
          <li>
            <t>Real-time streaming or updating of conversational data</t>
          </li>
          <li>
            <t>Transport mechanisms</t>
          </li>
          <li>
            <t>Storage or databases specifications</t>
          </li>
          <li>
            <t>Methods of redaction of text, audio or video media</t>
          </li>
          <li>
            <t>Validation of redactions or appended data beyond the signature of the domain making the changes to the conversational data (e.g. Merkle tree like redactions)</t>
          </li>
          <li>
            <t>Standardization of analysis data formats or file media types</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>analysis - analysis, transformations, summary, sentiment, or translation typically of the dialog data</t>
          </li>
          <li>
            <t>conversation - an exchange of communication using text, audio or video medium between at least one human and one or more bots or humans</t>
          </li>
          <li>
            <t>consent - explicit permission granted by a party for the collection, processing, or sharing of their conversation data</t>
          </li>
          <li>
            <t>data minimization - the practice of limiting the collection and processing of personal data to what is necessary for the stated purpose</t>
          </li>
          <li>
            <t>de-identification - removal of all information that could identify a party in a conversation. This includes PII as well as audio and video recordings. Voice recordings might be re-vocalized with a different speaker.</t>
          </li>
          <li>
            <t>dialog - the captured conversation in its original form (e.g. text, audio or video)</t>
          </li>
          <li>
            <t>encrypted form - encrypted JWE document with the JWS signed vCon form contained in the ciphertext</t>
          </li>
          <li>
            <t>file - a data block either included or referenced in a vCon</t>
          </li>
          <li>
            <t>object - JSON object containing key and value pairs</t>
          </li>
          <li>
            <t>parameter - JSON key and value pair</t>
          </li>
          <li>
            <t>party - an observer or participant to the conversation, either passive or active</t>
          </li>
          <li>
            <t>payload - the contents or bytes that make up a file</t>
          </li>
          <li>
            <t>PII - Personal Identifiable Information</t>
          </li>
          <li>
            <t>PII masked - may include voice recordings, but PII is removed from transcripts and recordings (audio and video)</t>
          </li>
          <li>
            <t>redaction - the process of removing or obscuring specific content from a vCon while maintaining the overall structure and integrity</t>
          </li>
          <li>
            <t>signed form - JWS signed document with the unsigned vCon form contained in the payload</t>
          </li>
          <li>
            <t>vCon - container for conversational information</t>
          </li>
          <li>
            <t>vCon instance - a vCon populated with data for a specific conversation</t>
          </li>
          <li>
            <t>vCon instance version - a single version of an instance of a conversation, which may be modified to redact or append additional information forming a subsequent vCon instance version</t>
          </li>
          <li>
            <t>vCon syntax version - the version for the data syntax used to form a vCon</t>
          </li>
        </ul>
      </section>
      <section anchor="inline-vs-externally-referenced-files">
        <name>Inline vs Externally Referenced Files</name>
        <t>Due to the size and complexity of some portions of a vCon, both inline and externally referenced dialog, analysis, attachments and other vCon reference assets are supported.
For instance, vCons may reference a video conference media recording as an external URL with an accompanying content hash of the contents to detect tampering.
Alternatively, vCons may directly contain the media of the entire dialog internally, keeping the conversation in one place, and optionally encrypted.</t>
      </section>
    </section>
    <section anchor="vcon-json-object">
      <name>vCon JSON Object</name>
      <section anchor="a-conversational-definition">
        <name>A Conversational Definition</name>
        <t>vCons define conversations, and are created by systems during and after the conversation itself.
vCons provide ways to express and define the contents, participants and context of a particular conversation.
Unlike some measurable physical phenomena, like mass and volume, conversations are heterogeneous, relatively complex and contain relevant information outside of the physical phenomena, such as consent and provenance.
Some communication modes, like SMS texting, lack natural session boundaries and require explicit definition.
Thus, the definition of a conversation requires more than a simple scalar value, or a series of samples of a time-based waveform.
The definition of a conversation enables tools and systems to precisely identify, responsibly manage, efficiently process and accurately govern their use.</t>
        <t>vCons also enables the definer of the conversation to express the scope of the conversations.
A vCon may contain any combination of content appropriate to the use case:</t>
        <ul spacing="normal">
          <li>
            <t>A vCon may be a single audio recording, or a complete conversational journey from a text message, to a resulting conversation and a followup email.</t>
          </li>
          <li>
            <t>A vCon may represent a conversation between two people, a conversation between a person and a machine, or all of the conversations between customers and a contact center team.</t>
          </li>
          <li>
            <t>A vCon may be sent in response to a Right To Know request to a single customer, or to a governance body during an audit</t>
          </li>
        </ul>
        <t>None of the major parts of the vCon (parties, dialog, attachments and analysis) are required to be present, to maximize the conversations that can be expressed.
For instance, a recording without a parties definition is a valid expression of a conversation without defining the people involved, either because it is unknown, to be discovered through the analysis of the recording, or to be hidden for data minimization reasons.
vCons may have two or more parties involved, but since a fundamental role of the vCon is to define and protect the data it contains, at least one should be, in the words of the GDPR, a "natural person."
For instance, an interaction between a bot and a human is an appropriate scope for vCons, but a conversation between two bots would not.</t>
      </section>
      <section anchor="parties">
        <name>Parties</name>
        <t>The parties section in a vCon serves as the container for all participant identity information involved in the conversation.
Structurally, it is an array of party objects, each of which can include various attributes such as telephone numbers, email addresses, names, and even structured contact information (like civic addresses and geographic coordinates).
The purpose of this section is to provide clear attribution of every interaction by documenting who participated in the conversation.
This not only supports accurate record-keeping but also enables accountability, context, and subsequent analysis of the conversation data.</t>
        <t>For example, as defined by the vCon standard, each party object may contain fields such as telephone numbers, email addresses, participant names, and more detailed address and identification data.
This detailed structure ensures that each participant can be uniquely identified and that their roles (such as agent or customer) are clearly established within the conversation record.</t>
        <t>The identification of parties serves multiple purposes beyond simple attribution.
It enables proper consent management by clearly identifying whose data is being processed, supports data subject rights requests by providing a clear mapping of individuals to their conversation data, and facilitates compliance with privacy regulations that require organizations to track and manage personal data throughout its lifecycle.
Additionally, the structured nature of party identification allows for consistent handling of privacy-related operations such as data deletion, anonymization, or redaction requests across different systems and jurisdictions.</t>
      </section>
      <section anchor="dialog">
        <name>Dialog</name>
        <t>The dialog section in a vCon captures the actual conversation content that occurred between parties. This is the core of what makes a vCon valuable - it contains the real communication that took place, whether that was spoken words, text messages, or other forms of interaction. The dialog section serves as the primary record of what was said, when it was said, and who was involved in each exchange. Dialogs contain the "ground truths" of the conversation.</t>
        <t>Each dialog entry represents a distinct communication event within the broader conversation. This could be a single text message, a phone call, a video conference session, or any other form of communication. The dialog section maintains the chronological flow and context of the conversation, preserving not just what was communicated, but the timing and sequence of exchanges that give meaning to the interaction.</t>
        <t>The identification and tracking of dialog content serves critical privacy and compliance functions. The structured format enables precise identification of which specific conversations contain personal information, allowing for targeted data subject rights fulfillment such as selective deletion of specific dialog segments rather than entire conversation records. The timestamp and party reference metadata provide essential context for privacy impact assessments and data retention decisions. Additionally, the content hash mechanism ensures data integrity while also enabling verification that external content has not been tampered with, which is crucial for maintaining the trustworthiness of conversation records in legal or compliance contexts.</t>
        <t>The purpose of the dialog section is two-fold:</t>
        <t><strong>Content Representation</strong>: It accurately captures the details of any conversation exchange—be it spoken words, text messages, or other communication types.
This ensures that the exact sequence and content are archived in a standardized format.
The content appropriate to dialogs are any of the times and places where personal data is communicated and recorded: audio, video, email, fax, rich emails as examples.</t>
        <t><strong>Interoperability and Analysis</strong>: The dialog's structured format supports further analysis (such as transcription or sentiment analysis) and ensures that conversations can be reliably exchanged between systems. By storing metadata like timestamps and participant references, the dialog section also enables the reconstruction of events (such as when participants join or leave a conversation) and aids in analytic processing.</t>
        <t>In summary, the dialog section is critical for recording, storing, and later analyzing the actual conversation data within a vCon object.</t>
      </section>
      <section anchor="attachments">
        <name>Attachments</name>
        <t>Attachments carry the context of the conversation; storing supplemental files and data that support the conversation record.
In the vCon, attachments are designed as an array of opaque objects.
They can be documents, images or any valid mediatype that can serve the proper analysis and comprehension of the conversation by providing context.
In them, they may contain expressions of consent, references to content authenticity, authorization receipts and business tracking objects.</t>
        <t>In parallel with each opaque object is a set of metadata that enables semantic understanding of the contents without the exposure of the underlying data.
Attachment metadata contains information such as the type of data it contains, the party or dialog it refers to, and whether or not the data is contained in the attachment itself, or is referenced by external network identifier.</t>
      </section>
      <section anchor="analysis">
        <name>Analysis</name>
        <t>The analysis section of a vCon contains processed insights and derived information from the original conversation data,
serving as a bridge between the raw conversation data and business intelligence applications.
The analysis section increases the utility of the conversation record by transforming raw dialog data into meaningful information.
This can include automatically deriving summaries, measuring sentiment, extracting key topics, and identifying action items.
Such insights are pivotal in generating business intelligence, facilitating quality control, and supporting various applications where actionable information from conversations is crucial.</t>
        <t>Analysis data represents a significant privacy consideration as it often contains processed personal information that may reveal insights about individuals beyond what is explicitly stated in the original conversation.
This includes inferred characteristics, behavioral patterns, emotional states, and other derived information that could be considered personal data under privacy regulations.
The vCon creator and processors must ensure that any analysis performed complies with applicable privacy laws and that data subjects are informed about what analysis is being conducted on their data.</t>
        <t>The "Right to know" principle is particularly important in the analysis section, as individuals have the right to understand what information is being derived from their conversations and how it is being used.
This includes transparency about what types of analysis are being performed, what insights are being generated, and how those insights are being applied. Organizations processing vCons must provide clear information about the analytical processes being applied to conversation data, including the purposes of analysis, the types of insights being generated, and how those insights may be used to make decisions about individuals.</t>
        <t>The analysis section enables organizations to extract value from conversations while maintaining accountability for how personal information is processed.
By clearly documenting what analysis has been performed and linking it back to specific dialog segments, the analysis section supports compliance with data subject rights requests, enables audit trails for analytical processes, and provides transparency about how conversation data is being transformed into business intelligence.</t>
      </section>
      <section anchor="relationships-between-vcons">
        <name>Relationships between vCons</name>
        <t>Relationships between vCons may also be defined, either through grouping, redaction or through appending past vCons.
Groups of vCons can be expressed, to indicate general interlationships.
Redactions are at the heart of data minimization, a primary technique of personal data protection.
vCons enable the sharing of limited data through redaction, while retaining the ability of systems to guarantee the accuracy of the redaction itself.</t>
      </section>
      <section anchor="appended-use-cases">
        <name>Appended Use Cases</name>
        <t>A vCon will often evolve over time.
It is not always created with all of its metadata, conversation media, attachments, and analysis at once.
There are several reasons for this:</t>
        <ul spacing="normal">
          <li>
            <t>Different components of the vCon may be produced by different application platforms or entities.</t>
          </li>
          <li>
            <t>The vCon may pass across multiple trust boundaries during its lifecycle, with entities on either side contributing content.</t>
          </li>
          <li>
            <t>Each of these entities may wish to sign the vCon to attest to its integrity or to the authenticity of their contributions.</t>
          </li>
        </ul>
        <t>Once a vCon has been signed, it becomes immutable.
Any modification will invalidate the signature.
To address this, a new vCon can be created containing the updated or additional content.
This new vCon can reference the previously signed version, preserving the integrity of the earlier state while allowing the overall conversation record to evolve.</t>
        <t>This approach can also be applied even when a vCon is unsigned, for scenarios where maintaining a historical snapshot is important.
For example, an application may wish to preserve a point-in-time representation of the vCon at a significant stage in its lifecycle.</t>
        <t>There are two competing requirements in this use case:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Ease of use and access to the latest version of the vCon</strong></t>
          </li>
          <li>
            <t><strong>Data size minimization and normalization</strong></t>
          </li>
        </ul>
        <t>For ease of use, it is often desirable to work with a fully composed vCon that contains all prior and newly added or updated content.
This has sometimes been referred to in vCon discussions as a "deep copy." Such a vCon requires no special handling, redirection, or reconstruction.
It contains all relevant information in a single, self-contained structure.</t>
        <t>However, this approach introduces duplication and increases document size.
To address concerns around efficiency and data normalization, a more compact representation using <em>patches</em> or <em>incremental updates</em> may be preferred.
This method allows changes to be recorded relative to earlier versions, reducing redundancy.
Additionally, it enables labeling or referencing specific stages in the vCon's lifecycle, offering a flexible way to manage changes.
In vCon discussions, this method has been referred to as representing <em>incremental changes</em>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The JSON form of a vCon is contained in a JSON object in one of three forms:</t>
      <ul spacing="normal">
        <li>
          <t>unsigned - for internal use or trusted environments where data integrity and authenticity verification are not required</t>
        </li>
        <li>
          <t>signed - for scenarios requiring data integrity verification and authenticity confirmation without encryption, enabling tamper detection while maintaining readability</t>
        </li>
        <li>
          <t>encrypted - for sensitive conversations requiring confidentiality protection, ensuring that only authorized parties with proper decryption keys can access the conversation content</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA considerations.
They will be addressed in other vCon documents.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3339">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="GEOPRIV">
          <front>
            <title>A Presence-based GEOPRIV Location Object Format</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an object format for carrying geographical information on the Internet. This location object extends the Presence Information Data Format (PIDF), which was designed for communicating privacy-sensitive presence information and which has similar properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4119"/>
          <seriesInfo name="DOI" value="10.17487/RFC4119"/>
        </reference>
        <reference anchor="GZIP">
          <front>
            <title>GZIP file format specification version 4.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1952"/>
          <seriesInfo name="DOI" value="10.17487/RFC1952"/>
        </reference>
        <reference anchor="HTTPS">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="IANA-COSE-ALG" target="&lt;https://www.iana.org/assignments/cose/cose.xhtml&gt;">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JSON">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="JWS">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="JWE">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="JWK">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="MAILTO">
          <front>
            <title>The 'mailto' URI Scheme</title>
            <author fullname="M. Duerst" initials="M." surname="Duerst"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="J. Zawinski" initials="J." surname="Zawinski"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document defines the format of Uniform Resource Identifiers (URIs) to identify resources that are reached using Internet mail. It adds better internationalization and compatibility with Internationalized Resource Identifiers (IRIs; RFC 3987) to the previous syntax of 'mailto' URIs (RFC 2368). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6068"/>
          <seriesInfo name="DOI" value="10.17487/RFC6068"/>
        </reference>
        <reference anchor="MEDIATYPE">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="MIME">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2045"/>
          <seriesInfo name="DOI" value="10.17487/RFC2045"/>
        </reference>
        <reference anchor="PASSporT">
          <front>
            <title>PASSporT: Personal Assertion Token</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8225"/>
          <seriesInfo name="DOI" value="10.17487/RFC8225"/>
        </reference>
        <reference anchor="PIDF-LO">
          <front>
            <title>GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations</title>
            <author fullname="J. Winterbottom" initials="J." surname="Winterbottom"/>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>The Presence Information Data Format Location Object (PIDF-LO) specification provides a flexible and versatile means to represent location information. There are, however, circumstances that arise when information needs to be constrained in how it is represented. In these circumstances, the range of options that need to be implemented are reduced. There is growing interest in being able to use location information contained in a PIDF-LO for routing applications. To allow successful interoperability between applications, location information needs to be normative and more tightly constrained than is currently specified in RFC 4119 (PIDF-LO). This document makes recommendations on how to constrain, represent, and interpret locations in a PIDF-LO. It further recommends a subset of Geography Markup Language (GML) 3.1.1 that is mandatory to implement by applications involved in location-based routing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5491"/>
          <seriesInfo name="DOI" value="10.17487/RFC5491"/>
        </reference>
        <reference anchor="SMTP">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
        <reference anchor="TEL">
          <front>
            <title>The tel URI for Telephone Numbers</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="December" year="2004"/>
            <abstract>
              <t>This document specifies the URI (Uniform Resource Identifier) scheme "tel". The "tel" URI describes resources identified by telephone numbers. This document obsoletes RFC 2806. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3966"/>
          <seriesInfo name="DOI" value="10.17487/RFC3966"/>
        </reference>
        <reference anchor="UUID">
          <front>
            <title>New UUID Formats</title>
            <author fullname="Brad Peabody" initials="B." surname="Peabody">
         </author>
            <author fullname="Kyzer R. Davis" initials="K. R." surname="Davis">
         </author>
            <date day="23" month="June" year="2022"/>
            <abstract>
              <t>   This document presents new Universally Unique Identifier (UUID)
   formats for use in modern applications and databases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-peabody-dispatch-new-uuid-format-04"/>
        </reference>
        <reference anchor="CBOR">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="CDDL">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="ISOBMFF" target="https://www.iso.org/standard/83102.html">
          <front>
            <title>Information technology -- Coding of audio-visual objects -- Part 12: ISO base media file format</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="January"/>
          </front>
          <refcontent>ISO/IEC 14496-12:2022</refcontent>
        </reference>
        <reference anchor="JMAP">
          <front>
            <title>The JSON Meta Application Protocol (JMAP)</title>
            <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8620"/>
          <seriesInfo name="DOI" value="10.17487/RFC8620"/>
        </reference>
        <reference anchor="JWT">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="SHA-512">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="May" year="2011"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
        <reference anchor="SIP-XFER">
          <front>
            <title>Session Initiation Protocol (SIP) Call Control - Transfer</title>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="A. Johnston" initials="A." role="editor" surname="Johnston"/>
            <author fullname="D. Petrie" initials="D." surname="Petrie"/>
            <date month="June" year="2009"/>
            <abstract>
              <t>This document describes providing Call Transfer capabilities in the Session Initiation Protocol (SIP). SIP extensions such as REFER and Replaces are used to provide a number of transfer services including blind transfer, consultative transfer, and attended transfer. This work is part of the SIP multiparty call control framework. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="149"/>
          <seriesInfo name="RFC" value="5589"/>
          <seriesInfo name="DOI" value="10.17487/RFC5589"/>
        </reference>
        <reference anchor="STIR-PASS">
          <front>
            <title>PASSporT Extension for Rich Call Data</title>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos Inc.</organization>
            </author>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>Neustar Inc.</organization>
            </author>
            <date day="5" month="June" year="2023"/>
            <abstract>
              <t>   This document extends PASSporT, a token for conveying
   cryptographically-signed call information about personal
   communications, to include rich meta-data about a call and caller
   that can be signed and integrity protected, transmitted, and
   subsequently rendered to the called party.  This framework is
   intended to include and extend caller and call specific information
   beyond human-readable display name comparable to the "Caller ID"
   function common on the telephone network and is also enhanced with a
   integrity mechanism that is designed to protect the authoring and
   transport of this information for different authoritative use-cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-stir-passport-rcd-26"/>
        </reference>
        <reference anchor="vCard">
          <front>
            <title>jCard: The JSON Format for vCard</title>
            <author fullname="P. Kewisch" initials="P." surname="Kewisch"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This specification defines "jCard", a JSON format for vCard data. The vCard data format is a text format for representing and exchanging information about individuals and other entities, for example, telephone numbers, email addresses, structured names, and delivery addresses. JSON is a lightweight, text-based, language- independent data interchange format commonly used in Internet applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7095"/>
          <seriesInfo name="DOI" value="10.17487/RFC7095"/>
        </reference>
        <reference anchor="vCon-white-paper" target="https://github.com/vcon-dev/vcon/blob/main/docs/vCons_%20an%20Open%20Standard%20for%20Conversation%20Data.pdf">
          <front>
            <title>vCon: an Open Standard for Conversation Data</title>
            <author initials="T." surname="Howe" fullname="Thomas Howe">
              <organization>STROLID Inc.</organization>
            </author>
            <author initials="D." surname="Petrie" fullname="Daniel Petrie">
              <organization>SIPez LLC</organization>
            </author>
            <author initials="M." surname="Lieberman" fullname="Mitch Lieberman">
              <organization>Conversational X</organization>
            </author>
            <author initials="A." surname="Quayle" fullname="Alan Quayle">
              <organization>TADHack and TADSummit</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CDR" target="https://www.itu.int/rec/T-REC-Q.825">
          <front>
            <title>Recommendation Q.825: Specification of TMN applications at the Q3 interface: Call detail recording</title>
            <author>
              <organization>ITU</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PY-VCON" target="https://github.com/py-vcon/py-vcon">
          <front>
            <title>Python open source vCon command line interface, library and workflow server</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 466?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Thank you to Daniel Petrie for making a concept real, for all the right reasons, and for the many projects we've shared over our careers.</t>
        </li>
        <li>
          <t>Thank you to Mitch Leiberman and Alan Quayle for their support, encouragements and insights during the early days of vCons.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
