<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tigress-requirements-07" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="tigress-requirements">Transfer Digital Credentials Securely - Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-tigress-requirements-07"/>
    <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
      <organization>Apple Inc</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <author initials="C." surname="Astiz" fullname="Casey Astiz">
      <organization>Apple Inc</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
      <organization>Apple Inc</organization>
      <address>
        <email>a_pelletier@apple.com</email>
      </address>
    </author>
    <author initials="B." surname="Lassey" fullname="Brad Lassey">
      <organization>Alphabet Inc</organization>
      <address>
        <email>lassey@google.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="17"/>
    <area>Applications and Real-Time</area>
    <workgroup>Transfer dIGital cREdentialS Securely</workgroup>
    <keyword>tigress</keyword>
    <keyword>requirements</keyword>
    <abstract>
      <t>This document describes the use cases necessitating the secure transfer of digital credentials, residing in a digital wallet, between two devices and defines general assumptions, requirements and the scope for possible solutions to this problem.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transfer dIGital cREdentialS Securely Working Group mailing list (<eref target="mailto:tigress@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tigress/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tigress/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dimmyvi/tigress-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In this document we are identifying a problem of transferring digital credentials (e.g. a digital car key, a digital key to a hotel room or a digital key to a private house) from a wallet on one device (smartphone) to another, particularly, if these devices belong to two different platforms (e.g. one is iOS, another - Android).
Today, there is no widely accepted way of transferring digital credentials securely between two digital wallets independent of hardware and software manufacturer. This document describes the problem space and the requirements for the solution the working group creates.</t>
      <t>A Working Group, called Tigress has been established to find a solution to the problem described above.
Within the WG an initial solution was presented (https://datatracker.ietf.org/doc/draft-art-tigress). The community decided to generalize the requirements to the solution and consider alternative solutions within the WG.</t>
      <t>This document presents the general requirements to possible solutions and  specifies certain privacy requirements in order to maintain a high level of user privacy.</t>
    </section>
    <section anchor="general-setting">
      <name>General Setting</name>
      <t>When sharing digital secure credentials, there are several actors involved. This document will focus on sharing information between two digital wallets, directly or through an intermediary server.</t>
      <t>Digital credentials provide access to property owned and / or operated by 3-rd party entities, such as hotel or residential building owners. The entity that is providing the digital credential for consumption by a digital wallet is referred to as the Provisioning Entity.
For some kind of credentials, the Provisioning Entity may need to have control over digital credential issuance and life time management - for example, hotel is the owner of the rooms and allow guests to access them for the time of thier stay only.</t>
      <t>A digital wallet is a combination of software and hardware in a smartphone device, there are two devices involved in credential transfer process - Sender and Receiver. They are defined in terms of which one is a transfer initiator (Sender) and which device is eventually consuming transferred credentials (Receiver). Device roles can change based on the transfer direction - in some transfers a device can act as a Sender, in other - as a Receiver.</t>
      <t>The interface between the device and the Provisioning Entity can be proprietary or a part of published specifications. The sender wallet obtains provisioning information from the Provisioning Entity, then shares it to the recipient using a solution defined in Tigress WG. The recipient then takes that provisioning information and sends it to the Provisioning Entity to redeem for credential for consumption in a digital wallet.</t>
      <t>For some credential types the Provisioning Entity who issues new credentials is actually the sender wallet. In that scenario the receiver will generate new key material at the request of the sender, and then communicate with the sender over Tigress to have its key material signed by the sender. The new credential, with the key material generated by receiver device and signed by sender device, will finally be added (provisioned) into a digital wallet on sender device.</t>
      <section anchor="credential-transfer-without-provisioning-entity">
        <name>Credential transfer without Provisioning Entity</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    participant I as Intermediary
    actor R as Receiver
    S -&gt;&gt; I : upload Sharing Invititation ({{CCC-Digital-Key-30}})
    break Generic messaging channel
      S -&gt;&gt; R : send invite
    end
    break Credential Provisioning flow {{CCC-Digital-Key-30}}
      R -&gt;&gt; I : upload Key Signing Request ({{CCC-Digital-Key-30}})
      S -&gt;&gt; I : read Key Signing Request, generate and upload Key Import Request ({{CCC-Digital-Key-30}})
      R -&gt;&gt; I : read Key Import Request and Import Key Data ({{CCC-Digital-Key-30}})
    end
</tt></t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>General terms:</t>
      <ul spacing="normal">
        <li>Credential information - data used to authenticate the user with an access point.</li>
        <li>Provisioning information - data transferred from Sender to Receiver device that is both necessary and sufficient for the Receiver to request a new credential from Provisioning Entity to provision it to the Receiver device.</li>
        <li>Provisioning - A process of adding a new credential to the device.</li>
        <li>Provisioning Entity - an entity which facilitates Credential Information lifecycle on a device - for some types of access credentials (e.g. hotels, corporate access). Lifecycle may include provisioning of credential, credential termination, credential update.</li>
        <li>Sender (device) - a device initiating a transfer of Provisioning Information to a Receiver that can provision this credential.</li>
        <li>Receiver (device) - a device that receives Provisioning Information and uses it to provision a new credential.</li>
        <li>Intermediary (server) - an optional intermediary server that provides a standardized and platform-independent way of transferring provisioning information between Sender and Receiver devices, acting as a temporary store and forward service between Sender and Receiver.</li>
        <li>Digital Wallet - A device, service, and/or software that faciliates transactions either online or in-person via a technology like NFC. Digital Wallet's typically support payments, drivers licenses, loyalty cards, access credentials and more.</li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <ul spacing="normal">
        <li>Let's say Ben owns a vehicle that supports digital car keys. Ben would like to let Ryan borrow the car for the weekend. Ryan and Ben are using two different devices (smartphones) with different operating systems. In order for Ben to share his digital car key to Ryan for a weekend, he must transfer some data to the receiver device. Receiver device generates new key material and return it to the sender to sign and return back to the receiver. At this point, the receiver now has a token that will allow them to provision their new key with the car.</li>
        <li>Bob booked a room at a hotel for the weekend, but will be arriving late at night. Alice, his partner, comes to the hotel first, so Bob wants to share his digital room key with Alice. Bob and Alice are using two different mobile phones with different operating systems. In order for Bob to share his digital room key to Alice for a weekend, he must transfer some data to her device. The data structure shared between the two participants is proprietary to the given hotel chain (or Provisioning Entity). This data transfer is a one-time, unidirectional transfer from Bob's device to Alice's. Once Alice receives this data, she can provision a new key to her digital wallet, making a call to Provisioning Entity to receive new credential information.</li>
      </ul>
    </section>
    <section anchor="relationships">
      <name>Relationships</name>
      <section anchor="credential-transfer-with-intermediary-server">
        <name>Credential transfer with intermediary server</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    participant I as Intermediary
    actor R as Receiver
    S -&gt;&gt; I : upload provisioning information
    break Generic messaging channel
      S -&gt;&gt; R : send invite
    end
    loop Provision credential
      R -&gt;&gt; I : request additional provisioning information
      I -&gt;&gt; R : deliver additional provisioning information
    end
</tt></t>
      </section>
      <section anchor="credential-transfer-without-intermediary">
        <name>Credential transfer without intermediary</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    actor R as Receiver
    break secure messaging channel
      S -&gt;&gt; R : transfer provisioning information E2E
    end
    loop Provision credential
      R -&gt;&gt; S : request additional provisioning information
      S -&gt;&gt; R : deliver additional provisioning information
    end
</tt></t>
      </section>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <ul spacing="normal">
        <li>Depending on credential type, there are 3 possible scenarios for transferred credential cryptographic key material:
1) An existing cryptographic key is being copied and sent from Sender to receiver and provisioned to digital wallet as it is. In this case two credentails on both devices are indistinguashable. This scenario is currently used by a very limited number of entities.
2) Instead of the original cryptographic key, Sender device fetches a provisiong token from Provisiong entity approval and sends it to Receiver so that Receiver can acquire new credential information from Provisiong Entity presenting given provisiong token to it and receiving new cryptographic key material. In this case receiver device may have just a subset of the sender's device access rights or receiver's device credential may be revoked independently of the sender's device credential. As a result, Sender and Receiver devices have 2 different keys, potentially linked to the same logical "user account". Also, the Provisiong Entity may not allow the same cryptographic key to be added to different physical devices.
3) When Provisioning Entity does not exist in the transfer flow. For example, for a transfer of a digital car key both sender and receiver devices are used to generate new credential's cryptographic key matherial and sign over the new cryptographic key for it to be trusted by the access point.</li>
        <li>Security: Communication between sender or receiver devices and Provisioning Entity should be trusted. Since new credential's key material is generated by Provisioning Entity, the channel between the device and Provisioning Entity shall be secure and trusted by both parties.</li>
        <li>In case of an intermediary server, used during the credential transfer from sender device to receiver device, the choice of intermediary shall be defined by the application initiating the credential transfer. Digital wallet or another application that manages credentials on sender device shall make the decision regarding the channel to be used to sent the Provisioning Information.</li>
        <li>Sender and Receiver shall both be able to manage the shared credential at any point in transfer or lifecycle: a) the process of credential transfer can be stopped at any time before the credential is provisioned to the receiver device by either sender or receiver device (e.g. making a call to intermediate server to delete a temporary mailbox); b) or after credential has been provisioned - by ether "manage credential" call issued from sender device to Provisiong Entity (or from Provisiong Entity initiating "manage credential" API).</li>
        <li>Any device OEM with a digital credential implementation adherent to Tigress solution shall be able to receive shared provisioning information, whether or not they can originate provisioning information themselves. We define the digital credential transfer as platform-independant; therefore, if the receiver device can recognize the data format of the received Provisioning Information, it should be able to provision the new credential to the Digital Wallet.</li>
        <li>Provisioning new credential on the receiver may require multiple round trips. In case the Provisioning Entity is not used for a certain type of credentials (e.g. for a transfer of a digital car key), both sender and receiver devices are used to generate new credential's cryptographic key matherial and sign on the new cryptographic key for it to be trusted by the access point.</li>
      </ul>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <ul spacing="normal">
        <li>(Req-XPlatform) Solution shall support transfer of digital credential across different platforms (e.g. from Android to iOS).</li>
        <li>(Req-P2P) A goal of credential transfer covered in this document shall include transfer from one device to another (group sharing shall not be a goal).</li>
        <li>(Req-CredentialType) The solution shall support transfer of various digital credential types, based on symmetric and asymmetric cryptography, public and proprietary standards.</li>
        <li>(Req-Security) Solution should provide security of the provisioning data transferred (confidentiality, integrity and availability of provisioning information in transit).</li>
        <li>(Req-Privacy) Transport protocol used to transfer provisioning information ( e.g. secure E2E transfer protocol or intermediary server) shall prevent from correlating users between exchanges or create a social graph of users involved into transfer. Intermediary server shall not be an arbiter of identity. User identities shall not be collected, stored and used for purpose other then the credential transfer itself.</li>
        <li>(Req-Connectivity) Sender and Receiver shall be allowed to be online at different times. Sender and Receiver shall not need to be online at the same time. This requirement allows devices to connect to network to only exchange the portion of information required during the transfer, allowing them upload or download data in turns to network servers.</li>
        <li>(Req-RoundTrips) Solution shall allow for multiple data exchanges between sender and receiver devices in the process of credential transfer. This requirement shall alighn with (Req-Connectivity) above.</li>
        <li>(Req-Opaque) In the case when an intermediary server is used to facilitate the credential transfer, message content between sender and receiver must be opaque to an intermediary, intermediary server shall not be able to recognize the content of provisioning information or use it to provision digital credential on its own.</li>
        <li>(Req-SenderTrust) In the case when an intermediary server is used to facilitate the credential transfer, sender device should establish trusted relationship with the intermediary server. Intermediary server shall be able to verify that the sender device is in good standing and content generated by the sender device can be trusted by the intermediary. The trust mechanism could be proprietary or publicly verifiable ( e.g. WebAuthN). This is important because intermediary server shall have no visibility to the content of the provisiong information sent through it (Req-Opaque).</li>
        <li>(Req-ReceiverTrust) In the case when an intermediary server is used to facilitate the credential transfer, receiver device should be able to evaluate the trustworthiness of the intermediary based on agreed criteria.</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CCC-Digital-Key-30" target="https://carconnectivity.org/download-digital-key-3-specification/">
          <front>
            <title>Digital Key Release 3</title>
            <author>
              <organization>Car Connectivity Consortium</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8Vb73LkNnL/Pk+ByB+suZoZeXdddRdd4rJW0vpUWa82kpzN
VSoVY0jMDCIOwQPIkceurcpr5FueJY+SJ8mvGwAJcjjy2uVLXFtlDQmgG/33
1w1wPp9PJrWuC3UuTh6sLN1KWXGl17qWhbi0KldlrWXhxL3KGquKvZiLO/WX
Rlu1xSt3MpHLpVU7TK/12irn5rb3OpO1Whu7Pxe6XJnJJDdZKbcgl1u5qudj
k+Zf/H7imuVWO6dNWe8rjL65fngzKZvtUtnzSY41zyeZKZ0qXePOxQocqgmY
eDWRVkkwc1FVhQZtLOCELHMwLYv5g96qk8mTsY9ra5oq3XN+8w3vObu7Dnu+
b/d8MnlUe8zKzyfYfmCZ/ky5nuxU2YAtIX7h2kL4LZ58AF+6XItvaD4930pd
dIL9Wqt6tTB2Ta+kzTZ4tanryp2fndFIeqR3ahGHndGDs6U1T06dhTXOaC6U
u2mWmJ3r7Xa/02fjmhOigJxdnZCB4GVtZfaobEcGGj07rkxQnMim3hhLwsOi
AoYAlV0txD/p0jw21uz4qbeKq62u7X7wClRkqX9kbZ4LUq0SN2XG75QXUr6L
M76W9H6RmW2P3uVCXLha/5jQupRO7ZOnn0AmkzT6CImLhXivikLVWtmEzEWh
fhi8+ARK8t+qOOUIudfirXTYQULqtZV5+nRAp6g2cqnqIamCJ3y9NmYdyExK
Y7eYtYM9TybkuO1PIS4vL+chQsz/Qe3nr74459VaLYtAmiRsxaUpS5Vhsq73
9MMZW+tmy8Ni5IkBB8vBUQsFxYhXJzyEfV28/OLlSwoLPEnatYJVRqPMYOcJ
jWCTT2VhZD7PA6OPxOjcVSrTqxAXzrC1+Xwu5NKRTdf4+bDRTsCeGzJdkSuX
Wb1UTtQbJRrwBPXjF0jByrFsTd5K7xw7s6ijw5uVCIRF1sXQGeKF0zlN0qWQ
7ZAnSYqeCajmSalS1E8GtHcaVDh05WqlS/y9VqWyGA91NduKQ9usF4J4NPOT
mUoJaE1UBpwuYV7OFI2PhrXBGOyzsgYvtgsvha3O80JNJp/BOmpr8iaj0ZPJ
TelHt1J5Ugg+Smje1WpPu5FxLdp4FIKlNyNSEKdqsV4k24f+BNQzSx7hJ7Ep
xcbUqhDWGCxtxwZUVu9gIRgI/UzFymKkDBIVpsQ/FWQpTt1W2rra4NGUJ5cG
srIzUeGxzhoE0AJc6BWJ0KlWBUtVGNKz8YrRK2yOBFEhPJJjxB0RKQhK397P
4tpIERdlbo3Op4vJg8kl1qfnPLA04glSREqVWaaqWuXge/9JInQxGfdMpmdO
YKTMVaVKmkSLbqTNn0hzZCTOrGr+sZVls4LxYzm7EM/Zf1Sxq2SmWkvrmR8Z
HJtfsDX+8RSyGmdF2gUlFRjdhejluxnsAHzn4sEnEfBLosfekILkstBug5dQ
Anwhh4o7GqbHXmQaY5YG2XDyAdlOe1Y+fAO+IRdNUuxWeJLkDFB5STo4/cRk
B6OJCW9KkkN0MNttU1KYyxFmcs9ucFr9ozqUV2C9ZYSESqgGc2HsRa1syVE3
cd6ndDeLYcQKu/AKi+FiSHIkJBBhEYIj1J0pW0tQYefK9v0V8BxICAxiKeSP
kkfCU/V6Iwq1g7vC2OCMNk4Hl4gq3wRu7lVNYXMy+bCBbh2sMjXyEEh7QdM7
DBmrw/IcALPaWOJkZ4qdyod2+6SLAraYNY4iQCTRZjE8e8ZtZnhgkUvgXGzN
sE1sjM0G+tiqXEvgE2wPrGBnVyPeCVPcQYXs1s6L3CIeWxgG0hJZJsR9RsvT
U0lGt9yLV3ObcyjaC1oIiR+8uCYDcRfiIGZwBvGExLLRBWcTWtU6b4Q8F8Fx
I2uhIy8xTx3GEvZZsrmQUYiTYWaidayieORNWnr7ek9LE0Kn1a+Z7GLyBss5
s1XikdwUljBU5dg02NEeWdWvvpE7ciVKQtjxjuDzIdcoDRpZhjhU6BWcC9Ce
oplcs50i8tLO1A9yC+w0CwLUnnOWFwda8kgkF+8B2Kx5EusGAYe1FvW3QViJ
oY3J8EwAM4HIBJ2WxZ7j2aHUJMWEpS691WFaG3eJXhuR2YG67BQyT2r5KSSI
Zk/TEpG04AMqZ77n8LWSIwmXP5nSOx/jkTtpTQ8reBmybEf8PW00DC5kMtmt
6WMmvE6c+kWnvKofHvIrZsA/y7rB9vfBptjwYjYDrR4OiDwhfF75JaByCj/w
tmwjy7USSwCuXIRM0nLjPZREOifu2d7iS2I7METrIFSQvcogixmHr5Ca+Xkr
GIqlynv5ijJcGyM2LYKISW/MhInYktMQwp6qKUgwYiGPJslWTcxhPRAavNZ5
TUXcsqSgGpw30knjF8OcI5yw2fiwR8ZSxywDkelKk2s0zoO2Nu8klhCzL5IL
M9bN4lVr+chwQNbHmWN8gf2kxMckhldkDcG5nglJI2AZ2mojTeoDKKSPBidY
q+HAwRD+qWeLZO1ZsNx6qI+FYBCMPbtMlcgmrUDZcny+8dkWSJSWJngKaShL
TMm6zfyILDHsuGCPwabKiB6oX8JZPuWDw2BUTYyRGlGqR8jpdelzSTfVa7G/
3Vm3fm9+3AIv0e4usf2OQOArBiqfcRHnCsakQuaEfk5bE1H5lDzLHKYWStDp
WlDsZ58ljafO6Yln09Rjmp1Mvv/++y1imNT5xJGckRqutFxb6etMBgzinjze
xwF+6nG/riSs+4be3SQpPpl3R+9inODn92L+1VeYcy6aispMcR9Axk2JEpQr
Q2zs9KefDmvljx+nvMQSQPjRoyKdiS0UK9e0AgW+UhWhivaE7kCIpEShX9fK
1+5lnqyTCKwnnxVltHE2AoW74VaoBr+Homn6XbDZZ3eSigPMjK4w6/yDDCkh
dbOtDCLkJ1K6O6Q0WICWD4/o7RVA/POLkiBhPgxSL01JGazFxFcUGDX/9umB
/IUagU6cfPvd/cPJzP9fvLvlv++u//G7m7vrK/r7/k8Xb9+2f0zCiPs/3X73
9qr7q5t5efvtt9fvrvxkPBW9R5OTby/+fOLDxcnt+4eb23cXb084d/ewL4MF
Qz7ImQwFAfmzdJOuLsKc15fv//u/XnwJy/ibuzeXL1+8+NuPH8OPP7z4/Zf4
8YSQ5KkRvAk/ETH2E1lVSloOygUV7xXJFNgOPuI2QFaCQAvc+Hf/QpL513Px
d8usevHlV+EBbbj3MMqs95BldvjkYLIX4sijETKtNHvPB5Lu83vx597vKPfk
If6LlQ2DqPPJZJ56Y5oY59TMklQbeRjdUNyvfcQPHSYf5gQDFwZxlYEeF1jz
/bF0G1ZNURbDgwD+QOhuEMpjbbAEEArNLIIrHOGbFZAJ5/uIeNvZnK+Dkw0y
iqd4JMm3WSDBAwOWDjY4FxctjkXCRD7xkGVANqx2ZJHAwpzEqSIEIMAKfKcL
itJAAomubhKpUk2R7TNUyabsEKUvKjzeZKhBvHlFHXa4uOSAY2TGIhxx6OOh
gLtv29Wp8tFlVjS56iOqXuk0620adhZKit7zpqJeKUkhqP7Ucz0lCbQg3QN5
L820X9mTXCoJztqdEZDtENbttMoBqOODGGiHj7HASwR44Y7T5TzhWgjb0Rta
ARFMM7c49dX51GveMIhkVzwo4BMkm1OzlQq6MkdZpn8MZXps8s3TbtpYm+4o
HI51xEgxFku6GQENVgkXXYrSFzMJ9OETJpZDpZgz2zopTsYqPIgjdiU+eJBF
3hShWliBY/sZG3OoSFkU3jPYMXh3MvPJUGmumZALUChQYaPLeYViC/vbaclM
Z5vSFGa9h+s8KvHuzeViwMbnjpxGZwwSXVNxjq7knttKM5Fb4t5hOkC2I6EU
Zi8LLq2QcGdjjkb73hpON8je3znFZzqOYvBbJuigqdeQE/ISiXan4P9F2Gtg
wQ0b0SjJaMqTaYrcbwbmR2K821ONZ6wFpqKwQ+NjlIQ2HqGLhR9EfNEaJFdf
bfVbx7GUT1rSbupDfzfIN4dosts7GIXjOsT33ogsEQBnXOgJBgH9fXDoJ25W
XIgGDmfIz2LbIIi33s/xzCeRQWUTAutBBolgzo1UO9g6QEdj03Dv2lxEJUQ6
ZimzxyHZhbiowxEFZb9Zn6cS0t94RzGPKhRmXID4/g23a3oBA0+0bTltax+I
ic4+xGuzhFaxFrWV+ahB1u3Rw0C/M7FsAjUqc+D6O1JQwdG9FqVeb1AuXhTs
YbwD6LekOg/lnWo7vmFtbQkZO8MsPMnQnz1UKDPV8s6rL3gOCZJ/HrW0rVlq
GLw3sV9sYSDxPEN46+n/IhvbJKZFqJqfu9o2fA7h6eW9BgxtKinXXGhttq2W
INc1LKQM0kUhBYx6Cr5GQME09oxT6OR7XhDUnLp8M4FqvO00pZUogx3I5n/+
4z9dm9SCIOjZQtxSa9ILpk10daQHjW/UIIfK1jyjeAZng1v56HM2hU8adLSj
wuSGQClJSD5W3qnC9582unLP1txjefP/v+A+lm5/09q6MKbqBJ3Ic6QaDcAY
QDWYy7McCsyK1HNVcGD71LltwfozjZJUb79SYcfU4QUcDmt+Xr5pa3ocJF2/
vP4Vkr//VZK//w0kLy66M3jKIVeMDRm3l8OGZNrHf5WcvoVeYjg2HW2S4899
VRtoqQJw6SVaumfxYiouUNr8oB0H8cPBVOQpfmUqHRCt4+KuXyG2yZUhb9e1
o3eDhp1kQK5daIoS9KfbGhSgA99SF3zwxuVle4+Bjzlyz2kjEeIhgxCE264q
LdZYSk1AiFwm82kUGCNUudXUyvB3wAh+x1OyBSTxcgp2kMJkHvurxoLvckyE
s7jxELpXqs42jP7bna8DtuiXtetYRcqKRgawk7a6W5zkjMcl7QN/FsHHqM/E
5gOCIbCHc10+RucUd8ApiOs6ACsiSUM9nWMGNFDgsN9LhSm3mf+94YLfNUun
Bt3rz9v0F7C5Jfzj/DmlX64bkuyY1l4SyR2jrqS0KvbHKCT1HpyPkJpyTVHP
nqur/AZeJoiH4P0MPlj7pQqyq/LRGzpTlYApqGKoShEn3JDB1kxT1icE65wZ
nGH2TzBN3WFQv9Sh+H1zzjfI6951ks3eMdnAPJn1q6ngY/KxZJ8bgt8gyf4v
9OCMjDq/C/EmPQP1GC0t+g8u4XindZ1I7VCkHmimdxvqoUV/7sbNbtNVCFwG
GF+BqyOGSux6t1rSvmCG3eHGsDvGtykhlXNx2R6jpMV3PEexIxsCO2PydRsu
ADvaC3GvCdcdbLZX/2jXP0c5dkIXk+Wxc8ZxlqQvPELm5bOjTjCsO8ZYZD3U
FPGuTYoevb8w85rMGxsvCIydJ3NM6h3S9FJGcliNPRl6DYJ9apHveNAYtdhd
0k0bU0cY6foJ8ezItves0pU48PqbAP1uwfCsKfAFaK2C9DMPN6xaUw8oshIU
5Q0x2r4LZ6JHG1hJI64Xm4IwSFcUCAgK8E0a4tcHDl/+JBKgerTce2tnR29d
2HaNynMhp/EmVOybjqkzHFS72lQVQQK/Nt9rWKqVsWoof+2GkGCkR0AqDU2i
o74W+qIHpUxnK7VqG3N03wFKVr2GGN1XXZofpn8Uyymrf1Wr3tFxe2ks5XjO
zDFvJ0HO3ZQTzwafC+dHbP0w3FNZeSRXJ4Y8Ru3i/c2UTOOi3EcKt9ffhrb/
6FUXCt7UIwtt0Xzj8wX4iifC7UF+62jRrGI5GGzqGLqd0QGP7/BZzil00sOW
EmBUrY5jd2q4OFWgxl2ID9HHj103as2Q7twNe6uoC//owTLZYbyKeWBGxBee
mXUZb9VxGe85aq/1+En5Uf+cUXLpgnyUWK9tdOS8od/XPDh3GEwKS7W7IKgQ
btSJLSCMptvfFhiDgjmq8UUbuI9dZNA+8XMo8kk93tijemNw6yp43Sck/+ns
/zb9l79J8vfdjOQ7DKjjFA/m//w+2NdU3PcdJDafn7+vDToWxdozN345AoQL
vhzIbu/Zt5n8+5fvUZ6JtZHF0VBMCCjcwOqd4no247lQPxMnN5q7S8zi1F+v
jZcd/QJkJGTazETHWdc0eIC5TP0FpJ+X0I5qtMaNejUdhs2621puv92qmpov
fK+u+5koGjCI70Rlsehsm3nxEMa1HEd419Mke268a+nCiOj+vWh1cEB6mply
Fe9RMiKjHLTmBZjjHX1Ps6RDQl7xaOyLyVjXieL9tVfIld74Uw5rapOZonWd
n++InAo2sYD0rl9e9+b41fgc5gDVTYMOUTTu2lo/M9h44dMSlTWuxZ3qB3/X
jss2fz2b74ZlfCWINBUv9PauHiabWPSP30IG75sgnYUsde0tyUu+3i/oyMbG
n3TzuDcJWyxUBsef+ZOwPJ4J+qhXNbYyBG/ZAfz1tCMQVtdIUKvOAZLPRabP
gTTl6zmvs6WK51/IMl1QIOSEmH18FdpNvNzaW6OtEmmJ0AtJrlp72q4NvZge
vnOhP0uoz1g+O+EbGlGN3vrpGxt/4zS1qbB4D/FHGc08ufB4G/uskHP8lsa7
EVl8Y/1nJJEHr/HOXe8omT1QLjsIvb4+JvW1qY+X7axwULKNZqFQ7D6PdEck
GnnQ603pIdeIPYTvBsJebiv5l0ZNfbPEfwHEt2GOlFSUm6OTd9cMjhnmLDRP
/YVn4vC53fOJClkQs+Sjf4+H2ShHfUfsgGGCnyL150IdVEafQA1P40eyAd/0
cHTmmgRw2s4D5fG/miiHtR3nh/bjkRZE2OTkozsMHLvd/0xYSySJh3oVLtwn
Z53dpWgY69qY3Kc1rnz8Zx4s8V6v4HB6KNYGAChl1p+g8QAYEzmRdhTuA6wd
3Ef2GRfhgrnWvIeQaT6o5UVTb97FozH6x/foJJtlJln7RyXCrbYS4oBZhMQZ
0HJiXL3M3DevUE/7zy1gZKnzdYEluMJf15CG9cZhkaB2smjiGix7xEH6MCdE
owOLapGRRMXGxb3mfpGHrxHe8OeR9PGPjFcOb69u27c89Obi3cXhsB54pBoY
iuCR4f7GInzqSKftfHqRPZbmqVD52kPmn859W13lf3/C31KffAzEZTsSIfF/
AUnWS7QuPgAA

-->

</rfc>
