<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.0.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hardman-verifiable-voice-protocol-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="VVP">Verifiable Voice Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hardman-verifiable-voice-protocol-03"/>
    <author fullname="Daniel Hardman">
      <organization>Provenant, Inc</organization>
      <address>
        <email>daniel.hardman@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="17"/>
    <keyword>voip</keyword>
    <keyword>telecom</keyword>
    <keyword>telco</keyword>
    <keyword>telephone number</keyword>
    <keyword>vetting</keyword>
    <keyword>KYC</keyword>
    <abstract>
      <?line 262?>

<t>Verifiable Voice Protocol (VVP) authenticates and authorizes organizations and individuals making and/or receiving telephone calls. This eliminates trust gaps that malicious parties exploit. Like related technolgies such as SHAKEN, RCD, and BCID, VVP can bind cryptographic evidence to a SIP INVITE, and verify this evidence downstream. VVP can also let evidence flow the other way, proving things about the callee. VVP builds from different technical and governance assumptions than alternatives, and uses stronger, richer evidence. This allows VVP to cross jurisdictional boundaries easily and robustly. It also makes VVP simpler, more decentralized, cheaper to deploy and maintain, more private, more scalable, and higher assurance. Because it is easier to adopt, VVP can plug gaps or build bridges between other approaches, functioning as glue in hybrid ecosystems. For example, it may justify an A attestation in SHAKEN, or an RCD passport for branded calling, when a call originates outside SHAKEN or RCD ecosystems. VVP also works well as a standalone mechanism, independent of other solutions. An extra benefit is that VVP enables two-way evidence sharing with verifiable text and chat (e.g., RCS and vCon), as well as with other industry verticals that need verifiability in non-telco contexts.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dhh1128.github.io/vvp/draft-hardman-verifiable-voice-protocol.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hardman-verifiable-voice-protocol/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dhh1128/vvp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 266?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>When we get phone calls, we want to know who's calling, and why. Often, we want similar information when we <em>make</em> calls as well, to confirm that we've truly reached who we intend. Strangers abuse expectations in either direction, far too often.</t>
      <t>Regulators have mandated protections, and industry has responded. However, existing solutions have several drawbacks:</t>
      <ul spacing="normal">
        <li>
          <t>Assurance of callers derives only from the signatures of originating service providers, with no independently verifiable proof of what they assert.</t>
        </li>
        <li>
          <t>Proving the identity of the callee is not supported.</t>
        </li>
        <li>
          <t>Each jurisdiction has its own governance and its own set of signers. Sharing information across boundaries is fraught with logistical and regulatory problems.</t>
        </li>
        <li>
          <t>Deployment and maintenance costs are high.</t>
        </li>
        <li>
          <t>Market complexities such as the presence of aggregators, wholesalers, and call centers that proxy a brand are difficult to model safely.</t>
        </li>
        <li>
          <t>What might work for enterprises offers few benefits and many drawbacks for individual callers.</t>
        </li>
      </ul>
      <t>VVP solves these problems by applying three crucial innovations.</t>
      <section anchor="evidence-scope">
        <name>Evidence scope</name>
        <t>Existing solutions aim to assert variable levels of confidence about a caller's identity, plus possibly some brand attributes. These assertions rest entirely on a service provider's judgment and are testable only in the moment a call is initiated; later, they become repudiable.</t>
        <t>VVP proves more. It always proves the legal identity of whoever presents evidence, plus any authority that they have delegated to staff and service providers. It typically also proves brand attributes and right to use a phone number. If a call center and/or an AI is involved, it proves the constraints under which that entity operates as a representative. Depending on how it is used, VVP can thus achieve very high levels of assurance about a broad range of facts related to callers, callees, or both.</t>
        <t>All VVP proof is traceable back to justifying evidence and can be evaluated in the present or the past. This guarantees accountability for all parties with a permanent, non-repudiable audit trail.</t>
      </section>
      <section anchor="evidence-format">
        <name>Evidence format</name>
        <t>VVP is rooted in an evidence format called <em>authentic chained data container</em>s (<em>ACDC</em>s) -- <xref target="TOIP-ACDC"/>. Other forms of evidence (e.g., JWTs/STIR PASSporTs, digital signatures, and optional interoperable inputs from W3C verifiable credentials <xref target="W3C-VC"/> and SD-JWTs <xref target="SD-JWT-DRAFT"/>) also contribute. However, the foundation that VVP places beneath them is unique. For a discussion of the theory behind VVP evidence, see <xref format="counter" target="appendix-a"/>. For more about additional evidence types, see <xref format="counter" target="building-blocks"/> and <xref format="counter" target="interoperability"/>.</t>
        <t>Because of innovations in format, VVP evidence is easier to create and maintain, safer, and more flexible than alternative approaches. It also lasts much longer. This drastically lowers the costs of adoption.</t>
      </section>
      <section anchor="vetting-refinements">
        <name>Vetting refinements</name>
        <t>Although VVP interoperates with governance frameworks such as SHAKEN <xref target="ATIS-1000074"/>, it allows for a dramatic upgrade of at least one core component: the foundational vetting mechanism. The evidence format used by VVP is also the format used by the Verifiable Legal Entity Identifier (vLEI) standardized in <xref target="ISO-17442-3"/>. vLEIs implement a KYC approach advocated by the G20's Financial Stability Board, and overseen by the G20's Regulatory Oversight Committee. This approach follows LEI rules for KYC (<xref target="ISO-17442-1"/>), and today it's globally required in high-security, high-regulation, cross-border banking.</t>
        <t>Millions of institutions have already undergone LEI vetting, and they already use the resulting evidence of their organizational identity in day-to-day behaviors all over the world. By adopting tooling that's compatible with the vLEI ecosystem, VVP gives adopters an intriguing option: <em>just skip the task of inventing a whole new vetting regime unique to telco, with its corresponding learning curve, costs, and legal and business adoption challenges.</em></t>
        <t>To be clear, VVP does not <em>require</em> that vLEIs be used for vetting. However, by choosing an evidence format that is high-precision and lossless enough to accommodate vLEIs, VVP lets telco ecosystems opt in, either wholly or partially (see <xref format="counter" target="interoperability"/>), to trust bases that are already adopted, and that are not limited to any particular jurisdiction or to the telco industry. It thus offers two-way, easy bridges between identity in phone calls and identity in financial, legal, technical, logistic, regulatory, web, email, and social media contexts.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="overview">
      <name>Overview</name>
      <t>Fundamentally, VVP requires identified parties (callers and/or callees) to curate (<xref format="counter" target="curating"/>) a dossier (<xref format="counter" target="dossier"/>) of stable evidence that proves things about them. This is done once or occasionally, in advance, as a configuration precondition. Then, for each call, participants decide whether to share this evidence. Callers share evidence by creating an ephemeral STIR-compatible VVP PASSporT (<xref format="counter" target="passport"/>) that cites (<xref format="counter" target="citing"/>) their preconfigured dossier. This passport travels along the delivery route as an <tt>Identity</tt> header in a SIP INVITE. Callees share evidence by adding an analogous passport to an attribute line in the SDP <xref target="RFC8866"/> body of their SIP response. This passes a signed citation to their dossier in the other direction. Verifiers anywhere along the route check the citation(s) and corresponding dossier(s), including realtime revocation status, to make decisions (<xref format="counter" target="verifying"/>).</t>
      <t>A VVP call may carry assurance in either or both directions. Compliant implementations may choose to support only assurance about the caller, only assurance about the callee, or both.</t>
      <section anchor="roles">
        <name>Roles</name>
        <t>Understanding the workflow in VVP requires a careful definition of roles related to the protocol. The terms that follow have deep implications for the mental model, and their meaning in VVP may not match casual usage.</t>
        <section anchor="allocation-holder">
          <name>Allocation Holder</name>
          <t>An <em>allocation holder</em> controls how a phone number is used, in the eyes of a regulator. Enterprises and consumers that make and receive calls with phone numbers they legitimately control are the most obvious category of allocation holders, and are called direct <em>telephone number users</em> (<em>TNUs</em>). Range holders hold allocations for numbers that have not yet been assigned; they don't make or receive calls with these numbers, and are therefore not TNUs, but they are still allocation holders.</t>
          <t>It is possible for an ecosystem to include other parties as allocation holders (e.g., wholesalers, aggregators). However, many regulators dislike this outcome, and prefer that such parties broker allocations without actually holding the allocations directly.</t>
        </section>
        <section anchor="TP">
          <name>Callee</name>
          <t>For a given phone call, a <em>callee</em> (also referred to as a <em>terminating party</em> or <em>TP</em>) receives the call. Typically one callee is targeted, but multiparty SIP flows allow INVITEs to multiple callees, either directly or via a conference server (see <xref target="RFC4353"/> and <xref target="RFC4575"/>). A callee can be an individual consumer or an organization. The direct service provider of the callee is the <em>terminating service provider</em> (<em>TSP</em>). In many use cases for VVP, callers attempt to prove things to callees, and callees and their service providers use VVP primarily with a verifier mindset. However, enterprises or call centers that accept inbound calls from individuals may want assurance to flow the other direction; hence, VVP supports optional evidence about callees as well.</t>
        </section>
        <section anchor="OP">
          <name>Originating Party</name>
          <t>An <em>originating party</em> (<em>OP</em>) controls the first <em>session border controller</em> (<em>SBC</em>) that processes an outbound call, and therefore builds the VVP passport (<xref format="counter" target="passport"/>) that cites evidence about the caller.</t>
          <t>It may be tempting to equate the OP with "the caller", and in some perspectives this could be true. However, this simple equivalence lacks nuance and doesn't always hold. In a VVP context, it is more accurate to say that the OP creates a SIP INVITE <xref target="RFC3261"/> with explicit, provable authorization from the party accountable for calls on the originating phone number. The OP originates the VVP protocol, but not always the call on the handset.</t>
          <t>It may also be tempting to associate the OP with an organizational identity like "Company X". While this is not wrong, and is in fact used in high-level descriptions in this specification, in its most careful definition, the cryptographic identity of an OP should be more narrow. It typically corresponds to a single service operated by an IT department within (or outsourced but operating at the behest of) Company X, rather than to Company X generically. This narrowness limits cybersecurity risk, because a single service operated by Company X needs far fewer privileges than the company as a whole. Failing to narrow identity appropriately creates vulnerabilities in some alternative approaches. The evidence securing VVP <bcp14>MUST</bcp14> therefore prove a valid relationship between the OP's narrow identity and the broader legal entities that stakeholders more naturally assume and understand (see <xref format="counter" target="DE"/>).</t>
          <t>The service provider associated with an OP is called the <em>originating service provider</em> (<em>OSP</em>). For a given phone call, there may be complexity between the hardware that begins a call and the SBC of the OP -- and there may also be many layers, boundaries, and transitions between OSP and TSP.</t>
        </section>
        <section anchor="AP">
          <name>Accountable Party</name>
          <t>For a given call, the <em>accountable party</em> (<em>AP</em>) is the organization or individual (the TNU) that has the right to use the originating phone number, according to the regulator of that number. When a callee asks, "Who's calling?", they have little interest in the technicalities of the OP, and it is almost always the AP that they want to identify. The AP is accountable for the call, and thus "the caller", as far as the regulator and the callee are concerned.</t>
          <t>APs can operate their own SBCs and therefore be their own OPs. However, APs can also use a UCaaS provider that makes the AP-OP relationship indirect. Going further, a business can hire a call center, and delegate to the call center the right to use its phone number. In such a case, the business is the AP, but the call center is the OP that makes calls on its behalf. None of these complexities alter the fact that, from the callee's perspective, the AP is "the caller". The callee chooses to answer or not, based on their desire to interact with the AP. If the callee's trust is abused, the regulator and the callee both want to hold the AP accountable.</t>
          <t>In order to verify a caller, VVP requires an AP to prepare a dossier (<xref format="counter" target="dossier"/>) of evidence that documents a basis for imposing this accountability on them. Only the owner of a given dossier can prove they intend to initiate a VVP call that cites their dossier (see <xref format="counter" target="delegating-signing-authority"/>). Therefore, if a verifier confirms that a particular call properly matches its dossier, the verifier is justified in considering the owner of that dossier the AP for the call. Otherwise, someone is committing fraud. Accountability, and the basis for it, are both unambiguous.</t>
        </section>
        <section anchor="VP">
          <name>Verified Party</name>
          <t>A <em>verified party</em> (<em>VP</em>) is a party that uses VVP to prove assertions about itself and its delegation decisions. When a VVP provides assurance about callers, the AP is a VP. When VVP provides assurance about callees, the callee is a VP. Some characteristics of proxies, delegates, and service providers may be proved by a dossier, but these parties are not VPs. They don't create dossiers, and dossiers are not focused on them.</t>
        </section>
        <section anchor="verifier">
          <name>Verifier</name>
          <t>A <em>verifier</em> is a party that wants to know who's calling or being called, and maybe why -- and that evaluates the answers to these questions by examining formal evidence. Callees, callers, TSPs, OSPs, government regulators, law enforcement doing lawful intercept, auditors, and even APs or OPs can be verifiers. Each may need to see different views of the evidence about a particular phone call, and it may be impossible to comply with various regulations unless these views are kept distinct -- yet each wants similar and compatible assurance.</t>
          <t>In addition to checking the validity of cryptographic evidence, the verifier role in VVP <bcp14>MAY</bcp14> also consider how that evidence matches business rules and external conditions. For example, a verifier can begin its analysis by deciding whether Call Center Y has the right, in the abstract, to make or receive calls on behalf of Organization X using a given phone number. However, VVP evidence allows a verifier to go further: it can also consider whether Y is allowed to exercise this right at the particular time of day when a call occurs, or in a particular jurisdiction, given the business purpose asserted in a particular call.</t>
        </section>
      </section>
      <section anchor="lifecycle">
        <name>Lifecycle</name>
        <t>VVP depends on three interrelated activities with evidence:</t>
        <ul spacing="normal">
          <li>
            <t>Curating</t>
          </li>
          <li>
            <t>Citing</t>
          </li>
          <li>
            <t>Verifying</t>
          </li>
        </ul>
        <t>Chronologically, evidence must be curated before it can be cited or verified. In addition, some vulnerabilities in existing approaches occur because evidence requirements are too loose. Therefore, understanding the nature of backing evidence, and how that evidence is created and maintained, is a crucial consideration for VVP. This specification includes normative statements about evidence.</t>
        <t>However, curating does not occur in realtime during phone calls. Citing and verifying are the heart of VVP, and implementers will probably approach VVP from the standpoint of SIP flows <xref target="RFC3261"/>, <xref target="RFC5626"/>. Therefore, we defer the question of curation to <xref format="counter" target="curating"/>. Where not-yet-explained evidence concepts are used, inline references allow easy cross-reference to formal definitions that come later.</t>
      </section>
    </section>
    <section anchor="citing">
      <name>Citing</name>
      <t>## Citing the AP's dossier
A VVP call that makes the caller verifiable begins when the OP (<xref format="counter" target="OP"/>) generates a new VVP passport (<xref format="counter" target="passport"/>) that complies with STIR <xref target="RFC8224"/> requirements. In its compact-serialized JWT <xref target="RFC7519"/> form, this passport is then passed as an <tt>Identity</tt> header in a SIP INVITE <xref target="RFC3261"/>. The passport <em>constitutes</em> lightweight, direct, and ephemeral evidence; it <em>cites</em> and therefore depends upon comprehensive, indirect, and long-lived evidence (the AP's dossier; see <xref format="counter" target="dossier"/>). Safely and efficiently citing stronger evidence is one way that VVP differs from alternatives.</t>
      <section anchor="questions-answered-by-an-aps-passport">
        <name>Questions answered by an AP's passport</name>
        <t>The passport directly answers the following questions:</t>
        <ul spacing="normal">
          <li>
            <t>What is the cryptographic identity of the OP?</t>
          </li>
          <li>
            <t>How can a verifier determine the OP's key state at the time the passport was created?</t>
          </li>
          <li>
            <t>How can a verifier identify and fetch more evidence that connects the OP to the asserted AP?</t>
          </li>
          <li>
            <t>What brand attributes are asserted to accompany the call?</t>
          </li>
        </ul>
        <t>The first two answers come from the <tt>kid</tt> header. The third answer is communicated in the required <tt>evd</tt> claim. The fourth answer is communicated in the optional <tt>card</tt> and <tt>goal</tt> claims.</t>
        <t>More evidence can then be fetched to indirectly answer the following additional questions:</t>
        <ul spacing="normal">
          <li>
            <t>What is the legal identity of the AP?</t>
          </li>
          <li>
            <t>Does the AP have the right to use the originating phone number?</t>
          </li>
          <li>
            <t>Does the AP intend the OP to sign passports on its behalf?</t>
          </li>
          <li>
            <t>Does the AP have the right to use the brand attributes asserted for the call?</t>
          </li>
        </ul>
        <t>Dossiers can be further expanded to answer even more questions; such dynamic expansion of the scope of proof is compatible with but not specified by VVP.</t>
        <section anchor="sample-passport">
          <name>Sample passport</name>
          <t>An example will help. In its JSON-serialized form, a typical VVP passport for an AP (with some long CESR-encoded hashes shortened by ellipsis for readability) might look like this:</t>
          <sourcecode type="json"><![CDATA[
{
  "header": {
    "alg": "EdDSA",
    "typ": "JWT",
    "ppt": "vvp",
    "kid": "https://agentsrus.net/oobi/EMC.../agent/EAx..."
  },
  "payload": {
    "orig": {"tn": ["+33612345678"]},
    "dest": {"tn": ["+33765432109"]},
    "card": ["NICKNAME:Monde d'Exemples",
      "CHATBOT:https://example.com/chatwithus",
      "LOGO;HASH=EK2...;VALUE=URI:https://example.com/ico64x48.png"],
    "goal": "negotiate.schedule",
    "call-reason": "planifier le prochain rendez-vous",
    "evd": "https://fr.example.com/dossiers/E0F....cesr",
    "origId": "e0ac7b44-1fc3-4794-8edd-34b83c018fe9",
    "iat": 1699840000,
    "exp": 1699840030,
    "jti": "70664125-c88d-49d6-b66f-0510c20fc3a6"
  }
}
]]></sourcecode>
          <t>The semantics of the fields are:</t>
          <ul spacing="normal">
            <li>
              <t><tt>alg</tt> <em>(required)</em> <bcp14>MUST</bcp14> be "EdDSA". Standardizing on one scheme prevents jurisdictions with incompatible or weaker cryptography. The RSA, HMAC, and ES256 algorithms <bcp14>MUST NOT</bcp14> be used. (This choice is motivated by compatibility with the vLEI and its associated ACDC ecosystem, which depends on the Montgomery-to-Edwards transformation.)</t>
            </li>
            <li>
              <t><tt>typ</tt> <em>(required)</em> Per <xref target="RFC8225"/>, <bcp14>MUST</bcp14> be "passport".</t>
            </li>
            <li>
              <t><tt>ppt</tt> <em>(required)</em> Per <xref target="RFC8225"/>, <bcp14>MUST</bcp14> identify the specific PASSporT type -- in this case, "vvp".</t>
            </li>
            <li>
              <t><tt>kid</tt> <em>(required)</em> <bcp14>MUST</bcp14> be the OOBI of an AID (<xref format="counter" target="aid"/>) controlled by the OP (<xref format="counter" target="OP"/>). An OOBI is a special URL that facilitates ACDC's viral discoverability goals. It returns IANA content-type <tt>application/json+cesr</tt>, which provides some important security guarantees. The content for this particular OOBI <bcp14>MUST</bcp14> be a KEL (<xref format="counter" target="KEL"/>). Typically the AID in question does not identify the OP as a legal entity, but rather software running on or invoked by the SBC operated by the OP. (The AID that identifies the OP as a legal entity may be controlled by a multisig scheme and thus require multiple humans to create a signature. The AID for <tt>kid</tt> <bcp14>MUST</bcp14> be singlesig and, in the common case where it is not the legal entity AID, <bcp14>MUST</bcp14> have a delegate relationship with the legal entity AID, proved through Delegate Evidence <xref format="counter" target="DE"/>.)</t>
            </li>
            <li>
              <t><tt>orig</tt> <em>(required)</em> Although VVP does not depend on SHAKEN, the format of this field <bcp14>MUST</bcp14> conform to SHAKEN requirements (<xref target="ATIS-1000074"/>), for interoperability reasons (see <xref format="counter" target="interoperability"/>). It <bcp14>MUST</bcp14> also satisfy one additional constraint, which is that only one phone number is allowed. Depite the fact that a containing SIP INVITE may allow multiple originating phone numbers, only one can be tied to evidence evaluated by verifiers.</t>
            </li>
            <li>
              <t><tt>dest</tt> <em>(required)</em> For interoperability reasons, <bcp14>MUST</bcp14> conform to SHAKEN requirements.</t>
            </li>
            <li>
              <t><tt>card</tt> <em>(optional)</em> Contains one or more brand attributes. These are analogous to <xref target="RCD-DRAFT"/> or <xref target="CTIA-BCID"/> data, but differ in that they <bcp14>MUST</bcp14> be justified by evidence in the dossier. Because of this strong foundation that interconnects with formal legal identity, they can be used to derive other brand evidence (e.g., an RCD passport) as needed. Individual attributes <bcp14>MUST</bcp14> conform to the VCard standard <xref target="RFC6350"/>.</t>
            </li>
            <li>
              <t><tt>goal</tt> <em>(optional)</em> A machine-readable, localizable goal code, as described informally by <xref target="ARIES-RFC-0519"/>. If present, the dossier <bcp14>MUST</bcp14> prove that the OP is authorized by the AP to initiate calls with this particular goal.</t>
            </li>
            <li>
              <t><tt>call-reason</tt> <em>(optional)</em> A human-readable, arbitrary phrase that describes the self-asserted intent of the caller. This claim is largely redundant with <tt>goal</tt>; most calls will either omit both, or choose one or the other. Since <tt>call-reason</tt> cannot be analyzed or verified in any way, and since it may communicate in a human language that is not meaningful to the callee, use of this field is discouraged. However it is not formally deprecated. It is included in VVP to facilitate the construction of derivative RCD passports which have the property (see <xref format="counter" target="interoperability"/>).</t>
            </li>
            <li>
              <t><tt>evd</tt> <em>(required)</em> <bcp14>MUST</bcp14> be the OOBI of a bespoke ACDC (the dossier, <xref format="counter" target="dossier"/>) that constitutes a verifiable data graph of all evidence justifying belief in the identity and authorization of the AP, the OP, and any relevant delegations. This URL can be hosted on any convenient web server, and is somewhat analogous to the <tt>x5u</tt> header in X509 contexts. See below for details.</t>
            </li>
            <li>
              <t><tt>origId</tt> <em>(optional)</em> Follows SHAKEN semantics.</t>
            </li>
            <li>
              <t><tt>iat</tt> <em>(required)</em> Follows standard JWT semantics (see <xref target="RFC7519"/>).</t>
            </li>
            <li>
              <t><tt>exp</tt> <em>(required)</em> Follows standard JWT semantics. As this sets a window for potential replay attacks between the same two phone numbers, a recommended expiration should be 30 seconds, with a minimum of 10 seconds and a maximum of 300 seconds.</t>
            </li>
            <li>
              <t><tt>jti</tt> <em>(optional)</em> Follows standard JWT semantics.</t>
            </li>
          </ul>
          <t>For information about the signature over a passport, see <xref format="counter" target="pss"/>.</t>
        </section>
      </section>
      <section anchor="citing-a-callees-dossier">
        <name>Citing a callee's dossier</name>
        <t>Optionally, evidence in VVP can also flow from callee to caller. For privacy reasons, individuals who receive phone calls may choose not to use VVP in this way. However, enterprises and call centers may find it useful as a reassurance to their customers about who they've reached.</t>
        <t>In such cases, the callee must have curated a dossier. The format of the callee dossier is identical in schema to that used by a caller. It may therefore introduce evidence of the callee's legal identity, right to use a brand, right to use a TN, delegated authority to a call center proxy or an AI, and so forth. (A callee's dossier might differ in one minor way that doesn't affect the schema: it could prove the right to use a TN that has a DNO flag.)</t>
        <t>A reference to the callee's dossier is conveyed by adding a special <tt>a=callee-passport:X</tt> attribute line to the SDP <xref target="RFC8866"/> body of the callee's <tt>200 OK</tt> response. (Optionally, the lines <bcp14>MAY</bcp14> also be added to a <tt>180 Ringing</tt> response, to make the callee verifiable earlier, but it <bcp14>MUST</bcp14> appear on the <tt>200 OK</tt> response.) The value of this line is a JWT in compact form, with the <tt>;type=vvp</tt> suffix. This is exactly compliant with the format used by callers to convey VVP passports in <tt>Identity</tt> headers. However, <tt>Identity</tt> headers are not used for callees because existing SIP tooling does not expect or preserve Identity headers on responses. Furthermore, the identity of a callee is primarily of interest to the caller, who is willing to parse the SDP body; it does not need the same full-route auditability as the identity of a caller.</t>
        <t>The callee JWT has a slightly different schema than a caller's VVP passport. It has the same headers, but <tt>kid</tt> contains the OOBI of the callee, not of the OP. Two new claims are added to the JWT payload: <tt>call-id</tt> and <tt>cseq</tt>. These <bcp14>MUST</bcp14> contain the values of the <tt>Call-ID</tt> and <tt>CSeq</tt> values on the preceding SIP INVITE. The <tt>iat</tt> claim <bcp14>MUST</bcp14> also be present and <bcp14>MUST</bcp14> contain a value from the system clock of the callee. The <tt>exp</tt> field <bcp14>MAY</bcp14> also be present and use a value chosen by the callee; if it is missing, this communicates the callee's intention to impose no new timeout logic on the call. The <tt>evd</tt> field <bcp14>MUST</bcp14> also be present, and <bcp14>MUST</bcp14> contain the OOBI of the callee's dossier. The <tt>card</tt> and <tt>goal</tt> claims are also allowed. Other claims <bcp14>MAY</bcp14> be present, but <bcp14>MUST</bcp14> be ignored by compliant implementations that do not understand them. (Because the callee references the specific SIP dialog via <tt>call-id</tt> and <tt>cseq</tt>, there is no point in repeating fields that describe the dialog, like <tt>orig</tt>, <tt>dest</tt>, and so forth.)</t>
      </section>
    </section>
    <section anchor="verifying">
      <name>Verifying</name>
      <section anchor="verifying-the-caller">
        <name>Verifying the caller</name>
        <section anchor="algorithm">
          <name>Algorithm</name>
          <t>When a verifier encounters a VVP passport, they <bcp14>SHOULD</bcp14> verify by using an algorithm similar to the following. Optimizations may combine or reorder operations, but <bcp14>MUST</bcp14> achieve all of the same guarantees, in order to be compliant implementations.</t>
          <ol spacing="normal" type="1"><li>
              <t>Analyze the <tt>iat</tt> and <tt>exp</tt> claims to evaluate timing. Confirm that <tt>exp</tt> is greater than <tt>iat</tt> and also greater than the reference time for analysis (e.g., <em>now</em>), and that <tt>iat</tt> is close enough to the reference time to satisfy the verifier's tolerance for replays. (A replay attack would have to call from the same <tt>orig</tt> to the same <tt>dest</tt> with the same <tt>iat</tt>, within whatever window the verifier accepts. Thirty seconds is a recommended default value.)</t>
            </li>
            <li>
              <t>Confirm that the <tt>orig</tt>, <tt>dest</tt>, and <tt>iat</tt> claims match contextual observations and other SIP metadata. That is, the passport appears aligned with what is known about the call from external sources.</t>
            </li>
            <li>
              <t>Extract the <tt>kid</tt> header.</t>
            </li>
            <li>
              <t>Fetch the key state for the OP at the reference time from the OOBI in <tt>kid</tt>. Caches may be used to optimize this, as long as they meet the freshness requirements of the verifier.</t>
            </li>
            <li>
              <t>Use the public key of the OP to verify that the signature on the passport is valid for that key state. On success, the verifier knows that the OP is at least making an assertion about the identity and authorizations of the AP. (When reference time is now, this is approximately the level of assurance provided by existing alternatives to VVP.)</t>
            </li>
            <li>
              <t>Extract the <tt>evd</tt> field, which references the dossier (<xref format="counter" target="dossier"/>) that constitutes backing evidence.</t>
            </li>
            <li>
              <t>Use the SAID (<xref format="counter" target="said"/>) of the dossier as a lookup key to see whether the dossier has already been fully validated. Since dossiers are highly stable, caching dossier validations is recommended.</t>
            </li>
            <li>
              <t>If the dossier requires full validation, perform it. Validation includes checking the signature on each ACDC in the dossier's data graph against the key state of its respective issuer at the time the issuance occurred. Key state is proved by the KEL (<xref format="counter" target="KEL"/>), and checked against independent witnesses.  </t>
              <t>
Issuance is recorded explicitly in the KEL's overall event sequence, so this check does not require guesses about how to map issuance timestamps to key state events. Subsequent key rotations do not invalidate this analysis.  </t>
              <t>
Validation also includes comparing data structure and values against the declared schema, plus a full traversal of all chained CVD (<xref format="counter" target="cvd"/>), back to the root of trust for each artifact. The verifier <bcp14>MUST</bcp14> accept the root of trust as a valid authority on the vital question answered by each credential that depends upon it. The correct relationships among evidence artifacts <bcp14>MUST</bcp14> also be checked (e.g., proving that the issuer of one piece is the issuee of another piece).</t>
            </li>
            <li>
              <t>Check to see whether the revocation status of the dossier and each item it depends on has been tested recently enough, at the reference time, to satisfy the verifier's freshness requirements. If no, check for revocations anywhere in the data graph of the dossier. Revocations are not the same as key rotations. They can be checked much more quickly than doing a full validation. Revocation checks can also be cached, possibly with a different freshness threshold than the main evidence.</t>
            </li>
            <li>
              <t>Assuming that the dossier is valid and has no breakages due to revocation, confirm that the OP is authorized to sign the passport. If there is no delegation evidence (<xref format="counter" target="DE"/>), the AP and the OP <bcp14>MUST</bcp14> be identical, and the OP <bcp14>MUST</bcp14> be the issuee of the vetting credential; otherwise, the OP <bcp14>MUST</bcp14> be the issuee of a delegated signing credential for which the issuer is the AP.</t>
            </li>
            <li>
              <t>Extract the <tt>orig</tt> field and compare it to the TNAlloc credential (<xref format="counter" target="tnalloc-credential"/>) cited in the dossier (<xref format="counter" target="dossier"/>) to confirm that the AP (<xref format="counter" target="AP"/>) -- or, if OP is not equal to AP and OP is using their own number, the OP (<xref format="counter" target="OP"/>) -- has the right to originate calls with this number.</t>
            </li>
            <li>
              <t>If the passport includes non-null values for the optional <tt>card</tt> claim, extract that information and check that the brand attributes claimed for the call are justified by a brand credential (<xref format="counter" target="brand-credential"/>) in the dossier.</t>
            </li>
            <li>
              <t>Check any business logic. For example, if the passport includes a non-null value for the optional <tt>goal</tt> claim, confirm that the verifier is willing to accept a call with that goal. Or, if the delegated signer credential says that the OP can only call on behalf of the AP during certain hours, or in certain geos, check those attributes of the call.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="verifying-the-callee">
        <name>Verifying the callee</name>
        <t>The callee is verified with an algorithm that <bcp14>MAY</bcp14> be optimized but <bcp14>MUST</bcp14> achieve the same security guarantees as this:</t>
        <ol spacing="normal" type="1"><li>
            <t>Confirm that the <tt>call-id</tt> and <tt>cseq</tt> claims match the values of <tt>Call-ID</tt> and <tt>CSeq</tt> from the preceding SIP INVITE.</t>
          </li>
          <li>
            <t>Confirm that the <tt>iat</tt> claim matches contextual observations and other SIP metadata. That is, the timing described by the callee appears aligned with what is known about the call from external sources.</t>
          </li>
          <li>
            <t>If the <tt>exp</tt> claim is present, analyze the <tt>iat</tt> and <tt>exp</tt> claims to evaluate timeout.</t>
          </li>
          <li>
            <t>Extract the <tt>kid</tt> header.</t>
          </li>
          <li>
            <t>Fetch the key state for the callee at the reference time from the OOBI in <tt>kid</tt>. Caches may be used to optimize this, as long as they meet the freshness requirements of the verifier.</t>
          </li>
          <li>
            <t>Use the public key of the callee to verify that the signature on the passport is valid for that key state.</t>
          </li>
          <li>
            <t>Extract the <tt>evd</tt> field, which references the dossier (<xref format="counter" target="dossier"/>) that constitutes backing evidence.</t>
          </li>
          <li>
            <t>Use the SAID (<xref format="counter" target="said"/>) of the dossier as a lookup key to see whether the dossier has already been fully validated. Since dossiers are highly stable, caching dossier validations is recommended.</t>
          </li>
          <li>
            <t>Confirm that the dossier was signed (issued) by the same AID that appears in the <tt>kid</tt> header.</t>
          </li>
          <li>
            <t>If the dossier requires full validation, perform it.</t>
          </li>
          <li>
            <t>Check to see whether the revocation status of the dossier and each item it depends on has been tested recently enough, at the reference time, to satisfy the verifier's freshness requirements.</t>
          </li>
          <li>
            <t>Compare the callee's TN to the TNAlloc credential (<xref format="counter" target="tnalloc-credential"/>) cited in the dossier (<xref format="counter" target="dossier"/>) to confirm that the callee has the right to accept calls at this number.</t>
          </li>
          <li>
            <t>If the passport includes non-null values for the optional <tt>card</tt> claim, extract that information and check that the brand attributes claimed for the call are justified by a brand credential (<xref format="counter" target="brand-credential"/>) in the dossier.</t>
          </li>
          <li>
            <t>Check any business logic. For example, if the passport includes a non-null value for the optional <tt>goal</tt> claim, and the preceding INVITE included a VVP passport that also declared a goal, confirm that the callee's and caller's goals overlap (one must be a subset of the other). Or, if the delegated signer credential says that a call center or an AI can accept calls during certain hours, or in certain geos, check those attributes of the call.</t>
          </li>
        </ol>
      </section>
      <section anchor="planning-for-efficiency">
        <name>Planning for efficiency</name>
        <t>A complete verficiation of either caller or callee passport, from scratch, is quite rigorous. With no caches, it may take several seconds, much like a thorough validation of a certificate chain. However, much VVP evidence is stable for long periods of time and lends itself to caching, subject to the proviso that revocation freshness must be managed wisely. Since the same dossier is used to add assurance to many calls -- perhaps thousands or millions of calls, for busy call centers -- and many dossiers will reference the same issuers and issuees and their associated key states and KELs (<xref format="counter" target="KEL"/>), caching will produce huge benefits.</t>
        <t>Furthermore, because SAIDs and their associated data (including links to other nodes in a data graph) have a tamper-evident relationship, any party can perform validation and compile their results, then share the data with verifiers that want to do less work. Validators like this are not oracles, because consumers of such data need not trust shared results blindly. They can always directly recompute some or all of it from a passport, to catch deception. However, they can do this lazily or occasionally, per their preferred balance of risk/effort.</t>
        <t><em>In toto</em>, these characteristics mean that no centralized registry is required in any given ecosystem. Data can be fetched directly from its source, across jurisdictional boundaries. Because it is fetched from its source, it comes with consent. Privacy can be tuned (see <xref format="counter" target="privacy"/>). Simple opportunistic, uncoordinated reuse (e.g., in or across the datacenters of TSPs) will arise spontaneously and will dramatically improve the scale and efficiency of the system.</t>
      </section>
      <section anchor="historical-analysis">
        <name>Historical analysis</name>
        <t>Normally, the verification algorithm determines whether the passport verifies <em>now</em>. (This is the only evaluation that's valid for most JWTs, because they depend on ephemeral key state fetched just in time from <tt>x5u</tt>). However, a VVP passport can do more. Its <tt>kid</tt> header references a KEL for the signer's AID, and its <tt>evd</tt> header references a dossier issued by either the AID of the AP or the AID of the callee. From thence it connects to a KEL (see <xref format="counter" target="KEL"/>). These data structures provide key state transitions that are timestamped -- both by the controllers of the AIDs, and by their independent witnesses. Although the timestamps are not guaranteed to be perfectly synchronized, they can be compared to establish fuzzy transition times and to detect duplicity.</t>
        <t>Using this historical information, it becomes possible to ask whether a VVP passport verified at an arbitrary moment in the past. In such framings, the reference time from the verification algorithm is <em>then</em>, not <em>now</em>. In the normal case where <em>then</em> falls outside a fuzzy range, answers about key state are clear to all observers. In the rare cases where <em>then</em> falls inside a fuzzy range, a state transition was underway but not yet universally known, and a verifier can compute the key state (and thence, the outcome of the verification algorithm) according to their preferred interpretation.</t>
      </section>
    </section>
    <section anchor="curating">
      <name>Curating</name>
      <t>The evidence that's available in today's telco ecosystems resembles some of the evidence described here, in concept. However, existing evidence has gaps, and its format is fragile. It requires direct trust in the proximate issuer, and it typically needs to be organized for discovery; both characteristics lead to large, centralized registries at a regional or national level. These registries become a trusted third party, which defeats some of the purpose of creating decentralized and independently verifiable evidence in the first place. Sharing such evidence across jurisdiction boundaries requires regulatory compatibility and bilateral agreements. Sharing at scale is impractical at best, if not illegal.</t>
      <t>How evidence is issued, propagated, quality-controlled, and referenced is therefore an important concern for this specification.</t>
      <section anchor="activities">
        <name>Activities</name>
        <t>The following curation activities guarantee the evidence upon which a VVP ecosystem depends.</t>
        <section anchor="witnessing-and-watching">
          <name>Witnessing and watching</name>
          <t>In an ACDC-based ecosystem, issuers issue and revoke their own evidence without any calls to a centralized registry or authority. However, KERI's decentralized witness feature <bcp14>MUST</bcp14> be active. This provides an official, uniform, and high-security methodology for curating the relationship between keys and identifiers, and between identifiers and non-repudiable actions like issuing and revoking credentials. In addition, watchers <bcp14>MAY</bcp14> be used by given verifiers, to provide efficient caching, pub-sub notifications of state changes, and duplicity detection. For more about these topics, see <xref format="counter" target="appendix-b"/>.</t>
        </section>
        <section anchor="vetting-identity">
          <name>Vetting identity</name>
          <t>Entities that <bcp14>SHOULD</bcp14> be vetted in a VVP ecosystem include APs <xref format="counter" target="AP"/>, but also OPs <xref format="counter" target="OP"/> and callees <xref format="counter" target="TP"/>, depending on which identities need to be verified. The job of vetting legal entities and issuing vetting credentials (<xref format="counter" target="vetting-credential"/>) is performed by a <em>legal entity vetter</em>. VVP <bcp14>MUST</bcp14> have evidence of vetted identity. It places few requirements on such vetters, other than the ones already listed for vetting credentials themselves. Vetting credentials <bcp14>MAY</bcp14> expire, but this is not particularly desirable and might actually be an antipattern. ACDCs and AIDs facilitate much longer lifecycles than certificates; proactive key rotation is recommended but creates no reason to rotate evidence. However, a legal entity vetter <bcp14>MUST</bcp14> agree to revoke vetting credentials in a timely manner if the legal status of an entity changes, or if data in a vetting credential becomes invalid.</t>
        </section>
        <section anchor="vetting-brand">
          <name>Vetting brand</name>
          <t>At the option of the verified entities, VVP <bcp14>MAY</bcp14> prove brand attributes. When this feature is active, the job of analyzing the brand assets of a legal entity and issuing brand credentials (<xref format="counter" target="brand-credential"/>) is performed by a <em>brand vetter</em>. A brand vetter <bcp14>MAY</bcp14> be a legal entity vetter, and <bcp14>MAY</bcp14> issue both types of credentials after a composite analysis. However, the credentials themselves <bcp14>MUST NOT</bcp14> use a combined schema, the credentials <bcp14>SHOULD</bcp14> have independent lifecycles. This allows the assurances associated with each credential type to remain independent.</t>
          <t>A brand vetter <bcp14>MUST</bcp14> verify the canonical properties of a brand, but it <bcp14>MUST</bcp14> do more than this: it <bcp14>MUST</bcp14> issue the brand credential to the AID <xref format="counter" target="aid"/> of an issuee that is also the issuee of a vetting credential that already exists, and it <bcp14>MUST</bcp14> verify that the legal entity in the vetting credential has a right to use the brand in question. This link <bcp14>MUST NOT</bcp14> be based on mere weak evidence such as an observation that the legal entity's name and the brand name have some or all words in common, or the fact that a single person requested both credentials. Further, the brand vetter <bcp14>MUST</bcp14> agree to revoke brand credentials in a timely manner if the associated vetting credential is revoked, if the legal entity's right to use the brand changes, or if characteristics of the brand evolve.</t>
        </section>
        <section anchor="allocating-tns">
          <name>Allocating TNs</name>
          <t>At the option of the AP and OP, VVP <bcp14>SHOULD</bcp14> prove the right to use the originating phone number. At the option of the callee, VVP <bcp14>MAY</bcp14> prove the right to use the terminating phone number. When this feature is active, regulators <bcp14>MUST</bcp14> issue TNAlloc credentials (<xref format="counter" target="tnalloc-credential"/>) to range holders, and range holders <bcp14>MUST</bcp14> issue them to downstream AHs in an unbroken chain that reaches telephone number users (TNUs; see <xref format="counter" target="allocation-holder"/>). TNUs <bcp14>MAY</bcp14> in turn issue them to a delegate such as a call center. If aggregators or other intemediaries hold an RTU in the eyes of a regulator, then intermediate TNAlloc credentials <bcp14>MUST</bcp14> be created to track that RTU as part of the chain. On the other hand, if TNUs acquire phone numbers through aggregators, but regulators do not consider aggregators to hold allocations, then aggregators <bcp14>MUST</bcp14> work with range holders to assure that the appropriate TNAlloc credentials are issued to the TNUs.</t>
        </section>
        <section anchor="authorizing-brand-proxy">
          <name>Authorizing brand proxy</name>
          <t>When VVP is used to prove brand, VPs (<xref format="counter" target="VP"/>) <bcp14>MAY</bcp14> issue brand proxy credentials (<xref format="counter" target="brand-proxy-credential"/>) to delegates, giving them the right to use the VP's brand. Without this credential, the delegate has the right to use the phone number, not the brand.</t>
          <t>Decisions about whether to issue vetting and brand credentials might be driven by large databases of metadata about organizations and brands, but how such systems work is out of scope. The credentials themselves contain all necessary information, and once credentials are issued, they constitute an independent source of truth as far as VVP is concerned. No party has to return to the operators of such databases to validate anything.</t>
        </section>
        <section anchor="delegating-signing-authority">
          <name>Delegating signing authority</name>
          <t>A VP (<xref format="counter" target="VP"/>) <bcp14>MUST</bcp14> prove, by issuing a delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>), that the signer of its VVP passports does so with its explicit authorization. Normally the signer is automation under the control of the delegate, but the issuee of the credential <bcp14>MAY</bcp14> vary at the VP's discretion.</t>
          <t>Since this credential merely documents the issuer's intent to be accountable for the actions of the signer, the VP <bcp14>MAY</bcp14> choose whatever process it likes to issue it.</t>
        </section>
        <section anchor="revoking">
          <name>Revoking</name>
          <t>Revoking an ACDC is as simple as the issuer signing a revocation event and distributing it to witnesses (see <xref format="counter" target="appendix-b"/>). Parties that perform a full validation of a given ACDC (see <xref format="counter" target="verifying"/>) will automatically detect the revocation event in realtime, because they will contact one or more of these witnesses. Parties that are caching their validations <bcp14>MAY</bcp14> poll witnesses very efficiently to discover revocation events. Some witnesses may choose to offer the option of registering a callback, allowing interested parties to learn about revocations even more efficiently.</t>
        </section>
      </section>
      <section anchor="building-blocks">
        <name>Building blocks</name>
        <t>The term "credential" has a fuzzy meaning in casual conversation. However, understanding how evidence is built from credentials in VVP requires considerably more precision. We will start from lower-level concepts.</t>
        <section anchor="said">
          <name>SAID</name>
          <t>A <em>self-addressing identifier</em> (<em>SAID</em>) is the hash of a canonicalized JSON object, encoded in self-describing CESR format <xref target="TOIP-CESR"/>. The raw bytes from the digest function are left-padded to the nearest 24-bit boundary and transformed to base64url <xref target="RFC4648"/>. The left-pad char from the converted left-pad byte is replaced with a code char that tells which digest function was used.</t>
          <t>An example of a SAID is <tt>E81Wmjyz5nXMCYrQqWyRLAYeKNQvYLYqMLYv_qm-qP7a</tt>, and a regex that matches all valid SAIDs is: <tt>[EFGHI][-_\w]{43}|0[DEFG][-_\w]{86}</tt>. The <tt>E</tt> prefix in the example indicates that it is a Blake3-256 hash.</t>
          <t>SAIDs are evidence that hashed data has not changed. They can also function like a reference, hyperlink, or placeholder for the data that was hashed to produce them (though they are more similar to URNs than to URLs <xref target="RFC3986"/>, since they contain no location information).</t>
        </section>
        <section anchor="signature">
          <name>Signature</name>
          <t>A digital signature over arbitrary data D constitutes evidence that the signer processed D with a signing function that took D and the signer's private key as inputs: <tt>signature = sign(D, privkey)</tt>. The evidence can be verified by checking that the signature is bound to D and the public key of the signer: <tt>valid = verify(signature, D, pubkey)</tt>. Assuming that the signer has not lost unique control of the private key, and that cryptography is appropriately strong, we are justified in the belief that the signer must have taken deliberate action that required seeing an unmodified D in its entirety.</t>
          <t>The assumption that a signer has control over their private keys may often be true (or at least believed, by the signer) at the time a signature is created. However, after key compromise, an attacker can create and sign evidence that purports to come from the current or an earlier time period, unless signatures are anchored to a data source that detects anachronisms. Lack of attention to this detail undermines the security of many credential schemes, including in telco. VVP explicitly addresses this concern by anchoring signatures on non-ephemeral evidence to KELs (<xref format="counter" target="KEL"/>).</t>
        </section>
        <section anchor="aid">
          <name>AID</name>
          <t>An <em>autonomic identifier</em> (<em>AID</em>) is a short string that can be resolved to one or more cryptographic keys at a specific version of the identifier's key state. Using cryptographic keys, a party can prove it is the controller of an AID by creating digital signatures. AIDs are like W3C DIDs <xref target="W3C-DID"/>, and can be transformed into DIDs. The information required to resolve an AID to its cryptographic keys is communicated through a special form of URI called an <em>out-of-band invitation</em> (<em>OOBI</em>). An OOBI points to an HTTP resource that returns IANA content-type <tt>application/json+cesr</tt>; it is somewhat analogous to a combination of the <tt>kid</tt> and <tt>x5u</tt> constructs in many JWTs. AIDs and OOBIs are defined in the KERI spec <xref target="TOIP-KERI"/>.</t>
          <t>An example of an AID is <tt>EMCYrQqWyRLAYqMLYv_qm-qP7eKN81Wmjyz5nXQvYLYa</tt>. AIDs are created by calculating the hash of the identifier's initial state; since this state is typically a canonicalized JSON object, AIDs usually match the same regex as SAIDs (which are hashes of JSON). A noteworthy exception is that non-transferrable AIDs begin with <tt>B</tt> instead of <tt>E</tt> or another letter. Such AIDs hash only their public key, not a document. They are analogous to did:key values, and play a limited role in VVP. They are incapable of rotating keys or anchoring events to a KEL. They therefore lack OOBIs and can receive but not issue ACDCs. However, their virtue is that they can be created and used without a sophisticated wallet. This may make them a convenient way to identify the automation that signs passports and receives a delegated signer credential (see <xref format="counter" target="delegating-signing-authority"/>).</t>
          <t>An example of an OOBI for an AID is <tt>https://agentsrus.net/oobi/EMCYrQqWyRLAYqMLYv_qm-qP7eKN81Wmjyz5nXQvYLYa/agent/EAxBDJkpA0rEjUG8vJrMdZKw8YL63r_7zYUMDrZMf1Wx</tt>. Note the same <tt>EMCY...</tt> in the AID and its OOBI. Many constructs in KERI may have OOBIs, but when OOBIs are associated with AIDs, such OOBIs always contain their associated AID as the first URL segment that matches the AID regex. They point either to an agent or a witness that provides verifiable state information for the AID.</t>
          <t>AIDs possess several security properties (e.g., self-certification, support for prerotation and multisig, support for witnesses, and cooperative delegation) that are not guaranteed by DIDs in general. Such properties are vital to some of VVP's goals for high assurance.</t>
        </section>
        <section anchor="signatures-over-saids">
          <name>Signatures over SAIDs</name>
          <t>Since neither a SAID value nor the data it hashes can be changed without breaking the correspondence between them, and since the cryptographic hash function used ensures strong collision resistance, signing over a SAID is equivalent, in how it commits the signer to content and provides tamper evidence, to signing over the data that the SAID hashes. Since SAIDs can function as placeholders for JSON objects, a SAID can represent such an object in a larger data structure. And since SAIDs can function as a reference without making a claim about location, it is possible to combine these properties to achieve some indirections in evidence that are crucial in privacy and regulatory compliance.</t>
          <t>VVP uses SAIDs and digital signatures as primitive forms of evidence.</t>
        </section>
        <section anchor="x509-certificates">
          <name>X509 certificates</name>
          <t>VVP does not depend on X509 certificates <xref target="RFC5280"/> for any of its evidence. However, if deployed in a hybrid mode, it <bcp14>MAY</bcp14> be used beside alternative mechanisms that are certificate-based. In such cases, self-signed certificates that never expire might suffice to tick certificate boxes, while drastically simplifying the burden of maintaining accurate, unexpired, unrevoked views of authorizations and reflecting that knowledge in certificates. This is because deep authorization analysis flows through VVP's more rich and flexible evidence chain. See <xref format="counter" target="interoperability"/>.</t>
        </section>
        <section anchor="passport">
          <name>Passport</name>
          <t>VVP uses STIR PASSporTs that are fully compliant with <xref target="RFC8225"/> in all respects, except that it <bcp14>MAY</bcp14> omit the <tt>x5u</tt> header that links it to an X509 certificate (see <xref format="counter" target="interop-certs"/>).</t>
          <t>The passport is a form of evidence suitable for evaluation during the brief interval when a call is being initiated, and it is carefully backed by evidence with a longer lifespan (<xref format="counter" target="dossier"/>). Conceptually, VVP's version is similar to a SHAKEN passport <xref target="RFC8588"/>. It <bcp14>MAY</bcp14> also reference brand-related evidence, allowing it to play an additional role similar to the RCD passport <xref target="RCD-PASSPORT"/>.</t>
          <t>Neither VVP's backing evidence nor its passport depends on a certificate authority ecosystem. The passport <bcp14>MUST</bcp14> be secured by an EdDSA digital signature <xref target="RFC8032"/>, <xref target="FIPS186-4"/>, rather than the signature variants preferred by the other passport types. Instead of including granular fields in the claims of its JWT, the VVP passport cites a rich data graph of evidence by referencing the SAID of that data graph. This indirection and its implications are discussed below.</t>
          <figure>
            <name>SHAKEN Passport compared to VVP Passport</name>
            <artset>
              <artwork type="svg" name="fig1.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="528" viewBox="0 0 528 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                  <path d="M 200,32 L 200,192" fill="none" stroke="black"/>
                  <path d="M 232,64 L 232,224" fill="none" stroke="black"/>
                  <path d="M 296,32 L 296,176" fill="none" stroke="black"/>
                  <path d="M 488,32 L 488,176" fill="none" stroke="black"/>
                  <path d="M 520,144 L 520,224" fill="none" stroke="black"/>
                  <path d="M 8,32 L 200,32" fill="none" stroke="black"/>
                  <path d="M 296,32 L 488,32" fill="none" stroke="black"/>
                  <path d="M 192,64 L 232,64" fill="none" stroke="black"/>
                  <path d="M 472,144 L 520,144" fill="none" stroke="black"/>
                  <path d="M 296,176 L 488,176" fill="none" stroke="black"/>
                  <path d="M 8,192 L 200,192" fill="none" stroke="black"/>
                  <path d="M 160,224 L 232,224" fill="none" stroke="black"/>
                  <path d="M 488,224 L 520,224" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="496,224 484,218.4 484,229.6" fill="black" transform="rotate(180,488,224)"/>
                  <polygon class="arrowhead" points="168,224 156,218.4 156,229.6" fill="black" transform="rotate(180,160,224)"/>
                  <circle cx="464" cy="144" r="6" class="opendot" fill="white" stroke="black"/>
                  <g class="text">
                    <text x="104" y="20">SHAKEN Passport</text>
                    <text x="396" y="20">VVP Passport</text>
                    <text x="56" y="52">protected</text>
                    <text x="344" y="52">protected</text>
                    <text x="108" y="68">kid: pubkey of OSP</text>
                    <text x="380" y="68">kid: AID of OP</text>
                    <text x="48" y="84">payload</text>
                    <text x="336" y="84">payload</text>
                    <text x="48" y="100">iat</text>
                    <text x="336" y="100">iat</text>
                    <text x="52" y="116">orig</text>
                    <text x="340" y="116">orig or call-id</text>
                    <text x="52" y="132">dest</text>
                    <text x="340" y="132">dest or cseq</text>
                    <text x="60" y="148">attest</text>
                    <text x="392" y="148">evd (JL to dossier)</text>
                    <text x="92" y="164">...more claims</text>
                    <text x="368" y="164">signature of OP</text>
                    <text x="84" y="180">signature of OSP</text>
                    <text x="92" y="228">pubkey in cert</text>
                    <text x="388" y="228">data graph of evidence</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig1.txt">
&lt;![CDATA[
     SHAKEN Passport                       VVP Passport
+-----------------------+           +-----------------------+
| protected             |           | protected             |
|   kid: pubkey of OSP -+---+       |   kid: AID of OP      |
| payload               |   |       | payload               |
|   iat                 |   |       |   iat                 |
|   orig                |   |       |   orig or call-id     |
|   dest                |   |       |   dest or cseq        |
|   attest              |   |       |   card                |
|   ...more claims      |   |       |   evd (JL to dossier)-+---+
| signature of OSP      |   |       | signature of OP       |   |
+-----------------------+   |       +-----------------------+   |
                            |                                   |
                            |                                   |
    pubkey in cert &lt;--------+        data graph of evidence &lt;---+
]]&gt;
    </artwork>
            </artset>
          </figure>
        </section>
        <section anchor="acdcs">
          <name>ACDCs</name>
          <t>Besides digital signatures and SAIDs, and the ephemeral passport, VVP uses long-lasting evidence in the ACDC format <xref target="TOIP-ACDC"/>. This is normalized, serialized data with an associated digital signature. Unlike X509 certificates, ACDCs are bound directly to the AIDs of their issuers and issuees, not to public keys of these parties. This has a radical effect on the lifecycle of evidence, because keys can be rotated without invalidating ACDCs (see <xref format="counter" target="appendix-a"/>).</t>
        </section>
        <section anchor="KEL">
          <name>KELs</name>
          <t>Unlike X509 certificates, JWTs <xref target="RFC7519"/>, and W3C Verifiable Credentials <xref target="W3C-VC"/>, signatures over ACDC data are not <em>contained inside</em> the ACDC; rather, they are <em>referenced by</em> the ACDC and <em>anchored in</em> a verifiable data structure called a <em>key event log</em> or <em>KEL</em> <xref target="TOIP-KERI"/>.</t>
          <figure>
            <name>X509 compared to ACDC</name>
            <artset>
              <artwork type="svg" name="fig2.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="456" viewBox="0 0 456 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                  <path d="M 200,32 L 200,192" fill="none" stroke="black"/>
                  <path d="M 248,32 L 248,192" fill="none" stroke="black"/>
                  <path d="M 248,240 L 248,288" fill="none" stroke="black"/>
                  <path d="M 376,240 L 376,288" fill="none" stroke="black"/>
                  <path d="M 432,64 L 432,272" fill="none" stroke="black"/>
                  <path d="M 448,32 L 448,192" fill="none" stroke="black"/>
                  <path d="M 8,32 L 200,32" fill="none" stroke="black"/>
                  <path d="M 248,32 L 448,32" fill="none" stroke="black"/>
                  <path d="M 400,64 L 432,64" fill="none" stroke="black"/>
                  <path d="M 8,192 L 200,192" fill="none" stroke="black"/>
                  <path d="M 248,192 L 448,192" fill="none" stroke="black"/>
                  <path d="M 248,240 L 376,240" fill="none" stroke="black"/>
                  <path d="M 376,272 L 432,272" fill="none" stroke="black"/>
                  <path d="M 248,288 L 376,288" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(180,400,64)"/>
                  <g class="text">
                    <text x="28" y="20">X509</text>
                    <text x="268" y="20">ACDC</text>
                    <text x="36" y="52">Data</text>
                    <text x="304" y="52">v (version)</text>
                    <text x="64" y="68">Version</text>
                    <text x="324" y="68">d (SAID of item)</text>
                    <text x="88" y="84">Serial Number</text>
                    <text x="328" y="84">i (AID of issuer)</text>
                    <text x="100" y="100">Issuer: DN of issuer</text>
                    <text x="340" y="100">ri (status registry)</text>
                    <text x="52" y="116">Validity</text>
                    <text x="300" y="116">s (schema)</text>
                    <text x="104" y="132">Subject: DN of issuee</text>
                    <text x="316" y="132">a (attributes)</text>
                    <text x="104" y="148">Sub PubKey Info: KeyX</text>
                    <text x="336" y="148">i (AID of issuee)</text>
                    <text x="60" y="164">Extensions</text>
                    <text x="340" y="164">dt (issuance date)</text>
                    <text x="56" y="180">Signature</text>
                    <text x="292" y="180">...etc</text>
                    <text x="256" y="228">KEL</text>
                    <text x="312" y="260">signed anchor</text>
                    <text x="292" y="276">for SAID</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig2.txt">
&lt;![CDATA[
 X509                          ACDC
+-----------------------+     +------------------------+
| Data                  |     | v (version)            |
|   Version             |     | d (SAID of item) &lt;---+ |
|   Serial Number       |     | i (AID of issuer)    | |
| Issuer: DN of issuer  |     | ri (status registry) | |
| Validity              |     | s (schema)           | |
| Subject: DN of issuee |     | a (attributes)       | |
| Sub PubKey Info: KeyX |     |  i (AID of issuee)   | |
| Extensions            |     |  dt (issuance date)  | |
| Signature             |     |  ...etc              | |
+-----------------------+     +----------------------+-+
                                                     |
                              KEL                    |
                              +---------------+      |
                              | signed anchor |      |
                              | for SAID      +------+
                              +---------------+
]]&gt;
    </artwork>
            </artset>
          </figure>
          <t>A KEL has some trust characteristics that resemble a blockchain. However, it is specific to one AID only (the AID of the issuer of the ACDC) and thus is not centralized. The KELs for two different AIDs need not (and typically do not) share any common storage or governance, and do not require coordination or administration. KELs thus suffer none of the performance and governance problems of blockchains, and incur none of blockchain's difficulties with regulatory requirements like data locality or right to be forgotten.</t>
          <t>ACDCs can be freely converted between text and binary representations, and either type of representation can also be compacted or expanded to support nuanced disclosure goals (see <xref format="counter" target="graduated-disclosure"/>). An ACDC is also uniquely identified by its SAID, which means that a SAID can take the place of a full ACDC in certain data structures and processes. None of these transformations invalidate the associated digital signatures, which means that any variant of a given ACDC is equivalently verifiable.</t>
          <t>The revocation of a given ACDC can be detected via the witnesses declared in its issuer's KEL. Discovering, detecting, and reacting to such events can be very efficient. Any number of aggregated views can be built on demand, for any subset of an ecosystem's evidence, by any party. This requires no special authority or access, and does not create a central registry as a source of truth, since such views are tamper-evident and therefore can be served by untrusted parties. Further, different views of the evidence can contain or elide different fields of the evidence data, to address privacy, regulatory, and legal requirements.</t>
        </section>
        <section anchor="cvd">
          <name>CVD</name>
          <t><em>Cryptographically verifiable data</em> (<em>CVD</em>) is data that's associated with a digital signature and a claim about who signed it. When CVD is an assertion, we make the additional assumption that the signer intends whatever the data asserts, since they took an affirmative action to create non-repudiable evidence that they processed it. CVD can be embodied in many formats, but in the context of VVP, all instances of CVD are ACDCs. When CVD references other CVD, the computer science term for the resulting data structure is a <em>data graph</em>.</t>
        </section>
        <section anchor="credential">
          <name>Credential</name>
          <t>A <em>credential</em> is a special kind of CVD that asserts entitlements for its legitimate bearer -- <em>and only its bearer</em>. CVD that says Organization X exists with a particular ID number in government registers, and with a particular legal name, is not necessarily a credential. In order to be a credential, it would have to be associated with an assertion that its legitimate bearer -- <em>and only its bearer</em> -- is entitled to use the identity of Organization X. If signed data merely enumerates properties without conferring privileges on a specific party, it is just CVD. Many security gaps in existing solutions arise from conflating CVD and credentials.</t>
          <t>ACDCs can embody any kind of CVD, not just credentials.</t>
        </section>
        <section anchor="bearer-token">
          <name>Bearer token</name>
          <t>VVP never uses bearer tokens, but we define them here to provide a contrast. A <em>bearer token</em> is a credential that satisfies binding requirements by a trivial test of possession -- like a movie ticket, the first party that presents the artifact to a verifier gets the privilege. Since Bearer Credentials can be stolen or copied, this is risky. JWTs, session cookies, and other artifacts in familiar identity technologies are often bearer tokens, even if they carry digital signatures. Although they can be protected to some degree by expiration dates and secure channels, these protections are imperfect. For example, unbeknownst to the parties on either end, TLS channels can be terminated and recreated at multiple places between call origination and delivery.</t>
        </section>
        <section anchor="targeted-credential">
          <name>Targeted credential</name>
          <t>A <em>targeted credential</em> is a CVD that identifies an issuee as the bearer, and that requires the issuee to prove their identity cryptographically (e.g., to produce a proper digital signature) in order to claim the associated privilege. All credentials in VVP are targeted credentials.</t>
        </section>
        <section anchor="jl">
          <name>JL</name>
          <t>A <em>justifying link</em> (<em>JL</em>) is a reference, inside of one CVD, to another CVD that justifies what the first CVD is asserting. JLs can be SAIDs that identify other ACDCs. JLs are edges in an ACDC data graph.</t>
        </section>
      </section>
      <section anchor="specific-artifacts">
        <name>Specific artifacts</name>
        <section anchor="pss">
          <name>PSS</name>
          <t>Each voice call begins with a SIP INVITE. If VVP is being used to make a caller verifiable, each SIP INVITE contains an <tt>Identity</tt> header that <bcp14>MUST</bcp14> have a signature from the call's OP (<xref format="counter" target="OP"/>). If VVP is being used to make a callee verifiable, each <tt>200 OK</tt> response contains an <tt>a=callee-passport</tt> attribute line in its body, where the passport has a signature from the callee. In either case, the <em>passpport-specific signature</em> (<em>PSS</em>) <bcp14>MUST</bcp14> be an Ed25519 signature serialized as CESR; it is NOT a JWS. The 64 raw bytes of the signature are left-padded to 66 bytes, then base64url-encoded. The <tt>AA</tt> at the front of the result is cut and replaced with <tt>0B</tt>, giving an 88-character string. A regex that matches the result is: <tt>0B[-_\w]{86}</tt>, and a sample value (with the middle elided) is: <tt>0BNzaC1lZD...yRLAYeKNQvYx</tt>.</t>
          <t>The signature <bcp14>MUST</bcp14> be the result of running the EdDSA algorithm over input data in the manner required by <xref target="RFC7519"/>: <tt>signature = sign(base64url(header) + "." + base64url(payload)</tt>. Also per the JWT spec, when the signature is added to the compact form of the JWT, it <bcp14>MUST</bcp14> be appended to the other two portions of the JWT, with a <tt>.</tt> delimiter preceding it. Per STIR conventions, it <bcp14>MUST</bcp14> then be followed by ";ppt=vvp" so tools that scan the string can decide how to process the passport without doing a full parse of the JWT.</t>
          <t>The headers in a VVP passport <bcp14>MUST</bcp14> include <tt>alg</tt>, <tt>typ</tt>, <tt>ppt</tt>, and <tt>kid</tt>, as described in <xref format="counter" target="sample-passport"/>. They <bcp14>MAY</bcp14> include other values, notably <tt>x5u</tt> (see <xref format="counter" target="interop-certs"/>). The claims <bcp14>MUST</bcp14> always include <tt>iat</tt> and <tt>evd</tt>. Caller passports <bcp14>MUST</bcp14> also include <tt>orig</tt>, <tt>dest</tt>, and <tt>exp</tt>; callee passports <bcp14>MUST</bcp14> also include <tt>call-id</tt> and <tt>cseq</tt>, and <bcp14>MAY</bcp14> include <tt>exp</tt>. Passports <bcp14>MAY</bcp14> include <tt>card</tt>, <tt>goal</tt>, <tt>call_reason</tt>, <tt>jti</tt>, <tt>origId</tt>, and other values (also described in <xref format="counter" target="sample-passport"/>). The signature <bcp14>MUST</bcp14> use all headers and all claims as input to the data stream that will be signed.</t>
        </section>
        <section anchor="dossier">
          <name>Dossier</name>
          <t>The <tt>evd</tt> field in the passport contains the OOBI (<xref format="counter" target="aid"/>) of an ACDC data graph called the <em>dossier</em>. The dossier is a compilation of all the permanent, backing evidence that justifies trust in the identity and authorization of the AP and OP (when referenced by the caller) or of the callee (when referenced the other direction). It is created and must be signed by the party that uses it. It is CVD (<xref format="counter" target="cvd"/>) asserted to the world, not a credential (<xref format="counter" target="credential"/>) issued to a specific party.</t>
        </section>
        <section anchor="VPE">
          <name>Verified Party Evidence</name>
          <t>The dossier <bcp14>MUST</bcp14> include at least what is called <em>verified party evidence</em> (<em>VPE</em>).</t>
          <t>VPE consists of several credentials, explored in detail below. It <bcp14>MUST</bcp14> include a vetting credential for the verified party (the AP or the callee). It <bcp14>SHOULD</bcp14> include a TNAlloc credential that proves RTU. Normally the RTU <bcp14>MUST</bcp14> be assigned to the verified party; however, if a proxy is active and uses their own phone number, the RTU <bcp14>MUST</bcp14> be assigned to the proxy instead. If the verified party intends to contextualize the call with a brand, it <bcp14>MUST</bcp14> include a brand credential for the verified party. (In cases where callers are private individuals, "brand" maps to descriptive information about the individual, as imagined in mechanisms like VCard <xref target="RFC6350"/> or JCard <xref target="RFC7095"/>.) If no brand credential is present, verifiers <bcp14>MUST NOT</bcp14> impute a brand to the call on the basis of any VVP guarantees. VPE <bcp14>MAY</bcp14> also include evidence that will aid in settlement.</t>
        </section>
        <section anchor="DE">
          <name>Delegation Evidence</name>
          <t>When a private individual makes a call with VVP, they might be both the AP and the OP; when they receive a call, they are the callee. An AID belonging to such an individual is likely to be the issuee (recipient) of all the VPE, and no backing evidence beyond the VPE may be necessary. However, in business contexts, it will almost always be true that the OP role is played by a delegate, and callees may be proxied as well. In such conditions, evidence must also include proof that this indirection is valid. We call this <em>delegation evidence</em> (<em>DE</em>).</t>
          <t>DE is nearly always required when the verified party is an organization, because the cryptographic identifier for the organization as a legal entity is typically not the same as the cryptographic identifier for the organization's automated software that prepares SIP INVITEs or SIP responses. DE can thus distinguish between Acme Corporation in general, and software operated by Acme's IT department for the express purpose of signing voice traffic. The former has a vetting credential and legal accountability, and can act as the company to publish press releases, prepare invoices, spend money, and make attestations to regulators; the latter should only be able to sign voice calls on Acme's behalf. Failing to make this distinction creates serious cybersecurity risks.</t>
          <t>Delegation evidence may also be used to prove that an AI-powered agent is empowered to interact on phone calls on behalf of a verified party.</t>
          <figure>
            <name>Sample evidence graph; OP kid could bind to VPE or DE</name>
            <artset>
              <artwork type="svg" name="fig3.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="528" width="512" viewBox="0 0 512 528" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 24,32 L 24,128" fill="none" stroke="black"/>
                  <path d="M 24,240 L 24,272" fill="none" stroke="black"/>
                  <path d="M 24,304 L 24,352" fill="none" stroke="black"/>
                  <path d="M 24,400 L 24,432" fill="none" stroke="black"/>
                  <path d="M 24,464 L 24,512" fill="none" stroke="black"/>
                  <path d="M 128,192 L 128,208" fill="none" stroke="black"/>
                  <path d="M 216,32 L 216,88" fill="none" stroke="black"/>
                  <path d="M 216,104 L 216,128" fill="none" stroke="black"/>
                  <path d="M 224,240 L 224,272" fill="none" stroke="black"/>
                  <path d="M 224,304 L 224,352" fill="none" stroke="black"/>
                  <path d="M 224,400 L 224,512" fill="none" stroke="black"/>
                  <path d="M 248,192 L 248,416" fill="none" stroke="black"/>
                  <path d="M 272,240 L 272,272" fill="none" stroke="black"/>
                  <path d="M 272,304 L 272,336" fill="none" stroke="black"/>
                  <path d="M 272,400 L 272,496" fill="none" stroke="black"/>
                  <path d="M 288,496 L 288,512" fill="none" stroke="black"/>
                  <path d="M 296,80 L 296,128" fill="none" stroke="black"/>
                  <path d="M 320,128 L 320,144" fill="none" stroke="black"/>
                  <path d="M 360,192 L 360,208" fill="none" stroke="black"/>
                  <path d="M 400,80 L 400,128" fill="none" stroke="black"/>
                  <path d="M 448,400 L 448,496" fill="none" stroke="black"/>
                  <path d="M 464,240 L 464,336" fill="none" stroke="black"/>
                  <path d="M 464,440 L 464,512" fill="none" stroke="black"/>
                  <path d="M 488,112 L 488,144" fill="none" stroke="black"/>
                  <path d="M 488,192 L 488,464" fill="none" stroke="black"/>
                  <path d="M 24,32 L 216,32" fill="none" stroke="black"/>
                  <path d="M 296,80 L 312,80" fill="none" stroke="black"/>
                  <path d="M 360,80 L 400,80" fill="none" stroke="black"/>
                  <path d="M 88,96 L 296,96" fill="none" stroke="black"/>
                  <path d="M 400,112 L 488,112" fill="none" stroke="black"/>
                  <path d="M 24,128 L 216,128" fill="none" stroke="black"/>
                  <path d="M 296,128 L 400,128" fill="none" stroke="black"/>
                  <path d="M 128,192 L 360,192" fill="none" stroke="black"/>
                  <path d="M 24,240 L 224,240" fill="none" stroke="black"/>
                  <path d="M 272,240 L 464,240" fill="none" stroke="black"/>
                  <path d="M 272,336 L 464,336" fill="none" stroke="black"/>
                  <path d="M 24,352 L 224,352" fill="none" stroke="black"/>
                  <path d="M 24,400 L 224,400" fill="none" stroke="black"/>
                  <path d="M 272,400 L 448,400" fill="none" stroke="black"/>
                  <path d="M 224,416 L 248,416" fill="none" stroke="black"/>
                  <path d="M 448,416 L 464,416" fill="none" stroke="black"/>
                  <path d="M 448,432 L 488,432" fill="none" stroke="black"/>
                  <path d="M 464,464 L 488,464" fill="none" stroke="black"/>
                  <path d="M 272,496 L 448,496" fill="none" stroke="black"/>
                  <path d="M 24,512 L 224,512" fill="none" stroke="black"/>
                  <path d="M 288,512 L 464,512" fill="none" stroke="black"/>
                  <circle cx="320" cy="80" r="6" class="opendot" fill="white" stroke="black"/>
                  <g class="text">
                    <text x="124" y="20">VVP Passport</text>
                    <text x="72" y="52">protected</text>
                    <text x="12" y="68">..</text>
                    <text x="96" y="68">...kid: AID of OP</text>
                    <text x="8" y="84">:</text>
                    <text x="64" y="84">payload</text>
                    <text x="340" y="84">f-OP</text>
                    <text x="8" y="100">:</text>
                    <text x="64" y="100">evd</text>
                    <text x="336" y="100">SAID of</text>
                    <text x="8" y="116">:</text>
                    <text x="96" y="116">signature of OP</text>
                    <text x="348" y="116">data graph</text>
                    <text x="8" y="132">:</text>
                    <text x="8" y="148">:</text>
                    <text x="8" y="164">:</text>
                    <text x="228" y="164">Primary Party Evidence</text>
                    <text x="424" y="164">Delegation Evidence</text>
                    <text x="12" y="180">v?</text>
                    <text x="312" y="180">(VPE)</text>
                    <text x="484" y="180">(DE)</text>
                    <text x="100" y="228">vetting credential</text>
                    <text x="348" y="228">TNAlloc credential</text>
                    <text x="52" y="260">SAID</text>
                    <text x="300" y="260">SAID</text>
                    <text x="104" y="276">AID of issuer</text>
                    <text x="352" y="276">AID of issuer</text>
                    <text x="124" y="292">..:...AID of AP............:..</text>
                    <text x="312" y="292">..:...AID of AP</text>
                    <text x="8" y="308">:</text>
                    <text x="92" y="308">legal name</text>
                    <text x="344" y="308">TNAllocList</text>
                    <text x="8" y="324">:</text>
                    <text x="116" y="324">legal identifier</text>
                    <text x="372" y="324">...more attributes</text>
                    <text x="8" y="340">:</text>
                    <text x="124" y="340">...more attributes</text>
                    <text x="8" y="356">:</text>
                    <text x="8" y="372">:</text>
                    <text x="8" y="388">:</text>
                    <text x="92" y="388">brand credential</text>
                    <text x="340" y="388">more credentials</text>
                    <text x="8" y="404">:</text>
                    <text x="8" y="420">:</text>
                    <text x="52" y="420">SAID</text>
                    <text x="8" y="436">:</text>
                    <text x="104" y="436">AID of issuer</text>
                    <text x="360" y="436">e.g., delegate RTU,</text>
                    <text x="64" y="452">:.:...AID of AP</text>
                    <text x="352" y="452">vet for call ctr,</text>
                    <text x="92" y="468">brand name</text>
                    <text x="364" y="468">proxy right to brand</text>
                    <text x="68" y="484">logo</text>
                    <text x="124" y="500">...more attributes</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig3.txt">
&lt;![CDATA[
         VVP Passport
  +-----------------------+
  | protected             |
......kid: AID of OP      |
: | payload               |         +--of-OP-----+
: |   evd --------------------------+ SAID of    |
: | signature of OP       |         | data graph +----------+
: +-----------------------+         +--+---------+          |
:                                      |                    |
:                Verified Party Evidence  Delegation Evidence
v?                                  (VPE)                 (DE)
               +--------------+--------+----+               |
               |              |             |               |
   vetting credential         |   TNAlloc credential        |
  +------------------------+  |  +-----------------------+  |
  | SAID                   |  |  | SAID                  |  |
  |   AID of issuer        |  |  |   AID of issuer       |  |
..:...AID of AP............:..|..:...AID of AP           |  |
: |   legal name           |  |  |   TNAllocList         |  |
: |   legal identifier     |  |  |   ...more attributes  |  |
: |   ...more attributes   |  |  +-----------------------+  |
: +------------------------+  |                             |
:                             |                             |
:  brand credential           |   more credentials          |
: +------------------------+  |  +---------------------+    |
: | SAID                   +--+  |                     +-+  |
: |   AID of issuer        |     | e.g., delegate RTU, +----+
:.:...AID of AP            |     | vet for call ctr,   | |  |
  |   brand name           |     | settlement, AI ok,  | +--+
  |   logo                 |     | proxy right to brand| |
  |   ...more attributes   |     +-+-------------------+ |
  +------------------------+       +---------------------+
]]&gt;
    </artwork>
            </artset>
          </figure>
          <t>Where DE exists, the VPE will identify and authorize the verified party, but the OOBI in the <tt>kid</tt> claim of the passport will identify the OP or the callee's delegate, and these two parties will be different. Therefore, the DE in the dossier <bcp14>MUST</bcp14> include a delegated signer credential that authorizes the delegate (e.g., an OP) to act on the verified party's behalf and that stipulates the constraints that govern this delegation. In addition to the vetting credential for the verified party, which is required, it <bcp14>SHOULD</bcp14> also include a vetting credential for the delegate, that proves the delegate's identity. If the VPE includes a brand credential, then the DE <bcp14>MUST</bcp14> also include a brand proxy credential, proving that the delegate not only can use the verified party's allocated phone number, but has permission to project the verified party's brand while doing so.</t>
          <t>In VVP calls that verify the caller, the passport-specific signature <bcp14>MUST</bcp14> come from the OP, not the OSP or any other party. The OP can generate this signature in its on-prem or cloud PBX, using keys that it controls. It is crucial that the distinction between OP and AP be transparent, with the relationship proved by strong evidence that the AP can create or revoke easily, in a self-service manner.</t>
        </section>
        <section anchor="vetting-credential">
          <name>Vetting credential</name>
          <t>A vetting credential is a targeted credential that enumerates the formal and legal attributes of a unique legal entity. It <bcp14>MUST</bcp14> include a legal identifier that makes the entity unique in its home jurisdiction (e.g., an LEI), and it <bcp14>MUST</bcp14> include an AID for the legal entity as a participant in voice traffic. This AID is globally unique.</t>
          <t>The vetting credential is so called because it <bcp14>MUST</bcp14> be issued according to a documented vetting process that offers formal assurance that it is only issued with accurate information, and only to the entity it describes. A vetting credential confers the privilege of acting with the associated legal identity if and only if the bearer can prove their identity as issuee via a digital signature from the issuee's AID.</t>
          <t>A vetting credential <bcp14>MUST</bcp14> include a JL to a credential that qualifies the issuer as a party trusted to do vetting. This linked credential that qualifies the issuer of the vetting credential <bcp14>MAY</bcp14> contain a JL that qualifies its own issuer, and such JLs <bcp14>MAY</bcp14> be repeated through as many layers as desired. In VVP, the reference type of a vetting credential is an LE vLEI; see <xref target="ISO-17442-3"/> and <xref format="counter" target="vet-cred-sample"/>. This implies both a schema and a governance framework. Other vetting credential types are possible, but they <bcp14>MUST</bcp14> be true credentials that meet the normative requirements here. They <bcp14>MUST NOT</bcp14> be bearer tokens. An alternate schema for a vetting credential with lower levels of assurance is published at <xref target="ORG-VET-SCHEMA"/>.</t>
          <t>To achieve various design goals, a vetting credential <bcp14>MUST</bcp14> be an ACDC, but this ACDC <bcp14>MAY</bcp14> be a transformation of a credential in another format (e.g., W3C VC, SD-JWT, X509 certificate). See <xref format="counter" target="interoperability"/>.</t>
        </section>
        <section anchor="tnalloc-credential">
          <name>TNAlloc credential</name>
          <t>A TNAlloc credential is a targeted credential that confers on its issuee the right to control how one or more phone numbers are used. Regulators issue TNAlloc credentials to range holders, who in turn issue new TNAlloc credentials to TNUs. TNUs often play the verified party roles in VVP. If an AP delegates RTU to a proxy (e.g., an employee or call center), the AP <bcp14>MUST</bcp14> also issue a TNAlloc credential to the proxy, to confer the RTU. With each successive reallocation, the set of numbers in the new TNAlloc credential may get smaller.</t>
          <t>Except for TNAlloc credentials issued by regulators, all TNAlloc credentials <bcp14>MUST</bcp14> contain a JL to a parent TNAlloc credential, having an equal or bigger set of numbers that includes those in the current credential. This JL in a child credential documents the fact that the child's issuer possessed an equal or broader RTU, from which the subset RTU in child credential derives.</t>
          <t>To achieve various design goals, a TNAlloc credential <bcp14>MUST</bcp14> be an ACDC, but this ACDC <bcp14>MAY</bcp14> be a transformation of a credential in another format (e.g., a TNAuthList from <xref target="RFC8226"/>). See <xref format="counter" target="interop-creds"/>.</t>
          <t>An example TNAlloc credential and its schema are described in <xref format="counter" target="tn-cred-sample"/>.</t>
        </section>
        <section anchor="brand-credential">
          <name>Brand credential</name>
          <t>A brand credential is a targeted credential that enumerates brand properties such as a brand name, logo, chatbot URL, social media handle, and domain name. It <bcp14>MUST</bcp14> be issued to an VP (<xref format="counter" target="VP"/>) as a legal entity, but it does not enumerate the formal and legal attributes of the VP; rather, it enumerates properties that would be meaningful to a callee who's deciding whether to accept a phone call. It confers on its issuee the right to use the described brand by virtue of research conducted by the issuer (e.g., a trademark search).</t>
          <t>This credential <bcp14>MUST</bcp14> be issued according to a documented process that offers formal assurance that it is only issued with accurate information, and only to a legal entity that has the right to use the described brand. A single VP <bcp14>MAY</bcp14> have multiple brand credentials (e.g., a fictional corporation, <tt>Amce Space Travel Deutschland, GmbH</tt>, might hold brand credentials for both <tt>Sky Ride</tt> and for <tt>Orbítame Latinoamérica</tt>). Rights to use the same brand <bcp14>MAY</bcp14> be conferred on multiple VPs (<tt>Acme Space Travel Deutschland, Gmbh</tt> and <tt>Acme Holdings Canada, Ltd</tt> may both possess brand credentials for <tt>Sky Ride</tt>). A brand credential <bcp14>MUST</bcp14> contain a JL to a vetting credential, that shows that the right to use the brand was evaluated only after using a vetting credential to prove the identity of the issuee.</t>
          <t>An example brand credential and its schema are described in <xref format="counter" target="bcred-sample"/>.</t>
        </section>
        <section anchor="brand-proxy-credential">
          <name>Brand proxy credential</name>
          <t>A brand proxy credential confers on an OP or call center the right to project the brand of a VP when making or receiving phone calls, subject to a carefully selected set of constraints. This is different from the simple RTU conferred by TNAlloc. Without a brand proxy credential, a call center could make calls or receive on behalf of an VP, using the VP's allocated phone number, but would be forced to do so under its own name or brand, because it lacks evidence that the VP intended anything different. If an VP intends for phone calls to be made by a proxy, and wants the proxy to project the VP's brand, the AP <bcp14>MUST</bcp14> issue this credential.</t>
          <t>An example brand proxy credential and its schema are shown in <xref format="counter" target="bprox-cred-sample"/>.</t>
        </section>
        <section anchor="delegated-signer-credential">
          <name>Delegated signer credential</name>
          <t>A delegated signer credential proves that automation running under the control of the OP (for verified callers) or the callee's delegate (for verified callees) has been authorized by the VP to originate VVP traffic (and thus, sign VVP passports) on its behalf.</t>
          <t>An example delegated signer credential and its schema are shown in <xref format="counter" target="dsig-cred-sample"/>.</t>
        </section>
        <section anchor="additional-credential-types">
          <name>Additional credential types</name>
          <t>New credential types can be added to a dossier, to answer any number of novel questions for verifiers, without changing the core characteristics of VVP.</t>
          <t>For example, a credential could be attached to a dossier to prove that the caller is a human being instead of an AI (see <xref target="F2F-SCHEMA"/> and <xref target="PERSONHOOD-CRED"/>), or a credential could be attached to a dossier to prove that the VP empowered an AI agent to make or receive calls on its behalf (analogous to how chatbots represent companies in RCS contexts). An additional credential could assist with questions about settlement (how the terminating service provider will be paid to connect the call). It might document the relationship between an AP and one or more financial clearinghouses.</t>
        </section>
      </section>
    </section>
    <section anchor="interoperability">
      <name>Interoperability</name>
      <t>VVP can achieve its goals without any dependence on RCD, SHAKEN, or similar mechanisms. However, it also provides easy bridges so value can flow to and from other ecosystems with similar goals.</t>
      <section anchor="chat-and-conversations">
        <name>Chat and conversations</name>
        <t>A dossier cited in a VVP passport may also be cited by an RCS verification authority (VA), may include evidence that is also submitted to a VA, or may consist of evidence created by a VA. This unlocks synergies between vetting for RCS (<xref target="GSMA-RCS"/>) and vetting for voice. It may also allow properly vetted RCS chatbots to make verifiable voice calls, including calls that carry brand information (see <xref target="RCD-DRAFT"/> and <xref target="CTIA-BCID"/>), distinguishing them with 100% confidence from AI-driven voice scams.</t>
        <t>When conversations are captured in rich containers such as vCon (<xref target="VCON-DRAFT"/>), a VVP passport may be included (e.g., in the <tt>stir</tt> field of a vCon), proving the identity of a calling party. As long as signatures over the data structure assert truthfully that the passport was verified at the time of attachment, no replay attack is possible, and all of VVP's guarantees transfer. A VVP dossier by itself can also provide permanent evidence of assertions as attachments to a conversation.</t>
      </section>
      <section anchor="interop-certs">
        <name>Certificates</name>
        <t>Certificates can add value to VVP, and VVP can add value to certificate-based ecosystems or stacks. In the rest of this section, note the difference between normative language (imposing requirements on VVP implementations) and non-normative language (suggesting how other solutions could react).</t>
        <section anchor="cascaded-mode">
          <name>Cascaded mode</name>
          <t>Verifiers who prefer to operate in certificate ecosystems such as SHAKEN and RCD can be satisfied by having an intermediary verify according to VVP rules (see <xref format="counter" target="verifying"/>), and then signing a new passport in a certificate-dependent format (e.g., for SHAKEN and/or RCD). In such cases, the new passport contains an <tt>x5u</tt> header pointing to the certificate of the new signer.</t>
          <t>This form of trust handoff is called <em>cascaded mode</em>. In cascaded mode, if the certificate fetched from the <tt>x5u</tt> URL satisfies enough trust requirements of the verifier, the goals of the new context are achieved. For example, if this intermediary is the OSP, the standard assumptions of SHAKEN are fully met, but the OSP's attestation can always be <tt>A</tt>, since VVP conclusively proves the identity of the AP and OP.</t>
        </section>
        <section anchor="foundation-mode">
          <name>Foundation mode</name>
          <t>In another pattern called <em>foundation mode</em>, a VVP passport <bcp14>MAY</bcp14> itself contain an <tt>x5u</tt> header. If it does, the <tt>x5u</tt> header <bcp14>MUST NOT</bcp14> be used to achieve any VVP verification guarantees; the key state of the signer's AID (fetched via <tt>kid</tt>) <bcp14>MUST</bcp14> still justify any acceptance of the signature. However, the associated X509 certificate <bcp14>SHOULD</bcp14> be issued to the public key of the party that signs the passport. If and only if it does so, the full weight of VVP evidence about the signer's status as a trusted voice traffic signer for the VP could be transferred to the certificate, even if the certificate is self-issued or otherwise chains back to something other than a known, high-reputation certificate authority.</t>
          <t>Valid VVP passports that obey this requirement can thus be used to enable VVP-unaware but certificate-based checks without certificate authorities (or without prior knowledge of them). Such certificate-based checks should be done in real-time, since the binding between a key and the owner of a cert cannot be known to be valid except at the current moment.</t>
        </section>
      </section>
      <section anchor="interop-creds">
        <name>Other credential formats</name>
        <t>The stable evidence that drives VVP -- vetting credential (<xref format="counter" target="vetting-credential"/>), TNAlloc credential (<xref format="counter" target="tnalloc-credential"/>), brand credential (<xref format="counter" target="brand-credential"/>), brand proxy credential (<xref format="counter" target="brand-proxy-credential"/>), and delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>) -- <bcp14>MUST</bcp14> all be ACDCs. This is because only when the data in these credentials is modeled as an ACDC is it associated with permanent identities that possess appropriate security guarantees.</t>
        <t>However, VVP can easily be driven by other approaches to evidence, treating the ACDCs as a somewhat secondary format transformation. In such a case, a <em>bridging party</em> plays a pivotal role. This party <bcp14>MUST</bcp14> verify foreign evidence (e.g., W3C verifiable credentials <xref target="W3C-VC"/>), and then issue ACDCs that derive from it (e.g., using <xref target="CITATION-SCHEMA"/>). It <bcp14>MAY</bcp14> radically transform the data in the process (e.g., combining or splitting credentials, changing schemas or data values).</t>
        <t>This transformation from foreign evidence to ACDCs is very flexible, and allows for tremendous interoperability. On the citing side, any ecosystem that deals in cryptographic evidence can provide input to VVP, no matter what evidence mechanisms they prefer.</t>
        <t>(On the verifying side, the information carried via ACDCs in VVP could be transformed again, with a second bridging party, to enable even more interoperability. However, the goals of such a secondary transformation are undefined by VVP, so the constraints and rules of the transformation are out of scope here.)</t>
        <t>All VVP stakeholders need to understand that accepting foreign evidence does much more than alter format. Bridging is not a simple conversion or reissuance. It replaces identifiers (e.g., DIDs as specified in <xref target="W3C-DID"/> with AIDs as specified in <xref target="TOIP-KERI"/>). The new identifiers have different lifecycles and different trust bases than the original. Bridging also changes the <em>meaning</em> of the credential. Foreign evidence directly asserts claims backed by the reputation of its original issuer. A new ACDC embodies a claim by the bridging party, that they personally verified foreign evidence according to foreign evidence rules, at a given moment. It cites the foreign evidence as a source, and may copy claims into the ACDC, but the bridging party is only asserting that they verified the original issuer's commitment to the claims, not that the bridging party commits to those claims.</t>
        <t>Verifiers <bcp14>MAY</bcp14> choose to accept such derivative ACDCs, but the indirection <bcp14>SHOULD</bcp14> color their confidence. They <bcp14>MUST NOT</bcp14> assume that identifiers in the foreign evidence and in the ACDC have the same referents or controllers. They <bcp14>MUST NOT</bcp14> hold the bridging party accountable for the claims -- only for the claim that they verified the original issuer's commitment to the claims. Unless additional governance offers guarantees beyond those explicitly provided by VVP, they <bcp14>MUST</bcp14> accept that there is no defined relationship between revocation of the foreign evidence and revocation of the ACDC.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Complying with a specification may forestall certain easy-to-anticipate attacks. However, <em>it does not mean that vulnerabilities don't exist, or that they won't be exploited</em>. The overall assurance of VVP requires reasonable vigilance. Given that a major objective of VVP is to ensure security, implementers are strongly counseled to understand the underlying principles, the assumptions, and the ways that choices by their own or other implementations could introduce risk.</t>
      <t>Like most cryptographic mechanisms, VVP depends on the foundational assumption that human stakeholders will manage cryptographic keys carefully. VVP enforces this assumption more thoroughly than many existing solutions:</t>
      <ul spacing="normal">
        <li>
          <t>Parties that issue credentials <bcp14>MUST</bcp14> be identified with AIDs (<xref format="counter" target="aid"/>) that use witnesses (<xref format="counter" target="appendix-b"/>). This guarantees a non-repudiable, publicly accessible audit log of how their key state evolves, and it makes key rotation easy. It also offers compromise and duplicity detection. Via prerotation, it enables recovery from key compromise. AIDs can be upgraded to use quantum-proof signing algorithms without changing the identifier.</t>
        </li>
        <li>
          <t>Parties that issue credentials <bcp14>MUST</bcp14> do so using ACDCs (<xref format="counter" target="acdcs"/>) signed by their AID rather than a raw key. This makes evidence revocable. It also makes it stable across key rotation, and prevents retrograde attacks by allowing verifiers to map an issuance or revocation event to an unambiguous key state in the KEL (<xref format="counter" target="KEL"/>).</t>
        </li>
        <li>
          <t>Parties that issue credentials <bcp14>SHOULD</bcp14> employ threshold-based multi-signature schemes. This enhances security by distributing signing authority across multiple key holders, reducing the risk of single-point compromise. Threshold-based signatures ensure that no single key compromise undermines the system’s integrity while enabling controlled key recovery and rotation without disrupting credential validity.</t>
        </li>
      </ul>
      <t>Nonetheless, it is still possible to make choices that weaken the security posture of the ecosystem, including at least the following:</t>
      <ul spacing="normal">
        <li>
          <t>Sharing keys or controlling access to them carelessly</t>
        </li>
        <li>
          <t>Issuing credentials with a flimsy basis for trust</t>
        </li>
        <li>
          <t>Delegating authority to untrustworthy parties</t>
        </li>
        <li>
          <t>Delegating authority without adequate constraints</t>
        </li>
        <li>
          <t>Failing to fully verify evidence</t>
        </li>
      </ul>
      <t>Generally understood best practices in cybersecurity will avoid many of these problems. In addition, the following policies that are specific to VVP are strongly recommended:</t>
      <ol spacing="normal" type="1"><li>
          <t>Passports <bcp14>SHOULD</bcp14> have an aggressive timeout (e.g., 30 seconds). Signatures on passports are not anchored in a KEL, and must therefore be evaluated for age with respect to the time they were received. Overly old passports could be a replay attack (a purported second call with the same orig and dest numbers, using the same backing evidence, soon after the first.)</t>
        </li>
        <li>
          <t>Witnesses (which <bcp14>MUST</bcp14> be used) <bcp14>SHOULD</bcp14> be used in such a way that high availability is guaranteed, and in such a way that duplicity by the controller of an AID is detected. See <xref format="counter" target="appendix-b"/>. (Verifiers will be able to see the witness policy of each AID controller, and <bcp14>SHOULD</bcp14> decide for themselves whether the party is reliable, depending on what they observe.)</t>
        </li>
        <li>
          <t>Revocations <bcp14>SHOULD</bcp14> be timely, and the timeliness guarantees of issuers <bcp14>SHOULD</bcp14> be published.</t>
        </li>
        <li>
          <t>Watchers <bcp14>SHOULD</bcp14> propagate events to local caches with a low latency, and <bcp14>MUST</bcp14> provide information that allows verifiers to decide whether that latency meets their freshness requirements.</t>
        </li>
      </ol>
    </section>
    <section anchor="privacy">
      <name>Privacy</name>
      <t>Institutions and individuals that make or receive phone calls as verified parties may have privacy goals. Although their goals might differ in some ways, both will wish to disclose some attributes to the counter party, and both may wish to suppress some of that same information from intermediaries. Both will want control over how this disclosure works.</t>
      <section anchor="graduated-disclosure">
        <name>Graduated Disclosure</name>
        <t>ACDCs support a technique called <em>graduated disclosure</em> that enables this.</t>
        <t>The hashing algorithm for ACDCs resembles the hashing algorithm for a merkle tree. An ACDC is a hierarchical data structure that can be modeled with nested JSON. Any given layer of the structure may consist of a mixture of simple scalar values and child objects. The input to the hashing function for a layer of content equals the content of scalar fields and the <em>hashes</em> of child objects.</t>
        <figure>
          <name>ACDC hashes like a Merkle tree</name>
          <artset>
            <artwork type="svg" name="fig4.svg">
      <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="432" width="408" viewBox="0 0 408 432" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,272" fill="none" stroke="black"/>
                <path d="M 72,320 L 72,328" fill="none" stroke="black"/>
                <path d="M 72,368 L 72,376" fill="none" stroke="black"/>
                <path d="M 112,48 L 112,272" fill="none" stroke="black"/>
                <path d="M 152,48 L 152,160" fill="none" stroke="black"/>
                <path d="M 216,320 L 216,328" fill="none" stroke="black"/>
                <path d="M 216,344 L 216,360" fill="none" stroke="black"/>
                <path d="M 224,80 L 224,88" fill="none" stroke="black"/>
                <path d="M 224,104 L 224,120" fill="none" stroke="black"/>
                <path d="M 256,48 L 256,160" fill="none" stroke="black"/>
                <path d="M 296,48 L 296,80" fill="none" stroke="black"/>
                <path d="M 400,48 L 400,80" fill="none" stroke="black"/>
                <path d="M 8,48 L 112,48" fill="none" stroke="black"/>
                <path d="M 152,48 L 256,48" fill="none" stroke="black"/>
                <path d="M 296,48 L 400,48" fill="none" stroke="black"/>
                <path d="M 296,80 L 400,80" fill="none" stroke="black"/>
                <path d="M 152,160 L 256,160" fill="none" stroke="black"/>
                <path d="M 8,272 L 112,272" fill="none" stroke="black"/>
                <path d="M 240,96 C 248.83064,96 256,103.16936 256,112" fill="none" stroke="black"/>
                <path class="jump" d="M 224,104 C 218,104 218,88 224,88" fill="none" stroke="black"/>
                <path class="jump" d="M 216,344 C 210,344 210,328 216,328" fill="none" stroke="black"/>
                <g class="text">
                  <text x="56" y="20">Fully</text>
                  <text x="208" y="20">Partially</text>
                  <text x="344" y="20">Fully</text>
                  <text x="56" y="36">Expanded ACDC</text>
                  <text x="204" y="36">Compact ACDC</text>
                  <text x="348" y="36">Compact ACDC</text>
                  <text x="40" y="68">a = {</text>
                  <text x="184" y="68">a = {</text>
                  <text x="348" y="68">a = H(...)</text>
                  <text x="60" y="84">b = N,</text>
                  <text x="200" y="84">b = N</text>
                  <text x="56" y="100">C = {</text>
                  <text x="200" y="100">c = H</text>
                  <text x="232" y="100">c</text>
                  <text x="76" y="116">d = M,</text>
                  <text x="200" y="116">g = Q</text>
                  <text x="76" y="132">e = O,</text>
                  <text x="212" y="132">i = H(i)</text>
                  <text x="72" y="148">f = P</text>
                  <text x="168" y="148">}</text>
                  <text x="44" y="164">},</text>
                  <text x="60" y="180">g = Q,</text>
                  <text x="56" y="196">i = {</text>
                  <text x="76" y="212">j = R,</text>
                  <text x="72" y="228">k = S</text>
                  <text x="40" y="244">}</text>
                  <text x="24" y="260">}</text>
                  <text x="48" y="308">H(a) = H(</text>
                  <text x="192" y="308">H(a) = H(</text>
                  <text x="344" y="308">H(a) = SAID</text>
                  <text x="48" y="324">b = N</text>
                  <text x="192" y="324">b = N</text>
                  <text x="64" y="340">c = H(c),</text>
                  <text x="192" y="340">c = H</text>
                  <text x="232" y="340">c),</text>
                  <text x="72" y="356">recurse</text>
                  <text x="192" y="356">g = Q</text>
                  <text x="48" y="372">g = Q</text>
                  <text x="204" y="372">i = H(i)</text>
                  <text x="60" y="388">i = H(i)</text>
                  <text x="188" y="388">) = SAID</text>
                  <text x="72" y="404">recurse</text>
                  <text x="44" y="420">) = SAID</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" name="fig4.txt">
&lt;![CDATA[
    Fully            Partially          Fully
Expanded ACDC      Compact ACDC      Compact ACDC
+------------+    +------------+    +------------+
| a = {      |    | a = {      |    | a = H(...) |
|   b = N,   |    |   b = N,   |    +------------+
|   C = {    |    |   c = H(c),|
|     d = M, |    |   g = Q,   |
|     e = O, |    |   i = H(i) |
|     f = P  |    | }          |
|   },       |    +------------+
|   g = Q,   |
|   i = {    |
|     j = R, |
|     k = S  |
|   }        |
| }          |
+------------+

 H(a) = H(         H(a) = H(         H(a) = SAID
   b = N,            b = N,
   c = H(c),         c = H(c),
     recurse         g = Q,
   g = Q,            i = H(i)
   i = H(i)        ) = SAID
     recurse
 ) = SAID
]]&gt;
    </artwork>
          </artset>
        </figure>
        <t>This means is that any given child JSON object in an ACDC can be replaced with its hash, <em>without altering the hash of the parent data</em>. Thus, there can be expanded ACDCs (where all data inside child objects is visible) or compacted ACDCs (where some or all of the child objects are opaquely represented by their equivalent hashes). A signature over an expanded ACDC is also a signature over any of the compacted versions of the same ACDC, and a revocation event over any of the versions is guaranteed to mean the same thing.</t>
        <t>In combination with the <tt>evd</tt> claim in a passport, graduated disclosure can be used to achieve privacy goals, because different verifiers can see different variations on an ACDC, each of which is guaranteed to pass the same verification tests and has the same revocation status.</t>
        <t>For example, suppose that company X wants to make a call to an individual in jurisdiction Y, and further suppose that auditor Z requires proof that X is operating lawfully, without knowing the name of X as a legal entity. In other words, the auditor needs to <em>qualify</em> X but not necessarily <em>identify</em> X. Company X can serve the KEL for its dossier from a web server that knows to return the expanded form of the vetting credential in the dossier to the individual or the individual's TSP in Y, but a compacted form of the vetting credential (revealing just the vetter's identity and their signature, but not the legal identity of the issuee, X) to auditor Z. Later, if law enforcement sees the work of the auditor and demands to know the legal identity of X, discovery of the expanded form can be compelled. When the expanded form is disclosed, it will demonstrably be associated with the compact form that Z recorded, since the qualifying and identifying forms of the ACDC have the same hash.</t>
        <t>Company X doesn't have to engage in sophisticated sniffing of traffic by geography to achieve goals like this. It can simply say that anonymous and unsigned HTTP requests for the dossier return the compact form; anyone who wants the expanded form must make an HTTP request that includes in its body a signature over terms and conditions that enforce privacy and make the recipient legally accountable not to reshare.</t>
        <t>Importantly, transformations from expanded to compact versions of an ACDC can be performed by anyone, not just the issuer or holder. This means that a verifier can achieve trust on the basis of expanded data, and then cache or share a compacted version of the data, meaning that any subsequent or downstream verifications can have equal assurance but higher privacy. The same policy can be applied to data any time it crosses a regulatory, jurisdictional boundary where terms and conditions for disclosure have weaker enforcement. It can also be used when business relationships should be redacted outside of a privileged context.</t>
        <t>Schemas for credentials should be designed to allow graduated disclosure in increments that match likely privacy goals of stakeholders. ACDC schema design typically includes a salty nonce in each increment, avoiding rainbow attacks on the hashed data. VVP encourages but does not require this.</t>
      </section>
      <section anchor="correlation">
        <name>Correlation</name>
        <t>Privacy theorists will note that, even with contractually protected graduated disclosure and maximally compact ACDCs, verifiers can still correlate by using some fields in ephemeral passports or long-lived ACDCs, and that this may undermine some privacy goals.</t>
        <t>There are three correlators in each passport:</t>
        <ol spacing="normal" type="1"><li>
            <t>Any brand information in <tt>card</tt> (may strongly identify a VP)</t>
          </li>
          <li>
            <t>the <tt>kid</tt> header (identifies the signer of the passport -- the OP for verified callers, or perhaps a call center or TSP automation for verified callees)</t>
          </li>
          <li>
            <t>the <tt>evd</tt> claim (uniquely identifies a dossier used by a VP)</t>
          </li>
        </ol>
        <t>We discount the first correlator, because if it is present, the VP is explicitly associating its correlated reputation with a call. It has asserted this brand publicly, to every stakeholder in the SIP pipeline. In such cases, any question of the VP's privacy is off the table, and no privacy protections on the other two correlators will be effective. However, if the first correlator is missing, the other two correlators become more interesting.</t>
        <section anchor="kid">
          <name>kid</name>
          <t>In VVP, the passport signer role that's identified by <tt>kid</tt> is played by automation. Automation is unlikely to have any direct privacy goal. Automation is assumed to be operated by a company, and that company is likely to be either a service provider, or a large corporation capable of significant IT investments. Either way, the signer is in the business of servicing phone calls, and is likely to be content for its traffic to be correlated publicly. Therefore, the fact that <tt>kid</tt> correlates the signer is not particularly interesting.</t>
          <t>However, could the signer be used as an indirect correlator for the VP?</t>
          <t>The signer's SBC can service calls for many thousands or millions of clients, providing a some herd privacy. This is not a perfect protection, but it is a beginning. We add to this the crucial observation that <em>the signer doesn't need to have a stable reputation to support VVP goals</em>. Trust in the signer comes from the existence of a delegated signer credential (see <xref format="counter" target="delegated-signer-credential"/>), not from a certificate or any other long-term identity. Therefore, the AID that provides cryptographic identity for a signer <bcp14>MAY</bcp14> be rotated often (as often as VPs are willing to delegate to a new one). Further, even without rotation, a signing organization <bcp14>MAY</bcp14> provide multiple instances of its automation, each using a different AID. Also, a VP <bcp14>MAY</bcp14> delegate signing authority to multiple signing organizations, each of which is using various strategies to mitigate correlation. Taken together, these measures offers reasonable protection -- protection that a VP can tune -- against correlating a VP via <tt>kid</tt>.</t>
        </section>
        <section anchor="evd">
          <name>evd</name>
          <t>The other correlator, <tt>evd</tt>, tracks a VP more directly, because a dossier is uniquely identified by its SAID, and can only be used by a single VP. Furthermore, if someone resolves <tt>evd</tt> to an actual dossier (something that might be avoidable with judicious use of graduated disclosure), the dossier will at a minimum have an issuer field that ties it to the VP as a perfect correlator.</t>
          <t>One answer here is to introduce a <em>VP blinding service</em>. This service creates <em>derived dossiers</em> on a schedule or by policy. Each derivation includes the hash of the original dossier, in a field that is hidden but available (along with a salty nonce) via graduated disclosure. The derived dossier is signed by the blinding service rather than the original VP. It embodies an assertion, by the blinding service, that it has verified the original dossier according to published rules, and that it will revoke the derivative if the original is revoked. VP blinding services would have to be trusted by verifiers, much like root CAs in SHAKEN. However, unlike CAs, their actions could be trivially audited for correctness, since every derivation would have to be backed by a dossier that has the associated hash. Such a mechanism is probably unnecessary for b2c calling, but may be justified when VVP is used by individual VPs if they wish to merely qualify without identifying themselves to some intermediaries or callees.</t>
        </section>
      </section>
    </section>
    <section anchor="appendix-a">
      <name>Appendix A: Evidence theory</name>
      <t>Most existing approaches to secure telephony uses X509 certificates <xref target="RFC5280"/> for foundational identity. Certificates have great virtues. Notably, they are well understood, and their tooling is ubiquitous and mature. However, they also have some serious drawbacks. They are protected by a single key whose compromise is difficult to detect. Recovery is cumbersome and slow. As a result, <em>certificates are far more temporary than the identities they attest</em>.</t>
      <t>This has numerous downstream consequences. When foundational evidence of identity has to be replaced constantly, the resulting ecosystem is fragile, complex, and expensive for all stakeholders. Vulnerabilities abound. Authorizations can only be analyzed in a narrow <em>now window</em>, never at arbitrary moments in time. This creates enormous pressure to build a centralized registry, where evidence can be curated once, and where the cost of reacting to revocations is amortized. The entire fabric of evidence has to be rebuilt from scratch if quantum security becomes a requirement.</t>
      <t>In contrast, the issuers and holders of ACDCs -- and thus, the stakeholders in VVP passports -- are identified by autonomic identifiers, not raw keys. This introduces numerous security benefits. Keys, key types, and signing algorithms can all change (even for post-quantum upgrades) without invalidating evidence. Signing and rotation operations are sequenced deterministically, making historical audits possible. Key compromises are detected as soon as an attacker attempts consequential actions. Recovery from compromise is trivial. Multisig signing policies allow diffuse, nuanced control.</t>
      <t>The result is that <em>identities in ACDCs are as stable as identities in real organizations</em>. This makes delegations and chaining mechanisms far more robust than their analogs in certificates, and this in turn makes the whole ecosystem safer, more powerful, and easier to maintain. Revocations are cheap and fast. No central registries are needed, which eliminates privacy concerns and regulatory hurdles. Adoption can be opportunistic; it doesn't require a central mandate or carefully orchestrated consensus throughout a jurisdiction before it can deliver value.</t>
      <t>ACDCs make it practical to model nuanced, dynamic delegations such as the one between Organization X and Call Center Y. This eliminates the gap that alternative approaches leave between accountable party and the provider of call evidence. Given X's formal approval, Y can sign a call on behalf of X, using a number allocated to X, and using X's brand, without impersonating X. They can also prove to any OSP or any other party, in any jurisdiction, that they have the right to do so. Furthermore, the evidence that Y cites can be built and maintained by X and Y, doesn't get stale or require periodic reissuance, and doesn't need to be published in a central registry.</t>
      <t>Even better, when such evidence is filtered through suballocations or crosses jurisdictional boundaries, it can be reused, or linked and transformed, without altering its robustness or efficiency. Unlike W3C verifiable credentials and SD-JWTs, which require direct trust in the proximate issuer, ACDCs and the JWTs that reference them verify data back to a root through arbitrarily long and complex chains of issuers, with only the root needing to be known and trusted by the verifier.</t>
      <t>The synergies of these properties mean that ACDCs can be permanent, flexible, robust, and low-maintenance. In VVP, no third party has to guess who's accountable for an outbound call or who's answering an inbound call; that party is transparently and provably accountable, period. (Yet notwithstanding this transparency, ACDCs support a form of pseudonymity and graduated disclosure that satisfies vital privacy and data processing constraints. See <xref format="counter" target="privacy"/>.)</t>
    </section>
    <section anchor="appendix-b">
      <name>Appendix B: Witnesses and Watchers</name>
      <t>A full description of witnesses and watchers is available in <xref target="TOIP-KERI"/>. Here, we merely summarize.</t>
      <t>A KERI <em>witness</em> is a lightweight server that acts as a notary. It exposes a standard interface. It receives signed events from the controller of an identifier that it services. If these events are properly sequenced and aligned with the identifier's signing policy and key state, they are recorded and become queryable, typically by the public. KERI allows the controller of an autonomic identifier to choose zero or more witnesses. The witnesses can change over the lifecycle of the identifier. However, the relationship between an identifier and its witnesses cannot be changed arbitrarily; the controller of the identifier makes a cryptographic commitment to its witnesses, and can only change that commitment by satisfying the signing policy of the identifier. In VVP, identifiers used by issuers <bcp14>MUST</bcp14> have at least one witness, because this guarantees viral discoverability, and <bcp14>SHOULD</bcp14> have at least 3 witnesses, because this guarantees both high availability and the detection of duplicity by the controller of the identifier.</t>
      <t>Witnesses provide, for VVP, many of the security guarantees that alternate designs seek from blockchains. However, witnesses are far more lightweight than blockchains. They can be run by anyone, without coordination or approval, and can be located in any jurisdiction that the owner of the identifier prefers, satisfying regulatory requirements about data locality. Although a single witness may service mulptiple identifiers, the records related to any single identifier are independent, and no consensus algorithm is required to order them relative to others. Thus, every identifier's data evolves in parallel, without bottlenecks, and any identifier can be deleted without affecting the integrity of other identifiers' records, satisfying regulatory requirements about erasure. Witnesses only store (and thus, can only expose to the public) what a given data controller has instructed them to store and publish. Thus, witnesses do not create difficulties with consent or privacy.</t>
      <t>In VVP, when a party shares an identifier or a piece of evidence, they do so via a special URL called an OOBI (out of band invitation). The OOBI serves a tamper-evident KEL (<xref format="counter" target="KEL"/>) that reveals the full, provable history of the key state and other witnesses for the identifier, and even includes a forward reference to new witnesses, if they have changed. It also allows the discovery of issuance and revocation events, and their sequence relative to one another and to key state changes.</t>
      <t>An additional and optional feature in KERI is enabled by adding <em>watchers</em>. Watchers are lightweight services that synthesize witness data. They may <bcp14>MAY</bcp14> monitor multiple witnesses and enable hyper-efficient caching. They <bcp14>SHOULD</bcp14> also compare what multiple witnesses for a given identifier are saying, which prevents controllers of an identifier from forking reality in a duplicitous way, and which can detect malicious attempts to use stolen keys.</t>
      <t>Witnesses are chosen according to the preference of each party that controls an identifier, and a mature ecosystem could have dozens, hundreds, or thousands. Watchers, on the other hand, address the needs of verifiers, because they distill some or all of the complexity in an ecosystem down to a single endpoint that verifiers can query. Any verifier can operate a watcher at any time, without any coordination or approval. Viral discoverability can automatically populate the watcher's cache, and keep it up-to-date as witness data evolves.</t>
      <t>Verifiers can share watchers if they prefer. Anything that watchers assert must be independently verified by consulting witnesses, so watchers need not have a complete picture of the world, and they are a convenience rather than an oracle that must be trusted. The data that watchers synthesize is deliberately published by witnesses for public consumption, at the request of each data stream's associated data controllers, and does not represent surveillance (<xref format="counter" target="privacy"/>). If a watcher can no longer find witness data to back one of its assertions, it <bcp14>MUST</bcp14> delete the data to satisfy its contract. This means that acts of erasure on witnesses propagate to watchers, again satisfying regulatory erasure requirements.</t>
    </section>
    <section anchor="appendix-c">
      <name>Appendix C: Sample Credentials</name>
      <section anchor="common-fields">
        <name>Common fields</name>
        <t>Some structure is common to all ACDCs. For details, consult <xref target="TOIP-ACDC"/>. Here, we provide a short summary.</t>
        <ul spacing="normal">
          <li>
            <t><tt>v</tt> <em>(required)</em> Contains a version statement.</t>
          </li>
          <li>
            <t><tt>d</tt> <em>(required)</em> Contains the SAID (<xref format="counter" target="said"/>) of the ACDC. (Nested <tt>d</tt> fields contain SAIDs of nested JSON objects, as discussed in <xref format="counter" target="graduated-disclosure"/>.</t>
          </li>
          <li>
            <t><tt>i</tt> <em>(required)</em> In the outermost structure, contains the AID (<xref format="counter" target="aid"/>) of an issuer. Inside <tt>a</tt>, contains the AID of the issuee.</t>
          </li>
          <li>
            <t><tt>ri</tt> <em>(optional)</em> Identifies a registry that tracks revocations that might include one for this credential.</t>
          </li>
          <li>
            <t><tt>s</tt> <em>(required)</em> Contains the SAID of a schema to which the associated ACDC conforms.</t>
          </li>
          <li>
            <t><tt>a</tt> <em>(required)</em> Contains additional attributes for this specific ACDC, as allowed by its schema.</t>
          </li>
          <li>
            <t><tt>dt</tt> <em>(optional)</em> Contains the date when the issuer claims to have issued the ACDC. This data will correspond closely with a timestamp saved in the issuer's KEL, at the point where the signature on the ACDC was signed and anchored there. The ordering of the signature in the KEL, relative to other key state events, is what is definitive here; the timestamp itself should be viewed more as a hint.</t>
          </li>
          <li>
            <t><tt>e</tt> <em>(optional)</em> Contains edges that connect this ACDC to other data upon which it depends.</t>
          </li>
          <li>
            <t><tt>r</tt> <em>(optional)</em> Contains one or more rules that govern the use of the ACDC. Holding the credential requires a cryptographically nonrepudiable <tt>admit</tt> action with a wallet, and therefore proves that the holder agreed to these terms and conditions.</t>
          </li>
        </ul>
        <t>All ACDCs are validated against a schema that conforms to <xref target="JSON-SCHEMA"/>. Below we show some sample credentials and their corresponding schemas. VVP does not require these specific schemas, but rather is compatible with any that have roughly the same information content.</t>
      </section>
      <section anchor="vet-cred-sample">
        <name>Vetting credential</name>
        <t>The schema of a vetting credential (<xref format="counter" target="vetting-credential"/>) can be very simple; it needs to identify the issuer and issuee by AID, and it needs to identify the vetted legal entity in at least one way that is unambiguous. Here is a sample LE vLEI that meets these requirements. The issuer's AID appears in the first <tt>i</tt> field, the issuee in the second <tt>i</tt> field, and the connection to a vetted legal entity in the <tt>LEI</tt> field. (The validity of this credential depends on its issuer having a valid, unrevoked QVI credential; the specifc credential it links to is conveyed in <tt>e</tt>. The full text of rules has been elided to keep the example short.)</t>
        <sourcecode type="json"><![CDATA[
{
  "v":"ACDC10JSON0005c8_",
  "d":"Ebyg1epjv7D4-6mvl44Nlde1hTyL8413LZbY-mz60yI9",
  "i":"Ed88Jn6CnWpNbSYz6vp9DOSpJH2_Di5MSwWTf1l34JJm",
  "ri":"Ekfi58Jiv-NVqr6GOrxgxzhrE5RsDaH4QNwv9rCyZCwZ",
  "s":"ENPXp1vQzRF6JwIuS-mp2U8Uf1MoADoP_GqQ62VsDZWY",
  "a":{
    "d":"EdjPlxlRyujxarfXHCwFAqSV-yr0XrTE3m3XdFaS6U3K",
    "i":"Eeu5zT9ChsawBt2UXdU3kPIf9_lFqT5S9Q3yLZvKVfN6",
    "dt":"2024-09-19T13:48:21.779000+00:00",
    "LEI":"9845006A4378DFB4ED29"
  },
  "e":{
    "d":"EeyVJC9yZKpbIC-LcDhmlS8YhrjD4VIUBZUOibohGXit",
    "qvi":{
      "n":"EmatUqz_u9BizxwOc3JishC4MyXfiWzQadDpgCBA6X9n",
      "s":"EBfdlu8R27Fbx-ehrqwImnK-8Cm79sqbAQ4MmvEAYqao"
    }
  },
  "r":{
    "d":"EgZ97EjPSINR-O-KHDN_uw4fdrTxeuRXrqT5ZHHQJujQ",
    "usageDisclaimer":{
      "l":"Usage of a valid...fulfilled."
    },
    "issuanceDisclaimer":{
      "l":"All information...Governance Framework."
    }
  }
}
]]></sourcecode>
        <t>The schema that governs this credential, <tt>ENPX...DZWY</tt>, is shown in the <tt>s</tt> field. LE vLEI credential schemas are managed by GLEIF and published at <xref target="LE-VLEI-SCHEMA"/>.</t>
        <t>An alternate schema for vetting credentials -- one that incurs less effort to quality and to perform vetting, but that offers correspondingly lower levels of assurance, is published at <xref target="ORG-VET-SCHEMA"/>.</t>
        <t>As fundamentally public artifacts that are issued only to organizations, most vetting credentials will not be designed for graduated disclosure (<xref format="counter" target="graduated-disclosure"/>). Vetting credentials for individuals would require a different schema -- perhaps one that documents their full legal name but allows disclosure strategies such as first name + last initial, or first initial plus last name.</t>
      </section>
      <section anchor="tn-cred-sample">
        <name>TNAlloc credential</name>
        <t>A TNAlloc credential needs to identify its issuer and issuee. If and only if it isn't issued by a national regulator that acts as a root of trust on allocation questions, it also needs to cite an upstream allocation that justifies the issuer's right to pass along a subset of the numbers it controls.</t>
        <t>Here is a sample TNAlloc credential that meets these requirements.</t>
        <sourcecode type="json"><![CDATA[
{
  "v": "ACDC10JSON0003cd_",
  "d": "EEeg55Yr01gDyCScFUaE2QgzC7IOjQRpX2sTckFZp1RP",
  "u": "0AC8kpfo-uHQvxkuGZdlSjGy",
  "i": "EANghOmfYKURt3rufd9JNzQDw_7sQFxnDlIew4C3YCnM",
  "ri": "EDoSO5PEPLsstDr_XXa8aHAf0YKfPlJQcxZvkpMSzQDB",
  "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
  "a": {
      "d": "ECFFejktQA0ThTqLtAUTmW46unVGf28I_arbBFnIwnWB",
      "u": "0ADSLntzn8x8eNU6PhUF26hk",
      "i": "EERawEn-XgvmDR_-2ESVUVC6pW-rkqBkxMTsL36HosAz",
      "dt": "2024-12-20T20:40:57.888000+00:00",
      "numbers": {
          "rangeStart": "+33801361002",
          "rangeEnd": "+33801361009"
      },
      "channel": "voice",
      "doNotOriginate": false
  },
  "e": {
      "d": "EI9qlgiDbMeJ7JTZTJfVanUFAoa0TMz281loi63nCSAH",
      "tnalloc": {
          "n": "EG16t8CpJROovnGpgEW1_pLxH5nSBs1xQCbRexINYJgz",
          "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
          "o": "I2I"
      }
  },
  "r": {
      "d": "EJFhpp0uU7D7PKooYM5QIO1hhPKTjHE18sR4Dn0GFscR",
      "perBrand": "Issuees agree not to share..."
  }
}
]]></sourcecode>
        <t>The schema used by this particular credential, <tt>EFvn...GgSQ</tt>, is published at <xref target="TN-ALLOC-SCHEMA"/>.</t>
      </section>
      <section anchor="bcred-sample">
        <name>Brand credential</name>
        <t>TODO
~~~json
~~~</t>
      </section>
      <section anchor="bprox-cred-sample">
        <name>Brand proxy credential</name>
        <t>A brand proxy credential (<xref format="counter" target="brand-proxy-credential"/>) is very similar to a delegated signer credential, in that it proves carefully constrained delegated authority. The difference lies in what authority is delegated (proxy a brand vs. sign passports).</t>
        <t>A Generalized Cooperative Delegation (GCD) credential embodies delegated but constrained authority in exactly this way. A GCD credential suitable for use as a brand proxy in VVP might look like this:</t>
        <sourcecode type="json"><![CDATA[
{
    "v": "ACDC10JSON00096c_",
    "d": "EWQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFx",
    "u": "0ADE6oAxBl4E7uKeGUb7BEYi",
    "i": "EC4SuEyzrRwu3FWFrK0Ubd9xejlo5bUwAtGcbBGUk2nL",
    "ri": "EM2YZ78SKE8eO4W1lQOJeer5xKZqLmJV7SPr3Ji5DMBZ",
    "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
    "a": {
        "d": "EPQhEk5tfXvxyKe5Hk4DG63dSgoP-F2VZrxuIeIKrT9B",
        "u": "0AC9kH8q99PTCQNteGyI-F4g",
        "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
        "dt": "2024-12-27T13:11:29.062000+00:00",
        "c_goal": ["ops.telco.*.proxybrand"],
        "c_proto": ["VVP:OP,callee"]
    },
    "r": {
        "d": "EFthNcTE20MLMaCOoXlSmNtdooGEbZF8uGmO5G85eMSF",
        "noRoleSemanticsWithoutGfw": "All parties agree...",
        "issuerNotResponsibleOutsideConstraints": "Although verifiers...",
        "noConstraintSansPrefix": "Issuers agree...",
        "useStdIfPossible": "Issuers agree...",
        "onlyDelegateHeldAuthority": "Issuers agree..."
    }
}
]]></sourcecode>
        <t>Note the <tt>c_goal</tt> field that limits goals that can be justified with this credential, and the <tt>c_proto</tt> field that says the delegate can only exercise this authority in the context of the "VVP" protocol with the "OP" or "callee" role. The wildcard in <tt>c_goal</tt> and the addition of the "callee" role in <tt>c_proto</tt> are complementary changes that allow this credential to justify proxying the brand on both outbound and inbound calls. (Branding on inbound calls is out of scope for VVP, but is included here just to show that the same credentials can be used for both VVP and non-VVP solutions. To convert this credential to a purely outbound authorization, replace the wildcard with <tt>send</tt>, and limit the roles in <tt>VVP</tt> to <tt>OP</tt>.)</t>
        <t>The schema for GCD credentials, and an explanation how to add additional constraints, is documented at <xref target="GCD-SCHEMA"/>.</t>
      </section>
      <section anchor="dsig-cred-sample">
        <name>Delegated signer credential</name>
        <t>A delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>) must prove that the issuer is giving authority to the issuee. This authority should be carefully constrained so that it applies only to outbound voice calls, not to signing invoices or legal contracts. It can also be constrained so it only applies on a particular schedule, or when the call originates or terminates in a particular geo or jurisdiction.</t>
        <t>A Generalized Cooperative Delegation (GCD) credential embodies delegated but constrained authority in exactly this way. A GCD credential suitable for use as a delegated signer credential in VVP might look like this:</t>
        <sourcecode type="json"><![CDATA[
{
    "v": "ACDC10JSON00096c_",
    "d": "EDQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFR",
    "u": "0ADE6oAxBl4E7uKeGUb7BEYi",
    "i": "EC4SuEyzrRwu3FWFrK0Ubd9xejlo5bUwAtGcbBGUk2nL",
    "ri": "EM2YZ78SKE8eO4W1lQOJeer5xKZqLmJV7SPr3Ji5DMBZ",
    "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
    "a": {
        "d": "EPQhEk5tfXvxyKe5Hk4DG63dSgoP-F2VZrxuIeIKrT9B",
        "u": "0AC9kH8q99PTCQNteGyI-F4g",
        "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
        "dt": "2024-12-27T13:11:29.062000+00:00",
        "c_goal": ["ops.telco.send.sign"],
        "c_proto": ["VVP:OP"]
    },
    "r": {
        "d": "EFthNcTE20MLMaCOoXlSmNtdooGEbZF8uGmO5G85eMSF",
        "noRoleSemanticsWithoutGfw": "All parties agree...",
        "issuerNotResponsibleOutsideConstraints": "Although verifiers...",
        "noConstraintSansPrefix": "Issuers agree...",
        "useStdIfPossible": "Issuers agree...",
        "onlyDelegateHeldAuthority": "Issuers agree..."
    }
}
]]></sourcecode>
        <t>Note the <tt>c_goal</tt> field that limits goals that can be justified with this credential, and the <tt>c_proto</tt> field that says the delegate can only exercise this authority in the context of the "VVP" protocol with the "OP" role.</t>
        <t>The schema for GCD credentials, and an explanation how to add additional constraints, is documented at <xref target="GCD-SCHEMA"/>.</t>
      </section>
      <section anchor="dossier-1">
        <name>Dossier</name>
        <t>A dossier (<xref format="counter" target="dossier"/>) contains little direct data of its own. It consists almost entirely of edges -- that is, links to other credentials. Here's what one might look like:</t>
        <sourcecode type="json"><![CDATA[
{
  "v": "ACDC10JSON00036f_",
  "d": "EKvpcshjgjzdCWwR4q9VnlsUwPgfWzmy9ojMpTSzNcEr",
  "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
  "ri": "EMU5wN33VsrJKlGCwk2ts_IJi67IXE6vrYV3v9Xdxw3p",
  "s": "EFv3_L64_xNhOGQkaAHQTI-lzQYDvlaHcuZbuOTuDBXj",
  "a": {
    "d": "EJnMhz8MJxmI0epkq7D1zzP5pGTbSb2YxkSdczNfcHQM",
    "dt": "2024-12-27T13:11:41.865000+00:00"
  },
  "e": {
    "d": "EPVc2ktYnZQOwNs34lO1YXFOkT51lzaILFEMXNfZbGrh",
    "vetting": {
      "n": "EIpaOx1NJc0N_Oj5xzWhFQp6EpB847yTex62xQ7uuSQL",
      "s": "ENPXp1vQzRF6JwIuS-mp2U8Uf1MoADoP_GqQ62VsDZWY",
      "o": "NI2I"
    },
    "alloc": {
      "n": "EEeg55Yr01gDyCScFUaE2QgzC7IOjQRpX2sTckFZp1RP",
      "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
      "o": "I2I"
    },
    "brand": {
      "n": "EKSZT4yTtsZ2AqriNKBvS7GjmsU3X1t-S3c69pHceIXW",
      "s": "EaWmoHDYbkjG4BaI0nK7I-kaBBeKlbDLGadxBdSQjMGg",
      "o": "I2I"
    },
    "bproxy": {
      "n": "EWQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFx",
      "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
      "o": "I2I"
    },
    "delsig": {
      "n": "EMKcp1-AvpW0PZdThjK3JCbMsXAmrqB9ONa1vZyTppQE",
      "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
      "o": "NI2I"
    }
  }
}
]]></sourcecode>
        <t>Notice how each named edge references one of the previous sample credentials in its <tt>n</tt> field, and that other credential's associated schema in the <tt>s</tt> field.</t>
        <t>The schema for this credential is documented at <xref target="DOSSIER-SCHEMA"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines a new SDP <xref target="RFC8866"/> session-level attribute:</t>
      <t>Attribute name:      callee-passport
   Long-form description: Contains a STIR-compatible passport that references a dossier of evidence about the callee's identity, brand, and related attributes. Used in 200 OK and/or 180 Ringing responses.
   Type of attribute:   session-level
   Subject to charset:  No
   Reference:           This document</t>
      <t>This specification also depends on OOBIs (see <xref format="counter" target="aid"/>) being served as web resources with IANA content type <tt>application/json+cesr</tt>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
            <author fullname="A. Johnston" initials="A." surname="Johnston"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Schooler" initials="E." surname="Schooler"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC4353">
          <front>
            <title>A Framework for Conferencing with the Session Initiation Protocol (SIP)</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>The Session Initiation Protocol (SIP) supports the initiation, modification, and termination of media sessions between user agents. These sessions are managed by SIP dialogs, which represent a SIP relationship between a pair of user agents. Because dialogs are between pairs of user agents, SIP's usage for two-party communications (such as a phone call), is obvious. Communications sessions with multiple participants, generally known as conferencing, are more complicated. This document defines a framework for how such conferencing can occur. This framework describes the overall architecture, terminology, and protocol components needed for multi-party conferencing. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4353"/>
          <seriesInfo name="DOI" value="10.17487/RFC4353"/>
        </reference>
        <reference anchor="RFC4575">
          <front>
            <title>A Session Initiation Protocol (SIP) Event Package for Conference State</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="O. Levin" initials="O." role="editor" surname="Levin"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This document defines a conference event package for tightly coupled conferences using the Session Initiation Protocol (SIP) events framework, along with a data format used in notifications for this package. The conference package allows users to subscribe to a conference Uniform Resource Identifier (URI). Notifications are sent about changes in the membership of this conference and optionally about changes in the state of additional conference components. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4575"/>
          <seriesInfo name="DOI" value="10.17487/RFC4575"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5626">
          <front>
            <title>Managing Client-Initiated Connections in the Session Initiation Protocol (SIP)</title>
            <author fullname="C. Jennings" initials="C." role="editor" surname="Jennings"/>
            <author fullname="R. Mahy" initials="R." role="editor" surname="Mahy"/>
            <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>The Session Initiation Protocol (SIP) allows proxy servers to initiate TCP connections or to send asynchronous UDP datagrams to User Agents in order to deliver requests. However, in a large number of real deployments, many practical considerations, such as the existence of firewalls and Network Address Translators (NATs) or the use of TLS with server-provided certificates, prevent servers from connecting to User Agents in this way. This specification defines behaviors for User Agents, registrars, and proxy servers that allow requests to be delivered on existing connections established by the User Agent. It also defines keep-alive behaviors needed to keep NAT bindings open and specifies the usage of multiple connections from the User Agent to its registrar. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5626"/>
          <seriesInfo name="DOI" value="10.17487/RFC5626"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8224">
          <front>
            <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
              <t>This document obsoletes RFC 4474.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8224"/>
          <seriesInfo name="DOI" value="10.17487/RFC8224"/>
        </reference>
        <reference anchor="RFC8225">
          <front>
            <title>PASSporT: Personal Assertion Token</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8225"/>
          <seriesInfo name="DOI" value="10.17487/RFC8225"/>
        </reference>
        <reference anchor="RFC8866">
          <front>
            <title>SDP: Session Description Protocol</title>
            <author fullname="A. Begen" initials="A." surname="Begen"/>
            <author fullname="P. Kyzivat" initials="P." surname="Kyzivat"/>
            <author fullname="C. Perkins" initials="C." surname="Perkins"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This memo defines the Session Description Protocol (SDP). SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. This document obsoletes RFC 4566.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8866"/>
          <seriesInfo name="DOI" value="10.17487/RFC8866"/>
        </reference>
        <reference anchor="FIPS186-4" target="https://doi.org/10.6028/NIST.FIPS.186-4">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2013" month="July"/>
          </front>
        </reference>
        <reference anchor="TOIP-CESR" target="https://trustoverip.github.io/tswg-cesr-specification/">
          <front>
            <title>Composable Event Streaming Representation (CESR)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TOIP-KERI" target="https://trustoverip.github.io/tswg-keri-specification/">
          <front>
            <title>Key Event Receipt Infrastructure (KERI)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="TOIP-ACDC" target="https://trustoverip.github.io/tswg-acdc-specification/">
          <front>
            <title>Authentic Chained Data Containers (ACDC)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="ISO-17442-1" target="https://www.iso.org/standard/78829.html">
          <front>
            <title>Financial services – Legal entity identifier (LEI) – Part 1: Assignment</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="ISO-17442-3" target="https://www.iso.org/standard/85628.html">
          <front>
            <title>inancial services – Legal entity identifier (LEI) – Part 3: Verifiable LEIs (vLEIs)</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="ATIS-1000074" target="https://atis.org/resources/signature-based-handling-of-asserted-information-using-tokens-shaken-atis-1000074-e/">
          <front>
            <title>Signature-Based Handling of Asserted Information Using toKENs (SHAKEN)</title>
            <author>
              <organization>Alliance for Telecommunications Industry Solutions</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3262">
          <front>
            <title>Reliability of Provisional Responses in Session Initiation Protocol (SIP)</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document specifies an extension to the Session Initiation Protocol (SIP) providing reliable provisional response messages. This extension uses the option tag 100rel and defines the Provisional Response ACKnowledgement (PRACK) method. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3262"/>
          <seriesInfo name="DOI" value="10.17487/RFC3262"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6350">
          <front>
            <title>vCard Format Specification</title>
            <author fullname="S. Perreault" initials="S." surname="Perreault"/>
            <date month="August" year="2011"/>
            <abstract>
              <t>This document defines the vCard data format for representing and exchanging a variety of information about individuals and other entities (e.g., formatted and structured name and delivery addresses, email address, multiple telephone numbers, photograph, logo, audio clips, etc.). This document obsoletes RFCs 2425, 2426, and 4770, and updates RFC 2739. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6350"/>
          <seriesInfo name="DOI" value="10.17487/RFC6350"/>
        </reference>
        <reference anchor="RFC7095">
          <front>
            <title>jCard: The JSON Format for vCard</title>
            <author fullname="P. Kewisch" initials="P." surname="Kewisch"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This specification defines "jCard", a JSON format for vCard data. The vCard data format is a text format for representing and exchanging information about individuals and other entities, for example, telephone numbers, email addresses, structured names, and delivery addresses. JSON is a lightweight, text-based, language- independent data interchange format commonly used in Internet applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7095"/>
          <seriesInfo name="DOI" value="10.17487/RFC7095"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8226">
          <front>
            <title>Secure Telephone Identity Credentials: Certificates</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8226"/>
          <seriesInfo name="DOI" value="10.17487/RFC8226"/>
        </reference>
        <reference anchor="RFC8588">
          <front>
            <title>Personal Assertion Token (PaSSporT) Extension for Signature-based Handling of Asserted information using toKENs (SHAKEN)</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="M. Barnes" initials="M." surname="Barnes"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document extends the Personal Assertion Token (PASSporT), which is a token object that conveys cryptographically signed information about the participants involved in communications. The extension is defined based on the "Signature-based Handling of Asserted information using toKENs (SHAKEN)" specification by the ATIS/SIP Forum IP-NNI Task Group. It provides both (1) a specific set of levels of confidence in the correctness of the originating identity of a call originated in a SIP-based telephone network as well as (2) an identifier that allows the Service Provider (SP) to uniquely identify the origin of the call within its network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8588"/>
          <seriesInfo name="DOI" value="10.17487/RFC8588"/>
        </reference>
        <reference anchor="VCON-DRAFT">
          <front>
            <title>The JSON format for vCon - Conversation Data Container</title>
            <author fullname="Daniel Petrie" initials="D." surname="Petrie">
              <organization>SIPez LLC</organization>
            </author>
            <author fullname="Thomas McCarthy-Howe" initials="T." surname="McCarthy-Howe">
              <organization>Strolid</organization>
            </author>
            <date day="19" month="March" year="2025"/>
            <abstract>
              <t>   A vCon is the container for data and information relating to a real-
   time, human conversation.  It is analogous to a [vCard] which enables
   the definition, interchange and storage of an individual's various
   points of contact.  The data contained in a vCon may be derived from
   any multimedia session, traditional phone call, video conference, SMS
   or MMS message exchange, webchat or email thread.  The data in the
   container relating to the conversation may include Call Detail
   Records (CDR), call meta data, participant identity information (e.g.
   STIR PASSporT), the actual conversational data exchanged (e.g. audio,
   video, text), realtime or post conversational analysis and
   attachments of files exchanged during the conversation.  A
   standardized conversation container enables many applications,
   establishes a common method of storage and interchange, and supports
   identity, privacy and security efforts (see [vCon-white-paper])

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-vcon-vcon-container-03"/>
        </reference>
        <reference anchor="GSMA-RCS" target="https://www.gsma.com/solutions-and-impact/technologies/networks/wp-content/uploads/2019/10/RCC.07-v11.0.pdf">
          <front>
            <title>Rich Communication Suite - Advanced Communications Services and Client Specification, version 11.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="RCD-DRAFT">
          <front>
            <title>SIP Call-Info Parameters for Rich Call Data</title>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos</organization>
            </author>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>TransUnion</organization>
            </author>
            <date day="21" month="April" year="2025"/>
            <abstract>
              <t>   This document specifies a usage of the SIP Call-Info header field
   that incorporates Rich Call Data (RCD) associated with the identity
   of the originating party in order to provide to the terminating party
   a description of the caller (including details about the reason for
   the session).  RCD includes information about the caller beyond the
   telephone number such as a calling name, a logo, photo, or jCard
   object representing the caller, which can help the called party
   decide how to handle the session request.

   This document defines three new parameters 'call-reason', 'verified',
   and 'integrity' for the SIP Call-Info header field and also a new
   token ("jcard") for the 'purpose' parameter of the Call-Info header
   field.  It also provides guidance on the use of the Call-Info
   'purpose' parameter token, "icon".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sipcore-callinfo-rcd-19"/>
        </reference>
        <reference anchor="RCD-PASSPORT">
          <front>
            <title>PASSporT Extension for Rich Call Data</title>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos Inc.</organization>
            </author>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>Neustar Inc.</organization>
            </author>
            <date day="5" month="June" year="2023"/>
            <abstract>
              <t>   This document extends PASSporT, a token for conveying
   cryptographically-signed call information about personal
   communications, to include rich meta-data about a call and caller
   that can be signed and integrity protected, transmitted, and
   subsequently rendered to the called party.  This framework is
   intended to include and extend caller and call specific information
   beyond human-readable display name comparable to the "Caller ID"
   function common on the telephone network and is also enhanced with a
   integrity mechanism that is designed to protect the authoring and
   transport of this information for different authoritative use-cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-stir-passport-rcd-26"/>
        </reference>
        <reference anchor="SD-JWT-DRAFT">
          <front>
            <title>Selective Disclosure for JWTs (SD-JWT)</title>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete</organization>
            </author>
            <author fullname="Kristina Yasuda" initials="K." surname="Yasuda">
              <organization>Keio University</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="29" month="May" year="2025"/>
            <abstract>
              <t>   This specification defines a mechanism for the selective disclosure
   of individual elements of a JSON data structure used as the payload
   of a JSON Web Signature (JWS).  The primary use case is the selective
   disclosure of JSON Web Token (JWT) claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-selective-disclosure-jwt-22"/>
        </reference>
        <reference anchor="CTIA-BCID" target="https://api.ctia.org/wp-content/uploads/2022/11/Branded-Calling-Best-Practices.pdf">
          <front>
            <title>Branded Calling ID Best Practices</title>
            <author>
              <organization>CTIA</organization>
            </author>
            <date year="2022" month="November"/>
          </front>
        </reference>
        <reference anchor="W3C-DID" target="https://www.w3.org/TR/2022/REC-did-core-20220719/">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author fullname="Amy Guy" role="editor"/>
            <author fullname="Drummond Reed" role="editor"/>
            <author fullname="Manu Sporny" role="editor"/>
            <author fullname="Markus Sabadello" role="editor"/>
            <date day="19" month="July" year="2022"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-did-core-20220719"/>
          <seriesInfo name="W3C" value="REC-did-core-20220719"/>
        </reference>
        <reference anchor="W3C-VC" target="https://www.w3.org/TR/2022/REC-vc-data-model-20220303/">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author fullname="Brent Zundel" role="editor"/>
            <author fullname="Daniel Burnett" role="editor"/>
            <author fullname="Dave Longley" role="editor"/>
            <author fullname="Grant Noble" role="editor"/>
            <author fullname="Kyle Den Hartog" role="editor"/>
            <author fullname="Manu Sporny" role="editor"/>
            <date day="3" month="March" year="2022"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-vc-data-model-20220303"/>
          <seriesInfo name="W3C" value="REC-vc-data-model-20220303"/>
        </reference>
        <reference anchor="ARIES-RFC-0519" target="https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0519-goal-codes/README.md">
          <front>
            <title>Aries RFC 0519: Goal Codes</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="JSON-SCHEMA" target="https://json-schema.org/specification">
          <front>
            <title>JSON Schema Specification 2020-12</title>
            <author>
              <organization>JSON Schema Community</organization>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="LE-VLEI-SCHEMA" target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/legal-entity-vLEI-credential.json">
          <front>
            <title>Legal Entity vLEI Credential</title>
            <author>
              <organization>GLEIF</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TN-ALLOC-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/tn-alloc/tn-alloc.schema.json">
          <front>
            <title>TN Allocation Credential</title>
            <author>
              <organization>Provenant</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="PERSONHOOD-CRED" target="https://arxiv.org/pdf/2408.07892">
          <front>
            <title>Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online</title>
            <author initials="S." surname="Adler" fullname="Steven Adler">
              <organization/>
            </author>
            <author initials="Z." surname="Hitzig" fullname="Zoë Hitzig">
              <organization/>
            </author>
            <author initials="S." surname="Jain" fullname="Shrey Jain">
              <organization/>
            </author>
            <author initials="C." surname="Brewer" fullname="Catherine Brewer">
              <organization/>
            </author>
            <author initials="W." surname="Chang" fullname="Wayne Chang">
              <organization/>
            </author>
            <author initials="R." surname="DiResta" fullname="Renée DiResta">
              <organization/>
            </author>
            <author initials="E." surname="Lazzarin" fullname="Eddy Lazzarin">
              <organization/>
            </author>
            <author initials="S." surname="McGregor" fullname="Sean McGregor">
              <organization/>
            </author>
            <author initials="W." surname="Seltzer" fullname="Wendy Seltzer">
              <organization/>
            </author>
            <author initials="D." surname="Siddarth" fullname="Divya Siddarth">
              <organization/>
            </author>
            <author initials="N." surname="Soliman" fullname="Nouran Soliman">
              <organization/>
            </author>
            <author initials="T." surname="South" fullname="Tobin South">
              <organization/>
            </author>
            <author initials="C." surname="Spelliscy" fullname="Connor Spelliscy">
              <organization/>
            </author>
            <author initials="M." surname="Sporny" fullname="Manu Sporny">
              <organization/>
            </author>
            <author initials="V." surname="Srivastava" fullname="Varya Srivastava">
              <organization/>
            </author>
            <author initials="J." surname="Bailey" fullname="John Bailey">
              <organization/>
            </author>
            <author initials="B." surname="Christian" fullname="Brian Christian">
              <organization/>
            </author>
            <author initials="A." surname="Critch" fullname="Andrew Critch">
              <organization/>
            </author>
            <author initials="R." surname="Falcon" fullname="Ronnie Falcon">
              <organization/>
            </author>
            <author initials="H." surname="Flanagan" fullname="Heather Flanagan">
              <organization/>
            </author>
            <author initials="K. H." surname="Duffy" fullname="Kim Hamilton Duffy">
              <organization/>
            </author>
            <author initials="E." surname="Ho" fullname="Eric Ho">
              <organization/>
            </author>
            <author initials="C. R." surname="Leibowicz" fullname="Claire R. Leibowicz">
              <organization/>
            </author>
            <author initials="S." surname="Nadhamuni" fullname="Srikanth Nadhamuni">
              <organization/>
            </author>
            <author initials="A. Z." surname="Rozenshtein" fullname="Alan Z. Rozenshtein">
              <organization/>
            </author>
            <author initials="D." surname="Schnurr" fullname="David Schnurr">
              <organization/>
            </author>
            <author initials="E." surname="Shapiro" fullname="Evan Shapiro">
              <organization/>
            </author>
            <author initials="L." surname="Strahm" fullname="Lacey Strahm">
              <organization/>
            </author>
            <author initials="A." surname="Trask" fullname="Andrew Trask">
              <organization/>
            </author>
            <author initials="Z." surname="Weinberg" fullname="Zoe Weinberg">
              <organization/>
            </author>
            <author initials="C." surname="Whitney" fullname="Cedric Whitney">
              <organization/>
            </author>
            <author initials="T." surname="Zick" fullname="Tom Zick">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="F2F-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/face-to-face/index.md">
          <front>
            <title>Face-to-Face Credentials</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="CITATION-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/citation/index.md">
          <front>
            <title>Citation Schema</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="GCD-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/gcd/index.md">
          <front>
            <title>Generalized Cooperative Delegation (GCD) Credentials</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="DOSSIER-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/vvp-dossier/vvp-dossier.schema.json">
          <front>
            <title>Verifiable Voice Dossier</title>
            <author initials="A." surname="Singh" fullname="Arshdeep Singh">
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="ORG-VET-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/org-vet/index.md">
          <front>
            <title>Org Vet Credentials</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1457?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much of the cybersecurity infrastructure used by VVP depends on KERI, which was invented by Sam Smith, and first implemented by Sam plus Phil Fairheller, Kevin Griffin, and other technical staff at GLEIF. Thanks to logistical support from Trust Over IP and the Linux Foundation, and to a diverse community of technical experts in those communities and in the Web of Trust group.</t>
      <t>Techniques that apply KERI to telco use cases were developed by Daniel Hardman, Randy Warshaw, and Ruth Choueka, with additional contributions from Dmitrii Tychinin, Yaroslav Lazarev, Arshdeep Singh, and many other staff members at Provenant, Inc. Thanks as well to Ed Eykholt for multiple editorial improvements.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
