<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.0.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hardman-verifiable-voice-protocol-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="VVP">Verifiable Voice Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hardman-verifiable-voice-protocol-01"/>
    <author fullname="Daniel Hardman">
      <organization>Provenant, Inc</organization>
      <address>
        <email>daniel.hardman@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="09"/>
    <keyword>voip</keyword>
    <keyword>telecom</keyword>
    <keyword>telco</keyword>
    <keyword>telephone number</keyword>
    <keyword>vetting</keyword>
    <keyword>KYC</keyword>
    <abstract>
      <?line 252?>

<t>Verifiable Voice Protocol (VVP) authenticates and authorizes organizations and individuals making telephone calls. This eliminates trust gaps that scammers exploit. Like related technolgies such as SHAKEN, RCD, and BCID, VVP binds cryptographic evidence to a SIP INVITE, and verifies this evidence downstream. However, VVP builds from different technical and governance assumptions, and uses stronger, richer evidence. This allows VVP to cross jurisdictional boundaries easily and robustly. It also makes VVP simpler, more decentralized, cheaper to deploy and maintain, more private, more scalable, and higher assurance than alternatives. Because it is easier to adopt, VVP can plug gaps or build bridges between other approaches, functioning as glue in hybrid ecosystems. For example, it may justify an A attestation in SHAKEN, or an RCD passport for branded calling, when a call originates outside SHAKEN or RCD ecosystems. VVP also works well as a standalone mechanism, independent of other solutions. An extra benefit is that VVP enables two-way evidence sharing with verifiable text and chat (e.g., RCS and vCon), as well as with other industry verticals that need verifiability in non-telco contexts.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dhh1128.github.io/vvp/draft-hardman-verifiable-voice-protocol.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hardman-verifiable-voice-protocol/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dhh1128/vvp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 256?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>When we get phone calls, we want to know who's calling, and why. Annoying or malicious strangers abuse expectations far too often.</t>
      <t>Regulators have mandated protections, and industry has responded. However, existing solutions have several drawbacks:</t>
      <ul spacing="normal">
        <li>
          <t>Assurance derives only from the signatures of originating service providers, with no independently verifiable proof of what they assert.</t>
        </li>
        <li>
          <t>Each jurisdiction has its own governance and its own set of signers. Sharing information across boundaries is fraught with logistical and regulatory problems.</t>
        </li>
        <li>
          <t>Deployment and maintenance costs are high.</t>
        </li>
        <li>
          <t>Market complexities such as the presence of aggregators, wholesalers, and call centers that proxy a brand are difficult to model safely.</t>
        </li>
        <li>
          <t>What might work for enterprises offers few benefits and many drawbacks for individual callers.</t>
        </li>
      </ul>
      <t>VVP solves these problems by applying three crucial innovations.</t>
      <section anchor="evidence-scope">
        <name>Evidence scope</name>
        <t>Existing solutions aim to assert variable levels of confidence about a caller's identity, plus possibly some brand attributes. These assertions rest entirely on a service provider's judgment and are testable only in the moment a call is initiated; later, they become repudiable.</t>
        <t>VVP proves more. It always proves the caller's legal identity, plus any authority that the caller has delegated to staff and service providers. It typically also proves brand attributes and right to use a phone number. If a call center is involved, it proves the constraints under which the call center operates as a representative. All VVP proof is traceable back to justifying evidence and can be evaluated in the present or the past. This guarantees accountability for all parties with a permanent, non-repudiable audit trail.</t>
      </section>
      <section anchor="evidence-format">
        <name>Evidence format</name>
        <t>VVP is rooted in an evidence format called <em>authentic chained data container</em>s (<em>ACDC</em>s) -- <xref target="TOIP-ACDC"/>. Other forms of evidence (e.g., JWTs/STIR PASSporTs, digital signatures, and optional interoperable inputs from W3C verifiable credentials <xref target="W3C-VC"/> and SD-JWTs <xref target="SD-JWT-DRAFT"/>) also contribute. However, the foundation that VVP places beneath them is unique. For a discussion of the theory behind VVP evidence, see <xref format="counter" target="appendix-a"/>. For more about additional evidence types, see <xref format="counter" target="building-blocks"/> and <xref format="counter" target="interoperability"/>.</t>
        <t>Because of innovations in format, VVP evidence is easier to create and maintain, safer, and more flexible than alternative approaches. It also lasts much longer. This drastically lowers the friction to adoption.</t>
      </section>
      <section anchor="vetting-refinements">
        <name>Vetting refinements</name>
        <t>Although VVP interoperates with governance frameworks such as SHAKEN <xref target="ATIS-1000074"/>, it allows for a dramatic upgrade of at least one core component: the foundational vetting mechanism. The evidence format used by VVP is also the format used by the Verifiable Legal Entity Identifier (vLEI) standardized in <xref target="ISO-17442-3"/>. vLEIs implement a KYC approach advocated by the G20's Financial Stability Board, and overseen by the G20's Regulatory Oversight Committee. This approach follows LEI rules for KYC (<xref target="ISO-17442-1"/>), and today it's globally required in high-security, high-regulation, cross-border banking.</t>
        <t>Millions of institutions have already undergone LEI vetting, and they already use the resulting evidence of their organizational identity in day-to-day behaviors all over the world. By adopting tooling that's compatible with the vLEI ecosystem, VVP gives adopters an intriguing option: <em>just skip the task of inventing a whole new vetting regime unique to telco, with its corresponding learning curve, costs, and legal and business adoption challenges.</em></t>
        <t>To be clear, VVP does not <em>require</em> that vLEIs be used for vetting. However, by choosing an evidence format that is high-precision and lossless enough to accommodate vLEIs, VVP lets telco ecosystems opt in, either wholly or partially (see <xref format="counter" target="interoperability"/>), to trust bases that are already adopted, and that are not limited to any particular jurisdiction or to the telco industry. It thus offers two-way, easy bridges between identity in phone calls and identity in financial, legal, technical, logistic, regulatory, web, email, and social media contexts.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="overview">
      <name>Overview</name>
      <t>Fundamentally, VVP requires a caller to curate (<xref format="counter" target="curating"/>) a dossier (<xref format="counter" target="dossier"/>) of stable evidence that proves identity and authorization. This is done once or occasionally, in advance, as a configuration precondition. Then, for each call, an ephemeral STIR-compatible VVP PASSporT (<xref format="counter" target="passport"/>) is generated that cites (<xref format="counter" target="citing"/>) the preconfigured dossier. Verifiers check the passport and its corresponding dossier, including realtime revocation status, to make decisions (<xref format="counter" target="verifying"/>).</t>
      <section anchor="roles">
        <name>Roles</name>
        <t>Understanding the workflow in VVP requires a careful definition of roles related to the protocol. The terms that follow have deep implications for the mental model, and their meaning in VVP may not match casual usage.</t>
        <section anchor="allocation-holder">
          <name>Allocation Holder</name>
          <t>An <em>allocation holder</em> controls how a phone number is used, in the eyes of a regulator. Enterprises and consumers that make calls with phone numbers they legitimately control are the most obvious category of allocation holders, and are called direct <em>telephone number users</em> (<em>TNUs</em>). Range holders hold allocations for numbers that have not yet been assigned; they don't make calls with these numbers, and are therefore not TNUs, but they are still allocation holders.</t>
          <t>It is possible for an ecosystem to include other parties as allocation holders (e.g., wholesalers, aggregators). However, many regulators dislike this outcome, and prefer that such parties broker allocations without actually holding the allocations as intermediaries.</t>
        </section>
        <section anchor="TP">
          <name>Terminating Party</name>
          <t>For a given phone call, the <em>terminating party</em> (<em>TP</em>) receives the call. A TP can be an individual consumer or an organization. The direct service provider of the TP is the <em>terminating service provider</em> (<em>TSP</em>).</t>
        </section>
        <section anchor="OP">
          <name>Originating Party</name>
          <t>An <em>originating party</em> (<em>OP</em>) controls the first <em>session border controller</em> (<em>SBC</em>) that processes a call, and therefore builds the VVP passport (<xref format="counter" target="passport"/>) that cites the evidence that authenticates and authorizes the call.</t>
          <t>It may be tempting to equate the OP with "the caller", and in some ways this perspective might reflect truth. However, this simple equivalence lacks nuance and doesn't always hold. In a VVP context, it is more accurate to say that the OP creates a SIP INVITE <xref target="RFC3261"/> with explicit, provable authorization from the party accountable for calls on the originating phone number. The OP originates the VVP protocol, <em>not</em> the call on the handset.</t>
          <t>It may also be tempting to associate the OP with an organizational identity like "Company X". While this is not wrong, and is in fact used in high-level descriptions in this specification, in its most careful definition, the cryptographic identity of an OP is more narrow. It typically corresponds to a single service operated by an IT department within (or outsourced but operating at the behest of) Company X, rather than to Company X generically. This narrowness limits cybersecurity risk, because a single service operated by Company X needs far fewer privileges than the company as a whole. Failing to narrow identity appropriately creates vulnerabilities in some alternative approaches. The evidence securing VVP <bcp14>MUST</bcp14> therefore prove a valid relationship between the OP's narrow identity and the broader legal entities that stakeholders more naturally assume and understand (see <xref format="counter" target="DE"/>).</t>
          <t>The service provider associated with an OP is called the <em>originating service provider</em> (<em>OSP</em>). For a given phone call, there may be complexity between the hardware that begins a call and the SBC of the OP -- and there may also be many layers, boundaries, and transitions between OSP and TSP.</t>
        </section>
        <section anchor="AP">
          <name>Accountable Party</name>
          <t>For a given call, the <em>accountable party</em> (<em>AP</em>) is the organization or individual (the TNU) that has the right to use the originating phone number, according to the regulator of that number. When a TP asks, "Who's calling?", they have little interest in the technicalities of the OP, and it is almost always the AP that they want to identify. The AP is accountable for the call, and thus "the caller", as far as the regulator and the TP are concerned.</t>
          <t>APs can operate their own SBCs and therefore be their own OPs. However, APs can also use a UCaaS provider that makes the AP-OP relationship indirect. Going further, a business can hire a call center, and delegate to the call center the right to use its phone number. In such a case, the business is the AP, but the call center is the OP that makes calls on its behalf. None of these complexities alter the fact that, from the TP's perspective, the AP is "the caller". The TP chooses to answer or not, based on their desire to interact with the AP. If the TP's trust is abused, the regulator and the TP both want to hold the AP accountable.</t>
          <t>VVP requires an AP to prepare a dossier (<xref format="counter" target="dossier"/>) of evidence that documents a basis for imposing this accountability on them. Only the owner of a given dossier can prove they intend to initiate a VVP call that cites their dossier (see <xref format="counter" target="delegating-signing-authority"/>). Therefore, if a verifier confirms that a particular call properly matches its dossier, the verifier is justified in considering the owner of that dossier the AP for the call. Otherwise, someone is committing fraud. Accountability, and the basis for it, are both unambiguous.</t>
        </section>
        <section anchor="verifier">
          <name>Verifier</name>
          <t>A <em>verifier</em> is a party that wants to know who's calling, and why, and that evaluates the answers to these questions by examining formal evidence. TPs, TSPs, OSPs, government regulators, law enforcement doing lawful intercept, auditors, and even APs or OPs can be verifiers. Each may need to see different views of the evidence about a particular phone call, and it may be impossible to comply with various regulations unless these views are kept distinct -- yet each wants similar and compatible assurance.</t>
          <t>In addition to checking the validity of cryptographic evidence, the verifier role in VVP <bcp14>MAY</bcp14> also consider how that evidence matches business rules and external conditions. For example, a verifier can begin its analysis by deciding whether Call Center Y has the right, in the abstract, to make calls on behalf of Organization X using a given phone number. However, VVP evidence allows a verifier to go further: it can also consider whether Y is allowed to exercise this right at the particular time of day when a call occurs, or in the jurisdiction of a particular TP, given the business purpose asserted in a particular call.</t>
        </section>
      </section>
      <section anchor="lifecycle">
        <name>Lifecycle</name>
        <t>VVP depends on three interrelated activities with evidence:</t>
        <ul spacing="normal">
          <li>
            <t>Curating</t>
          </li>
          <li>
            <t>Citing</t>
          </li>
          <li>
            <t>Verifying</t>
          </li>
        </ul>
        <t>Chronologically, evidence must be curated before it can be cited or verified. In addition, some vulnerabilities in existing approaches occur because evidence requirements are too loose. Therefore, understanding the nature of backing evidence, and how that evidence is created and maintained, is a crucial consideration for VVP. This specification includes normative statements about evidence.</t>
        <t>However, curating does not occur in realtime during phone calls. Citing and verifying are the heart of VVP, and implementers will probably approach VVP from the standpoint of SIP flows <xref target="RFC3261"/>, <xref target="RFC5626"/>. Therefore, we defer the question of curation to <xref format="counter" target="curating"/>. Where not-yet-explained evidence concepts are used, inline references allow easy cross-reference to formal definitions that come later.</t>
      </section>
    </section>
    <section anchor="citing">
      <name>Citing</name>
      <t>A call secured by VVP begins when the OP (<xref format="counter" target="OP"/>) generates a new VVP passport (<xref format="counter" target="passport"/>) that complies with STIR <xref target="RFC8224"/> requirements. In its compact-serialized JWT <xref target="RFC7519"/> form, this passport is then passed as an <tt>Identity</tt> header in a SIP INVITE <xref target="RFC3261"/>. The passport <em>constitutes</em> lightweight, direct, and ephemeral evidence; it <em>cites</em> and therefore depends upon comprehensive, indirect, and long-lived evidence (the dossier; see <xref format="counter" target="dossier"/>). Safely and efficiently citing stronger evidence is one way that VVP differs from alternatives.</t>
      <section anchor="questions-answered-by-a-passport">
        <name>Questions answered by a passport</name>
        <t>The passport directly answers the following questions:</t>
        <ul spacing="normal">
          <li>
            <t>What is the cryptographic identity of the OP?</t>
          </li>
          <li>
            <t>How can a verifier determine the OP's key state at the time the passport was created?</t>
          </li>
          <li>
            <t>How can a verifier identify and fetch more evidence that connects the OP to the asserted AP?</t>
          </li>
          <li>
            <t>What brand attributes are asserted to accompany the call?</t>
          </li>
        </ul>
        <t>The first two answers come from the <tt>kid</tt> header. The third answer is communicated in the required <tt>evd</tt> claim. The fourth answer is communicated in the optional <tt>card</tt> and <tt>goal</tt> claims.</t>
        <t>More evidence can then be fetched to indirectly answer the following additional questions:</t>
        <ul spacing="normal">
          <li>
            <t>What is the legal identity of the AP?</t>
          </li>
          <li>
            <t>Does the AP have the right to use the originating phone number?</t>
          </li>
          <li>
            <t>Does the AP intend the OP to sign passports on its behalf?</t>
          </li>
          <li>
            <t>Does the AP have the right to use the brand attributes asserted for the call?</t>
          </li>
        </ul>
      </section>
      <section anchor="sample-passport">
        <name>Sample passport</name>
        <t>An example will help. In its JSON-serialized form, a typical VVP passport (with some long CESR-encoded hashes shortened by ellipsis for readability) might look like this:</t>
        <sourcecode type="json"><![CDATA[
{
  "header": {
    "alg": "EdDSA",
    "typ": "JWT",
    "ppt": "vvp",
    "kid": "https://agentsrus.net/oobi/EMC.../agent/EAx..."
  },
  "payload": {
    "orig": {"tn": ["+33612345678"]},
    "dest": {"tn": ["+33765432109"]},
    "card": ["NICKNAME:Monde d'Exemples",
      "CHATBOT:https://example.com/chatwithus",
      "LOGO;HASH=EK2...;VALUE=URI:https://example.com/ico64x48.png"],
    "goal": "negotiate.schedule",
    "call-reason": "planifier le prochain rendez-vous",
    "evd": "https://fr.example.com/dossiers/E0F....cesr",
    "origId": "e0ac7b44-1fc3-4794-8edd-34b83c018fe9",
    "iat": 1699840000,
    "exp": 1699840030,
    "jti": "70664125-c88d-49d6-b66f-0510c20fc3a6"
  }
}
]]></sourcecode>
        <t>The semantics of the fields are:</t>
        <ul spacing="normal">
          <li>
            <t><tt>alg</tt> <em>(required)</em> <bcp14>MUST</bcp14> be "EdDSA". Standardizing on one scheme prevents jurisdictions with incompatible or weaker cryptography. The RSA, HMAC, and ES256 algorithms <bcp14>MUST NOT</bcp14> be used. (This choice is motivated by compatibility with the vLEI and its associated ACDC ecosystem, which depends on the Montgomery-to-Edwards transformation.)</t>
          </li>
          <li>
            <t><tt>typ</tt> <em>(required)</em> Per <xref target="RFC8225"/>, <bcp14>MUST</bcp14> be "passport".</t>
          </li>
          <li>
            <t><tt>ppt</tt> <em>(required)</em> Per <xref target="RFC8225"/>, <bcp14>MUST</bcp14> identify the specific PASSporT type -- in this case, "vvp".</t>
          </li>
          <li>
            <t><tt>kid</tt> <em>(required)</em> <bcp14>MUST</bcp14> be the OOBI of an AID (<xref format="counter" target="aid"/>) controlled by the OP (<xref format="counter" target="OP"/>). An OOBI is a special URL that facilitates ACDC's viral discoverability goals. It returns IANA content-type <tt>application/json+cesr</tt>, which provides some important security guarantees. The content for this particular OOBI <bcp14>MUST</bcp14> be a KEL (<xref format="counter" target="KEL"/>). Typically the AID in question does not identify the OP as a legal entity, but rather software running on or invoked by the SBC operated by the OP. (The AID that identifies the OP as a legal entity may be controlled by a multisig scheme and thus require multiple humans to create a signature. The AID for <tt>kid</tt> <bcp14>MUST</bcp14> be singlesig and, in the common case where it is not the legal entity AID, <bcp14>MUST</bcp14> have a delegate relationship with the legal entity AID, proved through Delegate Evidence <xref format="counter" target="DE"/>.)</t>
          </li>
          <li>
            <t><tt>orig</tt> <em>(required)</em> Although VVP does not depend on SHAKEN, the format of this field <bcp14>MUST</bcp14> conform to SHAKEN requirements (<xref target="ATIS-1000074"/>), for interoperability reasons (see <xref format="counter" target="interoperability"/>). It <bcp14>MUST</bcp14> also satisfy one additional constraint, which is that only one phone number is allowed. Depite the fact that a containing SIP INVITE may allow multiple originating phone numbers, only one can be tied to evidence evaluated by verifiers.</t>
          </li>
          <li>
            <t><tt>dest</tt> <em>(required)</em> For interoperability reasons, <bcp14>MUST</bcp14> conform to SHAKEN requirements.</t>
          </li>
          <li>
            <t><tt>card</tt> <em>(optional)</em> Contains one or more brand attributes. These are analogous to <xref target="RCD-DRAFT"/> or <xref target="CTIA-BCID"/> data, but differ in that they <bcp14>MUST</bcp14> be justified by evidence in the dossier. Because of this strong foundation that interconnects with formal legal identity, they can be used to derive other brand evidence (e.g., an RCD passport) as needed. Individual attributes <bcp14>MUST</bcp14> conform to the VCard standard <xref target="RFC6350"/>.</t>
          </li>
          <li>
            <t><tt>goal</tt> <em>(optional)</em> A machine-readable, localizable goal code, as described informally by <xref target="ARIES-RFC-0519"/>. If present, the dossier <bcp14>MUST</bcp14> prove that the OP is authorized by the AP to initiate calls with this particular goal.</t>
          </li>
          <li>
            <t><tt>call-reason</tt> <em>(optional)</em> A human-readable, arbitrary phrase that describes the self-asserted intent of the caller. This claim is largely redundant with <tt>goal</tt>; most calls will either omit both, or choose one or the other. Since <tt>call-reason</tt> cannot be analyzed or verified in any way, it is discouraged. However it is not formally deprecated. It is included in VVP to facilitate the construction of derivative RCD passports which have the property (see <xref format="counter" target="interoperability"/>).</t>
          </li>
          <li>
            <t><tt>evd</tt> <em>(required)</em> <bcp14>MUST</bcp14> be the OOBI of a bespoke ACDC (the dossier, <xref format="counter" target="dossier"/>) that constitutes a verifiable data graph of all evidence justifying belief in the identity and authorization of the AP, the OP, and any relevant delegations. This URL can be hosted on any convenient web server, and is somewhat analogous to the <tt>x5u</tt> header in X509 contexts. See below for details.</t>
          </li>
          <li>
            <t><tt>origId</tt> <em>(optional)</em> Follows SHAKEN semantics.</t>
          </li>
          <li>
            <t><tt>iat</tt> <em>(required)</em> Follows standard JWT semantics (see <xref target="RFC7519"/>).</t>
          </li>
          <li>
            <t><tt>exp</tt> <em>(required)</em> Follows standard JWT semantics. As this sets a window for potential replay attacks between the same two phone numbers, a recommended expiration should be 30 seconds, with a minimum of 10 seconds and a maximum of 300 seconds.</t>
          </li>
          <li>
            <t><tt>jti</tt> <em>(optional)</em> Follows standard JWT semantics.</t>
          </li>
        </ul>
        <t>For information about the signature over a passport, see <xref format="counter" target="pss"/>.</t>
      </section>
    </section>
    <section anchor="verifying">
      <name>Verifying</name>
      <section anchor="algorithm">
        <name>Algorithm</name>
        <t>When a verifier encounters a VVP passport, they <bcp14>SHOULD</bcp14> verify by using an algorithm similar to the following. (Optimizations may combine or reorder operations, but <bcp14>MUST</bcp14> achieve all of the same guarantees, in order to be compliant implementations.)</t>
        <ol spacing="normal" type="1"><li>
            <t>Confirm that the <tt>orig</tt> and <tt>dest</tt> fields match contextual observations and other SIP metadata. That is, the passport appears aligned with what is known about the call from external sources. This is not a cryptographic analysis.</t>
          </li>
          <li>
            <t>Extract the <tt>kid</tt> field.</t>
          </li>
          <li>
            <t>Fetch the key state for the OP from the OOBI in <tt>kid</tt>. Caches may be used to optimize this, as long as they meet the freshness standards of the verifier. Normally, the current key state is checked, but the OOBI returns a data stream that also allows historical analysis.</t>
          </li>
          <li>
            <t>Use the public key of the OP to verify that the signature on the passport is valid for that key state. On success, the verifier knows that the OP is at least making an assertion about the identity and authorizations of the AP. (This is approximately the level of assurance provided by existing alternatives to VVP.)</t>
          </li>
          <li>
            <t>Extract the <tt>evd</tt> field, which references the dossier (<xref format="counter" target="dossier"/>) that constitutes backing evidence.</t>
          </li>
          <li>
            <t>Use the SAID (<xref format="counter" target="said"/>) of the dossier as a lookup key to see whether the dossier has already been fully validated. Since dossiers are highly stable, caching dossier validations is recommended.</t>
          </li>
          <li>
            <t>If the dossier requires full validation, perform it. Validation includes checking the signature on each ACDC in the dossier's data graph against the key state of its respective issuer at the time the issuance occurred. Key state is proved by the KEL (<xref format="counter" target="KEL"/>), and checked against independent witnesses.  </t>
            <t>
Issuance is recorded explicitly in the KEL's overall event sequence, so this check does not require guesses about how to map issuance timestamps to key state events. Subsequent key rotations do not invalidate this analysis.  </t>
            <t>
Validation also includes comparing data structure and values against the declared schema, plus a full traversal of all chained CVD (<xref format="counter" target="cvd"/>), back to the root of trust for each artifact. The verifier <bcp14>MUST</bcp14> accept the root of trust as a valid authority on the vital question answered by each credential that depends upon it. The correct relationships among evidence artifacts <bcp14>MUST</bcp14> also be checked (e.g., proving that the issuer of one piece is the issuee of another piece).</t>
          </li>
          <li>
            <t>Check to see whether the revocation status of the dossier and each item it depends on has been tested recently enough to satisfy the verifier's freshness standards. If no, check for revocations anywhere in the data graph of the dossier. Revocations are not the same as key rotations. They can be checked much more quickly than doing a full validation. Revocation checks can also be cached, possibly with a different freshness threshold than the main evidence.</t>
          </li>
          <li>
            <t>Assuming that the dossier is valid and has no breakages due to revocation, confirm that the OP is authorized to sign the passport. If there is no delegation evidence (<xref format="counter" target="DE"/>), the AP and the OP <bcp14>MUST</bcp14> be identical, and the OP <bcp14>MUST</bcp14> be the issuee of the vetting credential; otherwise, the OP <bcp14>MUST</bcp14> be the issuee of a delegated signing credential for which the issuer is the AP.</t>
          </li>
          <li>
            <t>Extract the <tt>orig</tt> field and compare it to the TNAlloc credential (<xref format="counter" target="tnalloc-credential"/>) cited in the dossier (<xref format="counter" target="dossier"/>) to confirm that the AP (<xref format="counter" target="AP"/>) -- or, if OP is not equal to AP and OP is using their own number, the OP (<xref format="counter" target="OP"/>) -- has the right to originate calls with this number.</t>
          </li>
          <li>
            <t>If the passport includes non-null values for the optional <tt>card</tt> or <tt>goal</tt> fields, extract that information and check that the brand attributes claimed for the call are justified by a brand credential (<xref format="counter" target="brand-credential"/>) in the dossier.</t>
          </li>
          <li>
            <t>Check any business logic. For example, if the delegated signer credential says that the OP can only call on behalf of the AP during certain hours, or in certain geos, check those attributes of the call.</t>
          </li>
        </ol>
      </section>
      <section anchor="planning-for-efficiency">
        <name>Planning for efficiency</name>
        <t>The complete algorithm listed above is quite rigorous. With no caches, it may take several seconds, much like a thorough validation of a certificate chain. However, much VVP evidence is stable for long periods of time and lends itself to caching, subject to the proviso that revocation freshness must be managed wisely. Since the same dossier is used to justify many outbound calls -- perhaps thousands or millions of calls, for busy call centers -- and many dossiers will reference the same issuers and issuees and their associated key states and KELs (<xref format="counter" target="KEL"/>), caching will produce huge benefits.</t>
        <t>Furthermore, because SAIDs and their associated data (including links to other nodes in a data graph) have a tamper-evident relationship, any party can perform validation and compile their results, then share the data with verifiers that want to do less work. Validators like this are not oracles, because consumers of such data need not trust shared results blindly. They can always directly recompute some or all of it from a passport, to catch deception. However, they can do this lazily or occasionally, per their preferred balance of risk/effort.</t>
        <t><em>In toto</em>, these characteristics mean that no centralized registry is required in any given ecosystem. Data can be fetched directly from its source, across jurisdictional boundaries. Because it is fetched from its source, it comes with consent. Privacy can be tuned (see <xref format="counter" target="privacy"/>). Simple opportunistic, uncoordinated reuse (e.g., in or across the datacenters of TSPs) will arise spontaneously and will dramatically improve the scale and efficiency of the system.</t>
      </section>
    </section>
    <section anchor="curating">
      <name>Curating</name>
      <t>The evidence that's available in today's telco ecosystems resembles some of the evidence described here, in concept. However, existing evidence has gaps, and its format is fragile. It requires direct trust in the proximate issuer, and it is typically organized for discovery; both characteristics lead to large, centralized registries at a regional or national level. These registries become a trusted third party, which defeats some of the purpose of creating decentralized and independently verifiable evidence in the first place. Sharing such evidence across jurisdiction boundaries requires regulatory compatibility and bilateral agreements. Sharing at scale is impractical at best, if not illegal.</t>
      <t>How evidence is issued, propagated, quality-controlled, and referenced is therefore an important concern for this specification.</t>
      <section anchor="activities">
        <name>Activities</name>
        <t>The following curation activities guarantee the evidence upon which a VVP ecosystem depends.</t>
        <section anchor="witnessing-and-watching">
          <name>Witnessing and watching</name>
          <t>In an ACDC-based ecosystem, issuers issue and revoke their own evidence without any calls to a centralized registry or authority. However, KERI's decentralized witness feature <bcp14>MUST</bcp14> be active. This provides an official, uniform, and high-security methodology for curating the relationship between keys and identifiers, and between identifiers and non-repudiable actions like issuing and revoking credentials. In addition, watchers <bcp14>MAY</bcp14> be used by given verifiers, to provide efficient caching, pub-sub notifications of state changes, and duplicity detection. For more about these topics, see <xref format="counter" target="appendix-b"/>.</t>
        </section>
        <section anchor="vetting-identity">
          <name>Vetting identity</name>
          <t>The job of vetting legal entities (which includes APs <xref format="counter" target="AP"/>, but also OPs <xref format="counter" target="OP"/>) and issuing vetting credentials (<xref format="counter" target="vetting-credential"/>) is performed by a <em>legal entity vetter</em>. VVP <bcp14>MUST</bcp14> have evidence of vetted identity. It places few requirements on such vetters, other than the ones already listed for vetting credentials themselves. Vetting credentials <bcp14>MAY</bcp14> expire, but this is not particularly desirable and might actually be an antipattern. ACDCs and AIDs facilitate much longer lifecycles than certificates; proactive key rotation is recommended but creates no reason to rotate evidence. However, a legal entity vetter <bcp14>MUST</bcp14> agree to revoke vetting credentials in a timely manner if the legal status of an entity changes, or if data in a vetting credential becomes invalid.</t>
        </section>
        <section anchor="vetting-brand">
          <name>Vetting brand</name>
          <t>At the option of the AP and OP, VVP <bcp14>MAY</bcp14> prove brand attributes. When this feature is active, the job of analyzing the brand assets of a legal entity and issuing brand credentials (<xref format="counter" target="brand-credential"/>) is performed by a <em>brand vetter</em>. A brand vetter <bcp14>MAY</bcp14> be a legal entity vetter, and <bcp14>MAY</bcp14> issue both types of credentials after a composite analysis. However, the credentials themselves <bcp14>MUST NOT</bcp14> use a combined schema, the credentials <bcp14>MUST</bcp14> have independent lifecycles, and the assurances associated with each credential type <bcp14>MUST</bcp14> remain independent.</t>
          <t>A brand vetter <bcp14>MUST</bcp14> verify the canonical properties of a brand, but it <bcp14>MUST</bcp14> do more than this: it <bcp14>MUST</bcp14> issue the brand credential to the AID <xref format="counter" target="aid"/> of an issuee that is also the issuee of a vetting credential that already exists, and it <bcp14>MUST</bcp14> verify that the legal entity in the vetting credential has a right to use the brand in question. This link <bcp14>MUST NOT</bcp14> be based on mere weak evidence such as an observation that the legal entity's name and the brand name have some or all words in common, or the fact that a single person requested both credentials. Further, the brand vetter <bcp14>MUST</bcp14> agree to revoke brand credentials in a timely manner if the associated vetting credential is revoked, if the legal entity's right to use the brand changes, or if characteristics of the brand evolve.</t>
        </section>
        <section anchor="allocating-tns">
          <name>Allocating TNs</name>
          <t>At the option of the AP and OP, VVP <bcp14>SHOULD</bcp14> prove the right to use the originating phone number. When this feature is active, regulators <bcp14>MUST</bcp14> issue TNAlloc credentials (<xref format="counter" target="tnalloc-credential"/>) to range holders, and range holders <bcp14>MUST</bcp14> issue them to downstream AHs in an unbroken chain that reaches telephone number users (TNUs; see <xref format="counter" target="allocation-holder"/>). TNUs <bcp14>MAY</bcp14> in turn issue them to a delegate such as a call center. If aggregators or other intemediaries hold an RTU in the eyes of a regulator, then intermediate TNAlloc credentials <bcp14>MUST</bcp14> be created to track that RTU as part of the chain. On the other hand, if TNUs acquire phone numbers through aggregators, but regulators do not consider aggregators to hold allocations, then aggregators <bcp14>MUST</bcp14> work with range holders to assure that the appropriate TNAlloc credentials are issued to the TNUs.</t>
        </section>
        <section anchor="authorizing-brand-proxy">
          <name>Authorizing brand proxy</name>
          <t>When VVP is used to prove brand, APs (<xref format="counter" target="AP"/>) <bcp14>MAY</bcp14> issue brand proxy credentials (<xref format="counter" target="brand-proxy-credential"/>) to OPs (<xref format="counter" target="OP"/>), giving them the right to use the AP's brand. Without this credential, the OP only has the right to use the AP's phone number.</t>
          <t>Decisions about whether to issue vetting and brand credentials might be driven by large databases of metadata about organizations and brands, but how such systems work is out of scope. The credentials themselves contain all necessary information, and once credentials are issued, they constitute an independent source of truth as far as VVP is concerned. No party has to return to the operators of such databases to validate anything.</t>
        </section>
        <section anchor="delegating-signing-authority">
          <name>Delegating signing authority</name>
          <t>An AP <bcp14>MUST</bcp14> prove, by issuing a delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>), that the signer of its VVP passports does so with its explicit authorization. Normally the signer is automation under the control of the OP, but the issuee of the credential <bcp14>MAY</bcp14> vary at the AP's discretion.</t>
          <t>Since this credential merely documents the AP's intent to be accountable for the actions of the signer, the AP <bcp14>MAY</bcp14> choose whatever process it likes to issue it.</t>
        </section>
        <section anchor="revoking">
          <name>Revoking</name>
          <t>Revoking an ACDC is as simple as the issuer signing a revocation event and distributing it to witnesses (see <xref format="counter" target="appendix-b"/>). Parties that perform a full validation of a given ACDC (see <xref format="counter" target="verifying"/>) will automatically detect the revocation event in realtime, because they will contact one or more of these witnesses. Parties that are caching their validations <bcp14>MAY</bcp14> poll witnesses very efficiently to discover revocation events. Some witnesses may choose to offer the option of registering a callback, allowing interested parties to learn about revocations even more efficiently.</t>
        </section>
      </section>
      <section anchor="building-blocks">
        <name>Building blocks</name>
        <t>The term "credential" has a fuzzy meaning in casual conversation. However, understanding how evidence is built from credentials in VVP requires considerably more precision. We will start from lower-level concepts.</t>
        <section anchor="said">
          <name>SAID</name>
          <t>A <em>self-addressing identifier</em> (<em>SAID</em>) is the hash of a canonicalized JSON object, encoded in self-describing CESR format <xref target="TOIP-CESR"/>. The raw bytes from the digest function are left-padded to the nearest 24-bit boundary and transformed to base64url <xref target="RFC4648"/>. The left-pad char from the converted left-pad byte is replaced with a code char that tells which digest function was used.</t>
          <t>An example of a SAID is <tt>E81Wmjyz5nXMCYrQqWyRLAYeKNQvYLYqMLYv_qm-qP7a</tt>, and a regex that matches all valid SAIDs is: <tt>[EFGHI][-_\w]{43}|0[DEFG][-_\w]{86}</tt>. The <tt>E</tt> prefix in the example indicates that it is a Blake3-256 hash.</t>
          <t>SAIDs are evidence that hashed data has not changed. They can also function like a reference, hyperlink, or placeholder for the data that was hashed to produce them (though they are more similar to URNs than to URLs <xref target="RFC3986"/>, since they contain no location information).</t>
        </section>
        <section anchor="signature">
          <name>Signature</name>
          <t>A digital signature over arbitrary data D constitutes evidence that the signer processed D with a signing function that took D and the signer's private key as inputs: <tt>signature = sign(D, privkey)</tt>. The evidence can be verified by checking that the signature is bound to D and the public key of the signer: <tt>valid = verify(signature, D, pubkey)</tt>. Assuming that the signer has not lost unique control of the private key, and that cryptography is appropriately strong, we are justified in the belief that the signer must have taken deliberate action that required seeing an unmodified D in its entirety.</t>
          <t>The assumption that a signer has control over their private keys may often be true (or at least believed, by the signer) at the time a signature is created. However, after key compromise, an attacker can create and sign evidence that purports to come from the current or an earlier time period, unless signatures are anchored to a data source that detects anachronisms. Lack of attention to this detail undermines the security of many credential schemes, including in telco. VVP explicitly addresses this concern by anchoring signatures on non-ephemeral evidence to KELs (<xref format="counter" target="KEL"/>).</t>
        </section>
        <section anchor="aid">
          <name>AID</name>
          <t>An <em>autonomic identifier</em> (<em>AID</em>) is a short string that can be resolved to one or more cryptographic keys at a specific version of the identifier's key state. Using cryptographic keys, a party can prove it is the controller of an AID by creating digital signatures. AIDs are like W3C DIDs <xref target="W3C-DID"/>, and can be transformed into DIDs. The information required to resolve an AID to its cryptographic keys is communicated through a special form of URI called an <em>out-of-band invitation</em> (<em>OOBI</em>). An OOBI points to an HTTP resource that returns IANA content-type <tt>application/json+cesr</tt>; it is somewhat analogous to a combination of the <tt>kid</tt> and <tt>x5u</tt> constructs in many JWTs. AIDs and OOBIs are defined in the KERI spec <xref target="TOIP-KERI"/>.</t>
          <t>An example of an AID is <tt>EMCYrQqWyRLAYqMLYv_qm-qP7eKN81Wmjyz5nXQvYLYa</tt>. AIDs are created by calculating the hash of the identifier's initial state; since this state is typically a canonicalized JSON object, AIDs usually match the same regex as SAIDs (which are hashes of JSON). A noteworthy exception is that non-transferrable AIDs begin with <tt>B</tt> instead of <tt>E</tt> or another letter. Such AIDs hash only their public key, not a document. They are analogous to did:key values, and play a limited role in VVP. They are incapable of rotating keys or anchoring events to a KEL. They therefore lack OOBIs and can receive but not issue ACDCs. However, their virtue is that they can be created and used without a sophisticated wallet. This may make them a convenient way to identify the automation that signs passports and receives a delegated signer credential (see <xref format="counter" target="delegating-signing-authority"/>).</t>
          <t>An example of an OOBI for an AID is <tt>https://agentsrus.net/oobi/EMCYrQqWyRLAYqMLYv_qm-qP7eKN81Wmjyz5nXQvYLYa/agent/EAxBDJkpA0rEjUG8vJrMdZKw8YL63r_7zYUMDrZMf1Wx</tt>. Note the same <tt>EMCY...</tt> in the AID and its OOBI. Many constructs in KERI may have OOBIs, but when OOBIs are associated with AIDs, such OOBIs always contain their associated AID as the first URL segment that matches the AID regex. They point either to an agent or a witness that provides verifiable state information for the AID.</t>
          <t>AIDs possess several security properties (e.g., self-certification, support for prerotation and multisig, support for witnesses, and cooperative delegation) that are not guaranteed by DIDs in general. Such properties are vital to some of VVP's goals for high assurance.</t>
        </section>
        <section anchor="signatures-over-saids">
          <name>Signatures over SAIDs</name>
          <t>Since neither a SAID value nor the data it hashes can be changed without breaking the correspondence between them, and since the cryptographic hash function used ensures strong collision resistance, signing over a SAID is equivalent, in how it commits the signer to content and provides tamper evidence, to signing over the data that the SAID hashes. Since SAIDs can function as placeholders for JSON objects, a SAID can represent such an object in a larger data structure. And since SAIDs can function as a reference without making a claim about location, it is possible to combine these properties to achieve some indirections in evidence that are crucial in privacy and regulatory compliance.</t>
          <t>VVP uses SAIDs and digital signatures as primitive forms of evidence.</t>
        </section>
        <section anchor="x509-certificates">
          <name>X509 certificates</name>
          <t>VVP does not depend on X509 certificates <xref target="RFC5280"/> for any of its evidence. However, if deployed in a hybrid mode, it <bcp14>MAY</bcp14> be used beside alternative mechanisms that are certificate-based. In such cases, self-signed certificates that never expire might suffice to tick certificate boxes, while drastically simplifying the burden of maintaining accurate, unexpired, unrevoked views of authorizations and reflecting that knowledge in certificates. This is because deep authorization analysis flows through VVP's more rich and flexible evidence chain. See <xref format="counter" target="interoperability"/>.</t>
        </section>
        <section anchor="passport">
          <name>Passport</name>
          <t>VVP emits and verifies a STIR PASSporT <xref target="RFC8225"/> that is fully compliant in all respects, except that it <bcp14>MAY</bcp14> omit the <tt>x5u</tt> header that links it to an X509 certificate (see <xref format="counter" target="interop-certs"/>).</t>
          <t>The passport is a form of evidence suitable for evaluation during the brief interval when a call is being initiated, and it is carefully backed by evidence with a longer lifespan (<xref format="counter" target="dossier"/>). Conceptually, VVP's version is similar to a SHAKEN passport <xref target="RFC8588"/>. It <bcp14>MAY</bcp14> also reference brand-related evidence, allowing it to play an additional role similar to the RCD passport <xref target="RCD-PASSPORT"/>.</t>
          <t>Neither VVP's backing evidence nor its passport depends on a certificate authority ecosystem. The passport <bcp14>MUST</bcp14> be secured by an EdDSA digital signature <xref target="RFC8032"/>, <xref target="FIPS186-4"/>, rather than the signature variants preferred by the other passport types. Instead of including granular fields in the claims of its JWT, the VVP passport cites a rich data graph of evidence by referencing the SAID of that data graph. This indirection and its implications are discussed below.</t>
          <figure>
            <name>SHAKEN Passport compared to VVP Passport</name>
            <artset>
              <artwork type="svg" name="fig1.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="528" viewBox="0 0 528 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                  <path d="M 200,32 L 200,192" fill="none" stroke="black"/>
                  <path d="M 232,64 L 232,224" fill="none" stroke="black"/>
                  <path d="M 296,32 L 296,176" fill="none" stroke="black"/>
                  <path d="M 488,32 L 488,176" fill="none" stroke="black"/>
                  <path d="M 520,144 L 520,224" fill="none" stroke="black"/>
                  <path d="M 8,32 L 200,32" fill="none" stroke="black"/>
                  <path d="M 296,32 L 488,32" fill="none" stroke="black"/>
                  <path d="M 192,64 L 232,64" fill="none" stroke="black"/>
                  <path d="M 472,144 L 520,144" fill="none" stroke="black"/>
                  <path d="M 296,176 L 488,176" fill="none" stroke="black"/>
                  <path d="M 8,192 L 200,192" fill="none" stroke="black"/>
                  <path d="M 160,224 L 232,224" fill="none" stroke="black"/>
                  <path d="M 488,224 L 520,224" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="496,224 484,218.4 484,229.6" fill="black" transform="rotate(180,488,224)"/>
                  <polygon class="arrowhead" points="168,224 156,218.4 156,229.6" fill="black" transform="rotate(180,160,224)"/>
                  <circle cx="464" cy="144" r="6" class="opendot" fill="white" stroke="black"/>
                  <g class="text">
                    <text x="104" y="20">SHAKEN Passport</text>
                    <text x="396" y="20">VVP Passport</text>
                    <text x="56" y="52">protected</text>
                    <text x="344" y="52">protected</text>
                    <text x="108" y="68">kid: pubkey of OSP</text>
                    <text x="380" y="68">kid: AID of OP</text>
                    <text x="48" y="84">payload</text>
                    <text x="336" y="84">payload</text>
                    <text x="48" y="100">iat</text>
                    <text x="336" y="100">iat</text>
                    <text x="52" y="116">orig</text>
                    <text x="340" y="116">orig</text>
                    <text x="52" y="132">dest</text>
                    <text x="340" y="132">dest</text>
                    <text x="60" y="148">attest</text>
                    <text x="392" y="148">evd (JL to dossier)</text>
                    <text x="92" y="164">...more claims</text>
                    <text x="368" y="164">signature of OP</text>
                    <text x="84" y="180">signature of OSP</text>
                    <text x="92" y="228">pubkey in cert</text>
                    <text x="388" y="228">data graph of evidence</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig1.txt">
&lt;![CDATA[
     SHAKEN Passport                       VVP Passport
+-----------------------+           +-----------------------+
| protected             |           | protected             |
|   kid: pubkey of OSP -+---+       |   kid: AID of OP      |
| payload               |   |       | payload               |
|   iat                 |   |       |   iat                 |
|   orig                |   |       |   orig                |
|   dest                |   |       |   dest                |
|   attest              |   |       |   card                |
|   ...more claims      |   |       |   evd (JL to dossier)-+---+
| signature of OSP      |   |       | signature of OP       |   |
+-----------------------+   |       +-----------------------+   |
                            |                                   |
                            |                                   |
    pubkey in cert &lt;--------+        data graph of evidence &lt;---+
]]&gt;
    </artwork>
            </artset>
          </figure>
        </section>
        <section anchor="acdcs">
          <name>ACDCs</name>
          <t>Besides digital signatures and SAIDs, and the ephemeral passport, VVP uses long-lasting evidence in the ACDC format <xref target="TOIP-ACDC"/>. This is normalized, serialized data with an associated digital signature. Unlike X509 certificates, ACDCs are bound directly to the AIDs of their issuers and issuees, not to public keys of these parties. This has a radical effect on the lifecycle of evidence, because keys can be rotated without invalidating ACDCs (see <xref format="counter" target="appendix-a"/>).</t>
        </section>
        <section anchor="KEL">
          <name>KELs</name>
          <t>Unlike X509 certificates, JWTs <xref target="RFC7519"/>, and W3C Verifiable Credentials <xref target="W3C-VC"/>, signatures over ACDC data are not <em>contained inside</em> the ACDC; rather, they are <em>referenced by</em> the ACDC and <em>anchored in</em> a verifiable data structure called a <em>key event log</em> or <em>KEL</em> <xref target="TOIP-KERI"/>.</t>
          <figure>
            <name>X509 compared to ACDC</name>
            <artset>
              <artwork type="svg" name="fig2.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="456" viewBox="0 0 456 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                  <path d="M 200,32 L 200,192" fill="none" stroke="black"/>
                  <path d="M 248,32 L 248,192" fill="none" stroke="black"/>
                  <path d="M 248,240 L 248,288" fill="none" stroke="black"/>
                  <path d="M 376,240 L 376,288" fill="none" stroke="black"/>
                  <path d="M 432,64 L 432,272" fill="none" stroke="black"/>
                  <path d="M 448,32 L 448,192" fill="none" stroke="black"/>
                  <path d="M 8,32 L 200,32" fill="none" stroke="black"/>
                  <path d="M 248,32 L 448,32" fill="none" stroke="black"/>
                  <path d="M 400,64 L 432,64" fill="none" stroke="black"/>
                  <path d="M 8,192 L 200,192" fill="none" stroke="black"/>
                  <path d="M 248,192 L 448,192" fill="none" stroke="black"/>
                  <path d="M 248,240 L 376,240" fill="none" stroke="black"/>
                  <path d="M 376,272 L 432,272" fill="none" stroke="black"/>
                  <path d="M 248,288 L 376,288" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(180,400,64)"/>
                  <g class="text">
                    <text x="28" y="20">X509</text>
                    <text x="268" y="20">ACDC</text>
                    <text x="36" y="52">Data</text>
                    <text x="304" y="52">v (version)</text>
                    <text x="64" y="68">Version</text>
                    <text x="324" y="68">d (SAID of item)</text>
                    <text x="88" y="84">Serial Number</text>
                    <text x="328" y="84">i (AID of issuer)</text>
                    <text x="100" y="100">Issuer: DN of issuer</text>
                    <text x="340" y="100">ri (status registry)</text>
                    <text x="52" y="116">Validity</text>
                    <text x="300" y="116">s (schema)</text>
                    <text x="104" y="132">Subject: DN of issuee</text>
                    <text x="316" y="132">a (attributes)</text>
                    <text x="104" y="148">Sub PubKey Info: KeyX</text>
                    <text x="336" y="148">i (AID of issuee)</text>
                    <text x="60" y="164">Extensions</text>
                    <text x="340" y="164">dt (issuance date)</text>
                    <text x="56" y="180">Signature</text>
                    <text x="292" y="180">...etc</text>
                    <text x="256" y="228">KEL</text>
                    <text x="312" y="260">signed anchor</text>
                    <text x="292" y="276">for SAID</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig2.txt">
&lt;![CDATA[
 X509                          ACDC
+-----------------------+     +------------------------+
| Data                  |     | v (version)            |
|   Version             |     | d (SAID of item) &lt;---+ |
|   Serial Number       |     | i (AID of issuer)    | |
| Issuer: DN of issuer  |     | ri (status registry) | |
| Validity              |     | s (schema)           | |
| Subject: DN of issuee |     | a (attributes)       | |
| Sub PubKey Info: KeyX |     |  i (AID of issuee)   | |
| Extensions            |     |  dt (issuance date)  | |
| Signature             |     |  ...etc              | |
+-----------------------+     +----------------------+-+
                                                     |
                              KEL                    |
                              +---------------+      |
                              | signed anchor |      |
                              | for SAID      +------+
                              +---------------+
]]&gt;
    </artwork>
            </artset>
          </figure>
          <t>A KEL has some trust characteristics that resemble a blockchain. However, it is specific to one AID only (the AID of the issuer of the ACDC) and thus is not centralized. The KELs for two different AIDs need not (and typically do not) share any common storage or governance, and do not require coordination or administration. KELs thus suffer none of the performance and governance problems of blockchains, and incur none of blockchain's difficulties with regulatory requirements like data locality or right to be forgotten.</t>
          <t>ACDCs can be freely converted between text and binary representations, and either type of representation can also be compacted or expanded to support nuanced disclosure goals (see <xref format="counter" target="graduated-disclosure"/>). An ACDC is also uniquely identified by its SAID, which means that a SAID can take the place of a full ACDC in certain data structures and processes. None of these transformations invalidate the associated digital signatures, which means that any variant of a given ACDC is equivalently verifiable.</t>
          <t>The revocation of a given ACDC can be detected via the witnesses declared in its issuer's KEL. Discovering, detecting, and reacting to such events can be very efficient. Any number of aggregated views can be built on demand, for any subset of an ecosystem's evidence, by any party. This requires no special authority or access, and does not create a central registry as a source of truth, since such views are tamper-evident and therefore can be served by untrusted parties. Further, different views of the evidence can contain or elide different fields of the evidence data, to address privacy, regulatory, and legal requirements.</t>
        </section>
        <section anchor="cvd">
          <name>CVD</name>
          <t><em>Cryptographically verifiable data</em> (<em>CVD</em>) is data that's associated with a digital signature and a claim about who signed it. When CVD is an assertion, we make the additional assumption that the signer intends whatever the data asserts, since they took an affirmative action to create non-repudiable evidence that they processed it. CVD can be embodied in many formats, but in the context of VVP, all instances of CVD are ACDCs. When CVD references other CVD, the computer science term for the resulting data structure is a <em>data graph</em>.</t>
        </section>
        <section anchor="credential">
          <name>Credential</name>
          <t>A <em>credential</em> is a special kind of CVD that asserts entitlements for its legitimate bearer -- <em>and only its bearer</em>. CVD that says Organization X exists with a particular ID number in government registers, and with a particular legal name, is not necessarily a credential. In order to be a credential, it would have to be associated with an assertion that its legitimate bearer -- <em>and only its bearer</em> -- is entitled to use the identity of Organization X. If signed data merely enumerates properties without conferring privileges on a specific party, it is just CVD. Many security gaps in existing solutions arise from conflating CVD and credentials.</t>
          <t>ACDCs can embody any kind of CVD, not just credentials.</t>
        </section>
        <section anchor="bearer-token">
          <name>Bearer token</name>
          <t>VVP never uses bearer tokens, but we define them here to provide a contrast. A <em>bearer token</em> is a credential that satisfies binding requirements by a trivial test of possession -- like a movie ticket, the first party that presents the artifact to a verifier gets the privilege. Since Bearer Credentials can be stolen or copied, this is risky. JWTs, session cookies, and other artifacts in familiar identity technologies are often bearer tokens, even if they carry digital signatures. Although they can be protected to some degree by expiration dates and secure channels, these protections are imperfect. For example, TLS channels can be terminated and recreated at multiple places between call origination and delivery.</t>
        </section>
        <section anchor="targeted-credential">
          <name>Targeted credential</name>
          <t>A <em>targeted credential</em> is a CVD that identifies an issuee as the bearer, and that requires the issuee to prove their identity cryptographically (e.g., to produce a proper digital signature) in order to claim the associated privilege. All credentials in VVP are targeted credentials.</t>
        </section>
        <section anchor="jl">
          <name>JL</name>
          <t>A <em>justifying link</em> (<em>JL</em>) is a reference, inside of one CVD, to another CVD that justifies what the first CVD is asserting. JLs can be SAIDs that identify other ACDCs. JLs are edges in an ACDC data graph.</t>
        </section>
      </section>
      <section anchor="specific-artifacts">
        <name>Specific artifacts</name>
        <section anchor="pss">
          <name>PSS</name>
          <t>Each voice call begins with a SIP INVITE, and in VVP, each SIP INVITE contains an <tt>Identity</tt> header that <bcp14>MUST</bcp14> contain a signature from the call's OP (<xref format="counter" target="OP"/>). This <em>passpport-specific signature</em> (<em>PSS</em>) <bcp14>MUST</bcp14> be an Ed25519 signature serialized as CESR; it is NOT a JWS. The 64 raw bytes of the signature are left-padded to 66 bytes, then base64url-encoded. The <tt>AA</tt> at the front of the result is cut and replaced with <tt>0B</tt>, giving an 88-character string. A regex that matches the result is: <tt>0B[-_\w]{86}</tt>, and a sample value (with the middle elided) is: <tt>0BNzaC1lZD...yRLAYeKNQvYx</tt>.</t>
          <t>The signature <bcp14>MUST</bcp14> be the result of running the EdDSA algorithm over input data in the manner required by <xref target="RFC7519"/>: <tt>signature = sign(base64url(header) + "." + base64url(payload)</tt>. Also per the JWT spec, when the signature is added to the compact form of the JWT, it <bcp14>MUST</bcp14> be appended to the other two portions of the JWT, with a <tt>.</tt> delimiter preceding it. Per STIR conventions, it <bcp14>MUST</bcp14> then be followed by ";ppt=vvp" so tools that scan the <tt>Identity</tt> header of the passport can decide how to process the passport without doing a full parse of the JWT.</t>
          <t>The headers <bcp14>MUST</bcp14> include <tt>alg</tt>, <tt>typ</tt>, <tt>ppt</tt>, and <tt>kid</tt>, as described in <xref format="counter" target="sample-passport"/>. They <bcp14>MAY</bcp14> include other values, notably <tt>x5u</tt> (see <xref format="counter" target="interop-certs"/>). The claims <bcp14>MUST</bcp14> include <tt>orig</tt>, <tt>dest</tt>, <tt>iat</tt>, <tt>exp</tt>, and <tt>evd</tt>, and <bcp14>MAY</bcp14> include <tt>card</tt>, <tt>goal</tt>, <tt>call_reason</tt>, <tt>jti</tt>, <tt>origId</tt>, and other values (also described in <xref format="counter" target="sample-passport"/>). The signature <bcp14>MUST</bcp14> use all headers and all claims as input to the data stream that will be signed.</t>
        </section>
        <section anchor="dossier">
          <name>Dossier</name>
          <t>The <tt>evd</tt> field in the passport contains the OOBI (<xref format="counter" target="aid"/>) of an ACDC data graph called the <em>dossier</em>. The dossier is a compilation of all the permanent, backing evidence that justifies trust in the identity and authorization of the AP and OP. It is created and must be signed by the AP. It is CVD (<xref format="counter" target="cvd"/>) asserted to the world, not a credential (<xref format="counter" target="credential"/>) issued to a specific party.</t>
        </section>
        <section anchor="APE">
          <name>Accountable Party Evidence</name>
          <t>The dossier <bcp14>MUST</bcp14> include at least what is called <em>accountable party evidence</em> (<em>APE</em>).</t>
          <t>APE consists of several credentials, explored in detail below. It <bcp14>MUST</bcp14> include a vetting credential for the AP. It <bcp14>SHOULD</bcp14> include a TNAlloc credential that proves RTU. Normally the RTU <bcp14>MUST</bcp14> be assigned to the AP; however, if a proxy is the OP and uses their own phone number, the RTU <bcp14>MUST</bcp14> be assigned to the OP instead. If the AP intends to contextualize the call with a brand, it <bcp14>MUST</bcp14> include a brand credential for the AP. (In cases where callers are private individuals, "brand" maps to descriptive information about the individual, as imagined in mechanisms like VCard <xref target="RFC6350"/> or JCard <xref target="RFC7095"/>.) If no brand credential is present, verifiers <bcp14>MUST NOT</bcp14> impute a brand to the call on the basis of any VVP guarantees. APE <bcp14>MAY</bcp14> also include evidence that will aid in settlement.</t>
        </section>
        <section anchor="DE">
          <name>Delegation Evidence</name>
          <t>When a private individual makes a call with VVP, they might be both the AP and the OP. In such cases, we expect their AID to be the recipient or issuee of all the APE, and no backing evidence beyond the APE may be necessary. However, in business contexts, it will almost always be true that the OP role is played by a delegate. In such conditions, evidence must also include proof that this indirection is valid. We call this <em>delegation evidence</em> (<em>DE</em>).</t>
          <t>DE is nearly always required when the AP is an organization, because the cryptographic identifier for the organization as a legal entity is typically not the same as the cryptographic identifier for the organization's automated software that prepares SIP INVITEs. DE can thus distinguish between Acme Corporation in general, and software operated by Acme's IT department for the express purpose of signing voice traffic. The former has a vetting credential and legal accountability, and can act as the company to publish press releases, prepare invoices, spend money, and make attestations to regulators; the latter should only be able to sign outbound voice calls on Acme's behalf. Failing to make this distinction creates serious cybersecurity risks.</t>
          <t>Delegation evidence may also be used to prove that an AI-powered agent is empowered to make phone calls on behalf of an AP.</t>
          <figure>
            <name>Sample evidence graph; OP kid could bind to APE or DE</name>
            <artset>
              <artwork type="svg" name="fig3.svg">
          <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="528" width="512" viewBox="0 0 512 528" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 24,32 L 24,128" fill="none" stroke="black"/>
                  <path d="M 24,240 L 24,272" fill="none" stroke="black"/>
                  <path d="M 24,304 L 24,352" fill="none" stroke="black"/>
                  <path d="M 24,400 L 24,432" fill="none" stroke="black"/>
                  <path d="M 24,464 L 24,512" fill="none" stroke="black"/>
                  <path d="M 128,192 L 128,208" fill="none" stroke="black"/>
                  <path d="M 216,32 L 216,88" fill="none" stroke="black"/>
                  <path d="M 216,104 L 216,128" fill="none" stroke="black"/>
                  <path d="M 224,240 L 224,272" fill="none" stroke="black"/>
                  <path d="M 224,304 L 224,352" fill="none" stroke="black"/>
                  <path d="M 224,400 L 224,512" fill="none" stroke="black"/>
                  <path d="M 248,192 L 248,416" fill="none" stroke="black"/>
                  <path d="M 272,240 L 272,272" fill="none" stroke="black"/>
                  <path d="M 272,304 L 272,336" fill="none" stroke="black"/>
                  <path d="M 272,400 L 272,496" fill="none" stroke="black"/>
                  <path d="M 288,496 L 288,512" fill="none" stroke="black"/>
                  <path d="M 296,80 L 296,128" fill="none" stroke="black"/>
                  <path d="M 320,128 L 320,144" fill="none" stroke="black"/>
                  <path d="M 360,192 L 360,208" fill="none" stroke="black"/>
                  <path d="M 400,80 L 400,128" fill="none" stroke="black"/>
                  <path d="M 448,400 L 448,496" fill="none" stroke="black"/>
                  <path d="M 464,240 L 464,336" fill="none" stroke="black"/>
                  <path d="M 464,440 L 464,512" fill="none" stroke="black"/>
                  <path d="M 488,112 L 488,144" fill="none" stroke="black"/>
                  <path d="M 488,192 L 488,464" fill="none" stroke="black"/>
                  <path d="M 24,32 L 216,32" fill="none" stroke="black"/>
                  <path d="M 296,80 L 312,80" fill="none" stroke="black"/>
                  <path d="M 360,80 L 400,80" fill="none" stroke="black"/>
                  <path d="M 88,96 L 296,96" fill="none" stroke="black"/>
                  <path d="M 400,112 L 488,112" fill="none" stroke="black"/>
                  <path d="M 24,128 L 216,128" fill="none" stroke="black"/>
                  <path d="M 296,128 L 400,128" fill="none" stroke="black"/>
                  <path d="M 128,192 L 360,192" fill="none" stroke="black"/>
                  <path d="M 24,240 L 224,240" fill="none" stroke="black"/>
                  <path d="M 272,240 L 464,240" fill="none" stroke="black"/>
                  <path d="M 272,336 L 464,336" fill="none" stroke="black"/>
                  <path d="M 24,352 L 224,352" fill="none" stroke="black"/>
                  <path d="M 24,400 L 224,400" fill="none" stroke="black"/>
                  <path d="M 272,400 L 448,400" fill="none" stroke="black"/>
                  <path d="M 224,416 L 248,416" fill="none" stroke="black"/>
                  <path d="M 448,416 L 464,416" fill="none" stroke="black"/>
                  <path d="M 448,432 L 488,432" fill="none" stroke="black"/>
                  <path d="M 464,464 L 488,464" fill="none" stroke="black"/>
                  <path d="M 272,496 L 448,496" fill="none" stroke="black"/>
                  <path d="M 24,512 L 224,512" fill="none" stroke="black"/>
                  <path d="M 288,512 L 464,512" fill="none" stroke="black"/>
                  <circle cx="320" cy="80" r="6" class="opendot" fill="white" stroke="black"/>
                  <g class="text">
                    <text x="124" y="20">VVP Passport</text>
                    <text x="72" y="52">protected</text>
                    <text x="12" y="68">..</text>
                    <text x="96" y="68">...kid: AID of OP</text>
                    <text x="8" y="84">:</text>
                    <text x="64" y="84">payload</text>
                    <text x="340" y="84">f-OP</text>
                    <text x="8" y="100">:</text>
                    <text x="64" y="100">evd</text>
                    <text x="336" y="100">SAID of</text>
                    <text x="8" y="116">:</text>
                    <text x="96" y="116">signature of OP</text>
                    <text x="348" y="116">data graph</text>
                    <text x="8" y="132">:</text>
                    <text x="8" y="148">:</text>
                    <text x="8" y="164">:</text>
                    <text x="228" y="164">Accountable Party Evidence</text>
                    <text x="424" y="164">Delegation Evidence</text>
                    <text x="12" y="180">v?</text>
                    <text x="312" y="180">(APE)</text>
                    <text x="484" y="180">(DE)</text>
                    <text x="100" y="228">vetting credential</text>
                    <text x="348" y="228">TNAlloc credential</text>
                    <text x="52" y="260">SAID</text>
                    <text x="300" y="260">SAID</text>
                    <text x="104" y="276">AID of issuer</text>
                    <text x="352" y="276">AID of issuer</text>
                    <text x="124" y="292">..:...AID of AP............:..</text>
                    <text x="312" y="292">..:...AID of AP</text>
                    <text x="8" y="308">:</text>
                    <text x="92" y="308">legal name</text>
                    <text x="344" y="308">TNAllocList</text>
                    <text x="8" y="324">:</text>
                    <text x="116" y="324">legal identifier</text>
                    <text x="372" y="324">...more attributes</text>
                    <text x="8" y="340">:</text>
                    <text x="124" y="340">...more attributes</text>
                    <text x="8" y="356">:</text>
                    <text x="8" y="372">:</text>
                    <text x="8" y="388">:</text>
                    <text x="92" y="388">brand credential</text>
                    <text x="340" y="388">more credentials</text>
                    <text x="8" y="404">:</text>
                    <text x="8" y="420">:</text>
                    <text x="52" y="420">SAID</text>
                    <text x="8" y="436">:</text>
                    <text x="104" y="436">AID of issuer</text>
                    <text x="360" y="436">e.g., delegate RTU,</text>
                    <text x="64" y="452">:.:...AID of AP</text>
                    <text x="352" y="452">vet for call ctr,</text>
                    <text x="92" y="468">brand name</text>
                    <text x="364" y="468">proxy right to brand</text>
                    <text x="68" y="484">logo</text>
                    <text x="124" y="500">...more attributes</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" name="fig3.txt">
&lt;![CDATA[
         VVP Passport
  +-----------------------+
  | protected             |
......kid: AID of OP      |
: | payload               |         +--of-OP-----+
: |   evd --------------------------+ SAID of    |
: | signature of OP       |         | data graph +----------+
: +-----------------------+         +--+---------+          |
:                                      |                    |
:              Accountable Party Evidence  Delegation Evidence
v?                                  (APE)                 (DE)
               +--------------+--------+----+               |
               |              |             |               |
   vetting credential         |   TNAlloc credential        |
  +------------------------+  |  +-----------------------+  |
  | SAID                   |  |  | SAID                  |  |
  |   AID of issuer        |  |  |   AID of issuer       |  |
..:...AID of AP............:..|..:...AID of AP           |  |
: |   legal name           |  |  |   TNAllocList         |  |
: |   legal identifier     |  |  |   ...more attributes  |  |
: |   ...more attributes   |  |  +-----------------------+  |
: +------------------------+  |                             |
:                             |                             |
:  brand credential           |   more credentials          |
: +------------------------+  |  +---------------------+    |
: | SAID                   +--+  |                     +-+  |
: |   AID of issuer        |     | e.g., delegate RTU, +----+
:.:...AID of AP            |     | vet for call ctr,   | |  |
  |   brand name           |     | settlement, AI ok,  | +--+
  |   logo                 |     | proxy right to brand| |
  |   ...more attributes   |     +-+-------------------+ |
  +------------------------+       +---------------------+
]]&gt;
    </artwork>
            </artset>
          </figure>
          <t>Where DE exists, the APE will identify and authorize the AP, but the OOBI in the <tt>kid</tt> claim of the passport will identify the OP, and these two parties will be different. Therefore, the DE in the dossier <bcp14>MUST</bcp14> include a delegated signer credential that authorizes the OP to act on the AP's behalf and that stipulates the constraints that govern this delegation. In addition to the vetting credential for the AP, which is required, it <bcp14>SHOULD</bcp14> also include a vetting credential for the OP, that proves the OP's identity. If the APE includes a brand credential, then the DE <bcp14>MUST</bcp14> also include a brand proxy credential, proving that the OP not only can use the AP's allocated phone number, but has AP's permission to project the AP's brand while doing so.</t>
          <t>The passport-specific signature <bcp14>MUST</bcp14> come from the OP, not the OSP or any other party. The OP can generate this signature in its on-prem or cloud PBX, using keys that it controls. It is crucial that the distinction between OP and AP be transparent, with the relationship proved by strong evidence that the AP can create or revoke easily, in a self-service manner.</t>
        </section>
        <section anchor="vetting-credential">
          <name>Vetting credential</name>
          <t>A vetting credential is a targeted credential that enumerates the formal and legal attributes of a unique legal entity. It <bcp14>MUST</bcp14> include a legal identifier that makes the entity unique in its home jurisdiction (e.g., an LEI), and it <bcp14>MUST</bcp14> include an AID for the legal entity as an AP. This AID is globally unique.</t>
          <t>The vetting credential is so called because it <bcp14>MUST</bcp14> be issued according to a documented vetting process that offers formal assurance that it is only issued with accurate information, and only to the entity it describes. A vetting credential confers the privilege of acting with the associated legal identity if and only if the bearer can prove their identity as issuee via a digital signature from the issuee's AID.</t>
          <t>A vetting credential <bcp14>MUST</bcp14> include a JL to a credential that qualifies the issuer as a party trusted to do vetting. This linked credential that qualifies the issuer of the vetting credential <bcp14>MAY</bcp14> contain a JL that qualifies its own issuer, and such JLs <bcp14>MAY</bcp14> be repeated through as many layers as desired. In VVP, the reference type of a vetting credential is an LE vLEI; see <xref target="ISO-17442-3"/> and <xref format="counter" target="vet-cred-sample"/>. This implies both a schema and a governance framework. Other vetting credential types are possible, but they <bcp14>MUST</bcp14> be true credentials that meet the normative requirements here. They <bcp14>MUST NOT</bcp14> be bearer tokens.</t>
          <t>To achieve various design goals, a vetting credential <bcp14>MUST</bcp14> be an ACDC, but this ACDC <bcp14>MAY</bcp14> be a transformation of a credential in another format (e.g., W3C VC, SD-JWT, X509 certificate). See <xref format="counter" target="interoperability"/>.</t>
        </section>
        <section anchor="tnalloc-credential">
          <name>TNAlloc credential</name>
          <t>A TNAlloc credential is a targeted credential that confers on its issuee the right to control how one or more phone numbers are used. Regulators issue TNAlloc credentials to range holders, who in turn issue them to TNUs. TNUs often play the AP role in VVP. If an AP delegates RTU to a proxy (e.g., an employee or call center), the AP <bcp14>MUST</bcp14> also issue a TNAlloc credential to the proxy, to confer the RTU. With each successive reallocation, the set of numbers in the new TNAlloc credential may get smaller.</t>
          <t>Except for TNAlloc credentials issued by regulators, all TNAlloc credentials <bcp14>MUST</bcp14> contain a JL to a parent TNAlloc credential, having an equal or bigger set of numbers that includes those in the current credential. This JL in a child credential documents the fact that the child's issuer possessed an equal or broader RTU, from which the subset RTU in child credential derives.</t>
          <t>To achieve various design goals, a TNAlloc credential <bcp14>MUST</bcp14> be an ACDC, but this ACDC <bcp14>MAY</bcp14> be a transformation of a credential in another format (e.g., a TNAuthList from <xref target="RFC8226"/>). See <xref format="counter" target="interop-creds"/>.</t>
          <t>An example TNAlloc credential and its schema are described in <xref format="counter" target="tn-cred-sample"/>.</t>
        </section>
        <section anchor="brand-credential">
          <name>Brand credential</name>
          <t>A brand credential is a targeted credential that enumerates brand properties such as a brand name, logo, chatbot URL, social media handle, and domain name. It <bcp14>MUST</bcp14> be issued to an AP as a legal entity, but it does not enumerate the formal and legal attributes of the AP; rather, it enumerates properties that would be meaningful to a TP who's deciding whether to take a phone call. It confers on its issuee the right to use the described brand by virtue of research conducted by the issuer (e.g., a trademark search).</t>
          <t>This credential <bcp14>MUST</bcp14> be issued according to a documented process that offers formal assurance that it is only issued with accurate information, and only to a legal entity that has the right to use the described brand. A single AP <bcp14>MAY</bcp14> have multiple brand credentials (e.g., a fictional corporation, <tt>Amce Space Travel Deutschland, GmbH</tt>, might hold brand credentials for both <tt>Sky Ride</tt> and for <tt>Orbítame Latinoamérica</tt>). Rights to use the same brand <bcp14>MAY</bcp14> be conferred on multiple APs (<tt>Acme Space Travel Deutschland, Gmbh</tt> and <tt>Acme Holdings Canada, Ltd</tt> may both possess brand credentials for <tt>Sky Ride</tt>). A brand credential <bcp14>MUST</bcp14> contain a JL to a vetting credential, that shows that the right to use the brand was evaluated only after using a vetting credential to prove the identity of the issuee.</t>
          <t>An example brand credential and its schema are described in <xref format="counter" target="bcred-sample"/>.</t>
        </section>
        <section anchor="brand-proxy-credential">
          <name>Brand proxy credential</name>
          <t>A brand proxy credential confers on an OP the right to project the brand of an AP when making phone calls, subject to a carefully selected set of constraints. This is different from the simple RTU conferred by TNAlloc. Without a brand proxy credential, a call center could make calls on behalf of an AP, using the AP's allocated phone number, but would be forced to do so under its own name or brand, because it lacks evidence that the AP intended anything different. If an AP intends for phone calls to be made by a proxy, and wants the proxy to project the AP's brand, the AP <bcp14>MUST</bcp14> issue this credential.</t>
          <t>An example brand proxy credential and its schema are shown in <xref format="counter" target="bprox-cred-sample"/>.</t>
        </section>
        <section anchor="delegated-signer-credential">
          <name>Delegated signer credential</name>
          <t>A delegated signer credential proves that automation running under the control of the OP has been authorized by the AP to originate VVP traffic (and thus, sign VVP passports) on its behalf.</t>
          <t>An example delegated signer credential and its schema are shown in <xref format="counter" target="dsig-cred-sample"/>.</t>
        </section>
        <section anchor="additional-credential-types">
          <name>Additional credential types</name>
          <t>New credential types can be added to a dossier, to answer any number of novel questions for verifiers, without changing the core characteristics of VVP.</t>
          <t>For example, a credential could be attached to a dossier to prove that the caller is a human being instead of an AI (see <xref target="F2F-SCHEMA"/> and <xref target="PERSONHOOD-CRED"/>), or a credential could be attached to a dossier to prove that the AP empowered an AI agent to make calls on its behalf (analogous to how chatbots represent companies in RCS contexts). An additional credential could assist with questions about settlement (how the terminating service provider will be paid to connect the call). It might document the relationship between an AP and one or more financial clearinghouses.</t>
        </section>
      </section>
    </section>
    <section anchor="interoperability">
      <name>Interoperability</name>
      <t>VVP can achieve its goals without any dependence on RCD, SHAKEN, or similar mechanisms. However, it also provides easy bridges so value can flow to and from other ecosystems with similar goals.</t>
      <section anchor="chat-and-conversations">
        <name>Chat and conversations</name>
        <t>The dossier cited in a VVP passport may also be cited by an RCS verification authority (VA), may include evidence that is also submitted to a VA, or may consist of evidence created by a VA. This unlocks synergies between vetting for RCS (<xref target="GSMA-RCS"/>) and vetting for voice. It may also allow properly vetted RCS chatbots to make verifiable voice calls, including calls that carry brand information (see <xref target="RCD-DRAFT"/> and <xref target="CTIA-BCID"/>), distinguishing them with 100% confidence from AI-driven voice scams.</t>
        <t>When conversations are captured in rich containers such as vCon (<xref target="VCON-DRAFT"/>), a VVP passport may be included (e.g., in the <tt>stir</tt> field of a vCon), proving the identity of a calling party. As long as signatures over the data structure assert truthfully that the passport was verified at the time of attachment, no replay attack is possible, and all of VVP's guarantees transfer. A VVP dossier by itself can also provide permanent evidence of assertions as attachments to a conversation.</t>
      </section>
      <section anchor="interop-certs">
        <name>Certificates</name>
        <t>Certificates can add value to VVP, and VVP can add value to certificate-based ecosystems or stacks. In the rest of this section, note the difference between normative language (imposing requirements on VVP implementations) and non-normative language (suggesting how other solutions could react).</t>
        <section anchor="cascaded-mode">
          <name>Cascaded mode</name>
          <t>Verifiers who prefer to operate in certificate ecosystems such as SHAKEN and RCD can be satisfied by having an intermediary verify according to VVP rules (see <xref format="counter" target="verifying"/>), and then signing a new passport in a certificate-dependent format (e.g., for SHAKEN and/or RCD). In such cases, the new passport contains an <tt>x5u</tt> header pointing to the certificate of the new signer.</t>
          <t>This form of trust handoff is called <em>cascaded mode</em>. In cascaded mode, if the certificate fetched from the <tt>x5u</tt> URL satisfies enough trust requirements of the verifier, the goals of the new context are achieved. For example, if this intermediary is the OSP, the standard assumptions of SHAKEN are fully met, but the OSP's attestation can always be <tt>A</tt>, since VVP conclusively proves the identity of the AP and OP.</t>
        </section>
        <section anchor="foundation-mode">
          <name>Foundation mode</name>
          <t>In another pattern called <em>foundation mode</em>, a VVP passport <bcp14>MAY</bcp14> itself contain an <tt>x5u</tt> header. If it does, the <tt>x5u</tt> header <bcp14>MUST NOT</bcp14> be used to achieve any VVP verification guarantees; the key state of the OP's AID <bcp14>MUST</bcp14> still justify any acceptance of the signature. However, the associated X509 certificate <bcp14>SHOULD</bcp14> be issued to the public key of the party that plays the OP role in VVP. If and only if it does so, the full weight of VVP evidence about the OP's status as a trusted signer for the AP could be transferred to the certificate, even if the certificate is self-issued or otherwise chains back to something other than a known, high-reputation certificate authority.</t>
          <t>Valid VVP passports that obey this requirement can thus be used to enable VVP-unaware but certificate-based checks without certificate authorities (or without prior knowledge of them). Such certificate-based checks should be done in real-time, since the binding between a key and the owner of a cert cannot be known to be valid except at the current moment.</t>
        </section>
      </section>
      <section anchor="interop-creds">
        <name>Other credential formats</name>
        <t>The stable evidence that drives VVP -- vetting credential (<xref format="counter" target="vetting-credential"/>), TNAlloc credential (<xref format="counter" target="tnalloc-credential"/>), brand credential (<xref format="counter" target="brand-credential"/>), brand proxy credential (<xref format="counter" target="brand-proxy-credential"/>), and delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>) -- <bcp14>MUST</bcp14> all be ACDCs. This is because only when the data in these credentials is modeled as an ACDC is it associated with permanent identities that possess appropriate security guarantees.</t>
        <t>However, VVP can easily be driven by other approaches to evidence, treating the ACDCs as a somewhat secondary format transformation. In such a case, a <em>bridging party</em> plays a pivotal role. This party <bcp14>MUST</bcp14> verify foreign evidence (e.g., W3C verifiable credentials <xref target="W3C-VC"/>), and then issue ACDCs that derive from it (e.g., using <xref target="CITATION-SCHEMA"/>). It <bcp14>MAY</bcp14> radically transform the data in the process (e.g., combining or splitting credentials, changing schemas or data values).</t>
        <t>This transformation from foreign evidence to ACDCs is very flexible, and allows for tremendous interoperability. On the calling side, any ecosystem that deals in cryptographic evidence can provide input to VVP, no matter what evidence mechanisms they prefer.</t>
        <t>(On the receiving side, the information carried via ACDCs in VVP could be transformed again, with a second bridging party, to enable even more interoperability. However, the goals of such a secondary transformation are undefined by VVP, so the constraints and rules of the transformation are out of scope here.)</t>
        <t>All VVP stakeholders need to understand that accepting foreign evidence does much more than alter format. Bridging is not a simple conversion or reissuance. It replaces identifiers (e.g., DIDs as specified in <xref target="W3C-DID"/> with AIDs as specified in <xref target="TOIP-KERI"/>). The new identifiers have different lifecycles and different trust bases than the original. Bridging also changes the <em>meaning</em> of the credential. Foreign evidence directly asserts claims backed by the reputation of its original issuer. A new ACDC embodies a claim by the bridging party, that they personally verified foreign evidence according to foreign evidence rules, at a given moment. It cites the foreign evidence as a source, and may copy claims into the ACDC, but the bridging party is only asserting that they verified the original issuer's commitment to the claims, not that the bridging party commits to those claims.</t>
        <t>Verifiers <bcp14>MAY</bcp14> choose to accept such derivative ACDCs, but the indirection <bcp14>SHOULD</bcp14> color their confidence. They <bcp14>MUST NOT</bcp14> assume that identifiers in the foreign evidence and in the ACDC have the same referents or controllers. They <bcp14>MUST NOT</bcp14> hold the bridging party accountable for the claims -- only for the claim that they verified the original issuer's commitment to the claims. Unless additional governance offers guarantees beyond those explicitly provided by VVP, they <bcp14>MUST</bcp14> accept that there is no defined relationship between revocation of the foreign evidence and revocation of the ACDC.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Complying with a specification may forestall certain easy-to-anticipate attacks. However, <em>it does not mean that vulnerabilities don't exist, or that they won't be exploited</em>. The overall assurance of VVP requires reasonable vigilance. Given that a major objective of VVP is to ensure security, implementers are strongly counseled to understand the underlying principles, the assumptions, and the ways that choices by their own or other implementations could introduce risk.</t>
      <t>Like most cryptographic mechanisms, VVP depends on the foundational assumption that people will manage cryptographic keys carefully. VVP enforces this assumption more thoroughly than many existing solutions:</t>
      <ul spacing="normal">
        <li>
          <t>Parties that issue credentials <bcp14>MUST</bcp14> be identified with AIDs (<xref format="counter" target="aid"/>) that use witnesses (<xref format="counter" target="appendix-b"/>). This guarantees a non-repudiable, publicly accessible audit log of how their key state evolves, and it makes key rotation easy. It also offers compromise and duplicity detection. Via prerotation, it enables recovery from key compromise. AIDs can be upgraded to use quantum-proof signing algorithms without changing the identifier.</t>
        </li>
        <li>
          <t>Parties that issue credentials <bcp14>MUST</bcp14> do so using ACDCs (<xref format="counter" target="acdcs"/>) signed by their AID rather than a raw key. This makes evidence revocable. It also makes it stable across key rotation, and prevents retrograde attacks by allowing verifiers to map an issuance or revocation event to an unambiguous key state in the KEL (<xref format="counter" target="KEL"/>).</t>
        </li>
        <li>
          <t>Parties that issue credentials <bcp14>SHOULD</bcp14> employ threshold-based multi-signature schemes. This enhances security by distributing signing authority across multiple key holders, reducing the risk of single-point compromise. Threshold-based signatures ensure that no single key compromise undermines the system’s integrity while enabling controlled key recovery and rotation without disrupting credential validity.</t>
        </li>
      </ul>
      <t>Nonetheless, it is still possible to make choices that weaken the security posture of the ecosystem, including at least the following:</t>
      <ul spacing="normal">
        <li>
          <t>Sharing keys or controlling access to them carelessly</t>
        </li>
        <li>
          <t>Issuing credentials with a flimsy basis for trust</t>
        </li>
        <li>
          <t>Delegating authority to untrustworthy parties</t>
        </li>
        <li>
          <t>Delegating authority without adequate constraints</t>
        </li>
        <li>
          <t>Failing to fully verify evidence</t>
        </li>
      </ul>
      <t>Generally understood best practices in cybersecurity will avoid many of these problems. In addition, the following policies that are specific to VVP are strongly recommended:</t>
      <ol spacing="normal" type="1"><li>
          <t>Passports <bcp14>SHOULD</bcp14> have an aggressive timeout (e.g., 1 minute). Signatures on passports are not anchored in a KEL, and must therefore be evaluated for age with respect to the time they were received. Overly old passports could be a replay attack (a purported second call with the same orig and dest numbers, using the same backing evidence, soon after the first.)</t>
        </li>
        <li>
          <t>Witnesses (which <bcp14>MUST</bcp14> be used) <bcp14>SHOULD</bcp14> be used in such a way that high availability is guaranteed, and in such a way that duplicity by the controller of an AID is detected. See <xref format="counter" target="appendix-b"/>. (Verifiers will be able to see the witness policy of each AID controller, and <bcp14>SHOULD</bcp14> decide for themselves whether the party is reliable, depending on what they observe.)</t>
        </li>
        <li>
          <t>Revocations <bcp14>SHOULD</bcp14> be timely, and the timeliness guarantees of issuers <bcp14>SHOULD</bcp14> be published.</t>
        </li>
        <li>
          <t>Watchers <bcp14>SHOULD</bcp14> propagate events to local caches with a low latency, and <bcp14>MUST</bcp14> provide information that allows verifiers to decide whether that latency meets their freshness requirements.</t>
        </li>
      </ol>
    </section>
    <section anchor="privacy">
      <name>Privacy</name>
      <t>Both institutions and individuals that make phone calls may have privacy goals. Although their goals might differ in some ways, both will wish to disclose some attributes to the TP, and both may wish to suppress some of that same information from intermediaries. Both will want control over how this disclosure works.</t>
      <section anchor="graduated-disclosure">
        <name>Graduated Disclosure</name>
        <t>ACDCs support a technique called <em>graduated disclosure</em> that enables this.</t>
        <t>The hashing algorithm for ACDCs resembles the hashing algorithm for a merkle tree. An ACDC is a hierarchical data structure that can be modeled with nested JSON. Any given layer of the structure may consist of a mixture of simple scalar values and child objects. The input to the hashing function for a layer of content equals the content of scalar fields and the <em>hashes</em> of child objects.</t>
        <figure>
          <name>ACDC hashes like a Merkle tree</name>
          <artset>
            <artwork type="svg" name="fig4.svg">
      <svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="432" width="408" viewBox="0 0 408 432" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,272" fill="none" stroke="black"/>
                <path d="M 72,320 L 72,328" fill="none" stroke="black"/>
                <path d="M 72,368 L 72,376" fill="none" stroke="black"/>
                <path d="M 112,48 L 112,272" fill="none" stroke="black"/>
                <path d="M 152,48 L 152,160" fill="none" stroke="black"/>
                <path d="M 216,320 L 216,328" fill="none" stroke="black"/>
                <path d="M 216,344 L 216,360" fill="none" stroke="black"/>
                <path d="M 224,80 L 224,88" fill="none" stroke="black"/>
                <path d="M 224,104 L 224,120" fill="none" stroke="black"/>
                <path d="M 256,48 L 256,160" fill="none" stroke="black"/>
                <path d="M 296,48 L 296,80" fill="none" stroke="black"/>
                <path d="M 400,48 L 400,80" fill="none" stroke="black"/>
                <path d="M 8,48 L 112,48" fill="none" stroke="black"/>
                <path d="M 152,48 L 256,48" fill="none" stroke="black"/>
                <path d="M 296,48 L 400,48" fill="none" stroke="black"/>
                <path d="M 296,80 L 400,80" fill="none" stroke="black"/>
                <path d="M 152,160 L 256,160" fill="none" stroke="black"/>
                <path d="M 8,272 L 112,272" fill="none" stroke="black"/>
                <path d="M 240,96 C 248.83064,96 256,103.16936 256,112" fill="none" stroke="black"/>
                <path class="jump" d="M 224,104 C 218,104 218,88 224,88" fill="none" stroke="black"/>
                <path class="jump" d="M 216,344 C 210,344 210,328 216,328" fill="none" stroke="black"/>
                <g class="text">
                  <text x="56" y="20">Fully</text>
                  <text x="208" y="20">Partially</text>
                  <text x="344" y="20">Fully</text>
                  <text x="56" y="36">Expanded ACDC</text>
                  <text x="204" y="36">Compact ACDC</text>
                  <text x="348" y="36">Compact ACDC</text>
                  <text x="40" y="68">a = {</text>
                  <text x="184" y="68">a = {</text>
                  <text x="348" y="68">a = H(...)</text>
                  <text x="60" y="84">b = N,</text>
                  <text x="200" y="84">b = N</text>
                  <text x="56" y="100">C = {</text>
                  <text x="200" y="100">c = H</text>
                  <text x="232" y="100">c</text>
                  <text x="76" y="116">d = M,</text>
                  <text x="200" y="116">g = Q</text>
                  <text x="76" y="132">e = O,</text>
                  <text x="212" y="132">i = H(i)</text>
                  <text x="72" y="148">f = P</text>
                  <text x="168" y="148">}</text>
                  <text x="44" y="164">},</text>
                  <text x="60" y="180">g = Q,</text>
                  <text x="56" y="196">i = {</text>
                  <text x="76" y="212">j = R,</text>
                  <text x="72" y="228">k = S</text>
                  <text x="40" y="244">}</text>
                  <text x="24" y="260">}</text>
                  <text x="48" y="308">H(a) = H(</text>
                  <text x="192" y="308">H(a) = H(</text>
                  <text x="344" y="308">H(a) = SAID</text>
                  <text x="48" y="324">b = N</text>
                  <text x="192" y="324">b = N</text>
                  <text x="64" y="340">c = H(c),</text>
                  <text x="192" y="340">c = H</text>
                  <text x="232" y="340">c),</text>
                  <text x="72" y="356">recurse</text>
                  <text x="192" y="356">g = Q</text>
                  <text x="48" y="372">g = Q</text>
                  <text x="204" y="372">i = H(i)</text>
                  <text x="60" y="388">i = H(i)</text>
                  <text x="188" y="388">) = SAID</text>
                  <text x="72" y="404">recurse</text>
                  <text x="44" y="420">) = SAID</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" name="fig4.txt">
&lt;![CDATA[
    Fully            Partially          Fully
Expanded ACDC      Compact ACDC      Compact ACDC
+------------+    +------------+    +------------+
| a = {      |    | a = {      |    | a = H(...) |
|   b = N,   |    |   b = N,   |    +------------+
|   C = {    |    |   c = H(c),|
|     d = M, |    |   g = Q,   |
|     e = O, |    |   i = H(i) |
|     f = P  |    | }          |
|   },       |    +------------+
|   g = Q,   |
|   i = {    |
|     j = R, |
|     k = S  |
|   }        |
| }          |
+------------+

 H(a) = H(         H(a) = H(         H(a) = SAID
   b = N,            b = N,
   c = H(c),         c = H(c),
     recurse         g = Q,
   g = Q,            i = H(i)
   i = H(i)        ) = SAID
     recurse
 ) = SAID
]]&gt;
    </artwork>
          </artset>
        </figure>
        <t>This means is that any given child JSON object in an ACDC can be replaced with its hash, <em>without altering the hash of the parent data</em>. Thus, there can be expanded ACDCs (where all data inside child objects is visible) or compacted ACDCs (where some or all of the child objects are opaquely represented by their equivalent hashes). A signature over an expanded ACDC is also a signature over any of the compacted versions of the same ACDC, and a revocation event over any of the versions is guaranteed to mean the same thing.</t>
        <t>In combination with the <tt>evd</tt> claim in a passport, graduated disclosure can be used to achieve privacy goals, because different verifiers can see different variations on an ACDC, each of which is guaranteed to pass the same verification tests and has the same revocation status.</t>
        <t>For example, suppose that company X wants to make a call to an individual in jurisdiction Y, and further suppose that auditor Z requires proof that X is operating lawfully, without knowing the name of X as a legal entity. In other words, the auditor needs to <em>qualify</em> X but not necessarily <em>identify</em> X. Company X can serve the KEL for its dossier from a web server that knows to return the expanded form of the vetting credential in the dossier to the individual or the individual's TSP in Y, but a compacted form of the vetting credential (revealing just the vetter's identity and their signature, but not the legal identity of the issuee, X) to auditor Z. Later, if law enforcement sees the work of the auditor and demands to know the legal identity of X, discovery of the expanded form can be compelled. When the expanded form is disclosed, it will demonstrably be associated with the compact form that Z recorded, since the qualifying and identifying forms of the ACDC have the same hash.</t>
        <t>Company X doesn't have to engage in sophisticated sniffing of traffic by geography to achieve goals like this. It can simply say that anonymous and unsigned HTTP requests for the dossier return the compact form; anyone who wants the expanded form must make an HTTP request that includes in its body a signature over terms and conditions that enforce privacy and make the recipient legally accountable not to reshare.</t>
        <t>Importantly, transformations from expanded to compact versions of an ACDC can be performed by anyone, not just the issuer or holder. This means that a verifier can achieve trust on the basis of expanded data, and then cache or share a compacted version of the data, meaning that any subsequent or downstream verifications can have equal assurance but higher privacy. The same policy can be applied to data any time it crosses a regulatory, jurisdictional boundary where terms and conditions for disclosure have weaker enforcement. It can also be used when business relationships should be redacted outside of a privileged context.</t>
        <t>Schemas for credentials should be designed to allow graduated disclosure in increments that match likely privacy goals of stakeholders. ACDC schema design typically includes a salty nonce in each increment, avoiding rainbow attacks on the hashed data. VVP encourages but does not require this.</t>
      </section>
      <section anchor="correlation">
        <name>Correlation</name>
        <t>Privacy theorists will note that, even with contractually protected graduated disclosure and maximally compact ACDCs, verifiers can still correlate by using some fields in ephemeral passports or long-lived ACDCs, and that this may undermine some privacy goals.</t>
        <t>There are three correlators in each passport:</t>
        <ol spacing="normal" type="1"><li>
            <t>Any brand information in <tt>card</tt> (may strongly identify an AP)</t>
          </li>
          <li>
            <t>the <tt>kid</tt> header (identifies the OP)</t>
          </li>
          <li>
            <t>the <tt>evd</tt> claim (uniquely identifies a dossier used by an AP)</t>
          </li>
        </ol>
        <t>We discount the first correlator, because if it is present, the AP is explicitly associating its correlated reputation with a call. It has asserted this brand publicly, to every stakeholder in the SIP pipeline. In such cases, any question of the AP's privacy is off the table, and no privacy protections on the other two correlators will be effective. However, if the first correlator is missing, the other two correlators become more interesting.</t>
        <section anchor="kid">
          <name>kid</name>
          <t>In VVP, the OP role that's identified by <tt>kid</tt> is played by automation. Automation is unlikely to have any direct privacy goal. The company that operates it is likely to be either a service provider, or a large corporation capable of significant IT investments. Either way, the OP is in the business of servicing phone calls, and is likely to be content for its traffic to be correlated publicly. Therefore, the fact that <tt>kid</tt> correlates the OP is not particularly interesting.</t>
          <t>However, could the OP be used as an indirect correlator for the AP?</t>
          <t>The OP's SBC can service many thousands or millions of callers, providing a some herd privacy. This is not a perfect protection, but it is a beginning. We add to this the crucial observation that <em>the OP doesn't need to have a stable reputation to support VVP goals</em>. Trust in the OP comes from the existence of a delegated signer credential (see <xref format="counter" target="delegated-signer-credential"/>), not from a certificate or any other long-term identity. Therefore, the AID that provides cryptographic identity for an OP <bcp14>MAY</bcp14> be rotated often (as often as APs are willing to delegate to a new one). Further, even without rotation, an OP organization <bcp14>MAY</bcp14> provide multiple instances of its automation, each using a different AID. Also, an AP <bcp14>MAY</bcp14> delegate signing authority to multiple OP organizations, each of which is using various strategies to mitigate correlation. Taken together, these measures offers reasonable protection -- protection that an AP can tune -- against correlating an AP via <tt>kid</tt>.</t>
        </section>
        <section anchor="evd">
          <name>evd</name>
          <t>The other correlator, <tt>evd</tt>, tracks an AP more directly, because a dossier is uniquely identified by its SAID, and can only be used by a single AP. Furthermore, if someone resolves <tt>evd</tt> to an actual dossier (something that might be avoidable with judicious use of graduated disclosure), the dossier will at a minimum have an issuer field that ties it to the AP as a perfect correlator.</t>
          <t>One answer here is to introduce an <em>AP blinding service</em>. This service creates <em>derived dossiers</em> on a schedule or by policy. Each derivation includes the hash of the original dossier, in a field that is hidden but available (along with a salty nonce) via graduated disclosure. The derived dossier is signed by the blinding service rather than the original AP. It embodies an assertion, by the blinding service, that it has verified the original dossier according to published rules, and that it will revoke the derivative if the original is revoked. AP blinding services would have to be trusted by verifiers, much like root CAs in SHAKEN. However, unlike CAs, their actions could be trivially audited for correctness, since every derivation would have to be backed by a dossier that has the associated hash. Such a mechanism is probably unnecessary for b2c calling, but may be justified when VVP is used by individual APs if they wish to merely qualify without identifying themselves to some intermediaries or TPs.</t>
        </section>
      </section>
    </section>
    <section anchor="appendix-a">
      <name>Appendix A: Evidence theory</name>
      <t>Most existing approaches to secure telephony uses X509 certificates <xref target="RFC5280"/> for foundational identity. Certificates have great virtues. Notably, they are well understood, and their tooling is ubiquitous and mature. However, they also have some serious drawbacks. They are protected by a single key whose compromise is difficult to detect. Recovery is cumbersome and slow. As a result, <em>certificates are far more temporary than the identities they attest</em>.</t>
      <t>This has numerous downstream consequences. When foundational evidence of identity has to be replaced constantly, the resulting ecosystem is fragile, complex, and expensive for all stakeholders. Vulnerabilities abound. Authorizations can only be analyzed in a narrow <em>now window</em>, never at arbitrary moments in time. This creates enormous pressure to build a centralized registry, where evidence can be curated once, and where the cost of reacting to revocations is amortized. The entire fabric of evidence has to be rebuilt from scratch if quantum security becomes a requirement.</t>
      <t>In contrast, the issuers and holders of ACDCs -- and thus, the stakeholders in VVP passports -- are identified by autonomic identifiers, not raw keys. This introduces numerous security benefits. Keys, key types, and signing algorithms can all change (even for post-quantum upgrades) without invalidating evidence. Signing and rotation operations are sequenced deterministically, making historical audits possible. Key compromises are detected as soon as an attacker attempts consequential actions. Recovery from compromise is trivial. Multisig signing policies allow diffuse, nuanced control.</t>
      <t>The result is that <em>identities in ACDCs are as stable as identities in real organizations</em>. This makes delegations and chaining mechanisms far more robust than their analogs in certificates, and this in turn makes the whole ecosystem safer, more powerful, and easier to maintain. Revocations are cheap and fast. No central registries are needed, which eliminates privacy concerns and regulatory hurdles. Adoption can be opportunistic; it doesn't require a central mandate or carefully orchestrated consensus throughout a jurisdiction before it can deliver value.</t>
      <t>ACDCs make it practical to model nuanced, dynamic delegations such as the one between Organization X and Call Center Y. This eliminates the gap that alternative approaches leave between accountable party and the provider of call evidence. Given X's formal approval, Y can sign a call on behalf of X, using a number allocated to X, and using X's brand, without impersonating X. They can also prove to any OSP or any other party, in any jurisdiction, that they have the right to do so. Furthermore, the evidence that Y cites can be built and maintained by X and Y, doesn't get stale or require periodic reissuance, and doesn't need to be published in a central registry.</t>
      <t>Even better, when such evidence is filtered through suballocations or crosses jurisdictional boundaries, it can be reused, or linked and transformed, without altering its robustness or efficiency. Unlike W3C verifiable credentials and SD-JWTs, which require direct trust in the proximate issuer, ACDCs and the JWTs that reference them verify data back to a root through arbitrarily long and complex chains of issuers, with only the root needing to be known and trusted by the verifier.</t>
      <t>The synergies of these properties mean that ACDCs can be permanent, flexible, robust, and low-maintenance. In VVP, no third party has to guess who's accountable for a call; the accountable party is transparently and provably accountable, period. (Yet notwithstanding this transparency, ACDCs support a form of pseudonymity and graduated disclosure that satisfies vital privacy and data processing constraints. See <xref format="counter" target="privacy"/>.)</t>
    </section>
    <section anchor="appendix-b">
      <name>Appendix B: Witnesses and Watchers</name>
      <t>A full description of witnesses and watchers is available in <xref target="TOIP-KERI"/>. Here, we merely summarize.</t>
      <t>A KERI <em>witness</em> is a lightweight server that acts as a notary. It exposes a standard interface. It receives signed events from the controller of an identifier that it services. If these events are properly sequenced and aligned with the identifier's signing policy and key state, they are recorded and become queryable, typically by the public. KERI allows the controller of an autonomic identifier to choose zero or more witnesses. The witnesses can change over the lifecycle of the identifier. However, the relationship between an identifier and its witnesses cannot be changed arbitrarily; the controller of the identifier makes a cryptographic commitment to its witnesses, and can only change that commitment by satisfying the signing policy of the identifier. In VVP, identifiers used by issuers <bcp14>MUST</bcp14> have at least one witness, because this guarantees viral discoverability, and <bcp14>SHOULD</bcp14> have at least 3 witnesses, because this guarantees both high availability and the detection of duplicity by the controller of the identifier.</t>
      <t>Witnesses provide, for VVP, many of the security guarantees that alternate designs seek from blockchains. However, witnesses are far more lightweight than blockchains. They can be run by anyone, without coordination or approval, and can be located in any jurisdiction that the owner of the identifier prefers, satisfying regulatory requirements about data locality. Although a single witness may service mulptiple identifiers, the records related to any single identifier are independent, and no consensus algorithm is required to order them relative to others. Thus, every identifier's data evolves in parallel, without bottlenecks, and any identifier can be deleted without affecting the integrity of other identifiers' records, satisfying regulatory requirements about erasure. Witnesses only store (and thus, can only expose to the public) what a given data controller has instructed them to store and publish. Thus, witnesses do not create difficulties with consent or privacy.</t>
      <t>In VVP, when a party shares an identifier or a piece of evidence, they do so via a special URL called an OOBI (out of band invitation). The OOBI serves a tamper-evident KEL (<xref format="counter" target="KEL"/>) that reveals the full, provable history of the key state and other witnesses for the identifier, and even includes a forward reference to new witnesses, if they have changed. It also allows the discovery of issuance and revocation events, and their sequence relative to one another and to key state changes.</t>
      <t>An additional and optional feature in KERI is enabled by adding <em>watchers</em>. Watchers are lightweight services that synthesize witness data. They may <bcp14>MAY</bcp14> monitor multiple witnesses and enable hyper-efficient caching. They <bcp14>SHOULD</bcp14> also compare what multiple witnesses for a given identifier are saying, which prevents controllers of an identifier from forking reality in a duplicitous way, and which can detect malicious attempts to use stolen keys.</t>
      <t>Witnesses are chosen according to the preference of each party that controls an identifier, and a mature ecosystem could have dozens, hundreds, or thousands. Watchers, on the other hand, address the needs of verifiers, because they distill some or all of the complexity in an ecosystem down to a single endpoint that verifiers can query. Any verifier can operate a watcher at any time, without any coordination or approval. Viral discoverability can automatically populate the watcher's cache, and keep it up-to-date as witness data evolves.</t>
      <t>Verifiers can share watchers if they prefer. Anything that watchers assert must be independently verified by consulting witnesses, so watchers need not have a complete picture of the world, and they are a convenience rather than an oracle that must be trusted. The data that watchers synthesize is deliberately published by witnesses for public consumption, at the request of each data stream's associated data controllers, and does not represent surveillance (<xref format="counter" target="privacy"/>). If a watcher can no longer find witness data to back one of its assertions, it <bcp14>MUST</bcp14> delete the data to satisfy its contract. This means that acts of erasure on witnesses propagate to watchers, again satisfying regulatory erasure requirements.</t>
    </section>
    <section anchor="appendix-c">
      <name>Appendix C: Sample Credentials</name>
      <section anchor="common-fields">
        <name>Common fields</name>
        <t>Some structure is common to all ACDCs. For details, consult <xref target="TOIP-ACDC"/>. Here, we provide a short summary.</t>
        <ul spacing="normal">
          <li>
            <t><tt>v</tt> <em>(required)</em> Contains a version statement.</t>
          </li>
          <li>
            <t><tt>d</tt> <em>(required)</em> Contains the SAID (<xref format="counter" target="said"/>) of the ACDC. (Nested <tt>d</tt> fields contain SAIDs of nested JSON objects, as discussed in <xref format="counter" target="graduated-disclosure"/>.</t>
          </li>
          <li>
            <t><tt>i</tt> <em>(required)</em> In the outermost structure, contains the AID (<xref format="counter" target="aid"/>) of an issuer. Inside <tt>a</tt>, contains the AID of the issuee.</t>
          </li>
          <li>
            <t><tt>ri</tt> <em>(optional)</em> Identifies a registry that tracks revocations that might include one for this credential.</t>
          </li>
          <li>
            <t><tt>s</tt> <em>(required)</em> Contains the SAID of a schema to which the associated ACDC conforms.</t>
          </li>
          <li>
            <t><tt>a</tt> <em>(required)</em> Contains additional attributes for this specific ACDC, as allowed by its schema.</t>
          </li>
          <li>
            <t><tt>dt</tt> <em>(optional)</em> Contains the date when the issuer claims to have issued the ACDC. This data will correspond closely with a timestamp saved in the issuer's KEL, at the point where the signature on the ACDC was signed and anchored there. The ordering of the signature in the KEL, relative to other key state events, is what is definitive here; the timestamp itself should be viewed more as a hint.</t>
          </li>
          <li>
            <t><tt>e</tt> <em>(optional)</em> Contains edges that connect this ACDC to other data upon which it depends.</t>
          </li>
          <li>
            <t><tt>r</tt> <em>(optional)</em> Contains one or more rules that govern the use of the ACDC. Holding the credential requires a cryptographically nonrepudiable <tt>admit</tt> action with a wallet, and therefore proves that the holder agreed to these terms and conditions.</t>
          </li>
        </ul>
        <t>All ACDCs are validated against a schema that conforms to <xref target="JSON-SCHEMA"/>. Below we show some sample credentials and their corresponding schemas. VVP does not require these specific schemas, but rather is compatible with any that have roughly the same information content.</t>
      </section>
      <section anchor="vet-cred-sample">
        <name>Vetting credential</name>
        <t>The schema of a vetting credential (<xref format="counter" target="vetting-credential"/>) can be very simple; it needs to identify the issuer and issuee by AID, and it needs to identify the vetted legal entity in at least one way that is unambiguous. Here is a sample LE vLEI that meets these requirements. The issuer's AID appears in the first <tt>i</tt> field, the issuee in the second <tt>i</tt> field, and the connection to a vetted legal entity in the <tt>LEI</tt> field. (The validity of this credential depends on its issuer having a valid, unrevoked QVI credential; the specifc credential it links to is conveyed in <tt>e</tt>. The full text of rules has been elided to keep the example short.)</t>
        <sourcecode type="json"><![CDATA[
{
  "v":"ACDC10JSON0005c8_",
  "d":"Ebyg1epjv7D4-6mvl44Nlde1hTyL8413LZbY-mz60yI9",
  "i":"Ed88Jn6CnWpNbSYz6vp9DOSpJH2_Di5MSwWTf1l34JJm",
  "ri":"Ekfi58Jiv-NVqr6GOrxgxzhrE5RsDaH4QNwv9rCyZCwZ",
  "s":"ENPXp1vQzRF6JwIuS-mp2U8Uf1MoADoP_GqQ62VsDZWY",
  "a":{
    "d":"EdjPlxlRyujxarfXHCwFAqSV-yr0XrTE3m3XdFaS6U3K",
    "i":"Eeu5zT9ChsawBt2UXdU3kPIf9_lFqT5S9Q3yLZvKVfN6",
    "dt":"2024-09-19T13:48:21.779000+00:00",
    "LEI":"9845006A4378DFB4ED29"
  },
  "e":{
    "d":"EeyVJC9yZKpbIC-LcDhmlS8YhrjD4VIUBZUOibohGXit",
    "qvi":{
      "n":"EmatUqz_u9BizxwOc3JishC4MyXfiWzQadDpgCBA6X9n",
      "s":"EBfdlu8R27Fbx-ehrqwImnK-8Cm79sqbAQ4MmvEAYqao"
    }
  },
  "r":{
    "d":"EgZ97EjPSINR-O-KHDN_uw4fdrTxeuRXrqT5ZHHQJujQ",
    "usageDisclaimer":{
      "l":"Usage of a valid...fulfilled."
    },
    "issuanceDisclaimer":{
      "l":"All information...Governance Framework."
    }
  }
}
]]></sourcecode>
        <t>The schema that governs this credential, <tt>ENPX...DZWY</tt>, is shown in the <tt>s</tt> field. LE vLEI credential schemas are managed by GLEIF and published at <xref target="LE-VLEI-SCHEMA"/>.</t>
        <t>As fundamentally public artifacts that are issued only to organizations, not individuals, vLEIs are not designed for graduated disclosure (<xref format="counter" target="graduated-disclosure"/>). Vetting credentials for individuals would require a different schema -- perhaps one that documents their full legal name but allows disclosure strategies such as first name + last initial, or first initial plus last name.</t>
      </section>
      <section anchor="tn-cred-sample">
        <name>TNAlloc credential</name>
        <t>A TNAlloc credential needs to identify its issuer and issuee. If and only if it isn't issued by a national regulator that acts as a root of trust on allocation questions, it also needs to cite an upstream allocation that justifies the issuer's right to pass along a subset of the numbers it controls.</t>
        <t>Here is a sample TNAlloc credential that meets these requirements.</t>
        <sourcecode type="json"><![CDATA[
{
  "v": "ACDC10JSON0003cd_",
  "d": "EEeg55Yr01gDyCScFUaE2QgzC7IOjQRpX2sTckFZp1RP",
  "u": "0AC8kpfo-uHQvxkuGZdlSjGy",
  "i": "EANghOmfYKURt3rufd9JNzQDw_7sQFxnDlIew4C3YCnM",
  "ri": "EDoSO5PEPLsstDr_XXa8aHAf0YKfPlJQcxZvkpMSzQDB",
  "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
  "a": {
      "d": "ECFFejktQA0ThTqLtAUTmW46unVGf28I_arbBFnIwnWB",
      "u": "0ADSLntzn8x8eNU6PhUF26hk",
      "i": "EERawEn-XgvmDR_-2ESVUVC6pW-rkqBkxMTsL36HosAz",
      "dt": "2024-12-20T20:40:57.888000+00:00",
      "numbers": {
          "rangeStart": "+33801361002",
          "rangeEnd": "+33801361009"
      },
      "channel": "voice",
      "doNotOriginate": false
  },
  "e": {
      "d": "EI9qlgiDbMeJ7JTZTJfVanUFAoa0TMz281loi63nCSAH",
      "tnalloc": {
          "n": "EG16t8CpJROovnGpgEW1_pLxH5nSBs1xQCbRexINYJgz",
          "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
          "o": "I2I"
      }
  },
  "r": {
      "d": "EJFhpp0uU7D7PKooYM5QIO1hhPKTjHE18sR4Dn0GFscR",
      "perBrand": "Issuees agree not to share..."
  }
}
]]></sourcecode>
        <t>The schema used by this particular credential, <tt>EFvn...GgSQ</tt>, is published at <xref target="TN-ALLOC-SCHEMA"/>.</t>
      </section>
      <section anchor="bcred-sample">
        <name>Brand credential</name>
        <t>TODO
~~~json
~~~</t>
      </section>
      <section anchor="bprox-cred-sample">
        <name>Brand proxy credential</name>
        <t>A brand proxy credential (<xref format="counter" target="brand-proxy-credential"/>) is very similar to a delegated signer credential, in that it proves carefully constrained delegated authority. The difference lies in what authority is delegated (proxy a brand vs. sign passports).</t>
        <t>A Generalized Cooperative Delegation (GCD) credential embodies delegated but constrained authority in exactly this way. A GCD credential suitable for use as a brand proxy in VVP might look like this:</t>
        <sourcecode type="json"><![CDATA[
{
    "v": "ACDC10JSON00096c_",
    "d": "EWQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFx",
    "u": "0ADE6oAxBl4E7uKeGUb7BEYi",
    "i": "EC4SuEyzrRwu3FWFrK0Ubd9xejlo5bUwAtGcbBGUk2nL",
    "ri": "EM2YZ78SKE8eO4W1lQOJeer5xKZqLmJV7SPr3Ji5DMBZ",
    "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
    "a": {
        "d": "EPQhEk5tfXvxyKe5Hk4DG63dSgoP-F2VZrxuIeIKrT9B",
        "u": "0AC9kH8q99PTCQNteGyI-F4g",
        "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
        "dt": "2024-12-27T13:11:29.062000+00:00",
        "c_goal": ["ops.telco.*.proxybrand"],
        "c_proto": ["VVP:OP,TP"]
    },
    "r": {
        "d": "EFthNcTE20MLMaCOoXlSmNtdooGEbZF8uGmO5G85eMSF",
        "noRoleSemanticsWithoutGfw": "All parties agree...",
        "issuerNotResponsibleOutsideConstraints": "Although verifiers...",
        "noConstraintSansPrefix": "Issuers agree...",
        "useStdIfPossible": "Issuers agree...",
        "onlyDelegateHeldAuthority": "Issuers agree..."
    }
}
]]></sourcecode>
        <t>Note the <tt>c_goal</tt> field that limits goals that can be justified with this credential, and the <tt>c_proto</tt> field that says the delegate can only exercise this authority in the context of the "VVP" protocol with the "OP" or "TP" role. The wildcard in <tt>c_goal</tt> and the addition of the "TP" role in <tt>c_proto</tt> are complementary changes that allow this credential to justify proxying the brand on both outbound and inbound calls. (Branding on inbound calls is out of scope for VVP, but is included here just to show that the same credentials can be used for both VVP and non-VVP solutions. To convert this credential to a purely outbound authorization, replace the wildcard with <tt>send</tt>, and limit the roles in <tt>VVP</tt> to <tt>OP</tt>.)</t>
        <t>The schema for GCD credentials, and an explanation how to add additional constraints, is documented at <xref target="GCD-SCHEMA"/>.</t>
      </section>
      <section anchor="dsig-cred-sample">
        <name>Delegated signer credential</name>
        <t>A delegated signer credential (<xref format="counter" target="delegated-signer-credential"/>) must prove that the issuer is giving authority to the issuee. This authority should be carefully constrained so that it applies only to outbound voice calls, not to signing invoices or legal contracts. It can also be constrained so it only applies on a particular schedule, or when the call originates or terminates in a particular geo or jurisdiction.</t>
        <t>A Generalized Cooperative Delegation (GCD) credential embodies delegated but constrained authority in exactly this way. A GCD credential suitable for use as a delegated signer credential in VVP might look like this:</t>
        <sourcecode type="json"><![CDATA[
{
    "v": "ACDC10JSON00096c_",
    "d": "EDQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFR",
    "u": "0ADE6oAxBl4E7uKeGUb7BEYi",
    "i": "EC4SuEyzrRwu3FWFrK0Ubd9xejlo5bUwAtGcbBGUk2nL",
    "ri": "EM2YZ78SKE8eO4W1lQOJeer5xKZqLmJV7SPr3Ji5DMBZ",
    "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
    "a": {
        "d": "EPQhEk5tfXvxyKe5Hk4DG63dSgoP-F2VZrxuIeIKrT9B",
        "u": "0AC9kH8q99PTCQNteGyI-F4g",
        "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
        "dt": "2024-12-27T13:11:29.062000+00:00",
        "c_goal": ["ops.telco.send.sign"],
        "c_proto": ["VVP:OP"]
    },
    "r": {
        "d": "EFthNcTE20MLMaCOoXlSmNtdooGEbZF8uGmO5G85eMSF",
        "noRoleSemanticsWithoutGfw": "All parties agree...",
        "issuerNotResponsibleOutsideConstraints": "Although verifiers...",
        "noConstraintSansPrefix": "Issuers agree...",
        "useStdIfPossible": "Issuers agree...",
        "onlyDelegateHeldAuthority": "Issuers agree..."
    }
}
]]></sourcecode>
        <t>Note the <tt>c_goal</tt> field that limits goals that can be justified with this credential, and the <tt>c_proto</tt> field that says the delegate can only exercise this authority in the context of the "VVP" protocol with the "OP" role.</t>
        <t>The schema for GCD credentials, and an explanation how to add additional constraints, is documented at <xref target="GCD-SCHEMA"/>.</t>
      </section>
      <section anchor="dossier-1">
        <name>Dossier</name>
        <t>A dossier (<xref format="counter" target="dossier"/>) is almost all edges -- that is, links to other credentials. Here's what one might look like:</t>
        <sourcecode type="json"><![CDATA[
{
  "v": "ACDC10JSON00036f_",
  "d": "EKvpcshjgjzdCWwR4q9VnlsUwPgfWzmy9ojMpTSzNcEr",
  "i": "EIkxoE8eYnPLCydPcyc_lhQgwOdBHwzkSe36e2gqEH-5",
  "ri": "EMU5wN33VsrJKlGCwk2ts_IJi67IXE6vrYV3v9Xdxw3p",
  "s": "EFv3_L64_xNhOGQkaAHQTI-lzQYDvlaHcuZbuOTuDBXj",
  "a": {
    "d": "EJnMhz8MJxmI0epkq7D1zzP5pGTbSb2YxkSdczNfcHQM",
    "dt": "2024-12-27T13:11:41.865000+00:00"
  },
  "e": {
    "d": "EPVc2ktYnZQOwNs34lO1YXFOkT51lzaILFEMXNfZbGrh",
    "vetting": {
      "n": "EIpaOx1NJc0N_Oj5xzWhFQp6EpB847yTex62xQ7uuSQL",
      "s": "ENPXp1vQzRF6JwIuS-mp2U8Uf1MoADoP_GqQ62VsDZWY",
      "o": "NI2I"
    },
    "alloc": {
      "n": "EEeg55Yr01gDyCScFUaE2QgzC7IOjQRpX2sTckFZp1RP",
      "s": "EFvnoHDY7I-kaBBeKlbDbkjG4BaI0nKLGadxBdjMGgSQ",
      "o": "I2I"
    },
    "brand": {
      "n": "EKSZT4yTtsZ2AqriNKBvS7GjmsU3X1t-S3c69pHceIXW",
      "s": "EaWmoHDYbkjG4BaI0nK7I-kaBBeKlbDLGadxBdSQjMGg",
      "o": "I2I"
    },
    "bproxy": {
      "n": "EWQpU3nrKyJBgUJGw5461CbWcug9BZj7WXUkKbNOlnFx",
      "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
      "o": "I2I"
    },
    "delsig": {
      "n": "EMKcp1-AvpW0PZdThjK3JCbMsXAmrqB9ONa1vZyTppQE",
      "s": "EL7irIKYJL9Io0hhKSGWI4OznhwC7qgJG5Qf4aEs6j0o",
      "o": "NI2I"
    }
  }
}
]]></sourcecode>
        <t>Notice how each named edge references one of the previous sample credentials in its <tt>n</tt> field, and that other credential's associated schema in the <tt>s</tt> field.</t>
        <t>The schema for this credential is documented at <xref target="DOSSIER-SCHEMA"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This specification requires no IANA actions. However, it does depend on OOBIs (see <xref format="counter" target="aid"/>) being served as web resources with IANA content type <tt>application/json+cesr</tt>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
            <author fullname="A. Johnston" initials="A." surname="Johnston"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Schooler" initials="E." surname="Schooler"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC5626">
          <front>
            <title>Managing Client-Initiated Connections in the Session Initiation Protocol (SIP)</title>
            <author fullname="C. Jennings" initials="C." role="editor" surname="Jennings"/>
            <author fullname="R. Mahy" initials="R." role="editor" surname="Mahy"/>
            <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>The Session Initiation Protocol (SIP) allows proxy servers to initiate TCP connections or to send asynchronous UDP datagrams to User Agents in order to deliver requests. However, in a large number of real deployments, many practical considerations, such as the existence of firewalls and Network Address Translators (NATs) or the use of TLS with server-provided certificates, prevent servers from connecting to User Agents in this way. This specification defines behaviors for User Agents, registrars, and proxy servers that allow requests to be delivered on existing connections established by the User Agent. It also defines keep-alive behaviors needed to keep NAT bindings open and specifies the usage of multiple connections from the User Agent to its registrar. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5626"/>
          <seriesInfo name="DOI" value="10.17487/RFC5626"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8224">
          <front>
            <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
              <t>This document obsoletes RFC 4474.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8224"/>
          <seriesInfo name="DOI" value="10.17487/RFC8224"/>
        </reference>
        <reference anchor="RFC8225">
          <front>
            <title>PASSporT: Personal Assertion Token</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8225"/>
          <seriesInfo name="DOI" value="10.17487/RFC8225"/>
        </reference>
        <reference anchor="FIPS186-4" target="https://doi.org/10.6028/NIST.FIPS.186-4">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2013" month="July"/>
          </front>
        </reference>
        <reference anchor="TOIP-CESR" target="https://trustoverip.github.io/tswg-cesr-specification/">
          <front>
            <title>Composable Event Streaming Representation (CESR)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TOIP-KERI" target="https://trustoverip.github.io/tswg-keri-specification/">
          <front>
            <title>Key Event Receipt Infrastructure (KERI)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="TOIP-ACDC" target="https://trustoverip.github.io/tswg-acdc-specification/">
          <front>
            <title>Authentic Chained Data Containers (ACDC)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="ISO-17442-1" target="https://www.iso.org/standard/78829.html">
          <front>
            <title>Financial services – Legal entity identifier (LEI) – Part 1: Assignment</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="ISO-17442-3" target="https://www.iso.org/standard/85628.html">
          <front>
            <title>inancial services – Legal entity identifier (LEI) – Part 3: Verifiable LEIs (vLEIs)</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="ATIS-1000074" target="https://atis.org/resources/signature-based-handling-of-asserted-information-using-tokens-shaken-atis-1000074-e/">
          <front>
            <title>Signature-Based Handling of Asserted Information Using toKENs (SHAKEN)</title>
            <author>
              <organization>Alliance for Telecommunications Industry Solutions</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8226">
          <front>
            <title>Secure Telephone Identity Credentials: Certificates</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8226"/>
          <seriesInfo name="DOI" value="10.17487/RFC8226"/>
        </reference>
        <reference anchor="RFC8588">
          <front>
            <title>Personal Assertion Token (PaSSporT) Extension for Signature-based Handling of Asserted information using toKENs (SHAKEN)</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="M. Barnes" initials="M." surname="Barnes"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document extends the Personal Assertion Token (PASSporT), which is a token object that conveys cryptographically signed information about the participants involved in communications. The extension is defined based on the "Signature-based Handling of Asserted information using toKENs (SHAKEN)" specification by the ATIS/SIP Forum IP-NNI Task Group. It provides both (1) a specific set of levels of confidence in the correctness of the originating identity of a call originated in a SIP-based telephone network as well as (2) an identifier that allows the Service Provider (SP) to uniquely identify the origin of the call within its network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8588"/>
          <seriesInfo name="DOI" value="10.17487/RFC8588"/>
        </reference>
        <reference anchor="RFC6350">
          <front>
            <title>vCard Format Specification</title>
            <author fullname="S. Perreault" initials="S." surname="Perreault"/>
            <date month="August" year="2011"/>
            <abstract>
              <t>This document defines the vCard data format for representing and exchanging a variety of information about individuals and other entities (e.g., formatted and structured name and delivery addresses, email address, multiple telephone numbers, photograph, logo, audio clips, etc.). This document obsoletes RFCs 2425, 2426, and 4770, and updates RFC 2739. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6350"/>
          <seriesInfo name="DOI" value="10.17487/RFC6350"/>
        </reference>
        <reference anchor="RFC7095">
          <front>
            <title>jCard: The JSON Format for vCard</title>
            <author fullname="P. Kewisch" initials="P." surname="Kewisch"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This specification defines "jCard", a JSON format for vCard data. The vCard data format is a text format for representing and exchanging information about individuals and other entities, for example, telephone numbers, email addresses, structured names, and delivery addresses. JSON is a lightweight, text-based, language- independent data interchange format commonly used in Internet applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7095"/>
          <seriesInfo name="DOI" value="10.17487/RFC7095"/>
        </reference>
        <reference anchor="VCON-DRAFT">
          <front>
            <title>The JSON format for vCon - Conversation Data Container</title>
            <author fullname="Daniel Petrie" initials="D." surname="Petrie">
              <organization>SIPez LLC</organization>
            </author>
            <author fullname="Thomas McCarthy-Howe" initials="T." surname="McCarthy-Howe">
              <organization>Strolid</organization>
            </author>
            <date day="19" month="March" year="2025"/>
            <abstract>
              <t>   A vCon is the container for data and information relating to a real-
   time, human conversation.  It is analogous to a [vCard] which enables
   the definition, interchange and storage of an individual's various
   points of contact.  The data contained in a vCon may be derived from
   any multimedia session, traditional phone call, video conference, SMS
   or MMS message exchange, webchat or email thread.  The data in the
   container relating to the conversation may include Call Detail
   Records (CDR), call meta data, participant identity information (e.g.
   STIR PASSporT), the actual conversational data exchanged (e.g. audio,
   video, text), realtime or post conversational analysis and
   attachments of files exchanged during the conversation.  A
   standardized conversation container enables many applications,
   establishes a common method of storage and interchange, and supports
   identity, privacy and security efforts (see [vCon-white-paper])

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-vcon-vcon-container-03"/>
        </reference>
        <reference anchor="GSMA-RCS" target="https://www.gsma.com/solutions-and-impact/technologies/networks/wp-content/uploads/2019/10/RCC.07-v11.0.pdf">
          <front>
            <title>Rich Communication Suite - Advanced Communications Services and Client Specification, version 11.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="RCD-DRAFT">
          <front>
            <title>SIP Call-Info Parameters for Rich Call Data</title>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos</organization>
            </author>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>Neustar</organization>
            </author>
            <date day="17" month="March" year="2025"/>
            <abstract>
              <t>   This document describes a usage of the SIP Call-Info header field
   that incorporates Rich Call Data (RCD) associated with the identity
   of the calling party in order to provide to the called party a
   description of the caller or details about the reason for the call.
   RCD includes information about the caller beyond the telephone number
   such as a calling name, or a logo, photo, or jCard object
   representing the caller, which can help the called party decide
   whether to answer the phone.  The elements defined for this purpose
   are intended to be extensible in order to accommodate related
   information about calls and to be compatible and complementary with
   the STIR/PASSporT RCD framework.

   This document defines three new parameters 'call-reason', 'verified',
   and 'integrity' for the SIP Call-Info header field and also a new
   token ("jcard") for the 'purpose' parameter of the Call-Info header
   field.  It also provides guidance on the use of the Call-Info
   'purpose' parameter token, "icon".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sipcore-callinfo-rcd-16"/>
        </reference>
        <reference anchor="RCD-PASSPORT">
          <front>
            <title>PASSporT Extension for Rich Call Data</title>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos Inc.</organization>
            </author>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>Neustar Inc.</organization>
            </author>
            <date day="5" month="June" year="2023"/>
            <abstract>
              <t>   This document extends PASSporT, a token for conveying
   cryptographically-signed call information about personal
   communications, to include rich meta-data about a call and caller
   that can be signed and integrity protected, transmitted, and
   subsequently rendered to the called party.  This framework is
   intended to include and extend caller and call specific information
   beyond human-readable display name comparable to the "Caller ID"
   function common on the telephone network and is also enhanced with a
   integrity mechanism that is designed to protect the authoring and
   transport of this information for different authoritative use-cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-stir-passport-rcd-26"/>
        </reference>
        <reference anchor="SD-JWT-DRAFT">
          <front>
            <title>Selective Disclosure for JWTs (SD-JWT)</title>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete</organization>
            </author>
            <author fullname="Kristina Yasuda" initials="K." surname="Yasuda">
              <organization>Keio University</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="1" month="March" year="2025"/>
            <abstract>
              <t>   This specification defines a mechanism for the selective disclosure
   of individual elements of a JSON-encoded data structure used as the
   payload of a JSON Web Signature (JWS).  The primary use case is the
   selective disclosure of JSON Web Token (JWT) claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-selective-disclosure-jwt-17"/>
        </reference>
        <reference anchor="CTIA-BCID" target="https://api.ctia.org/wp-content/uploads/2022/11/Branded-Calling-Best-Practices.pdf">
          <front>
            <title>Branded Calling ID Best Practices</title>
            <author>
              <organization>CTIA</organization>
            </author>
            <date year="2022" month="November"/>
          </front>
        </reference>
        <reference anchor="W3C-DID" target="https://www.w3.org/TR/2022/REC-did-core-20220719/">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author fullname="Amy Guy" role="editor"/>
            <author fullname="Drummond Reed" role="editor"/>
            <author fullname="Manu Sporny" role="editor"/>
            <author fullname="Markus Sabadello" role="editor"/>
            <date day="19" month="July" year="2022"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-did-core-20220719"/>
          <seriesInfo name="W3C" value="REC-did-core-20220719"/>
        </reference>
        <reference anchor="W3C-VC" target="https://www.w3.org/TR/2022/REC-vc-data-model-20220303/">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author fullname="Brent Zundel" role="editor"/>
            <author fullname="Daniel Burnett" role="editor"/>
            <author fullname="Dave Longley" role="editor"/>
            <author fullname="Grant Noble" role="editor"/>
            <author fullname="Kyle Den Hartog" role="editor"/>
            <author fullname="Manu Sporny" role="editor"/>
            <date day="3" month="March" year="2022"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-vc-data-model-20220303"/>
          <seriesInfo name="W3C" value="REC-vc-data-model-20220303"/>
        </reference>
        <reference anchor="ARIES-RFC-0519" target="https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0519-goal-codes/README.md">
          <front>
            <title>Aries RFC 0519: Goal Codes</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="JSON-SCHEMA" target="https://json-schema.org/specification">
          <front>
            <title>JSON Schema Specification 2020-12</title>
            <author>
              <organization>JSON Schema Community</organization>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="LE-VLEI-SCHEMA" target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/legal-entity-vLEI-credential.json">
          <front>
            <title>Legal Entity vLEI Credential</title>
            <author>
              <organization>GLEIF</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TN-ALLOC-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/tn-alloc/tn-alloc.schema.json">
          <front>
            <title>TN Allocation Credential</title>
            <author>
              <organization>Provenant</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="PERSONHOOD-CRED" target="https://arxiv.org/pdf/2408.07892">
          <front>
            <title>Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online</title>
            <author initials="S." surname="Adler" fullname="Steven Adler">
              <organization/>
            </author>
            <author initials="Z." surname="Hitzig" fullname="Zoë Hitzig">
              <organization/>
            </author>
            <author initials="S." surname="Jain" fullname="Shrey Jain">
              <organization/>
            </author>
            <author initials="C." surname="Brewer" fullname="Catherine Brewer">
              <organization/>
            </author>
            <author initials="W." surname="Chang" fullname="Wayne Chang">
              <organization/>
            </author>
            <author initials="R." surname="DiResta" fullname="Renée DiResta">
              <organization/>
            </author>
            <author initials="E." surname="Lazzarin" fullname="Eddy Lazzarin">
              <organization/>
            </author>
            <author initials="S." surname="McGregor" fullname="Sean McGregor">
              <organization/>
            </author>
            <author initials="W." surname="Seltzer" fullname="Wendy Seltzer">
              <organization/>
            </author>
            <author initials="D." surname="Siddarth" fullname="Divya Siddarth">
              <organization/>
            </author>
            <author initials="N." surname="Soliman" fullname="Nouran Soliman">
              <organization/>
            </author>
            <author initials="T." surname="South" fullname="Tobin South">
              <organization/>
            </author>
            <author initials="C." surname="Spelliscy" fullname="Connor Spelliscy">
              <organization/>
            </author>
            <author initials="M." surname="Sporny" fullname="Manu Sporny">
              <organization/>
            </author>
            <author initials="V." surname="Srivastava" fullname="Varya Srivastava">
              <organization/>
            </author>
            <author initials="J." surname="Bailey" fullname="John Bailey">
              <organization/>
            </author>
            <author initials="B." surname="Christian" fullname="Brian Christian">
              <organization/>
            </author>
            <author initials="A." surname="Critch" fullname="Andrew Critch">
              <organization/>
            </author>
            <author initials="R." surname="Falcon" fullname="Ronnie Falcon">
              <organization/>
            </author>
            <author initials="H." surname="Flanagan" fullname="Heather Flanagan">
              <organization/>
            </author>
            <author initials="K. H." surname="Duffy" fullname="Kim Hamilton Duffy">
              <organization/>
            </author>
            <author initials="E." surname="Ho" fullname="Eric Ho">
              <organization/>
            </author>
            <author initials="C. R." surname="Leibowicz" fullname="Claire R. Leibowicz">
              <organization/>
            </author>
            <author initials="S." surname="Nadhamuni" fullname="Srikanth Nadhamuni">
              <organization/>
            </author>
            <author initials="A. Z." surname="Rozenshtein" fullname="Alan Z. Rozenshtein">
              <organization/>
            </author>
            <author initials="D." surname="Schnurr" fullname="David Schnurr">
              <organization/>
            </author>
            <author initials="E." surname="Shapiro" fullname="Evan Shapiro">
              <organization/>
            </author>
            <author initials="L." surname="Strahm" fullname="Lacey Strahm">
              <organization/>
            </author>
            <author initials="A." surname="Trask" fullname="Andrew Trask">
              <organization/>
            </author>
            <author initials="Z." surname="Weinberg" fullname="Zoe Weinberg">
              <organization/>
            </author>
            <author initials="C." surname="Whitney" fullname="Cedric Whitney">
              <organization/>
            </author>
            <author initials="T." surname="Zick" fullname="Tom Zick">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="F2F-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/face-to-face/index.md">
          <front>
            <title>Face-to-Face Credentials</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="CITATION-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/citation/index.md">
          <front>
            <title>Citation Schema</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="GCD-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/gcd/index.md">
          <front>
            <title>Generalized Cooperative Delegation (GCD) Credentials</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="DOSSIER-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/vvp-dossier/vvp-dossier.schema.json">
          <front>
            <title>Verifiable Voice Dossier</title>
            <author initials="A." surname="Singh" fullname="Arshdeep Singh">
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1389?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much of the cybersecurity infrastructure used by VVP depends on KERI, which was invented by Sam Smith, and first implemented by Sam plus Phil Fairheller, Kevin Griffin, and other technical staff at GLEIF. Thanks to logistical support from Trust Over IP and the Linux Foundation, and to a diverse community of technical experts in those communities and in the Web of Trust group.</t>
      <t>Techniques that apply KERI to telco use cases were developed by Daniel Hardman, Randy Warshaw, and Ruth Choueka, with additional contributions from Dmitrii Tychinin, Yaroslav Lazarev, Arshdeep Singh, and many other staff members at Provenant, Inc. Thanks as well to Ed Eykholt for multiple editorial improvements.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
