<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-steele-spice-cta-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title>Credential Type Assertions</title>
    <seriesInfo name="Internet-Draft" value="draft-steele-spice-cta-00"/>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <date year="2024" month="June" day="09"/>
    <area>Security</area>
    <workgroup>Secure Patterns for Internet CrEdentials</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 43?>

<t>Requirements for physical supply chain credentials are subject to frequent changes due to regulatory, logistic and market pressures.
Preventing fraud and counterfeiting requires strong cryptographic assurance and binding to identities for people, organizations, vehicles and devices.
New information regarding a credential subject needs to be conveyed by holders to verifier, after credential issuance.
This specification describes the role of credential types or schemas in supporting changing requirements and realtime information regarding digital credentials.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://OR13.github.io/draft-steele-spice-cta/draft-steele-spice-cta.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-steele-spice-cta/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/OR13/draft-steele-spice-cta"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Requirements for physical supply chain credentials are subject to frequent changes due to regulatory, logistic and market pressures.
Preventing fraud and counterfeiting requires strong cryptographic assurance and binding to identities for people, organizations, vehicles and devices.
New information regarding a credential subject needs to be conveyed by holders to verifier, after credential issuance.
This specification describes the role of credential types or schemas in supporting changing requirements and realtime information regarding digital credentials.</t>
      <t>When products in a physical supply chain are produced, it is common for certain required information to become available over time, sometimes as a result or tranformation processes which can be performed in different locations.</t>
      <t>When creating a digital twin or product passport for a marketable product, the issuer needs to balance the need to create identifiers as soon as possible, so that claims can be associated to them, with the need to wait for sufficient claims to be available to justify a credential issuance.</t>
      <t>A credential type or credential schema, is a set of mandatory and optional data elements, and is often based on a paper document such as a government form, or an evaluation or test performed by a trusted third party.</t>
      <t>When specifying digital representation of product information, it is common to encounter data elements which are "required when present", but which do not become present for some time after credential issuance.</t>
      <t>For example, when producing steel products, the chemical composition of steel is determined at the location and time when the steel is still in liquid form.
However, mechanical properties, including length, weight and other dimensions as well as material properties such as tensile strength become available later as the raw product is further refined on its journey to the end customer.
In particular, attributes such as protective coatings or finishing details which can impact weight and price may only be available shortly after the product is purchased.
These attributes are critical to intermediate supply chain parties, such as logistics providers, who need to load and unload product from vessels or vehicles.
Accurate information regarding dimensions and weight is critical to estimating fuel costs, and enabling advanced models of supply chain activity based on realtime digital twins.</t>
      <t>In some cases, flaws in a batch of products are discovered only after transport has begun, and downstream supply chain partners need access to the latest information regarding a product in order to comply with regulatory or business policies.</t>
      <t>Traditionally these challenges have been solved for with combinations of the following recommendations:</t>
      <ul spacing="normal">
        <li>
          <t>Issue small credentials linked together with a common identifier</t>
        </li>
        <li>
          <t>Enable the latest revocation, suspension or other status information to be retrieved in realtime</t>
        </li>
        <li>
          <t>Use credential types or schemas to distinguish credentials with different required fields</t>
        </li>
        <li>
          <t>Use a confirmation method to selectively disclosed attributes to a single credential</t>
        </li>
      </ul>
      <t>Depending on the nature of the new information associated to a credential, these approaches can be difficult to implement, consume needless resources such as CPU, memory or network bandwidth, or reveal confidential supply chain metadata such as location information associated with a credential verification.</t>
      <t>This document proposes a simple profile for JOSE and COSE based credentials, enabling simple, secure and efficient realtime digital twins.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses many terms common to the digital credential ecosystem and the OAUTH, SCITT, SPICE, JOSE and COSE working groups.</t>
      <dl>
        <dt>Media Type:</dt>
        <dd>
          <t>JWT and CWT credential formats support the use of media types to identify the claimset (cty) and the entire secured object (typ). This specification relates these media type extension points to other application specific extension points such as verifiable credential type (vct).</t>
        </dd>
        <dt>Credential ID:</dt>
        <dd>
          <t>CWT ID (CTI) and JWT ID (JTI) as defined in Section 3.1.7 of <xref target="RFC8392"/>, are used to identify a digital credential represented as a token.</t>
        </dd>
        <dt>Credential Type:</dt>
        <dd>
          <t>Section 3.2.2.1.1 of <xref target="I-D.draft-ietf-oauth-sd-jwt-vc"/> and Section TBD of <xref target="I-D.draft-prorock-spice-cose-sd-cwt"/> describe a stringOrURI based identifier for distinguishing required or optional JWT or CWT claims.</t>
        </dd>
        <dt>Credential Schema:</dt>
        <dd>
          <t><eref target="https://w3c.github.io/vc-data-model/#data-schemas">Verifiable Credentials Data Model v2.0</eref> describes solutions for validating instances of a JSON data model. This specification generalizes this approach to support validating instances of JWT or CWT claimsets similar to the approach taken in <xref target="I-D.draft-ietf-rats-eat"/>, by relating the use of schema languages to the vct claim in JWT or CWT.</t>
        </dd>
        <dt>Credential Assertions:</dt>
        <dd>
          <t><xref target="I-D.draft-demarco-oauth-status-attestations"/> describes a mechanism whereby a holder can retrieve updated credential state from an issuer, and present it to a verifier.</t>
        </dd>
        <dt>Credential Status Lists:</dt>
        <dd>
          <t><xref target="I-D.draft-ietf-oauth-status-list"/> describes a mechanism whereby a verifier can retrieve updated credential states for a list of credentials from an issuer.</t>
        </dd>
      </dl>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>This section describes how supply chain event driven architectures can be mapped to high level digital credential workflows to support digital twin ecosystems.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="584" viewBox="0 0 584 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
            <path d="M 8,128 L 8,192" fill="none" stroke="black"/>
            <path d="M 56,80 L 56,120" fill="none" stroke="black"/>
            <path d="M 88,32 L 88,80" fill="none" stroke="black"/>
            <path d="M 112,128 L 112,192" fill="none" stroke="black"/>
            <path d="M 136,32 L 136,80" fill="none" stroke="black"/>
            <path d="M 144,128 L 144,192" fill="none" stroke="black"/>
            <path d="M 192,80 L 192,120" fill="none" stroke="black"/>
            <path d="M 248,32 L 248,80" fill="none" stroke="black"/>
            <path d="M 248,128 L 248,192" fill="none" stroke="black"/>
            <path d="M 296,32 L 296,80" fill="none" stroke="black"/>
            <path d="M 296,128 L 296,192" fill="none" stroke="black"/>
            <path d="M 360,80 L 360,120" fill="none" stroke="black"/>
            <path d="M 408,32 L 408,80" fill="none" stroke="black"/>
            <path d="M 424,128 L 424,192" fill="none" stroke="black"/>
            <path d="M 456,32 L 456,80" fill="none" stroke="black"/>
            <path d="M 456,128 L 456,192" fill="none" stroke="black"/>
            <path d="M 520,80 L 520,120" fill="none" stroke="black"/>
            <path d="M 576,32 L 576,80" fill="none" stroke="black"/>
            <path d="M 576,128 L 576,192" fill="none" stroke="black"/>
            <path d="M 8,32 L 88,32" fill="none" stroke="black"/>
            <path d="M 136,32 L 248,32" fill="none" stroke="black"/>
            <path d="M 296,32 L 408,32" fill="none" stroke="black"/>
            <path d="M 456,32 L 576,32" fill="none" stroke="black"/>
            <path d="M 8,80 L 88,80" fill="none" stroke="black"/>
            <path d="M 136,80 L 248,80" fill="none" stroke="black"/>
            <path d="M 296,80 L 408,80" fill="none" stroke="black"/>
            <path d="M 456,80 L 576,80" fill="none" stroke="black"/>
            <path d="M 8,128 L 112,128" fill="none" stroke="black"/>
            <path d="M 144,128 L 248,128" fill="none" stroke="black"/>
            <path d="M 296,128 L 424,128" fill="none" stroke="black"/>
            <path d="M 456,128 L 576,128" fill="none" stroke="black"/>
            <path d="M 8,192 L 112,192" fill="none" stroke="black"/>
            <path d="M 144,192 L 248,192" fill="none" stroke="black"/>
            <path d="M 296,192 L 424,192" fill="none" stroke="black"/>
            <path d="M 456,192 L 576,192" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="528,120 516,114.4 516,125.6" fill="black" transform="rotate(90,520,120)"/>
            <polygon class="arrowhead" points="368,120 356,114.4 356,125.6" fill="black" transform="rotate(90,360,120)"/>
            <polygon class="arrowhead" points="200,120 188,114.4 188,125.6" fill="black" transform="rotate(90,192,120)"/>
            <polygon class="arrowhead" points="64,120 52,114.4 52,125.6" fill="black" transform="rotate(90,56,120)"/>
            <g class="text">
              <text x="112" y="36">...</text>
              <text x="272" y="36">...</text>
              <text x="432" y="36">...</text>
              <text x="48" y="52">Product</text>
              <text x="176" y="52">Product</text>
              <text x="344" y="52">Product</text>
              <text x="520" y="52">Regulations</text>
              <text x="48" y="68">Created</text>
              <text x="192" y="68">Transformed</text>
              <text x="356" y="68">Transfered</text>
              <text x="504" y="68">Updated</text>
              <text x="60" y="148">Credential</text>
              <text x="196" y="148">Credential</text>
              <text x="356" y="148">Credential</text>
              <text x="516" y="148">Credential</text>
              <text x="60" y="164">Identifier</text>
              <text x="180" y="164">Claims</text>
              <text x="364" y="164">Confirmation</text>
              <text x="500" y="164">Schema</text>
              <text x="48" y="180">Created</text>
              <text x="176" y="180">Added</text>
              <text x="344" y="180">Updated</text>
              <text x="504" y="180">Updated</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
+---------+ ... +-------------+ ... +-------------+ ... +--------------+
| Product |     | Product     |     |  Product    |     |  Regulations |
| Created |     | Transformed |     |  Transfered |     |  Updated     |
+-----+---+     +------+------+     +-------+-----+     +-------+------+
      |                |                    |                   |
      v                v                    v                   v
+-----+------+   +-----+------+     +-------+-------+   +-------+------+
| Credential |   | Credential |     |  Credential   |   |  Credential  |
| Identifier |   | Claims     |     |  Confirmation |   |  Schema      |
| Created    |   | Added      |     |  Updated      |   |  Updated     |
+------------+   +------------+     +---------------+   +--------------+

]]></artwork>
      </artset>
      <t>Although the figure above suggests a linear ordering of events, complex supply chains also known as value networks often combine component products into higher order products over time with events arriving out of order or for products which are not yet known to the stakeholder.</t>
      <t>Regulations and therefor credential types requirements can change after or during a product custody transfers, making responsibility for compliance difficult.
When requirements change, or in certain policy situations, additional information might be required from one or more supply chain actors, for example a border agent might request specific information from the original manufacturer and the logistics providers that are partnered to transport products.</t>
      <t>Businesses account for these changes today through a combination of messages exchanged over email or through proprietary digital document management systems.</t>
      <t>As workflows for producing physical or digital products embrace transparency, traceability and security enabled by digital credentials, using the correct extension points at the the correct time becomes essential to reducing data duplication, and improving speed and security.</t>
      <t>The following sections cover guidance for when to use specific extension points which are available to profiles built on JOSE and COSE credential formats.</t>
    </section>
    <section anchor="entity-identifiers">
      <name>Entity Identifiers</name>
      <t>It is important to distinguish subject entity identifiers (<tt>sub</tt> or <tt>iss</tt>) for a product, organization or device, from credential identifiers such as <tt>cti</tt> or <tt>jti</tt>.
Credential identifiers are used to name a set of secured claims about a subject.
Consider that in the future, a supply chain party may wish to aggregate all credentials associated with a product identifier such as serial number, including multiple credentials from the same or different issuers.
In these cases, the subject identifer can be considered as a primary key for the product, and the credential id can be considered as a foreign key for a table with columns representing the claims available for the token type (typ) and then finally the credential type (vct).</t>
      <t>For example:</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="368" width="568" viewBox="0 0 568 368" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,48 L 8,96" fill="none" stroke="black"/>
            <path d="M 8,288 L 8,336" fill="none" stroke="black"/>
            <path d="M 88,96 L 88,192" fill="none" stroke="black"/>
            <path d="M 168,160 L 168,240" fill="none" stroke="black"/>
            <path d="M 192,288 L 192,336" fill="none" stroke="black"/>
            <path d="M 200,48 L 200,96" fill="none" stroke="black"/>
            <path d="M 248,48 L 248,96" fill="none" stroke="black"/>
            <path d="M 264,240 L 264,320" fill="none" stroke="black"/>
            <path d="M 352,160 L 352,240" fill="none" stroke="black"/>
            <path d="M 416,96 L 416,208" fill="none" stroke="black"/>
            <path d="M 560,48 L 560,96" fill="none" stroke="black"/>
            <path d="M 8,48 L 200,48" fill="none" stroke="black"/>
            <path d="M 248,48 L 560,48" fill="none" stroke="black"/>
            <path d="M 8,96 L 200,96" fill="none" stroke="black"/>
            <path d="M 248,96 L 560,96" fill="none" stroke="black"/>
            <path d="M 168,160 L 352,160" fill="none" stroke="black"/>
            <path d="M 88,192 L 160,192" fill="none" stroke="black"/>
            <path d="M 360,208 L 416,208" fill="none" stroke="black"/>
            <path d="M 168,240 L 352,240" fill="none" stroke="black"/>
            <path d="M 8,288 L 192,288" fill="none" stroke="black"/>
            <path d="M 200,320 L 264,320" fill="none" stroke="black"/>
            <path d="M 8,336 L 192,336" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="368,208 356,202.4 356,213.6" fill="black" transform="rotate(180,360,208)"/>
            <polygon class="arrowhead" points="208,320 196,314.4 196,325.6" fill="black" transform="rotate(180,200,320)"/>
            <polygon class="arrowhead" points="168,192 156,186.4 156,197.6" fill="black" transform="rotate(0,160,192)"/>
            <g class="text">
              <text x="24" y="36">Token</text>
              <text x="68" y="36">Type</text>
              <text x="284" y="36">Verifiable</text>
              <text x="372" y="36">Credential</text>
              <text x="436" y="36">Type</text>
              <text x="36" y="68">typ:</text>
              <text x="124" y="68">foo-passport+jwt</text>
              <text x="276" y="68">vct:</text>
              <text x="424" y="68">https://.../foo-passport/v1.2.3</text>
              <text x="40" y="84">(jti,</text>
              <text x="84" y="84">iss,</text>
              <text x="124" y="84">sub)</text>
              <text x="316" y="84">(product_name,</text>
              <text x="436" y="84">serial_number)</text>
              <text x="204" y="148">Credential</text>
              <text x="284" y="148">Instance</text>
              <text x="196" y="180">jti:</text>
              <text x="280" y="180">urn:uuid:123...</text>
              <text x="192" y="196">...</text>
              <text x="224" y="196">typ</text>
              <text x="268" y="196">claims</text>
              <text x="312" y="196">...</text>
              <text x="192" y="212">...</text>
              <text x="224" y="212">vct</text>
              <text x="268" y="212">claims</text>
              <text x="312" y="212">...</text>
              <text x="196" y="228">sub:</text>
              <text x="280" y="228">urn:uuid:456...</text>
              <text x="36" y="276">Internal</text>
              <text x="100" y="276">System</text>
              <text x="32" y="308">id:</text>
              <text x="108" y="308">0xfacade123...</text>
              <text x="36" y="324">sub:</text>
              <text x="120" y="324">urn:uuid:456...</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
Token Type                    Verifiable Credential Type
+-----------------------+     +--------------------------------------+
| typ: foo-passport+jwt |     | vct: https://.../foo-passport/v1.2.3 |
| (jti, iss, sub)       |     | (product_name, serial_number)        |
+---------+-------------+     +--------------------+-----------------+
          |                                        |
          |                                        |
          |         Credential Instance            |
          |         +----------------------+       |
          |         | jti: urn:uuid:123... |       |
          +-------->| ... typ claims ...   |       |
                    | ... vct claims ...   +<------+
                    | sub: urn:uuid:456... |
                    +-----------+----------+
                                |
Internal System                 |
+----------------------+        |
| id: 0xfacade123...   |        |
| sub: urn:uuid:456... +<-------+
+----------------------+

]]></artwork>
      </artset>
    </section>
    <section anchor="credential-token-types">
      <name>Credential &amp; Token Types</name>
      <t>Per <xref target="RFC8725"/> it is considered a best practice for both COSE and JOSE based digital credentials to distinguish types of tokens using the <tt>typ</tt> header parameter, which is used to indicate the media type of the associated token (including protected headers and signatures or ciphertexts).
As described in Section 3.2.2.1.1 of <xref target="I-D.draft-ietf-oauth-sd-jwt-vc"/> and Section TBD of <xref target="I-D.draft-prorock-spice-cose-sd-cwt"/> the type of a JWT or CWT claimset can also be constrained using the <tt>vct</tt> CWT or JWT claim.
It is recommended that both <tt>typ</tt> and <tt>vct</tt> be used when possible, and that application specific constraints which might be extended, updated or changed frequently be expressed through <tt>vct</tt>.
The specific semantics of <tt>vct</tt> have been left intentionally open to support many use cases.
A value of <tt>vct</tt> indicating <tt>https://issuer.gov.example/foo-passport/v1.2.3</tt> might be present in a credential of media type <tt>application/foo-passport+jwt</tt> and <tt>application/foo-passport+cwt</tt>.
In other words, it is recommended to not include media type parameters which using <tt>typ</tt> parameters.
When versioning is necessary, it should be performed in the context of mandatory and optional claims and communicated throught the <tt>vct</tt> property.
Although the example above includes a version identifier in the example URI, version information could be requested in other ways, including via HTTP headers.
When HTTP is used to transport credential type information it is recommended to support negotiation of the credential type requirements through the use of the Accept Header.
This enables human and machine readable requirements to be supported for each version of a digital credential.</t>
      <t>For example:</t>
      <t><tt>
GET https://issuer.gov.example/foo-passport
Accept: application/cddl or application/schema+json or text/html; charset=utf-8
</tt></t>
      <section anchor="schemas">
        <name>Schemas</name>
        <t>Schemas are another name for verifiable credential type.
Schemas constrain the expected mandatory and optional fields, and can recognize if an instance of a credential is valid according a data definition lanugage such as JSON Schema or CDDL.
Schemas can be used to convey updated requirements associated with a credential, such as new fields which are mandatory in a new version.
A new schema and associated status assertions can be conveyed using the mechanism described in <xref target="I-D.draft-demarco-oauth-status-attestations"/>.
This enables a holder of a credential to disclose the original credential with confirmation, and any new information or requirements that have changed since the original credential was issued.</t>
        <t>For example:</t>
        <t><tt>cbor-diag
/ cose-sign1 / 18([
  / protected / &lt;&lt; {
    / alg / 1  : -35 / ES384 /
    / typ / 16 : "application/sd+cwt"
    / kid /    : "https://issuer.gov.example/key-42"
  } &gt;&gt;,
  / unprotected / {
    / disclosed claims /
    / sd_claims / TBD1 : &lt;&lt;[
        [
            / salt /   h'399c641e...2aa18c1e',
            / claim /  "region",
            / value /  "ca" / California /
        ],
        [
            / salt /   h'82501bb4...6c655f32',
            / value /  "4.1.7"
        ]
    ]
    / sd_kbt    / TBD2 : &lt;&lt; [
      / protected / &lt;&lt; {
          / alg / 1 : -35 / ES384 /
          / typ / 16 : "application/kb+cwt"
      } &gt;&gt;,
      / unprotected / {},
      / payload / &lt;&lt;
        / cnonce / 39    : h'e0a156bb3f',
        / aud     / 3    : "https://verifier.example",
        / iat     / 6    : 1783000000,
        / sd_alg  / TBD4 : -16  /SHA-256/
        / sd_hash / TBD3 : h'c341bb...4a5f3f',  / hash of sd_claims  /
                                                / using sd_alg       /
      &gt;&gt;,
      / signature / h'1237af2e...6789456'
    ] &gt;&gt;
  },
  / payload / &lt;&lt;
    / iss / 1      : "https://issuer.example",
    / sub / 2      : "https://device.example",
    / vct / TBD10  : "https://issuer.gov.example/foo-passport/v1.2.3",
    / exp / 2   : 1883000000,
    / iat / 2   : 1683000000,
    / cnf / 8   : {
      / cose key / 1 : {
        / alg: ES256 /  3: 35,
        / kty: EC2   /  1: 2,
        / crv: P-256 / -1: 1,
        / x / -2: h'768ed8...8626e',
        / y / -3: h'6a48cc...fd5d5'
      }
    },
    / status / TBD8 : {
      / status assertion / TBD9 : {
        / credential hash alg / : "sha-256"
      }
    },
    / sd_alg / TBD4        : -16, / SHA-256 /
    / redacted measurements / -65537 : [
      { TBD6 : h'45dd...87af'  / redacted_element / }
    ],
    "address": {
        "country" : "us",            / United States /
        / redacted_keys / TBD5 : [
            h'adb70604...03da225b',  / redacted region /
            h'e04bdfc4...4d3d40bc'   / redacted post_code /
        ]
    }
  &gt;&gt;,
  / signature / h'3337af2e...66959614'
])
</tt></t>
        <t>The associated status assertion could convey updated measurments that the issuer was not aware of at the time they issued the associated SD-CWT.</t>
        <t>For example:</t>
        <t><tt>cbor-diag
/ cose-sign1 / 18([
  / protected / &lt;&lt; {
    / alg / 1  : -35 / ES384 /
    / typ / 16 : "application/status-assertion+cwt"
    / kid /    : "https://issuer.gov.example/key-42"
  } &gt;&gt;,
  / unprotected / {},
  / payload / &lt;&lt;
    / iss / 1   : "https://issuer.example",
    / sub / 2   : "https://device.example",
    / vct / TBD10  : "https://issuer.gov.example/foo-passport/v2.0.0",
    / exp / 2   : 1883000000,
    / iat / 2   : 1683000000,
    / credential hash / TBD : h'227a33...45975',
    / credential hash alg / TBD : "sha-256",
    / cnf / 8   : {
      / Note this must match the original confirmation method /
      / cose key / 1 : {
        / alg: ES256 /  3: 35,
        / kty: EC2   /  1: 2,
        / crv: P-256 / -1: 1,
        / x / -2: h'768ed8...8626e',
        / y / -3: h'6a48cc...fd5d5'
      }
    },
    / realtime updates for / -65548 : {
      / last location geohash / 282 : h'542aaa...66559ff'
    }
  &gt;&gt;,
  / signature / h'627aff...649596dd'
])
</tt></t>
        <t>Note that in the example above the status assertion added realtime location information which was not present in the original credential type <tt>https://issuer.gov.example/foo-passport/v1.2.3</tt>, but which is mandatory in the new credential type <tt>https://issuer.gov.example/foo-passport/v2.0.0</tt>.</t>
        <t>Status assertions allow for new schemas and new credential type mandatory properties to be added over time, without issuing fresh credentials or updating existing schemas.</t>
        <t>However, there are cases where a new credential <bcp14>MUST</bcp14> be issued, and they are covered in the next section.</t>
      </section>
    </section>
    <section anchor="confirmation">
      <name>Confirmation</name>
      <t>Confirmation methods and their associated claims are used to ensure that only the authorized holder of a credential retaining the ability to use the associated confirmation method, can present the credential and receive facilitation benefits.</t>
      <t>Confirmation is critical to prevent credential theft and forgery, but it introduces complications to supply chain workflows that might have previously relied on a bearer token or bearer documents.</t>
      <t>When custody of a product is transfered for example in relation to a bill of lading and mate receipt for an ocean liner vessel, the controller of the product credential and the associated digital twin needs to be updated.</t>
      <t>This can be accomplished through an issuance of a new credential, binding to the receiver of the product via their confirmation method, and a revocation of the previous credential to ensure the original holder is no longer able to present the proof of custody credential associated with the product shipment.</t>
      <t>There exist other registry updates which might be required to support product traceability such as notifications to shared databases or new entries in a certificate transparency system.</t>
      <t>After a new credential has been issued, the ability to provide status assertions transfers from the previous issuer, to the new issuer.</t>
      <t>It is essential that the validity period of associated credentials be aligned to the revocation and issuance process to ensure that the latest product information come from the current authoritative issuer for the product, and that the fresh status assertions be presentable by the current holder, and with the latest confirmation methods.</t>
    </section>
    <section anchor="status">
      <name>Status</name>
      <t>Status information regarding a credential can be expressed in several ways including those described in <xref target="I-D.draft-ietf-oauth-status-list"/> and <xref target="I-D.draft-demarco-oauth-status-attestations"/>.
It is important to note that while status assertions are bound to the holder of a credential thought the associated confirmation method, status list information can be aggregated across several issuers over time, and issuer's might a previous issuer's authority to communicate status information for a newly issued credential.
In these cases, credential may have 1 or more associated status lists, and a single associated status assertion.</t>
    </section>
    <section anchor="verifier-policies">
      <name>Verifier Policies</name>
      <t>Supply chain actors for who receive credential presentations decide how to interpret the associated claims presented.
In some cases, a verifier might reject presentations of a credential that did not include fresh status assertions for the latest version of a schema describing the required elements in a digital twin.
For example, if a vessel leaves a port with bill of lading version 1, and regulations change in transit, a port authority might reject presentations of bill of lading version 1 unless they are companied with an assoicated status assertion covering the required data elements associated with bill of lading version 2.
A verifier might also communicate with the holder out of band, and decide to accept the presentation of revoked or outdated credentials based on internal information of confidential evidence provided by the holder.
It can be useful, especially when crafting machine readable and enforcable verifier policies, to refer to token types <tt>typ</tt> and crendential types <tt>vct</tt> explicitly.
It can also be useful to refer to specific supported protocol versions in a machine readable way, because certain credential features are only available to specific credential protocols.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.draft-prorock-spice-cose-sd-cwt">
          <front>
            <title>Selective Disclosure CWTs (SD-CWT)</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="21" month="March" year="2024"/>
            <abstract>
              <t>   This document describes how to perform selective disclosure of claims
   withing a CBOR Web Token (CWT) [RFC8392] as well as how to create and
   verify those tokens.

   This document does not define any new cryptography.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-prorock-spice-cose-sd-cwt-00"/>
        </reference>
        <reference anchor="I-D.draft-ietf-oauth-sd-jwt-vc">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-03"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="26" month="May" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-27"/>
        </reference>
        <reference anchor="I-D.draft-demarco-oauth-status-attestations">
          <front>
            <title>OAuth Status Attestations</title>
            <author fullname="Giuseppe De Marco" initials="G." surname="De Marco">
              <organization>Dipartimento per la trasformazione digitale</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Francesco Marino" initials="F." surname="Marino">
              <organization>Istituto Poligrafico e Zecca dello Stato</organization>
            </author>
            <date day="19" month="April" year="2024"/>
            <abstract>
              <t>   Status Attestation is a signed object that demonstrates the validity
   status of a digital credential.  These attestations are periodically
   provided to holders, who can present these to Verifiers along with
   the corresponding digital credentials.  The approach outlined in this
   document makes the verifiers able to check the non-revocation of a
   digital credential without requiring to query any third-party
   entities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-demarco-oauth-status-attestations-01"/>
        </reference>
        <reference anchor="I-D.draft-ietf-oauth-status-list">
          <front>
            <title>Token Status List</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>MATTR</organization>
            </author>
            <author fullname="Paul Bastian" initials="P." surname="Bastian">
         </author>
            <author fullname="Christian Bormann" initials="C." surname="Bormann">
         </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>   This specification defines status list data structures and processing
   rules for representing the status of tokens secured by JSON Object
   Signing and Encryption (JOSE) or CBOR Object Signing and
   Encryption(COSE), such as JSON Web Tokens (JWTs), CBOR Web Tokens
   (CWTs) and ISO mdoc.  The status list token data structures
   themselves are also represented as JWTs or CWTs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-02"/>
        </reference>
      </references>
    </references>
    <?line 381?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
