<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bwbh-digital-emblem-model-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Digital Emblem Models">Conceptual Model for Digitized Emblems</title>
    <seriesInfo name="Internet-Draft" value="draft-bwbh-digital-emblem-model-00"/>
    <author initials="B." surname="Woodcock" fullname="Bill Woodcock">
      <organization>PCH</organization>
      <address>
        <email>woody@pch.net</email>
      </address>
    </author>
    <author initials="B." surname="Haberman" fullname="Brian Haberman">
      <organization>Johns Hopkins University</organization>
      <address>
        <email>brian@innovationslab.net</email>
      </address>
    </author>
    <date year="2024" month="July" day="23"/>
    <abstract>
      <?line 31?>

<t>This document describes the conceptual models of use for digial emblems.</t>
    </abstract>
  </front>
  <middle>
    <?line 34?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Digital emblems are intended to be modern counterparts to the visual 
markings which have historically been used to comply with marking 
requirements found in international law. Digital emblems provide 
mechanisms for authentication, access control, dynamic data and 
bidirectional data flows, revocation, non-repudiatability, and the 
inclusion of external data, rich media, and many other benefits which 
are difficult or impossible to convey with a rattle-can and a stencil.</t>
      <t>Although there are many different marks, applied by many different 
parties, for many different purposes, the task of marking, per se, is 
simply one of conveying information between parties. As long as a 
protocol is capable of conveying any information parties agree to use 
it for, it succeeds.  If it is too prescriptive, or tries too hard to 
anticipate and circumscribe uses, it fails.</t>
      <t>Many use-cases for digital counterparts to physical markings have been 
documented <xref target="I-D.haberman-digital-emblem-ps"/>. This document distills 
the common technological requirements of those use-cases into a single 
harmonized set of requirements; the superset of requirements which are 
common to multiple intergovernmental organizations and multiple bodies 
of international law. From this set of common requirements is derived 
a conceptual models of digital emblems.</t>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
"RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted
as described in BCP 14 <xref target="RFC2119"/><xref target="RFC8174"/> when, and only when, they appear in all capitals,
as shown here.</t>
      </section>
    </section>
    <section anchor="digital-emblems-roles-relationships">
      <name>Digital Emblems Roles &amp; Relationships</name>
      <t>An issuer creates digital emblems and cryptographically signs them.</t>
      <t>Digital emblems are bound to assets or asset classes by descriptions.</t>
      <t>Validators evaluate the digital signature which relates the issuer to the digital emblem, and the
description which binds the digital emblem to the asset, see <xref target="figrel"/>.</t>
      <figure anchor="figrel">
        <name>Digital Emblem Relationships</name>
        <artwork><![CDATA[
       +--------+
       | Issuer |
       +----+---+
            |
  Signature |<------------------+
            |                   |
       +----+----+              | +-----------+
       | Digital |   Evaluation +-| Validator |
       | Emblem  |              | +-----------+
       +----+----+              |
            |                   |
Description |<------------------+
            |
        +---+---+
        | Asset |
        +-------+

]]></artwork>
      </figure>
      <t>A distribution mechanism is used by the issuer to communicate the digital emblem to the validator.
This mechanism may be access-controlled, and may require that validators authenticate themselves in
order to gain access to an emblem.  A physical representation of a digital emblem may be used by the
issuer to direct validators to the digital emblem, or to communicate the digital emblem. Thus a
physical representation may be either a non-unique embodiment of the emblem, or it may be a signpost
directing validators to an emblem via a separate distribution mechanism.  It should be understood
neither the physical representation nor the distribution mechanism are the emblem.  The emblem is a
cryptographically signed bundle of data records associated by a common name.</t>
    </section>
    <section anchor="digital-emblem-data-model">
      <name>Digital Emblem Data Model</name>
      <t>A digital emblem consists of a bundle of records which identify the issuer, bind the record to the
marked asset, and provide a communications channel from issuer to validator which can be used to convey
Information regarding the asset and its handling which may not be presently anticipated by current
implementors. <xref target="figbind"/> illustrates the record bundles for issuers and assets. <xref target="figcomm"/> shows the
channels used to convey the information to a validator.</t>
      <figure anchor="figbind">
        <name>Issuer and Asset Bundles and Binding</name>
        <artwork><![CDATA[
    +------------------------+      +----------------------------+
    |         Issuer         |      |           Asset            |
    +------------------------+      +----------------------------+
+===| Visual representation  |======| Temporal scope of validity |===+
||  | Identification of law  |      | Spatial scope of validity  |  ||
||  | Contact information    |      | SI unit of size or weight  |  ||
||  | Handling flags         |      | WCO standard quantity      |  ||
||  | Issuer's signature     |      | ISO 4217 unit of currency  |  ||
||  | Third-party signatures |      | Names and serial numbers   |  ||
||  +------------------------+      | Distinguishing marks       |  ||
||                                  | External references        |  ||
||                                  +----------------------------+  ||
||                                                                  ||
||          Standardized digital emblem data elements               ||
||                                                                  ||
+====================================================================+

]]></artwork>
      </figure>
      <figure anchor="figcomm">
        <name>Communication channels conveying digital emblem data to validators</name>
        <artwork><![CDATA[
            --- Data at rest ----------------->
+--------+  --- Data in flight --------------->
| Issuer |  --- In-band network response ----->
+--------+  --- Passive RF transponder ------->
            --- Active RF transponder --------> +-----------+
            --- Active RF beacon -------------> | Validator |
            --- Passive optical marking ------> +-----------+
 +-------+  --- Active optical transponder ---> 
 | Asset |  --- Active optical beacon -------->
 +-------+  --- Active audio transponder ----->
            --- Active audio beacon ---------->

]]></artwork>
      </figure>
      <t>Digital emblem data bundles may be presented as part of an interactive session between issuer and
validator, as for instance in the case that the validator MUST be authenticated in real time, or
may receive variable information.  Digital emblem data bundles may also be presented as static data
or unidirectional data flows, which may facilitate offline validation.  Digital emblems should be
agnostic as to the mode by which they are communicated to validators, but implementors may wish to
consider methods which encompass both interactive and offline validation, transmission of the whole
digital emblem data bundles or redirective links to them, and should prefer, wherever possible, to
implement digital emblems above already-standardized lower-level transmission protocols, without
requiring exceptions or revisions to those protocols to accommodate digital emblem payloads. A number
of the anticipated possible distribution mechanisms are noted in the diagram above.</t>
    </section>
    <section anchor="digital-emblem-functional-requirements">
      <name>Digital Emblem Functional Requirements</name>
      <section anchor="goals-and-non-goals">
        <name>Goals and Non-goals</name>
        <ul spacing="normal">
          <li>
            <t>It MUST be possible to bind a digital emblem to a person, place, thing, digital data at rest, digital data in transit, or an online service (collectively referred to as assets).</t>
          </li>
          <li>
            <t>Putting aside any legal or regulatory restrictions, any entity MAY issue a digital emblem under their own authority and imprimatur without the approval or participation of any other party.</t>
          </li>
          <li>
            <t>Non-goal: The binding of assets and emblems will always be fraught, and markings of any kind MAY be replicated outside the control or intention of a their original author. No protocol can limit the actions of people in the physical world, and thus this protocol focuses on improving the communication channel which allows validators to determine the authenticity of the original emblem (not of a physical representation of the emblem) and the information needed to determine the authenticity of the binding.</t>
          </li>
        </ul>
      </section>
      <section anchor="issuance">
        <name>Issuance</name>
        <ul spacing="normal">
          <li>
            <t>A digital emblem consists of a set of one or more data elements united by a common label.</t>
          </li>
          <li>
            <t>It SHOULD be possible for a single uniquely-named digital emblem to incorporate data elements which are also used in other digital emblems issued by the same issuer, or other digital emblems issued by other issuers.</t>
          </li>
          <li>
            <t>It SHOULD be possible to organize digital emblems in a hierarchical namespace, in which each node of the namespace MAY contain a bundle of records representing a single digital emblem.</t>
          </li>
          <li>
            <t>It MUST be possible for parties controlling portions of the hierarchical namespace to receive delegations of that space from others above them in the hierarchy, and to perform delegations to others who are then by definition below them in the hierarchy.</t>
          </li>
          <li>
            <t>Any hierarchy of cryptographic signatures used to authenticate digital emblems SHOULD be one and the same as the hierarchy of the namespace.</t>
          </li>
          <li>
            <t>Issuers MUST be free to compose digital emblem of the elements which best fit their uses. No element type SHOULD be a required member of the set.
&lt;!---</t>
          </li>
          <li>
            <t>A digital emblem MUST be capable of displaying a visual representation of any physical emblem which it supplements or replaces. This MUST be in scalable vector format. The preferred aspect-ratio is between 1:1 and 2:1, but MUST NOT exceed 3:1 or 1:3.  The emblem MAY be presented in two versions, one for display against a light background, the other for display against a dark background.  The emblem MUST utilize a transparent background, if it is not a contiguous convex rectangle of the same extent as the file. The emblem MAY utilize variable transparency, and implementations which display it MUST support display of variable transparency.  The visual representation MUST be entirely self-contained, and may not contain any external references, such as to Internet-hosted webfonts or linked URLs.  All current embodiments are anticipated to be static visual images, without animation or sound. While it SHOULD generally be possible to include digital emblem elements from other areas of the digital emblem hierarchy, visual representations MAY only be used within their own cone, or cones linked by an outbound intra-organizational Digital Emblem Peer (DEP) signature. For example, the United Nations logotype might be included as a visual representation within any digital embem in any cone which the UN has signed with an intra-organizational DEP, but may not be used within the cone of CopyCatCo.
---&gt;</t>
          </li>
          <li>
            <t>A visual representation SHOULD be included in any digital emblem bundle which the issuer has reason to believe may be viewed by a human. If a visual representation is included it MUST be in scalable vector format.</t>
          </li>
          <li>
            <t>It SHOULD be possible to use a redirection to include-by-reference a bundle of records under a different namespace node, in order to allow for the use of common sets without duplicating them (and keeping them synchronized when updated) to different parts of the hierarchy.  If the redirections contain language codes, this MAY also be a way to allow good localization support without cluttering the top level of the digital emblem.  It could contain these redirectors, for different language-codes, which would expand into the set of records supporting that language.  If someone doesn't speak Turkish, they could ignore all the redirects that were Turkish-language-specific.</t>
          </li>
          <li>
            <t>It SHOULD be possible for an issuer to authenticate potential validators, and respond with different digital emblem data, or no data, depending upon the identity of the validator.</t>
          </li>
          <li>
            <t>It SHOULD be possible for an issuer to specify periods of validity for digital emblems (TTL) and the cryptographic signatures over them, independently of the period of validity of the subject of the digital emblem. For example, it SHOULD be possible to issue a digital emblem which is signed with a key which has a validity period which extends one year into the future and one year in the past, indicating that an asset SHOULD arrive at its destination five days from now, and it SHOULD be possible to mark that digital emblem as cacheable by validators for a period of one day.</t>
          </li>
          <li>
            <t>Issuers SHOULD have the option to make downward delegations within the hierarchical namespace within their control subject to discovery by validators or not subject to discovery, at their option. Upward walking of the hierarchy SHOULD always be available to any validator.</t>
          </li>
        </ul>
      </section>
      <section anchor="validation-and-display">
        <name>Validation and Display</name>
        <ul spacing="normal">
          <li>
            <t>It SHOULD be possible for a validator and an issuer to conduct a cryptographically private conversation, such that third parties are not able to easily discern what asset the query regards, nor what answer is returned.
&lt;!---</t>
          </li>
          <li>
            <t>Verifier implementations MUST display the visual emblem first, followed by the name of the emblem, followed by a textual description with hyperlinks to the bodies of protective law, followed by the content protected by the emblem.  This ordering MAY be temporal, or spatially top-to-bottom, in the direction of text reading, or front-to-back, in order of preference.  The emblem is not a license, and implementations MUST NOT require user interaction to proceed through these steps, except as MAY normally be needed to "scroll through" or read content.  The emblem SHOULD be distinguished from the content it protects, without requiring any modal interaction on the part of the user.
---&gt;</t>
          </li>
          <li>
            <t>Verifier implementations MUST display the visual representation if it is included in the digital emblem bundle.</t>
          </li>
          <li>
            <t>All text within digital emblems SHOULD be rendered in its native script, and common transliterations MAY also be provided, all identified by ISO 639 language code and Unicode script identifier. The native script version SHOULD always take precedence but validators MAY, at the user’s option, display only appropriate transliterations, if they exist.</t>
          </li>
          <li>
            <t>It SHOULD be possible to determine authoritatively whether a digital emblem is associated with an IP address or ASNs by querying relevant portions of the hierarchical namespace.</t>
          </li>
          <li>
            <t>In the event that a digital emblem does not exist at a node in the hierarchical namespace, it SHOULD be possible to prove that due diligence has been exercised, and that a negative answer was received at a specific time.</t>
          </li>
          <li>
            <t>Offline validation SHOULD be possible, provided a sufficient portion of the digital emblem bundle is present, and all necessary parent signatures/delegations are cached by the validator in then-valid form.</t>
          </li>
          <li>
            <t>As DEP signatures SHOULD be asymmetric, it MAY be desirable to also support discovery of outbound DEP signatures performed from a node in the namespace hierarchy. i.e. to be able to discover what other nodes the current node has provided DEP signatures for.</t>
          </li>
          <li>
            <t>If the digital emblem hierarchical namespace exists within another namespace, sharing a root of trust, it MAY be useful to create a registry which allows the publication of tops of digital emblem cones within the larger namespace, to assist verifiers in locating the authentic tops of the digital emblem namespace cones they’re interested in.</t>
          </li>
          <li>
            <t>Until verification tools are widespread, it MAY be useful to have a backwards-compatible mechanism of displaying digital emblem information in a less-secure context, for instance web browsers which are incapable of verifying digital emblem content might still be capable of displaying it, with an indication that it has not been verified.</t>
          </li>
        </ul>
      </section>
      <section anchor="binding-of-issuer-to-digital-emblem">
        <name>Binding of Issuer to Digital Emblem</name>
        <ul spacing="normal">
          <li>
            <t>It MUST be possible to cryptographically verify that the content of a digital emblem is complete and has not been modified.</t>
          </li>
          <li>
            <t>It MUST be possible to cryptographically authenticate the issuing party of a Digital Emblem.</t>
          </li>
          <li>
            <t>At any level of the digital emblem namespace hierarchy, it MUST be possible to use a DEP record to contextualize the issuing party of a Digital Emblem in terms of a "web of trust" consisting of other related organizations, other emblem issuers within the same organization, or other authenticated entities which can "vouch for" the legitimacy of the issuing party in a cross-signing web-of-trust, with the nature of the relationship between the namespace node and the signing entity characterized using a small standardized set of relationship types. These SHOULD include the ability to denote one cone of the hierarchy as functionally identical to another (in the event that two cones within the namespace, neither of which is within the other, are functionally identical or under common control and policy; intra-organizational signatures which indicate that two cones are under common control and vouch for each other, but have different function and policy; and inter-organizational signatures which indicate that the other organization vouches for this one, in the sense of being a known and trusted partner, for instance. Inter-organizational DEP relationships can be used to differentiate intended organizations from typosquatting impersonators. Some potential relationships which might be encoded in a DEP record include: Treaty signatory, P&amp;I recognizer, Organizational parent, Organizational peer, Organizational child, License grantor, Visa / entry grantor, Work-permit grantor, Residence-permit grantor, Employment certifier, Overflight right grantor, Permission to enter territorial waters grantor, Know-Your-Customer data verifier.</t>
          </li>
          <li>
            <t>It MUST be possible to specify the formal name of the TREATY or international law referenced by the marking: "1961 Vienna Convention on Diplomatic Relations” “The Convention on Wetlands” If the treaty or body of law has a commonly-used informal name, that MAY be provided as a second text string. The name SHOULD be provided in the native script of the title of the treaty, and common transliterations MAY also be provided, identified by ISO language labels.</t>
          </li>
          <li>
            <t>It MUST be possible to indicate the canonical URL of a public copy of the treaty or international law referenced by the marking.</t>
          </li>
          <li>
            <t>It MUST be possible to identify the TREATY ORGANIZATION responsible for administering the relevant body of international law.</t>
          </li>
          <li>
            <t>If a specific PROTECTION is being invoked under international law, it MUST be possible to include a brief description of the legal protection being invoked: "Anti-counterfeiting" "Diplomatic courier" "Endangered species transport"  "Fissionable materials transport"</t>
          </li>
          <li>
            <t>It MUST be possible to identify one or more authoritative points of CONTACT of the digital emblem issuer. It SHOULD be possible to include fields such as person or role name, email, phone, and postal address. If multiple CONTACT parties are identified, they SHOULD also be distinguished as to purpose.</t>
          </li>
        </ul>
      </section>
      <section anchor="binding-of-digital-emblem-to-asset">
        <name>Binding of Digital Emblem to Asset</name>
        <ul spacing="normal">
          <li>
            <t>It SHOULD be possible to bind a digital emblem to an online service by FQDN, IPv4 address, IPv6 address, IP/port combination, URL, ASN, or combinations of those.</t>
          </li>
          <li>
            <t>Binding of digital emblems to assets SHOULD be accomplished by using digital emblem elements to describe the asset, assets, or class of assets to which the digital emblem is bound, using parameters appropriate to the type of asset, the context of communication, and the shared understanding of the issuer and the verifier.</t>
          </li>
          <li>
            <t>Common descriptive elements SHOULD be sufficiently standardized such that they can be displayed by most verification terminals, software, or devices.</t>
          </li>
          <li>
            <t>It MUST be possible for a digital emblem to reference arbitrary externally-hosted media via URLs. References to image URLs (i.e. images which do not contain text) do not need language codes.  URLs to, for instance, PDFs of treaty documents, SHOULD contain the language label indicating the language of text included within the PDF document.</t>
          </li>
          <li>
            <t>The framework of descriptive elements SHOULD NOT be so prescriptive as to preclude the communication of arbitrary structured data in formats understood in common by digital emblem issuers and verifiers, but unanticipated by the digital emblem protocol or its authors.</t>
          </li>
          <li>
            <t>It MUST be possible to specify a temporal scope of validity for a Digital Emblem, composed of one or more temporal periods of validity.</t>
          </li>
          <li>
            <t>It MUST be possible to define temporal scopes and periods of validity which are independent of other time periods inherited from other parts of the protocol stack, such as the TTLs or the validity periods of digital signatures used to authenticate the digital emblem.</t>
          </li>
          <li>
            <t>Each temporal period of validity MUST be of non-negative length; that is, for each one, its end time may not precede its start time.</t>
          </li>
          <li>
            <t>Temporal periods of validity MAY be overlapping, and the areas of overlap shall be treated as positive, not negative.</t>
          </li>
          <li>
            <t>It MUST be possible to specify a spatial scope of validity for a Digital Emblem, composed of one or more volumetric regions of validity.</t>
          </li>
          <li>
            <t>Volumetric regions of validity MAY be overlapping, and the areas of overlap shall be treated as positive, not negative.</t>
          </li>
          <li>
            <t>Volumetric regions of validity MUST be convex and not sufficiently complex or unconventional as to startle improvident interpretation code. Principle of least astonishment applies.</t>
          </li>
          <li>
            <t>For reasons of compatibility with other systems, it MUST be possible to denote volumetric regions of validity as either or both of a lat/lon/alt/rad or by locating the vertices of a geometric solid. Both systems MAY be used within the same digital emblem, and geometric solids are presumed to have precedence over lat/lon/alt/rad spheres.</t>
          </li>
          <li>
            <t>It MUST be possible to associate one or more temporal scopes of validity with one or more spatial scopes of validity.</t>
          </li>
          <li>
            <t>It MUST be possible to describe multiple separate and independent sets of temporal/spatial validities within the same digital emblem.</t>
          </li>
          <li>
            <t>When a marked asset is identified as a numbered member of an enumerated set, it SHOULD be possible to convey its individual number as well as the size of the set. i.e. “crate 2 of 5.”</t>
          </li>
          <li>
            <t>It MUST be possible to denote a quantity, currency, weight or measure using customs-recognized standards, in the format of a paired numerical quantity and named unit, followed by an optional numerical precision in the same units. The unit MAY consist of an ISO 4217 currency code, an SI base unit of length or mass ("m" or "kg"), a WCO unit of quantity (m2, m3, l, kWh, u), or one of the following: persons, pouches, vehicles, aircraft, watercraft, spacecraft, ANY. The quantity and precision (each of which MAY be of value 0) MAY possess an optional floating decimal place.  Precision should be understood to be +/- the previous value.  In conjunction with a Digital Emblem, this could be used, depending on context, to connote a number of vehicles traveling together in convoy, a number of persons in a delegation, a number of diplomatic pouches in a shipment, a quantity or valuation of goods being proffered to customs, an area under protection, etc.  Multiple QTY RRs MAY be associated with the same DNS label, but have no defined precedence or order.</t>
          </li>
          <li>
            <t>It MUST be possible to denote a period of validity, using an ISO 8601 P[n]Y[n]M[n]DT[n]H[n]M[n]S duration OR a start AND end date OR date and time in ISO 8601 extended format OR the word ANY.  Each start and end date/time MAY consist of the word ANY or YYYY, YYYYMMDD, or YYYYMMDDThhmmss.sss, but may not be empty.  Each ISO 8601 extended date MAY be represented in its most compact form, independent of the resolution of the other date.  Start is first, end is second.  A duration MUST stand alone and may not be paired with a date.  A date represents the point in time immediately preceding and including the named date, but subsequent to and not including the previous period of the same resolution.</t>
          </li>
          <li>
            <t>It MUST be possible to define the FORM of the instance of the emblem. Is it a physical plaque, a nametag, an RFID transponder, a painted QRcode, a file on digital storage, a badge attached to a shipping crate, text embroidered onto a garment?  Ideally this SHOULD be a reference to a common registry.</t>
          </li>
          <li>
            <t>It MUST be possible to indicate the TYPE of asset to which the digital emblem is bound. Is it a building, a diplomatic courier, a web site, and email server, files on a flash thumb drive, the contents of a shipping crate? Ideally this SHOULD be a reference to a common registry.</t>
          </li>
          <li>
            <t>It MUST be possible to NAME the asset to which the digital emblem is bound using a proper noun name of the thing, if it has one, such as "Richard Smith" or "Amiens Cathedral”. Names SHOULD be rendered in their native script, and common transliterations MAY also be provided, identified by ISO 639 language code and Unicode script identifier.</t>
          </li>
          <li>
            <t>It MUST be possible to state the unique SERIAL number of the thing being protected, if it has one.</t>
          </li>
          <li>
            <t>It MUST be possible to provide a textual DESCRIPTION of identifying characteristics: "A painting of a standing woman in Elizabethan dress, 92cm wide by 188 cm high, in a gold-leaf wooden frame."</t>
          </li>
          <li>
            <t>It MUST be possible to provide a textual DESCRIPTION of uniquely identifying characteristics: "Initials 'RH' scratched into lower right corner" "Two brown birthmarks of 4mm and 3mm above left eyebrow"</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate in a simple flag if the digital emblem is problematically no longer known to be physically proximate to the asset it marks (i.e. they may have become separated from each other).</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate in a simple flag if a physical embodiment of the digital embem is problematically no longer in a known location (i.e. it has been stolen / lost / separated from its asset).</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate in a simple flag if the asset is problematically no longer in a known location (i.e. it has been stolen / kidnapped / lost).</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate in a simple flag if the asset has had its legal protections violated.  (For instance, a diplomatic pouch has been opened by unauthorized parties.) In a more elaborate form, this could include time and position, if known, and other details about the violation.</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate if the issuer requests that informational updates regarding the progress or status of the asset be sent to the specified contact.</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate the preferred treatment of an asset which is outside its spatial or temporal window of certificate validity. (For instance, a diplomatic envoy whose remit is for Argentina from January 1, 2025 through December 31, 2026, but whose digital emblem is scanned in Brazil: should they receive any special status? For instance, a shipment of medical aid which arrives at a customs checkpoint a year late: should it be returned to sender, forwarded onward to its destination, confiscated, destroyed, donated to a good cause?)</t>
          </li>
          <li>
            <t>It SHOULD be possible for properly-authenticated mobile assets, or the physical instantiations of digital emblems affixed to them, to update the location record associated with the digital emblem instance or the asset or both, in real-time or near-real-time, provided a sufficient communications channel back to the issuer exists.</t>
          </li>
        </ul>
      </section>
      <section anchor="distribution-mechanisms">
        <name>Distribution Mechanisms</name>
        <ul spacing="normal">
          <li>
            <t>Issuers / servers SHOULD attempt to deliver all records associated with a single digital emblem as a bundle or blob or single transaction, rather than requiring validators to make multiple queries or guess what records to ask for within a node of the namespace hierarchy.</t>
          </li>
          <li>
            <t>Issuers / servers MAY wish to include the chain of parent signatures up to the unitary root of trust, within the digital emblem record blob, so as to facilitate offline validation by validators which have only the root signature cached.</t>
          </li>
          <li>
            <t>It SHOULD be possible for issuers to push new and updated digital emblems to relevant verifiers or trusted intermediary caches, when appropriate, with cryptographic authentication of both parties and encrypted transport between them.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of the IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Moez Chakchouk arranged and conducted many of the use-case interviews 
with intergovernmental treaty organizations responsible for bodies of 
international law.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="I-D.haberman-digital-emblem-ps">
        <front>
          <title>Problem Statement for Digitized Emblems</title>
          <author fullname="Brian Haberman" initials="B." surname="Haberman">
            <organization>Johns Hopkins University Applied Physics Lab</organization>
          </author>
          <author fullname="Tommy Jensen" initials="T." surname="Jensen">
            <organization>Microsoft</organization>
          </author>
          <author fullname="Bill Woodcock" initials="B." surname="Woodcock">
            <organization>PCH</organization>
          </author>
          <date day="21" month="May" year="2024"/>
          <abstract>
            <t>   International law defines a number of emblems, such as the blue
   helmets of United Nations peacekeeping forces, the blue and white
   shield of UNESCO, and the Red Cross of the International Committee of
   the Red Cross, as indicative of special protections under the Geneva
   Conventions.  Similar protections attach to journalists who wear
   "Press" protective emblems on the battlefield, under Article 79 of
   Protocol I of the Geneva Conventions and Resolution 2222 of the
   United Nations Security Council.  The emblems of national governments
   and inter-governmental organizations protect diplomatic pouches,
   couriers, and envoys under the Vienna Convention on Diplomatic
   Relations.  Other marks enjoy protections against mis-use under the
   Paris Convention, the Madrid Protocol, and the Trade-Related Aspects
   of Intellectual Property Rights.

   Such physical emblems have a number of weaknesses and do not
   translate to the digital realm.  This document provides a summary of
   the problems and documents identified requirements from a number of
   stakeholders for a digital emblem which addresses the shortcomings of
   the physical emblems and makes possible the indication of protections
   of digital assets under international law.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-haberman-digital-emblem-ps-02"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
