<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bwbh-digital-emblem-model-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Digital Emblem Models">Conceptual Model for Digitized Emblems</title>
    <seriesInfo name="Internet-Draft" value="draft-bwbh-digital-emblem-model-01"/>
    <author initials="B." surname="Woodcock" fullname="Bill Woodcock">
      <organization>PCH</organization>
      <address>
        <email>woody@pch.net</email>
      </address>
    </author>
    <author initials="B." surname="Haberman" fullname="Brian Haberman">
      <organization>JHU/APL</organization>
      <address>
        <email>brian@innovationslab.net</email>
      </address>
    </author>
    <author initials="C." surname="Deccio" fullname="Casey Deccio">
      <organization>Brigham Young University</organization>
      <address>
        <email>casey@byu.edu</email>
      </address>
    </author>
    <date year="2024" month="November" day="21"/>
    <abstract>
      <?line 38?>

<t>This document describes the conceptual models of use for digital emblems.</t>
    </abstract>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Digital emblems are intended to be modern counterparts to the visual 
markings which have historically been used to comply with marking 
requirements found in international law. Digital emblems provide 
mechanisms for authentication, access control, dynamic data and 
bidirectional data flows, revocation, non-repudiatability, and the 
inclusion of external data, rich media, and many other benefits which 
are difficult or impossible to convey with a rattle-can and a stencil.</t>
      <t>Although there are many different marks, applied by many different 
parties, for many different purposes, the task of marking, per se, is 
simply one of conveying information between parties. As long as a 
protocol is capable of conveying any information parties agree to use 
it for, it succeeds.  If it is too prescriptive, or tries too hard to 
anticipate and circumscribe uses, it fails.</t>
      <t>Many use-cases for digital counterparts to physical markings have been 
documented <xref target="I-D.haberman-digital-emblem-ps"/>. This document distills 
the common technological requirements of those use-cases into a single 
harmonized set of requirements; the superset of requirements which are 
common to multiple intergovernmental organizations and multiple bodies 
of international law. From this set of common requirements is derived 
a conceptual models of digital emblems.</t>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
"RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted
as described in BCP 14 <xref target="RFC2119"/><xref target="RFC8174"/> when, and only when, they appear in all capitals,
as shown here.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t><em>Asset:</em> A person, place, or thing that is designated by a state or other
recognized entity as having certain legal protections.</t>
          </li>
          <li>
            <t><em>Digital Emblem.</em>  A digital embodiment of the protections granted for an
asset, consisting of attributes that definitively describe the asset using
electronic means.  These attributes collectively associate the emblem to the
asset based on legal or similar normative framework and inform recipients
of the emblem as to how they should treat the asset.</t>
          </li>
          <li>
            <t><em>Authenticity:</em> A characteristic that demonstrates a) the positive
association between a digital emblem to the asset that it describes, using
its attributes and b) that the digital emblem itself is the original and has
not been tampered with.</t>
          </li>
          <li>
            <t><em>Authorization:</em> The act of granting legitimacy to the creation of a digital
emblem for an asset, either directly by an entity that is officially
recognized to do so, or indirectly, by an entity that has been recognized by
an already-recognized entity.</t>
          </li>
          <li>
            <t><em>Validation:</em> The act of verifying both the authenticity and authorization
of a digital emblem using one or more ultimately trusted sources as the
root(s) for authenticity and/or authorization.</t>
          </li>
          <li>
            <t><em>Discovery:</em> The process of definitely determining whether a digital emblem
exists for a given asset, or learning digital emblems and their
corresponding assets.</t>
          </li>
          <li>
            <t><em>Issuer:</em> The entity that has created a digital emblem.</t>
          </li>
          <li>
            <t><em>Validator:</em> An entity performing validation of a digital emblem.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="roles-and-relationships">
      <name>Roles and Relationships</name>
      <t>The <em>issuer</em> of a digital emblem is the entity that wants to communicate to
third parties that the associated asset has certain legal protections.  It does
this by creating the digital emblem, digitally signing it in such a way that it
can be <em>validated</em> for both <em>authorization</em> and <em>authenticity</em>, and making it
discoverable via a distribution mechanism.</t>
      <t>The <em>validator</em> is the ultimate consumer of a digital emblem; it is an entity
wanting to inquire as to whether a given asset has legal protections.  This
entity needs some way to <em>discover</em> the digital emblem associated with the
asset in question and to <em>validate</em> it.</t>
      <t><xref target="figrel"/> illustrates these roles.</t>
      <figure anchor="figrel">
        <name>Digital Emblem Relationships</name>
        <artwork><![CDATA[
      +--------+
      | Issuer |
      +----+---+
           |
 Signature |<------------------+
           |                   |
      +----+----+              | +-----------+
      | Digital |   Validation +-| Validator |
      | Emblem  |              | +-----------+
      +----+----+              |
           |                   |
Attributes |<------------------+
           |
       +---+---+
       | Asset |
       +-------+

]]></artwork>
      </figure>
    </section>
    <section anchor="discovery-and-access-control">
      <name>Discovery and Access Control</name>
      <t>A distribution mechanism is used by the issuer to make a digital emblem for an
asset discoverable to a validator.  It is referenced by an unambiguous
identifier appropriate for that mechanism.  Example identifiers include a
domain name or a Uniform Resource Locator (URL).  The distribution mechanism
may be access-controlled, and it may require that validators authenticate
themselves in order to gain access to an emblem.  A physical representation of
a digital emblem may be used by the issuer to direct validators to the digital
emblem by displaying or to to communicate the digital emblem itself. Thus, a
physical representation may be either a non-unique embodiment of the emblem, or
it may be a signpost directing validators to a digital emblem via a separate
distribution mechanism.</t>
    </section>
    <section anchor="digital-emblem-data-model">
      <name>Digital Emblem Data Model</name>
      <t>A digital emblem consists of attributes that unambiguously describe the asset
with which it is associated, as well as the considerations it is to be given,
including legal and other protections.  These take the form of a bundle of
related records appropriate for the distribution mechanism employed, and
discoverable at the specified identifier.  The attributes comprising the
records bind the record to the asset.  They convey information regarding the
asset and its handling which may not be presently anticipated by current
implementors. <xref target="figbind"/> illustrates the record bundles for issuers and
assets. <xref target="figcomm"/> shows the channels used to convey the information to a
validator.</t>
      <figure anchor="figbind">
        <name>Issuer and Asset Bundles and Binding</name>
        <artwork><![CDATA[
    +------------------------+      +----------------------------+
    |         Issuer         |      |           Asset            |
    +------------------------+      +----------------------------+
+===| Visual representation  |======| Temporal scope of validity |===+
||  | Identification of law  |      | Spatial scope of validity  |  ||
||  | Contact information    |      | SI unit of size or weight  |  ||
||  | Handling flags         |      | WCO standard quantity      |  ||
||  | Issuer's signature     |      | ISO 4217 unit of currency  |  ||
||  | Third-party signatures |      | Names and serial numbers   |  ||
||  +------------------------+      | Distinguishing marks       |  ||
||                                  | External references        |  ||
||                                  +----------------------------+  ||
||                                                                  ||
||          Standardized digital emblem data elements               ||
||                                                                  ||
+====================================================================+

]]></artwork>
      </figure>
      <figure anchor="figcomm">
        <name>Communication channels conveying digital emblem data to validators</name>
        <artwork><![CDATA[
            --- Data at rest ----------------->
+--------+  --- Data in flight --------------->
| Issuer |  --- In-band network response ----->
+--------+  --- Passive RF transponder ------->
            --- Active RF transponder --------> +-----------+
            --- Active RF beacon -------------> | Validator |
            --- Passive optical marking ------> +-----------+
 +-------+  --- Active optical transponder ---> 
 | Asset |  --- Active optical beacon -------->
 +-------+  --- Active audio transponder ----->
            --- Active audio beacon ---------->

]]></artwork>
      </figure>
      <t>Digital emblem data bundles may be presented as part of an interactive session between issuer and
validator, as for instance in the case that the validator MUST be authenticated in real time, or
may receive variable information.  Digital emblem data bundles may also be presented as static data
or unidirectional data flows, which may facilitate offline validation.  Digital emblems should be
agnostic as to the mode by which they are communicated to validators, but implementors may wish to
consider methods which encompass both interactive and offline validation, transmission of the whole
digital emblem data bundles or redirective links to them, and should prefer, wherever possible, to
implement digital emblems above already-standardized lower-level transmission protocols, without
requiring exceptions or revisions to those protocols to accommodate digital emblem payloads. A number
of the anticipated possible distribution mechanisms are noted in the diagram above.</t>
    </section>
    <section anchor="digital-emblem-functional-requirements">
      <name>Digital Emblem Functional Requirements</name>
      <section anchor="goals-and-non-goals">
        <name>Goals and Non-goals</name>
        <ul spacing="normal">
          <li>
            <t>It MUST be possible to bind a digital emblem to a person, place, thing, digital data at rest, digital data in transit, or an online service (collectively referred to as assets).</t>
          </li>
          <li>
            <t>Putting aside any legal or regulatory restrictions, any entity MAY issue a digital emblem under their own authority and imprimatur without the approval or participation of any other party.</t>
          </li>
          <li>
            <t>Non-goal: The binding of assets and emblems will always be fraught, and markings of any kind MAY be replicated outside the control or intention of a their original author. No protocol can limit the actions of people in the physical world, and thus this protocol focuses on improving the communication channel which allows validators to determine the authenticity of the original emblem (not of a physical representation of the emblem) and the information needed to determine the authenticity of the binding.</t>
          </li>
        </ul>
      </section>
      <section anchor="issuance">
        <name>Issuance</name>
        <ul spacing="normal">
          <li>
            <t>A digital emblem consists of a set of one or more data elements united by a common label.</t>
          </li>
          <li>
            <t>It SHOULD be possible for a single uniquely-named digital emblem to incorporate data elements which are also used in other digital emblems issued by the same issuer, or other digital emblems issued by other issuers.</t>
          </li>
          <li>
            <t>It SHOULD be possible to organize digital emblems in a hierarchical namespace, in which each node of the namespace MAY contain a bundle of records representing a single digital emblem.</t>
          </li>
          <li>
            <t>It MUST be possible for parties controlling portions of the hierarchical namespace to receive delegations of that space from others above them in the hierarchy, and to perform delegations to others who are then by definition below them in the hierarchy.</t>
          </li>
          <li>
            <t>Any hierarchy of cryptographic signatures used to authenticate digital emblems SHOULD be one and the same as the hierarchy of the namespace.</t>
          </li>
          <li>
            <t>Issuers MUST be free to compose digital emblem of the elements which best fit their uses. No element type SHOULD be a required member of the set.
&lt;!---</t>
          </li>
          <li>
            <t>A digital emblem MUST be capable of displaying a visual representation of any physical emblem which it supplements or replaces. This MUST be in scalable vector format. The preferred aspect-ratio is between 1:1 and 2:1, but MUST NOT exceed 3:1 or 1:3.  The emblem MAY be presented in two versions, one for display against a light background, the other for display against a dark background.  The emblem MUST utilize a transparent background, if it is not a contiguous convex rectangle of the same extent as the file. The emblem MAY utilize variable transparency, and implementations which display it MUST support display of variable transparency.  The visual representation MUST be entirely self-contained, and may not contain any external references, such as to Internet-hosted webfonts or linked URLs.  All current embodiments are anticipated to be static visual images, without animation or sound. While it SHOULD generally be possible to include digital emblem elements from other areas of the digital emblem hierarchy, visual representations MAY only be used within their own cone, or cones linked by an outbound intra-organizational Digital Emblem Peer (DEP) signature. For example, the United Nations logotype might be included as a visual representation within any digital embem in any cone which the UN has signed with an intra-organizational DEP, but may not be used within the cone of CopyCatCo.
---&gt;</t>
          </li>
          <li>
            <t>A visual representation SHOULD be included in any digital emblem bundle which the issuer has reason to believe may be viewed by a human. If a visual representation is included it MUST be in scalable vector format.</t>
          </li>
          <li>
            <t>It SHOULD be possible to use a redirection to include-by-reference a bundle of records under a different namespace node, in order to allow for the use of common sets without duplicating them (and keeping them synchronized when updated) to different parts of the hierarchy.  If the redirections contain language tags, this MAY also be a way to allow good localization support without cluttering the top level of the digital emblem.  It could contain these redirectors, for different language-codes, which would expand into the set of records supporting that language.  If someone doesn't speak Turkish, they could ignore all the redirects that were Turkish-language-specific.</t>
          </li>
          <li>
            <t>It SHOULD be possible for an issuer to authenticate potential validators, and respond with different digital emblem data, or no data, depending upon the identity of the validator.</t>
          </li>
          <li>
            <t>It SHOULD be possible for an issuer to specify periods of validity for digital emblems (TTL) and the cryptographic signatures over them, independently of the period of validity of the subject of the digital emblem. For example, it SHOULD be possible to issue a digital emblem which is signed with a key which has a validity period which extends one year into the future and one year in the past, indicating that an asset SHOULD arrive at its destination five days from now, and it SHOULD be possible to mark that digital emblem as cacheable by validators for a period of one day.</t>
          </li>
          <li>
            <t>Issuers SHOULD have the option to make downward delegations within the hierarchical namespace within their control subject to discovery by validators or not subject to discovery, at their option. Upward walking of the hierarchy SHOULD always be available to any validator.</t>
          </li>
        </ul>
      </section>
      <section anchor="validation-and-display">
        <name>Validation and Display</name>
        <ul spacing="normal">
          <li>
            <t>It SHOULD be possible for a validator and an issuer to conduct a cryptographically private conversation, such that third parties are not able to easily discern what asset the query regards, nor what answer is returned.
&lt;!---</t>
          </li>
          <li>
            <t>Verifier implementations MUST display the visual emblem first, followed by the name of the emblem, followed by a textual description with hyperlinks to the bodies of protective law, followed by the content protected by the emblem.  This ordering MAY be temporal, or spatially top-to-bottom, in the direction of text reading, or front-to-back, in order of preference.  The emblem is not a license, and implementations MUST NOT require user interaction to proceed through these steps, except as MAY normally be needed to "scroll through" or read content.  The emblem SHOULD be distinguished from the content it protects, without requiring any modal interaction on the part of the user.
---&gt;</t>
          </li>
          <li>
            <t>Verifier implementations MUST display the visual representation if it is included in the digital emblem bundle.</t>
          </li>
          <li>
            <t>All text within digital emblems SHOULD be rendered in its native script, and common transliterations MAY also be provided, all identified by language tag and script <xref target="BCP47"/>. The native script version SHOULD always take precedence but validators MAY, at the user’s option, display only appropriate transliterations, if they exist.</t>
          </li>
          <li>
            <t>It SHOULD be possible to determine authoritatively whether a digital emblem is associated with an IP address or ASNs by querying relevant portions of the hierarchical namespace.</t>
          </li>
          <li>
            <t>In the event that a digital emblem does not exist at a node in the hierarchical namespace, it SHOULD be possible to prove that due diligence has been exercised, and that a negative answer was received at a specific time.</t>
          </li>
          <li>
            <t>Offline validation SHOULD be possible, provided a sufficient portion of the digital emblem bundle is present, and all necessary parent signatures/delegations are cached by the validator in then-valid form.</t>
          </li>
          <li>
            <t>As DEP signatures SHOULD be asymmetric, it MAY be desirable to also support discovery of outbound DEP signatures performed from a node in the namespace hierarchy. i.e. to be able to discover what other nodes the current node has provided DEP signatures for.</t>
          </li>
          <li>
            <t>If the digital emblem hierarchical namespace exists within another namespace, sharing a root of trust, it MAY be useful to create a registry which allows the publication of tops of digital emblem cones within the larger namespace, to assist verifiers in locating the authentic tops of the digital emblem namespace cones they’re interested in.</t>
          </li>
          <li>
            <t>Until verification tools are widespread, it MAY be useful to have a backwards-compatible mechanism of displaying digital emblem information in a less-secure context, for instance web browsers which are incapable of verifying digital emblem content might still be capable of displaying it, with an indication that it has not been verified.</t>
          </li>
        </ul>
      </section>
      <section anchor="binding-of-issuer-to-digital-emblem">
        <name>Binding of Issuer to Digital Emblem</name>
        <ul spacing="normal">
          <li>
            <t>It MUST be possible to cryptographically verify that the content of a digital emblem is complete and has not been modified.</t>
          </li>
          <li>
            <t>It MUST be possible to cryptographically authenticate the issuing party of a Digital Emblem.</t>
          </li>
          <li>
            <t>At any level of the digital emblem namespace hierarchy, it MUST be possible to use a DEP record to contextualize the issuing party of a Digital Emblem in terms of a "web of trust" consisting of other related organizations, other emblem issuers within the same organization, or other authenticated entities which can "vouch for" the legitimacy of the issuing party in a cross-signing web-of-trust, with the nature of the relationship between the namespace node and the signing entity characterized using a small standardized set of relationship types. These SHOULD include the ability to denote one cone of the hierarchy as functionally identical to another (in the event that two cones within the namespace, neither of which is within the other, are functionally identical or under common control and policy; intra-organizational signatures which indicate that two cones are under common control and vouch for each other, but have different function and policy; and inter-organizational signatures which indicate that the other organization vouches for this one, in the sense of being a known and trusted partner, for instance. Inter-organizational DEP relationships can be used to differentiate intended organizations from typosquatting impersonators. Some potential relationships which might be encoded in a DEP record include: Treaty signatory, P&amp;I recognizer, Organizational parent, Organizational peer, Organizational child, License grantor, Visa / entry grantor, Work-permit grantor, Residence-permit grantor, Employment certifier, Overflight right grantor, Permission to enter territorial waters grantor, Know-Your-Customer data verifier.</t>
          </li>
          <li>
            <t>It MUST be possible to specify the formal name of the TREATY or international law referenced by the marking: "1961 Vienna Convention on Diplomatic Relations” “The Convention on Wetlands” If the treaty or body of law has a commonly-used informal name, that MAY be provided as a second text string. The name SHOULD be provided in the native script of the title of the treaty, and common transliterations MAY also be provided, identified by language tag and script <xref target="BCP47"/>.</t>
          </li>
          <li>
            <t>It MUST be possible to indicate the canonical URL of a public copy of the treaty or international law referenced by the marking.</t>
          </li>
          <li>
            <t>It MUST be possible to identify the TREATY ORGANIZATION responsible for administering the relevant body of international law.</t>
          </li>
          <li>
            <t>If a specific PROTECTION is being invoked under international law, it MUST be possible to include a brief description of the legal protection being invoked: "Anti-counterfeiting" "Diplomatic courier" "Endangered species transport"  "Fissionable materials transport"</t>
          </li>
          <li>
            <t>It MUST be possible to identify one or more authoritative points of CONTACT of the digital emblem issuer. It SHOULD be possible to include fields such as person or role name, email, phone, and postal address. If multiple CONTACT parties are identified, they SHOULD also be distinguished as to purpose.</t>
          </li>
        </ul>
      </section>
      <section anchor="binding-of-digital-emblem-to-asset">
        <name>Binding of Digital Emblem to Asset</name>
        <ul spacing="normal">
          <li>
            <t>It SHOULD be possible to bind a digital emblem to an online service by FQDN, IPv4 address, IPv6 address, IP/port combination, URL, ASN, or combinations of those.</t>
          </li>
          <li>
            <t>Binding of digital emblems to assets SHOULD be accomplished by using digital emblem elements to describe the asset, assets, or class of assets to which the digital emblem is bound, using parameters appropriate to the type of asset, the context of communication, and the shared understanding of the issuer and the verifier.</t>
          </li>
          <li>
            <t>Common descriptive elements SHOULD be sufficiently standardized such that they can be displayed by most verification terminals, software, or devices.</t>
          </li>
          <li>
            <t>It MUST be possible for a digital emblem to reference arbitrary externally-hosted media via URLs. References to image URLs (i.e. images which do not contain text) do not need language tags.  URLs to, for instance, PDFs of treaty documents, SHOULD contain the language label indicating the language of text included within the PDF document.</t>
          </li>
          <li>
            <t>The framework of descriptive elements SHOULD NOT be so prescriptive as to preclude the communication of arbitrary structured data in formats understood in common by digital emblem issuers and verifiers, but unanticipated by the digital emblem protocol or its authors.</t>
          </li>
          <li>
            <t>It MUST be possible to specify a temporal scope of validity for a Digital Emblem, composed of one or more temporal periods of validity.</t>
          </li>
          <li>
            <t>It MUST be possible to define temporal scopes and periods of validity which are independent of other time periods inherited from other parts of the protocol stack, such as the TTLs or the validity periods of digital signatures used to authenticate the digital emblem.</t>
          </li>
          <li>
            <t>Each temporal period of validity MUST be of non-negative length; that is, for each one, its end time may not precede its start time.</t>
          </li>
          <li>
            <t>Temporal periods of validity MAY be overlapping, and the areas of overlap shall be treated as positive, not negative.</t>
          </li>
          <li>
            <t>It MUST be possible to specify a spatial scope of validity for a Digital Emblem, composed of one or more volumetric regions of validity.</t>
          </li>
          <li>
            <t>Volumetric regions of validity MAY be overlapping, and the areas of overlap shall be treated as positive, not negative.</t>
          </li>
          <li>
            <t>Volumetric regions of validity MUST be convex and not sufficiently complex or unconventional as to startle improvident interpretation code. Principle of least astonishment applies.</t>
          </li>
          <li>
            <t>For reasons of compatibility with other systems, it MUST be possible to denote volumetric regions of validity as either or both of a lat/lon/alt/rad or by locating the vertices of a geometric solid. Both systems MAY be used within the same digital emblem, and geometric solids are presumed to have precedence over lat/lon/alt/rad spheres.</t>
          </li>
          <li>
            <t>It MUST be possible to associate one or more temporal scopes of validity with one or more spatial scopes of validity.</t>
          </li>
          <li>
            <t>It MUST be possible to describe multiple separate and independent sets of temporal/spatial validities within the same digital emblem.</t>
          </li>
          <li>
            <t>When a marked asset is identified as a numbered member of an enumerated set, it SHOULD be possible to convey its individual number as well as the size of the set. i.e. “crate 2 of 5.”</t>
          </li>
          <li>
            <t>It MUST be possible to denote a quantity, currency, weight or measure using customs-recognized standards, in the format of a paired numerical quantity and named unit, followed by an optional numerical precision in the same units. The unit MAY consist of an ISO 4217 currency code, an SI base unit of length or mass ("m" or "kg"), a WCO unit of quantity (m2, m3, l, kWh, u), or one of the following: persons, pouches, vehicles, aircraft, watercraft, spacecraft, ANY. The quantity and precision (each of which MAY be of value 0) MAY possess an optional floating decimal place.  Precision should be understood to be +/- the previous value.  In conjunction with a Digital Emblem, this could be used, depending on context, to connote a number of vehicles traveling together in convoy, a number of persons in a delegation, a number of diplomatic pouches in a shipment, a quantity or valuation of goods being proffered to customs, an area under protection, etc.  Multiple QTY RRs MAY be associated with the same DNS label, but have no defined precedence or order.</t>
          </li>
          <li>
            <t>It MUST be possible to denote a period of validity, by specifying a duration OR a start AND end date OR date and time  OR the word ANY.  The format of dates, times, and durations must be consistent with <xref target="RFC3339"/>.  When start and end date and times are used, start is first, and end is second.  A duration MUST stand alone and may not be paired with a date.  A date represents the point in time immediately preceding and including the named date, but subsequent to and not including the previous period of the same resolution.</t>
          </li>
          <li>
            <t>It MUST be possible to define the FORM of the instance of the emblem. Is it a physical plaque, a nametag, an RFID transponder, a painted QRcode, a file on digital storage, a badge attached to a shipping crate, text embroidered onto a garment?  Ideally this SHOULD be a reference to a common registry.</t>
          </li>
          <li>
            <t>It MUST be possible to indicate the TYPE of asset to which the digital emblem is bound. Is it a building, a diplomatic courier, a web site, and email server, files on a flash thumb drive, the contents of a shipping crate? Ideally this SHOULD be a reference to a common registry.</t>
          </li>
          <li>
            <t>It MUST be possible to NAME the asset to which the digital emblem is bound using a proper noun name of the thing, if it has one, such as "Richard Smith" or "Amiens Cathedral”. Names SHOULD be rendered in their native script, and common transliterations MAY also be provided, identified by language tag and script <xref target="BCP47"/>.</t>
          </li>
          <li>
            <t>It MUST be possible to state the unique SERIAL number of the thing being protected, if it has one.</t>
          </li>
          <li>
            <t>It MUST be possible to provide a textual DESCRIPTION of identifying characteristics: "A painting of a standing woman in Elizabethan dress, 92cm wide by 188 cm high, in a gold-leaf wooden frame."</t>
          </li>
          <li>
            <t>It MUST be possible to provide a textual DESCRIPTION of uniquely identifying characteristics: "Initials 'RH' scratched into lower right corner" "Two brown birthmarks of 4mm and 3mm above left eyebrow"</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate in a simple flag if the digital emblem is problematically no longer known to be physically proximate to the asset it marks (i.e. they may have become separated from each other).</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate in a simple flag if a physical embodiment of the digital embem is problematically no longer in a known location (i.e. it has been stolen / lost / separated from its asset).</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate in a simple flag if the asset is problematically no longer in a known location (i.e. it has been stolen / kidnapped / lost).</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate in a simple flag if the asset has had its legal protections violated.  (For instance, a diplomatic pouch has been opened by unauthorized parties.) In a more elaborate form, this could include time and position, if known, and other details about the violation.</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate if the issuer requests that informational updates regarding the progress or status of the asset be sent to the specified contact.</t>
          </li>
          <li>
            <t>It SHOULD be possible to indicate the preferred treatment of an asset which is outside its spatial or temporal window of certificate validity. (For instance, a diplomatic envoy whose remit is for Argentina from January 1, 2025 through December 31, 2026, but whose digital emblem is scanned in Brazil: should they receive any special status? For instance, a shipment of medical aid which arrives at a customs checkpoint a year late: should it be returned to sender, forwarded onward to its destination, confiscated, destroyed, donated to a good cause?)</t>
          </li>
          <li>
            <t>It SHOULD be possible for properly-authenticated mobile assets, or the physical instantiations of digital emblems affixed to them, to update the location record associated with the digital emblem instance or the asset or both, in real-time or near-real-time, provided a sufficient communications channel back to the issuer exists.</t>
          </li>
        </ul>
      </section>
      <section anchor="distribution-mechanisms">
        <name>Distribution Mechanisms</name>
        <ul spacing="normal">
          <li>
            <t>Issuers / servers SHOULD attempt to deliver all records associated with a single digital emblem as a bundle or blob or single transaction, rather than requiring validators to make multiple queries or guess what records to ask for within a node of the namespace hierarchy.</t>
          </li>
          <li>
            <t>Issuers / servers MAY wish to include the chain of parent signatures up to the unitary root of trust, within the digital emblem record blob, so as to facilitate offline validation by validators which have only the root signature cached.</t>
          </li>
          <li>
            <t>It SHOULD be possible for issuers to push new and updated digital emblems to relevant verifiers or trusted intermediary caches, when appropriate, with cryptographic authentication of both parties and encrypted transport between them.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of the IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Moez Chakchouk arranged and conducted many of the use-case interviews 
with intergovernmental treaty organizations responsible for bodies of 
international law.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3339">
        <front>
          <title>Date and Time on the Internet: Timestamps</title>
          <author fullname="G. Klyne" initials="G." surname="Klyne"/>
          <author fullname="C. Newman" initials="C." surname="Newman"/>
          <date month="July" year="2002"/>
          <abstract>
            <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3339"/>
        <seriesInfo name="DOI" value="10.17487/RFC3339"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <referencegroup anchor="BCP47" target="https://www.rfc-editor.org/info/bcp47">
        <reference anchor="RFC4647" target="https://www.rfc-editor.org/info/rfc4647">
          <front>
            <title>Matching of Language Tags</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document describes a syntax, called a "language-range", for specifying items in a user's list of language preferences. It also describes different mechanisms for comparing and matching these to language tags. Two kinds of matching mechanisms, filtering and lookup, are defined. Filtering produces a (potentially empty) set of language tags, whereas lookup produces a single language tag. Possible applications include language negotiation or content selection. This document, in combination with RFC 4646, replaces RFC 3066, which replaced RFC 1766. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="4647"/>
          <seriesInfo name="DOI" value="10.17487/RFC4647"/>
        </reference>
        <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
      </referencegroup>
      <reference anchor="I-D.haberman-digital-emblem-ps">
        <front>
          <title>Problem Statement for Digitized Emblems</title>
          <author fullname="Brian Haberman" initials="B." surname="Haberman">
            <organization>JHU/APL</organization>
          </author>
          <author fullname="Tommy Jensen" initials="T." surname="Jensen">
            <organization>Microsoft</organization>
          </author>
          <author fullname="Bill Woodcock" initials="B." surname="Woodcock">
            <organization>PCH</organization>
          </author>
          <date day="18" month="November" year="2024"/>
          <abstract>
            <t>   International law defines a number of emblems, such as the blue
   helmets of United Nations peacekeeping forces, the blue and white
   shield of UNESCO, and the Red Cross of the International Committee of
   the Red Cross, as indicative of special protections under the Geneva
   Conventions.  Similar protections attach to journalists who wear
   "Press" protective emblems on the battlefield, under Article 79 of
   Protocol I of the Geneva Conventions and Resolution 2222 of the
   United Nations Security Council.  The emblems of national governments
   and inter-governmental organizations protect diplomatic pouches,
   couriers, and envoys under the Vienna Convention on Diplomatic
   Relations.  Other marks enjoy protections against mis-use under the
   Paris Convention, the Madrid Protocol, and the Trade-Related Aspects
   of Intellectual Property Rights.

   Such physical emblems have a number of weaknesses and do not
   translate to the digital realm.  This document provides a summary of
   the problems and documents identified requirements from a number of
   stakeholders for a digital emblem which addresses the shortcomings of
   the physical emblems and makes possible the indication of protections
   of digital assets under international law.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-haberman-digital-emblem-ps-03"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
