<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-dmsc-acps-arc-00" category="info" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACPs Architecture">Agent Collaboration Protocols Architecture for Internet of Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-dmsc-acps-arc-00"/>
    <author fullname="Jun Liu">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>liujun@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Yu">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>yuke@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Li">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>like1990@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Keliang Chen">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>chenkl@bupt.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="January" day="15"/>
    <workgroup>DMSC Working Group</workgroup>
    <keyword>Internet of Agents</keyword>
    <keyword>Agent Communication</keyword>
    <keyword>Task Collaboration</keyword>
    <abstract>
      <?line 63?>

<t>Internet of Agent (IoA) aims to facilitate interconnection and collaboration among heterogeneous agents to address complex tasks and support various applications.</t>
      <t>This IETF draft proposes the Agent Collaboration Protocols (ACPs) architecture, which outlines the key components and functionalities required for agent interoperability. ACPs cover all stages of agents in the network, from their access to collaboration, including: Agent Trusted Registration (ATR), Agent Identity Authentication (AIA), Agent Discovery (ADP), Agent Interaction (AIP), Tool Invocation (TIP), and Agent Monitoring (AMP). The long-term vision of ACPs is to support the future large-scale interconnected agents and construct the key infrastructure for IoA.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the rapid development of artificial intelligence (AI), particularly large language model (LLM) technology, the number of AI agents has grown dramatically. With the capability of autonomous perception, decision-making, and execution, agents' applications are becoming increasingly widespread.</t>
      <t>To overcome the limitations of single-agent systems, and to break free from the constraints of proprietary multi-agent frameworks developed by various vendors, the Internet of Agents (IoA) has emerged. IoA aims to enable seamless connectivity and efficient collaboration among agents, through standardized communication protocols and interfaces.</t>
      <t>This draft proposes the Agent Collaboration Protocols (ACPs) <xref target="ACPs-Github"/>, which is a standardized protocol suite for IoA to enable wide-area connectivity, cross-domain interoperability, and secure collaboration among heterogeneous agents. The main characteristics of ACPs are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Multi-centralized architecture, which consists of multiple autonomous domains, each domain containing its own management nodes (such as registration, authentication, and discovery servers), to support efficient, reliable, and manageable large-scale agent interconnection scenarios.</t>
        </li>
        <li>
          <t>Standardized communication mechanisms with peer to peer and grouping mode, allowing agents to self-organize and negotiate autonomously, to facilitate rapid and accurate information exchange, as well as efficient task Collaboration.</t>
        </li>
        <li>
          <t>Robust registration and authentication mechanisms, to ensure the trusted access of agents and prevent unauthorized access and data breaches.</t>
        </li>
        <li>
          <t>Reliable registration and management of agent capability, along with intra-domain and cross-domain discovery based on capability matching, to support universal and efficient discovery of collaborative agents.</t>
        </li>
        <li>
          <t>Real-time monitoring of agent status and behavior, to support more complex application requirements such as agent auditing and transactions.</t>
        </li>
      </ul>
      <t>ACPs cover all stages of agents in the IoA, from their access to collaboration, to construct the key infrastructure for agent communication, task collaboration and resource allocation.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Agent：An agent is a software or hardware entity with autonomous decision-making and execution capabilities, capable of perceiving the environment, acquiring contextual information, reasoning, and learning. Agent can independently or collaboratively with other agents to perform tasks. Each agent is created by a specific agent provider and needs to complete processes such as registration and authentication before providing services to obtain a legitimate identity and relevant credentials.</t>
      <t>Agent Identity Code (AIC): AIC is a certifiable, globally unique identity that represents the identity of an agent. AIC MAY contain the following infomation: the registration service center,  the agent provider, the serial number of agent entity and instance, and the check code.</t>
      <t>Agent Capability Specification (ACS): ACS is a detailed description of an agent's capabilities and information that can be saved and retrieved. ACS MAY use the JSON <xref target="RFC8259"/> format, typically including the following information: AIC, the functional capabilities of agent, the technical characteristics, and the service interfaces.</t>
      <t>Agent Registration Server (ARS): ARS is a service entity recognized by consensus, responsible for the registration of agents, the distribution of AICs, and the maintenance of the agent's availability status.</t>
      <t>Certificate Authority Server (CAS): CAS is a service entity that is responsible for verifying the detailed information of agents and issuing, managing agent certificates, establishing communication identity trust.</t>
      <t>Agent Discovery Server (ADS): ADS is a service entity responsible for discovering available collaborative intelligent agents for specific task requirement.</t>
      <t>Agent Autonomous Domain: Agent Autonomous Domain is a collaborative network domain organized and managed by specific IoA service provider. It may include multiple different entities, such as ARS, CAS, ADS, and agents.</t>
    </section>
    <section anchor="acps-architecture">
      <name>ACPs Architecture</name>
      <t>Agent Collaboration Protocols (ACPs) is a standardized protocol suite for IoA, which consists of the following protocols built on HTTPS:</t>
      <t>(1) Agent Trusted Registration (ATR) protocol: Defines the requirements and process for agents to register with a registration service provider.</t>
      <t>(2) Agent Identity Authentication (AIA) protocol: Defines the mechanisms for agents to obtain digital identity credentials and perform authentication during communication.</t>
      <t>(3) Agent Discovery Protocol (ADP): Defines the mechanisms for agents to discover potential collaboration partners in an open environment, including query formats, matching processes, and result feedback.</t>
      <t>(4) Agent Interaction Protocol (AIP): Defines the communication protocol for agents to establish sessions and exchange messages, serving as the core communication layer of ACPs.</t>
      <t>(5) Tool Invocation Protocol (TIP): Provides a standard way for agents to invoke external tools or services.</t>
      <t>(6) Agent Monitoring Protocol (AMP): Provides a framework for monitoring and measuring agent behavior and performance.</t>
      <figure anchor="fig-acps-stack">
        <name>ACPs Protocol Stack</name>
        <artwork><![CDATA[
  APPLICATION LAYER
  +-------------------------------------------------------------+
  |              Agent Collaboration Protocols (ACPs)           |
  |                                                             |
  |   Control Sublayer:      +-------+   +-------+   +-------+  |
  |                          |  ADP  |   |  AIP  |   |  AMP  |  |
  |                          +-------+   +-------+   +-------+  |
  |                                                             |
  |   --------------------------------------------------------- |
  |                                                             |
  |   Interaction Sublayer:  +-------+   +-------+   +-------+  |
  |                          |  ADP  |   |  AIP  |   |  TIP  |  |
  |                          +-------+   +-------+   +-------+  |
  +-------------------------------------------------------------+
  |          HTTP               HTTPS                DNS        |
  +-------------------------------------------------------------+

  TRANSPORT LAYER
  +-------------------------------------------------------------+
  |                  TCP                  UDP                   |
  +-------------------------------------------------------------+

  INTERNET LAYER
  +-------------------------------------------------------------+
  |                  IPv4                 IPv6                  |
  +-------------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The ACPs-based Internet of Agents consists of multiple autonomous domains, each domain containing registration, authentication, and discovery servers, as well as agents. The overall architecture is as follows.</t>
      <figure anchor="fig-acps-arch">
        <name>ACPs Architecture</name>
        <artwork><![CDATA[
+------------------------------+     +------------------------------+
|     Autonomous Domain 1      |     |     Autonomous Domain 2      |
|  +------+         +------+   |     |    +------+         +------+ |
|  | ARS1 | <-----> | CAS1 |   |     |    | CAS2 | <-----> | ARS2 | |
|  +------+         +------+   |     |    +------+         +------+ |
|     ^                        |     |                         ^    |
|     |ATR                     |     |                         |ATR |
|     v                        |     |                         v    |
|  +------+  ADP   +------+    |     |    +------+   ADP  +------+  |
|  | PAA1 | <----> | ADS1 | <--+-----+--> | ADS2 | <----> | PAA2 |  |
|  +------+        +------+    |     |    +------+        +------+  |
|    |   AIP,AIA   +--------+  |     |  +--------+   AIP,AIA  |     |
|    |-----------> | Agent1 |  |     |  | Agent3 | <----------|     |
|    |             +--------+  |     |  +--------+            |     |
|    |   AIP,AIA   +--------+  |     |  +--------+   AIP,AIA  |     |
|    |-----------> | Agent2 |  |     |  | Agent4 | <----------|     |
|    |             +--------+  |     |  +--------+            |     |
|    |   AIP,AIA   +---------+ |     |  +--------+   AIP,AIA  |     |
|    |-----------> |ToolAgent| |     |  | Agent5 | <----------|     |
|    |             +---------+ |     |  +--------+            |     |
|    |                   ^     |     |                        |     |
|    |AMP             TIP|     |     |                     AMP|     |
|    v                   v     |     |                        v     | 
|  +-------+        +-------+  |     |                   +-------+  |
|  | Logs  |        | Tools |  |     |                   | Logs  |  |
|  +-------+        +-------+  |     |                   +-------+  |
+------------------------------+     +------------------------------+



Legend:
  ARS  = Agent Registration Server
  CAS  = Certificate Authority Server
  ADS  = Agent Discovery Server
  PAA  = Personal Assistant Agent
  ATR  = Agent Trusted Registration
  AIA  = Agent Identity Authentication
  ADP  = Agent Discovery Protocol
  AIP  = Agent Interaction Protocol
  TIP  = Tool Invocation Protocol
  AMP  = Agent Monitoring Protocol
]]></artwork>
      </figure>
      <t>The ACPs-based IoA operates based on the following fundamental rules:</t>
      <t>(1) All agents are required to follow the ATR to register with the Trusted Agent Registry Server.</t>
      <t>(2) An agent must comply with AIA verification to ensure the reliability of the collaborator's identity before collaboration.</t>
      <t>(3) When a user proposes a task request, the personal assistant agent decomposes the task and queries the ADS, in accordance with the ADP, to identify collaborative agents whose capabilities match the task requirements.</t>
      <t>(4) Agents follow AIP to form agent collaboration networks to complete complex tasks. When an external tool is needed, Agent contacts the tool agengt and invokes the appropriate tool.</t>
    </section>
    <section anchor="agent-trusted-registration-atr">
      <name>Agent Trusted Registration (ATR)</name>
      <t>The IoA should be a safe and reliable agent ecosystem, and the agents running in it with the ability to perform tasks independently should be reliable entities. To achieve this, each agent should have the following two necessary conditions:</t>
      <ul spacing="normal">
        <li>
          <t>Obtain a globally unique identity from the ARS, which is an AIC.</t>
        </li>
        <li>
          <t>Obtain a digital certificate from the CAS designated by the ARS that can be used for authentication, called a Certificate of Agent Identity (CAI).</t>
        </li>
      </ul>
      <t>Each agent should have a unique AIC from the ARS on which the agent first registered. In the IoA, there can be multiple ARS, each of which should be a service entity that has been recognized by consensus (e.g., certified by a governing body). Each agent can choose a different ARS to register with and receive an assigned AIC based on their needs.</t>
      <t>After the agent obtains the AIC, it also needs to obtain the CAI from the CAS. In the IoA, there can be multiple CAS, and each CAS should be a service entity recognized by consensus (such as certification by a management agency).</t>
      <section anchor="basic-workflow-of-agent-trusted-registration">
        <name>Basic Workflow of Agent Trusted Registration</name>
        <t>The basic workflow of agent trusted registration includes the following steps:</t>
        <t>(1) The agent provider sends a registration request to the ARS to register the agent, which must include all or part of the ACS information. Apply for AIC;</t>
        <t>(2) The ARS manually reviews the content of the registration request;</t>
        <t>(3) After the ARS approves the approval, the agent is assigned an AIC;</t>
        <t>(4) The agent provider applies for an CAI from CAS, and the request must be accompanied by an AIC;</t>
        <t>(5) CAS requests the ARS to obtain the agent's details based on the AIC;</t>
        <t>(6) The ARS returns the agent details to the CAS based on the AIC;</t>
        <t>(7) CAS reconciles the agent details;</t>
        <t>(8) The CAS issues an ACME HTTP-01 challenge to the agent provider for domain validation and issues a CAI upon successful verification.</t>
      </section>
    </section>
    <section anchor="agent-identity-authentication-aia">
      <name>Agent Identity Authentication (AIA)</name>
      <t>In the basic workflow of agent trusted registration, agent get the necessary AIC and CAI.</t>
      <t>Agent Identity Authentication supports multiple security protocols. TLS 1.3 mutual TLS (mTLS) <xref target="RFC8446"/> is recommended. In this process, the connection-initiating agent acts as the TLS client, while the receiving agent serves as the TLS server. The mutual TLS handshake comprises three phases: Key Exchange, Server Parameters, and Authentication. All communications beyond the key exchange phase are encrypted.</t>
      <section anchor="phase-1-key-exchange">
        <name>Phase 1: Key Exchange</name>
        <t>(1) Client sends ClientHello message with supported cipher suites and ephemeral public key;</t>
        <t>(2) Server responds with ServerHello message, selecting cipher suites and returning ephemeral public key;</t>
        <t>(3) Both parties derive a pre-master secret using ECDHE with the peer's ephemeral public key and their own ephemeral private key, then generate session keys and handshake keys via HKDF. All subsequent messages are encrypted;</t>
      </section>
      <section anchor="phase-2-server-parameters-transmission">
        <name>Phase 2: Server Parameters Transmission</name>
        <t>(4) Server transmits CertificateRequest (requesting client certificate) and Encrypted Extensions messages;</t>
      </section>
      <section anchor="phase-3-authentication">
        <name>Phase 3: Authentication</name>
        <t>(5) Server sends CAI, CertificateVerify (signing all previous handshake messages hash using signature algorithm from ClientHello's signature_algorithms extension and server's private key), and Finished message;</t>
        <t>(6) Client sends CAI, CertificateVerify, and Finished message;</t>
        <t>(7) Both parties validate peer's CAI and CertificateVerify.</t>
        <t>(8) Upon successful mutual verification, encrypted data transfer begins.</t>
      </section>
    </section>
    <section anchor="agent-discovery-adp">
      <name>Agent Discovery (ADP)</name>
      <t>Agent discovery refers to the process of dynamically identifying and matching the functions and services provided by distributed agents according to the requirements of a user task. Agent capability discovery enables dispersed agents to be efficiently searched and invoked. It is the prerequisite and foundation for large-scale collaboration among agents.</t>
      <section anchor="core-roles-in-agent-discovery">
        <name>Core Roles in Agent Discovery</name>
        <ul spacing="normal">
          <li>
            <t>Leader: Agent who issues tasks and organizes interactions. Leader is the initiator of agent discovery requests.</t>
          </li>
          <li>
            <t>Partner: Agent who accepts tasks and provides services.</t>
          </li>
          <li>
            <t>Agent Discovery Server: Receives agent discovery requests and returns discovery results. Each agent discovery server must establish and maintain mutual trust relationships with external discovery servers, maintain a trusted discovery server list, and perform agent discovery within the trusted scope.</t>
          </li>
        </ul>
      </section>
      <section anchor="data-sources-for-agent-discovery-servers">
        <name>Data Sources for Agent Discovery Servers</name>
        <t>Agent discovery in the IoA relies on a multi-level agent discovery architecture. Through synchronization mechanisms, it obtains authoritative registration data from Agent Registration Servers, to support capability-based search, matching, and decision-making.</t>
        <t>An Agent Registration Server is responsible for the submission, verification, approval, revocation, and version management of agent identities, to ensure data integrity, legitimacy, and consistency. It also maintains the agent’s AIC and version history as the reliable baseline for discovery. After obtaining registration data, the discovery server stores it in a local database and builds customized indexes to enable efficient handling of discovery requests. A discovery server may synchronize with multiple registration servers to support multi-source registration scenarios.</t>
        <section anchor="data-synchronization">
          <name>Data Synchronization</name>
          <t>The primary data synchronization methods between discovery servers and registration/monitoring servers include:</t>
          <ul spacing="normal">
            <li>
              <t>Full Snapshot: Used to obtain a complete data view for initialization or reconstruction when starting up for the first time, when data is lost, or when consistency is compromised;</t>
            </li>
            <li>
              <t>Incremental Changes: Used after synchronization becomes stable to continuously synchronize newly added or updated data at low cost, to maintain nearly real-time consistency;</t>
            </li>
            <li>
              <t>Active Push: For stricter timeliness requirements, the data provider may proactively push changes instead.</t>
            </li>
          </ul>
          <t>Note that the discovery server may obtain operational status data from agent monitoring related servers, which will be elaborated in Section 9. They may use the same data synchronization mechanism.</t>
        </section>
      </section>
      <section anchor="basic-workflow-of-agent-discovery">
        <name>Basic Workflow of Agent Discovery</name>
        <t>The basic workflow of agent discovery includes the following steps:</t>
        <t>(1) The Leader receives a user task and analyzes it to determine the required capabilities (skills) of Partners;</t>
        <t>(2) The Leader sends an agent discovery request to the Agent Discovery Server, where the request contains explicit query information or constrained query conditions;</t>
        <t>(3) The Agent Discovery Server matches the query conditions with the available agent descriptions;</t>
        <t>(4) The Agent Discovery Server returns a list of candidate agents that satisfy the requirements to the Leader;</t>
        <t>(5) The Leader selects Partners from the candidate list according to its own strategy, performs identity verification, and collaborates with them to complete the task.</t>
      </section>
      <section anchor="different-agent-discovery-methods">
        <name>Different Agent Discovery Methods</name>
        <ul spacing="normal">
          <li>
            <t>In-Domain Discovery: Upon receiving a discovery request, the discovery server performs matching, ranking, and filtering of available Partners within the local domain; if the Leader’s requirements are met, it directly returns the candidate list of serving agents.</t>
          </li>
          <li>
            <t>Cross-Domain Discovery: Discovery servers across multiple autonomous domains can establish connections based on trust relationships between agent providers. If the discovery request for an agent cannot be fulfilled within one autonomous domain, the discovery server in one domain may forward the discovery request to the discovery servers in the neighboring domain. If the neighboring discovery server locates a suitable agent, it returns a discovery response.</t>
          </li>
        </ul>
        <t>There are two cross-domain discover mechanisms: the chained forwarding and the aggregated forwarding. For the chained forwarding, the discovery request is forwarded hop-by-hop along a trusted chain, and the continued forwarding process is constrained by a maximum hop count limit. For the aggregated forwarding, the upstream discovery server can select multiple downstream discovery servers from the trusted list to initiate parallel discovery requests, and the continued forwarding process is constrained by a maximum participant limit. During agent discovery, each discovery server must ensure that the forwarding depth or parallel fanout do not exceed the configured limits. The AICs of all discovery servers along the route must be recorded, to ensure that the discovery results are trustworthy and that the discovery process is controllable and traceable.</t>
      </section>
    </section>
    <section anchor="agent-interaction-aip">
      <name>Agent Interaction (AIP)</name>
      <t>In the Internet of Agents, agents may form different collaborative networks under various task scenarios. To ensure that agents can communicate safely and effectively across different scenarios, AIP defines standardized mechanisms and processes to promote deep collaboration between agents.</t>
      <section anchor="core-roles-in-agent-interaction">
        <name>Core Roles in Agent Interaction</name>
        <t>In AIP, the interaction between agents are task-driven, based on which agents can be divided into two roles:</t>
        <ul spacing="normal">
          <li>
            <t>Leader: Agent who issues tasks and organizes interactions. There should only be one Leader in a complete task execution process.</t>
          </li>
          <li>
            <t>Partner: Agent who accepts tasks and provides services. After Partner receives a task from the Leader, it executes and returns the execution result.</t>
          </li>
        </ul>
      </section>
      <section anchor="interaction-mode-in-aip">
        <name>Interaction mode in AIP</name>
        <t>In AIP, there are three interaction modes between the Leader and the Partner: peer to peer mode, grouping mode and hybrid mode.</t>
        <ul spacing="normal">
          <li>
            <t>Peer to peer mode: In this mode, the Leader maintains separate communication connections with each Partner, ensuring context isolation. Each message in this mode has only one sender and receiver.</t>
          </li>
          <li>
            <t>Grouping mode: In this mode, interaction messages between agents are distributed through a message queue. Message in this mode has only one sender but may has multiple receivers.</t>
          </li>
          <li>
            <t>Hybrid mode: In this mode, the Leader and Partner may interact directly or through the message queue according to the Leader's task planning.</t>
          </li>
        </ul>
        <t>Agents in the existing agent collaboration network can interact with other agents as Leaders through the interaction mode defined in AIP to introduce them into the agent domain, forming a more complex agent collaboration network.</t>
      </section>
      <section anchor="messaging-in-aip">
        <name>Messaging in AIP</name>
        <t>Messaging in AIP includes three types: RPC, streaming, and notification.</t>
        <ul spacing="normal">
          <li>
            <t>RPC: For instant scenarios like synchronous messages, managing task states, or performing actions requiring immediate responses.</t>
          </li>
          <li>
            <t>Streaming: For scenarios such as chunking large files, real-time log pushes, or long-running data transfer operations.</t>
          </li>
          <li>
            <t>Notification: Event-driven asynchronous callback methods for agents to send notifications to other agents when specific conditions are met.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="tool-invocation-tip">
      <name>Tool Invocation (TIP)</name>
      <t>In the Internet of Agents, to accomplish users' complex tasks, agent collaboration often involves calling external tools and accessing external data. TIP provides a standardized interface for agents to call tools, enabling different agents to use various external tools or services through a unified method.</t>
      <section anchor="core-roles-in-tool-inbocation">
        <name>Core Roles in Tool Inbocation</name>
        <t>TIP follows a client-host-server architecture:</t>
        <ul spacing="normal">
          <li>
            <t>Tool Agent (TA): Tool Agent is the agent that uses the TIP to call tool, which usually acts as a Partner to interact with the Leader through AIP, and autonomously planning to call tools to complete the tasks published by the Leader.</t>
          </li>
          <li>
            <t>TIP Host: The TIP Host process is typically created and managed by the Tool Agent, serving as a container and coordinator for TIP Clients, and managing cross-client context aggregation.</t>
          </li>
          <li>
            <t>TIP Client: Each TIP Client maintains an isolated TIP Server connection, handle protocol negotiation and feature exchange between both parties, and send requests to the TIP Server to use its corresponding features.</t>
          </li>
          <li>
            <t>TIP Server: The TIP Server provides specialized context and functionality, exposing tools through TIP primitives, which call tools based on received requests and return execution results.</t>
          </li>
        </ul>
      </section>
      <section anchor="basic-workflow-of-tool-invocation">
        <name>Basic Workflow of Tool Invocation</name>
        <t>The basic workflow of tool invocation includes the following steps:</t>
        <t>(1) Tool Agent creates a connection between TIP Client and TIP Server;</t>
        <t>(2) Tool Agent autonomously discovers available tools and invokes them as needed;</t>
        <t>(3) Tool Agent proactively disconnects from the TIP Server once the desired result is obtained and it is confirmed that no further tool calls are needed.</t>
      </section>
    </section>
    <section anchor="agent-monitoring-amp">
      <name>Agent Monitoring (AMP)</name>
      <t>To ensure that agents’ status information can be aggregated in real time and distributed in an orderly manner under a unified specification, AMP adopts log files as the data carrier for agents’ states and behaviors. Through standardized mechanisms for log collection and storage, it enables centralized retention and controlled distribution of agent information, thereby providing agent registration servers, discovery servers, and other agents with capabilities for status querying and traceability.</t>
      <section anchor="log-file-categories">
        <name>Log File Categories</name>
        <t>The raw log data is generated by agents. Logs include the following types, and different types of logs are stored in different files:</t>
        <ul spacing="normal">
          <li>
            <t>Heartbeat Logs: Periodically record an agent’s operational status and health condition. The core purpose of heartbeat logs is to express the fact that “the agent is still alive.” They are typically generated at a fixed interval (e.g., every 10 to 60 seconds) and usually contain only lightweight information such as status indicators and brief metric summaries.</t>
          </li>
          <li>
            <t>Metrics Logs: Record an agent’s performance metrics and resource utilization, focusing on “how the agent is performing,” presented in structured numerical form. Typical contents include task queue status, latency percentiles (P50/P90/P99), and CPU/memory/disk/network utilization.</t>
          </li>
          <li>
            <t>Access Logs: Record every interaction between an agent and external systems, including requests, responses, errors, debugging information, and tracing data. Access logs are “generalized interaction logs,” covering traditional request logs, error logs, debug logs, and distributed tracing logs.</t>
          </li>
          <li>
            <t>Message Logs: Record sending and receiving behaviors of an agent through messaging channels (queues, topics, streams), focusing on reliable delivery, ordering, and retry status in message-driven architectures. They help diagnose issues such as message backlogs, out-of-order delivery, and duplicate delivery.</t>
          </li>
          <li>
            <t>Auditing Logs: Record security-related operations and access activities of an agent. Auditing logs serve security compliance and post-incident forensics needs, typically including fields such as operator, target, operation type, and operation result. Auditing logs usually have a long retention period (depending on regulatory requirements) and impose high requirements on integrity and tamper resistance. Transaction logs of billing systems can also be categorized as a special form of auditing logs.</t>
          </li>
          <li>
            <t>System Logs: Record status information of the agent runtime environment and related services. System logs help diagnose issues in the agent runtime environment, and are typically used together with access logs and metrics logs to provide a comprehensive troubleshooting perspective.</t>
          </li>
        </ul>
      </section>
      <section anchor="log-collection-and-storage">
        <name>Log Collection and Storage</name>
        <t>Log Collection Layer: Various logs (heartbeat, access, metrics, audit, message, system, etc.) are written by agents into local log files by type. After necessary steps such as parsing, filtering, and labeling, this layer delivers logs by type to the log storage layer in a reliable and controllable manner.</t>
        <t>Log Storage Layer: This layer provides unified storage for different log information from different agents. According to the structural characteristics, access patterns, and lifecycle requirements of different log types, it provides differentiated storage solutions, and also supports index building and fast retrieval of log data, providing data support for subsequent monitoring analysis, alert triggering, and root-cause tracing.</t>
        <t>After logs are stored, they can be read and processed on demand by different analysis and application systems for querying and aggregation analysis, operational monitoring and alerting, fault localization and root-cause tracing, security auditing and compliance retention, and unified presentation of key conclusions via reports or visualization, thereby supporting a continuous monitoring and governance closed loop.</t>
      </section>
      <section anchor="the-use-of-logs">
        <name>The Use of Logs</name>
        <t>Logs are the most fundamental and most trustworthy “source of truth” for an agent monitoring system. The monitoring systems continuously collect and reliably store, by type, the status changes, request interactions, key metrics, exception information, and audit records generated during agent operation, and then distribute them in a controlled manner to different entities for processing and analysis.</t>
        <t>Logs can provide long-term data foundations for agent auditing, agent transaction, as well as network performance optimization. The IoA can achieve operational observability, alerting and diagnosis, tracing and accountability, security and compliance assurance.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>This draft introduces the Agent Collaboration Protocols (ACPs) architecture for Internet of Agents. By defining a comprehensive protocol suite, including trusted registration, identity authentication, agent discovery, agent interaction, tool invocation, and agent monitoring, the ACPs address the core requirements for interoperability and secure collaboration among heterogeneous agents. The long-term goal of the ACPs is to enable IoA to serve as the critical infrastructure for agent collaboration on complex tasks, as well as to support the future large-scale and diverse applications.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/> and <xref target="RFC8174"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the Agent Collaboration Protocols architecture for IoA. Security of IoA is not detailed in this document. Security considerations relevant to deployment with multiple agent service providers are suggested to be deeply discussed through other proposals.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no request for IANA action.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ACPs-Github" target="https://github.com/AIP-PUB">
          <front>
            <title>ACPs GitHub repository</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9V963IbR5bmfzxFrfzD4hiAJbXtbtPrjYVJucVpSeaS1PT2
n94oVCWAGhWqMJVVpNBtdfRrzMTMm+zT9AvsK+z5zjl5K4CS2pZjdxhhmSxk
ZZ48ee6XxGw2m/RVX5vT7MFibZo+O2vrOl+2Xd5XbZNddm3fFm1ts0VXbKre
FP3QmWzVdtlF05uuMX3WrjJ+1T6Y5MtlZ24x19ll+sqDSZH3Zt12+9Osalbt
ZFK2RZNvaeGyy1f9rK6GWbm1xSwvdnaWd8Xs0aOJHZbbylqCpN/vaOjF05vv
J82wXZrudFLShKeTom2saexgT7O+G8zk9nSSdyY/ndy13et11w670+z8xfVZ
9nv6u2rW2W/xbPLa7GlAeTrJZkd2gqcOHdvt0FQFowOPb3L7OkXSpNp1vLjt
nzx69PWjJ5NJPvSbtsPkk4x+VkNdy17/cWiy59XAT9tunTfVn3iO0+w7U/0z
wHvVVLems1W/BziXre1tljdldmNqU8TAWJ7E9p0x/Wn2+FH2P6t+KDaG5rhq
83KaPcurssqb7LyiQVXR8/iCJvaLyZO2NHj/0W9+/ZU+GJoe53S2qZqcH5lt
XtWnGZ3RPw/Nf18Ou35uymFeNIc7/J3J/vD/2f4OtnOwZd3ffnht3ru759V/
0t3V1Wvz+OuvH71vhzUtu6b5TPOfdKOY/XWdbHPStN2W4LkliTGB/PF/ZRlk
1ey3Vb8Zlqc8TZ93awC76fudPf388zV/Nqdtfb64uJxdvvpOhjm5CVlH7z8b
lllndi0hhcTcg8lkPp9PJrPZLMuXtLWctjY5EDXZw4t2cZLl1dZmfZut8qKq
q54kG0lJGkrSrSEBClEM7BaJcM63LWFxY2hcS3OZdqAzYPmFqfKy7Iy19M52
V5s3tCv7Ws7IDrtd2/XZbd5V/M5uV7vTIohvNpVlSSuSOdt1LW3K0KQbk71b
STwELmg3keCfZnebqthk7dDXVaOzkPRluNqGoQVQq6Hhfea0/YqGdeZfhqoz
Jesa3pVgpN2ZLl8CSfs5Hx1NRJSY5XVNVEYDLXCraKgaXo4QDm0wzVZdu8WT
isYXBbBDiEqQOqV3inooiexOdbM3kOwEyJVZg0Rlzw8XN1cnUx1xUdK/YIUF
yX38WrhBFws/iOibId3T4/PL8C42lRduPD64aduant+2bpobfgwsyTsv2gY0
Bj58uHhxeTLPbmiXNVHDjCbbZrcVVCbTGBBU8TbdqQMhq4HVeA1Cn9kir1Ny
o80qAoXoGtr2UPT+6IiBulyeeWugXSixb6uyrM1k8gm21rXlwHubTH5PXMQz
dPmuKrPS3Jq63W2xHxxY11erqqjymiGp64oAKAxQQlvf4eNiIHjrvUBN/zbr
gaDMtiQF6uzh8+cvTjKiuU3T1u16P5WDZ1OBEXHhtrTJbUZ2wV0D8oYUoO3X
REseviLfKYExYEPfNu0WfEKUV5idUElpCkbybJvDqpDTMW9MMcjnstinCW/R
Jk22hHjEyRGdkZ1i6Vfa011VGrujv0swYJuBUGicYYDqaguRwFMQRPyKmQlP
2D3R5tbK+nTKZH/lr4nOjfHErgeYV9g9vQ9+7ipDUm6fbYe6r3QqOtOtAZ9Y
dzhEB8u9FxO3pinbzgpmD20mlWRAr9kaOqJyDqrwos00+ZLozJp8W4tcEtF2
C0Qz9lYgAEByTMwJQrE42W/rDXi9KfOurP5kQKKRxsEGVR5hWiZskqvGy7af
Ktb+/OdIVbx96yQbzZin4DgAiOdIDDr+iJCA457BTE2wMM2KrrV2Vrakx5oD
cSdnbInEOvPBmkBEA89XbHIIGtORFKsK68UDqJIObUUztneW9OM/ZC+YLAqa
oCN5jC0dE+mgq8oKUTEhkZ6J+UX2QWdmchqtu6KXevo/cwBeJT7c5g0By5Kg
IWYmfFuyEABTF4ncKaaOpKugo/RS1ZoOFglJi0jYeZqa0lxk2BDy5T1Zkw8j
loKRoolUryVMgAlAQf+QXd9PeVuSP2QsWaL4O4iTnSHpQ+Dw/7EsOyTYO6TW
FEqrvas8dTPkpl7N1OYy/E5DblNfwSQIuK3305G5IFIV40mzDZ1YEGrnEGTm
DSBbY02CjeQr/h84rj/wanirV+2SdF9yDLJEqufCtqdC5BYkCr7qVXeqtg2a
GbOQvLvF4kMj/pIQmozks837nAUaGXSC+is9w0OIIhpyi0SCHJgGh/ChVKBq
x2Ss4GKuCwS1zC3BQ/NHCoGwSXwAeR8R2SC2MKmuVIyFqQikiGFvjWNO2VNe
z/pqC03m1brfA8mVfhB0LM0mv63aLll727IwEBMvUjbOftoyth0/yZw5mTc9
Ux10Rpc3VuwPwPOBFhWJsw+zpvjJB9gPemIxN02FKkeSjkAms7YdSBUz+xSO
Wj8h36MjzcrqnzaCCf/P//63ReOYmsV0u+rvIPBoSRKHJf+uxhsTRyy+UhWf
avhAFGSsTuUvokuoV1gJJM/pDezXNLdV1zZblkF5gUPBRxCD5k0/sL3j2RRS
Krdt4y2K2uQd/pqrhipy6IXS7EgX099kOdBGEtKqdSMtLd5FcoXAwjLiBsyz
pxDJHjGwRHrR9oSjHW2caFg/JmV2S+qqU1lkSj1mkBwJGfoYR28Ckb1PWizN
CkQr8wIXkNxVYXjedtkzW9LOye2qtizHnHkth1+b2xyoIOcAz/Oa6TY1xM9I
vMJ2PDshK/7iTA6/MGxkihJY1+0Shh+491+GaJF+k0PikXCygrtN9CEYQQlq
zhO/WPzBqTSxrFsn0nGsW/Wa2eyN0aJbzqBiDXE0j0jxLXYWDYRNHAxZGRQh
hDQsKaRC9RrbextTvGbv2CPmLIiwaz1e56KcXQNHZ9eCo5Lswqo2sM9t0VVs
7ca7/tQmlK8QBD3D2AOVLgn2/NaUemjk2pOwL+e8EpA2WNEQ/3j9w0uyrP7L
1fdnv3ny5ddv32YyGW1/vxPbPLhkR1DcORzTaUzVuXGeZAqqQ56MYlcB84/t
ooBHd0iJBSn4THzBa7Y8CJVXjMorRaV7Xc+qI8N/3bCOW+4zH7YEy9sdLCnI
D4jCA2Lx0lcgLzlQshzcZ7TxCGgosZ7MFThP9KGnKzq4/JaO1pGBKBba0Jlw
BcKz7L+SAgKV6J7OFtgT/Xt0T3zalT3YAr1arfbuwDxNxYSSmgKVJVMZQo/1
uLeIHMsCONiRBPSyruxGJGhseQX2hcXhzyk43f6QzvmQzu87pHQjToUzRIK+
2ox0efBXe7clvOrFKGuxSB174BZB15yz8eEiDgcfqPxKltWghrOrnclYRuYQ
U5qHAy6I264TMuSikQ2ROxYzwY4vq9XKdF7WsJZzEp5IfAqamAKPQnreoPkk
O4j9eyH0bvfqQ/2oY+5HKheCA7gcqrqHDffs5ubymnybh49P3hvW8e+fZudm
5YNWiUUl9iurvmC/sAYT1iVSE3viuNz3+CeInpx8SBjpHqAijyMFQxVpWZEa
hZHh5o7UpmxC7YKRki6H7oDJAOyvTg7CWe4gJa71geA5xsp2bS/gjAw9hHwa
sqozNtIz8oOb1JYKSoHUN4EhosVOvY0eTJOpMxuJuLMVmTDLvHiN3XxxciQK
F+3nYryf44GG0d68mKLj5uSVVdtRXDBCirUwq6dCDhAtbvZuvESd7zWARTwC
kL88OYgPBoBvGOBLIa6YnbK7fD+CsqIJXpPge4NADqG/b8EwEFxqjmG1r04O
Q44Rfl6MlvMhJF4r8mdYJpFpK1Qlst35MzEZQm3Run/5y18QmL+8fH5xtri5
IAvh+eIPT6/o2Wezn/PzGc3wY5b8fJBoCj8/Hs7wd/64Gc5ahEfr7HpY8iGf
ysdug5/d//t7YKCPiBFlCH6/iH5/Ib+/Z4afD8PfgYeffJgfEYaY/aPz+EXP
4ubiY57FR+ULKMsRGKw/x7Cdv/SPPgYMNMXN1eLl9eUPVze/HMPj5+ZsvD/6
eXV+5OHH2tjFy5unVy+f/sL7uri8/eLYw69+mX1BTP/5NPtkVa2lbIPUDXme
nBj9VvKiXllc46MHbxGCN5JylfjakUTCz40r/4SocRIWjSPnGIVAWBz/ZkvV
B8xVXb0Hl58x0t83aCJnemj/P9ZDi/49HPTEneyPfqXP/HlHD6JZ7h/Gs/wI
U/8x/e+/8tP/Rr+R2f/YiTD3Lz99kgyj9/DgI8JCP388JONDvBz7+aPHC/5P
Nv5PmoVfdLPc/lRYbj0sYcOsIxIEHMcLjwt/6xldLhb+jBj35+7MZOhn/vGT
eBi99kQU0JEzej8so2GKF/xDWm5KLksW0ftn0SzxwzBWP9ZZIqZg0MGRTHZ+
Fn34K091/JPOkuD9/bCMj/AX39GTYzv64v/VjsBoP31HcEoY/h8PdvTl37+j
e2G5f0fjnz/Gw458fmQWNo+jHzLR4vePz0IvJbMcEwy3HwKLGxSx4wGjJUd9
8JPYhIz/5+3aRmN/ZN/RJmR38BO99eNHguXjKEf6eW6IoEqu2roi2/Pb7N5w
LA1B1JKGvCvAiYnOo4nG8UL6nMQkPr8kK4FjygsL4wQZCH4FM0CffPuOsBLG
XCzCmHsCPRMV8IfAOCtqoi7Et+8IW0zUtfj23jjBRB3Bb+/37Q9NOxhAiWWX
VPcesevaRcbFC72xIZWaxulWQ1PmiOYQWruhNtYF6GBwaXC4M6EUDBlvfllq
NgjtB/E2fOCOIKENd6Iu4ubSglskuDmbpYkznBTHr10IJs1oSxmBLw+SsI0L
HrTdpzaE2jTRVYzS6oih/Z6OPcuRBOlCIUoeQsXGappi58gu92QncJeGC+hc
AQu/CdMWwbDKVbUgOov4WVG0XckpAY8kojTOzgq0q/3RBHV2t6EV0jQKh9fC
mnFUNA6pOfuYCZYPDkHG9WF5j8ax06xiUrQ4V3Q1abAKZjjykaZ0tXTsAxSa
s+MhWHDda5YK8S75LN9JERREAsYR4AhcvycuLDTOYfRNO9TIyCPElq+My0xK
cYKm6IpWirNCbkaR2g2N1L80WdWHE3FUNU7WjhK+YW2/oIvQk8vS0mFvkGqj
KSvnImkpgby4yW/NiA/pAAiTiJWiJoywiPoAcsK4FugHl5G9N2PqC804LxCK
ohqkpubJHC4cHeV1wuuQ16Wx1bpxyWidNMkqDtYVhY4cO+QKkf5IBL6vs/Uy
9+HZ4uKEoHp6HDO52x6yu/HOIL5kbyFXu6o6Xx5jOq54i+ojkIE3DmzvyDKS
+FgINpkwIacjGTbU1C2Nae7LIWYPzXw9nzqsukT+GsqDKW3ZlvuTJOkPqIpN
C+7Oo1wPI/sgh8HEjaIGw3lgiyOCfCUMxZK96qQ+AAmuFd4OiJJshEolJGqJ
8PPatqGgQPMVQgcXCVF8CFY5G8VRduwRlPQOpN6LRpfgCuTJBQtAZlRghC0V
e9DQJ59k3+W2Kri5ZAVp5+ntqB3AAmTJb9xFbwiOXK1UkjDSvJwdcSwN3Dlt
eXNQOkD7bUo7zj2pXgGyPV9FR+0Py7Ewa0aXF0QMhHgOWRmn9rhmIGR059li
ByUK1qQj/kb07I2uROgbWHh05rYydy7fgVS1n/AYtN9ozsnTEyZj8X0by/Lb
vJ5G5MYBGqVSEUPfiGo6gisumjKan2oC8XmKcrk/4I5xApIqoKHyxvGaX+PL
EyY+HW9jTEcU7jLykhkf2Uc601cBeZ0hI0u5x2l/eVHPEksezJHRJL924BCq
i6o2R+bAWr+RtSTNbwcjwvvsxVOO+84ePUaRBElXZK90yREWOVkuYSg6i6oM
1T9uQsbssEMSdOBqsdVQJ4bWPOjgd2ZC0UXBIPw9jKQV2dna9NoS4NQdpBjg
JPAO64hG62vVnQ1yh8txMdLnnEkJP7/OHs9/RYO4vgt/PtzSvyeuzuWLL756
+1bqJpDtg2p3qoMeatpy6lhEq1BnFVnpZLGEBBqbOpo6xCJFXTn2rZ2x6krR
VNHBBE7ekfinVgkHeDeEEbvJX4sl1lViZqKqfEfKiAz17Hdmnz31RaVaXXGZ
IwHYS0AV7QoJ+uZs2KfdQcRM+1aZDKWBPknK62RSnld0+x0dqAjcS/7gcQqB
SMIzRoBKP/njmSGR6TKuos70EFG8W+1QJMfVBZqjpQdbRHyz3bCsiboIJpVk
ukWpECm1wFceJosgq1vjyJA+P1hAWBmf3bcUSbvvWtQOo+fBQEZ0rHhRLjvb
5iyriepoIjKFMNHTs/NnT4MZiVpjEi3HpnfijBQ16q6jIbQErCUaw2TXZKgi
5yJiTWHjI9lBIA1+dFvl2bPfnX8vh2uHpYXog2OlWe70DL+JzvDJ6SHdkN7M
G6tNnyKzdUwvHxDJR/bdlcrlhypwGelCBZGJecKAP3UwENWQ2pHEvIMyhutX
p2PHnOW6wqHUtbiYxoD8E1c8kQVBSof5ra65vpk7JwLKPFJooY2enxi88C/z
eo3gxGarGihQMB2oH/a//DDLDhHvRHsDAOGnNj5PbRz6nqSH3ZjSQaAaJuWY
o3u6//1fjyhVBb8nQQh8lqzjKeeicl6NlIHKn1gnTAPlSDk4UwEZqyQ31lVj
I50x6q9yojykejqzAoGp/nLFO6Q1yn2Tb12pobrDvmjBFZPElYXWY5vLVlUJ
siXgi/OiHir2vnmO9rCQCFpL4gBw9kKdr6/XDBuQ5hGLJwgLhBXQ92NC4Tmc
RIN4jRaDiedbcq1XZXX3hqGwqKvi9rsWsRhWclDlcU/E/d04IpDPEOS4agEZ
af/RYUwms+y5yUvk0+Wju03rbILQkuiq16wUW7p6dH3VQa0asI0KYePjFZML
bWgQKKgeitdEifqujxfducIVX/GS4d3jkcBTsuTZBbL3rhwJeJt8jLqjtOZ6
nIAUwzIUDgnpVVJXrHzBZg2cftGcm2qnSshHRY6kNf0kuTeLDtamFftpWgw2
AhLLqOnqZqGPdkYI4ByMec0l+WJGH8egPWTJ0E3AwQwU6QJS6Uqr0YR2AEqc
iIXZot1g+6agX12fctKRUgX3U/tMeolxJf4GSxcWu/eGlG3SeRFYVCOewnPT
qEeEU81pFwFMzOb+JY4V03Ipsr8IYTqSj8H9IW3Txklu7s9um6OtMRq74arO
EN9kHIAB1x03zbga/EKVgCbm4f2yMGEP3lFY5Fr87a//ar1d7cAg0xZ90c74
9MErIA+dwUm9LXp72eWTkxtn9RlSXw2dUjNWgRzpM+kjaFHjjfFLNijRSDNU
Nam7ggi53XIUABG2NyZuUwxdPFDetfbkHJE22eIIM+f7iCLV7PQuw0FBqGol
39LD1K8tLungqA/tE894KelLjIEMgC2cGz7RQ+YgLihhevd3iCodiA0VZGHl
z6NSPjdGIwOnEJnfD2TuXDf5zm7a/jR7ZSVY75s5fFyX4UEAgE9b5Hnt4Go7
cVSlM6jieBuBR0KxY8Nu2Hl+kMAbuqamMkhI19JxQ5bRKH4aESy3ucCXoSO3
bIfi4o9C1DBRyBn7EVaBz5n4xojj3l3oi55pRHqbCLSBO/KSI2/MHT3JS5gF
BM2wK3Nvw+R9Bn+1YFD7wEH0Ejc4d74jLIKfAV4ULLguB7s5zb5HrSZfmQDj
gYZzf71NzAvlEazqXXVQJ/2RF9outKPZMnGjLHeTSBfyyxbBcYQfj7IZZtHz
lTSPdFxov1qQppplCfTDCsyUQUVJtOmuIhKCFaO2BnMlSUUhhK/ZQ93zqq5z
xJLLcB+Bq/R/d4guMlLeFZeL1dUHBePUaOm8vRDsO6mVJ0Tt/yQyCqXQcHy2
kICRcVimSZeH9jXhx57wZRtaGR1F2HRFDfs191koPvR3VD8zJ3UBCmN7V1UF
RwOthQSwFFsnnRxd6DA3pQ4ISQT1aW/uXVcUpmJ1/HaUHvHtFy585RuUbBTd
u2cNZ5blbO1wQyYdhbgrzooGrVvak13tD+10RZ1gWiN9Cerh81t/OFH3vV+H
V068AdcBzXLW4NYCtcCiLOJI3Se3gJiAn22SP3PpOTXQQnx/hJ0XogpEGM60
jsx/fCouWhRFOqSpe7Sw30ewhshzC1clrKq6N77V1R+tR19kcaoGZ9i+yapV
dA5saKR9GR2c7J6tvpKeFj0L1BA/HR0H7lNwRfjOp5llZ9wRfIiO80NNyc3D
7ypT5FRFsOxDQC8O+x4x7Z12TgOtZHBcrEYod8yqEWyf4GlajlWTa03YRmpM
kdo2R+C85xx1uIZ2t9JFcIeOguMwKJscmhT+KpZqvVmKJpBJ/YaSjw58lJZ7
wJDLGao+iAE+6MDcidcFK9rAp7thuQbSQKbzaLt35DGcahOliDPdrm+XZht3
TcYRq6jw6Zz18fE3x7h1yKqsG0TDN+1uttzP6H/arB48Np4x6u8UoyMFzsUz
KptIY81dvam2wxZLyD1KcqVIAPnojgTqYYe7m/Lt4ZGArkXsRV1jJM3uGR+J
RLcv5kBuRankgoNdjmJbUx8xtD/C9uUWmWqXBwScxw0pflFXWXzcSXe1IGoZ
RUCUZofO6y7sY5U37UAztxmY0bwpjPGbWFXroWMsIKopIXj0crJErI9480oX
rJpoVuOzUbCaO66DiGtVDiw3DUQII+AIyNbpNy4qfDA8RSl6VVT9yq0BBd+e
ESdtxjcZ+UTNYY23uyDHSZRtlIM+2uZos6GBnnWX0bAxFfwhFD7EG9fZOcvt
8w2GazVqf9uMcRawCvEAgp94yuUrpXaAJc2JUWtb1AwoTiS8DJjPpTG7Ufws
EevviKBF2GQ8oghTg2ABzelkcrCEmFmJlAFJDK9gxMaOsLLESUvUkiZsWTB2
rZRg/ayInchaTb63TY0yKFYhLpSX+IN8jOFSBUXizwrhSdxA346NcF7LyyAB
h9WHrG/S+B3GBMCEdeS0YjrHNS58ZheXySk5dcMps2r0QtDtARAv3fy2k7tj
5LqY5PYYScbsl11V8t+CtPFLpz6tKFNEK4bAjTUQWP249zA2VSTQCKmoAE6F
36K7LIhG2loTfRzqdFm3KoKAa1mYLEATcFh073pQHW/jt/FGx1tI0OnyKUc4
IQ7Fu1ujcg8UaZWBjIMXHwojzcPCCp9FoRwBWij2WTiMd6Adm3XUKZ3Xsp1g
rrJSFnjxXgLxYTZBpv1UReKuzrm4zKWyveFl3lQ2yh0frcHT60UUnsNrRGjr
sppNABzTt8rLUhlDNLxcBWfEVRGREyoR1AKFIhA3I73W5n6IhSPlELWkjllx
/CR23cGSuE6WDL2ry7NpJvaK90xIUcclCTMMkmCL3LQRaQe+UtNHH6CWQmuv
v8hANFUvNxi03jPifSpziQfD0G63pmRTyNmvQlrXDkYN+3gIfMXSZmDvSm/H
W6HWYxpFkup2zYEeBYLvCnR1iGlizUdzZOWXETpOs6e4sEnVCy0b7RzpM7RV
++hi2m0MLkpQK0VfMXVJsM/dVhCFANSnkzt+jt2N+E5Do2+1WofdL0Ri7Kdp
fen0KIW1pEcazp3V0B/YH6ft035pvXALSfL4Q6B0znXYu8NmbA0566UiI0Rh
HZl7KrFocYecZRIGIgzmrKH7m7gjyUeCnWsD5YCOWR6K3GXr0t7YgLa5QWtz
spg8FNvP1CKOszFsOfAUorEf3ixOTuMHVVx9xGba4MqXb0RM+M27qOBgpWrM
lbrkXnSKUIkkVSRi3Z5ZG+sNRP7iNC8iU2wfDZ9YKZ7gxLeWo8oSzBoA+hkh
45RNd/dXbDeHK2zcDUujyzl47x5DyYUAuQu+qc4oWpb7nP4EyWA9Sd/b6Eo7
1sfs4LoyCFXOzsVzUi28firaOjyILAPoA9bqBC4GaDQtWAZTyY+YcBeCu67O
FSWsjBQ3+Moep6qXUe2Au9uQDQFXOtd60nAlIEL1FfeIdlqJw40Esob1O3M5
25t0gmAuQszo1YYeQ6NbaOEGvsF1vkwqTCJKV8LXcNtgWvr7SAItebtbDYRo
V8HGPDAv7X3h6pHQuy9cLUXxQTZ+SLg6cKdQqNKdu/nQnVVEHHzLs0epC0KH
eRJec96kjWJ8QXBGJflbkLxU87uAcZgyzlbwjAxfFFCIjrhtxMjgSvLO+Gs/
iBslXeGKInp1bFdVtzXqADctUUDHSomRiSMV/SOgRd7u+A5evrb10AX921//
1eVE4pi5umBR3KVqWFtzIsf1KHvzVe9AIR8f+SFidAgFcYiDXLfxxV5TbvHJ
yxb+EpQ/WwQu+coav8i7rtLSzRRYk144aKM8+z0eMNeMtGtWodF91cjFckkc
vCytXolvFSVGQJTb324tUQYTbT6+Kiq9KY+9rOU+ukdOBh1Lr06PdnzDi00M
EKiRJO3C9zjJ6XFiIro0EeEPuYWamfY5bf57lF2eydcc0NvCpl1+x5hxCUpX
WCexKe0054Y7V2qdcitbqq5r3VkB/BB4qfEi6JOz3kwoYRQfOfdwPDMkZpfE
37zSKZrZqrZU1STRIx855pj6kZQeu5tEof0m2GYStOJra3ZDh24kALXxqzF4
cv00iVK+jpx3lxdqAPztr/8eTIIKERakAYk6bs38b3/9D0n6sSftNWlAIJiM
NvnGWVO3BKx2Qhg+6sePsPJXj1AviZpNqQN0NoW7to89vbpab0jU4d+EUZ19
7XkYWCNcK4fQOa9gUHUkiu2w3eY4eG55ecEPrSL86giOoytvdAqnHTT3T9Tv
cuPwjQopFySgCGsbbYLzmAtuxRSI0+sLhST8VZslLhKks0dCBaPp/ASvrhQ/
okK4LeJyyt6nGcwAZNL5hktiW3Dzw8svH31++TX++1pLDc8uX32+NeTB7T8n
rnv9uXMuo+3MJxmhaCGXhiYYMppoPRLjcpkNuUtJDV5//3W4DipEjL0PRQTR
dXx3dWmWw3o9ujxw6pnauUNzB5xnMMK5UF4dzHeFEGMY6f6qOJpKGASNjRrs
51ECh/7OsOjvY4nvgMGngi0XqUjQBYvJCaWQpvOCO7650VsvW+8bQ3w3Btcc
8UGzs7TjKxDFJ8ZlyjHd+Zqd0oBDEShnneR9Z9zzuA+84txh7zBG3oLVjP7G
1Dvaeb5uID00zOi4zoU+4FgKntqhn7W4IBm6L4DB6Bvk9tsAnpKZu+52hDkp
3J+5eoTg90ZOHbvot+H+yHD3p5uUCYR1SugFEG+TGZuDlHCYiD45pQu+Q8lu
IeaOPX7PJSl0lCg5PAhsfPUvfzfFNEDLukCVmX+m4coRlE7waZ8bJxOCBt6x
TsgeSq+hP/H1UOdctxWnWUWQVtx/mm1IaI5qWptQRSaslW93UjtfyWWlc6nz
jhgI6CWFyu6uMjVbSVxjtkTeVvQq33Bo3TW1Ksfkov5or3JRN08zOvZDWyy+
JRO9mWyBRVfNueZOX7UicWadnWE/SsRxr8+xedU1TZTbIJVTdMQb330XCyK+
Rk1UBT+QXAN8Go2qd2YD6kKLJ3E7DK5N2zJaUDK8k5RHMFnOUnvtWuy1yWT0
2XO5EOufNNzASz/0an6qME4dbFM5jGnUEqGdsKYv5ie85zsiDgRYvBUkQUFJ
9geDFT4yEbgL64e2HfZiPIOQG2lZCvm6Ar0/OV+iLIpzmagO49v0VDzoPnQF
525iaTVbdThnLEJzb2So8gOxxueCM0WgQ9hNWNS7nt5c16FS9uhsNiwfEye7
OOPwD2unNArsVPzR+2yFgnZ5D6WpyqauVqbYF/VhOXoKjNqfVR924AdUwhK6
EdvWbK/rAsy4vmGKKyyl8tLpq1XONQ98MzCBLdasVnYGo14KvLQ0ku3xqMUk
vmAwr/cWHc95bfAtJ121XseaibhgVuRcOyaq1Xepjmxo9iz2zkPDV3Ik+T12
60uzZfNvHx+NQiCbj25id9IMwCdeRBSSieCPTe/RDYq8NSHzHD4tM4sreju+
y2nQSsm175GK8ipAMOXoUy1ILyPlO3ugoaRzBo0/+LojnC6u/K2gXby56rwz
PTmJ6odqyfHOpFWZwSnqFliu23YncgouxivxLCDKmdE014nsCEJu8UUSLCPx
ME5xk/WmRjWkfTf0G9hrScFMXOLKJ6ZNcePHNi36VI83vgFgL5Q0daJFb/IW
zaOFltNQBBKlT6eMZS9FUS+w01DOyFjlw1TXLXYqy7igwZOSL55oIiPTpWL0
YNTz1uACX9E6vgGYEaaM4GlSCXeeZXoy4BynlMJ3EklFqO8yifIDnjBdHD76
SoLkXjbnSMSOU0v42Tqvgg8MzQRsOOg9CDE/tUvo7+hLIUznOULVN1jQGd9q
B6Jixr8T2CnlopyUfqfXlyKu7hkl+dIZnwf7id+mdc83L86z7/aSdXOMFlsC
6TXKsat0vFM23Lc/vjpvXCbjwjKegqfjIGR0O3TESsIR8u0z+jVlvQskJOpI
qsTT78HRUPFP+BqcQI3rVjSOB6OKi//1y3rEqnd389Khs6f8ji+vSNJHzUGS
KVDy+7+OSygSVooZfz8bU9etiGzRNnxDsSTLJOgEKXLHkuHBi1fXNw+m8v/s
5Q/8+9XT//Hq4urpOX6/frZ4/tz/4kZcP/vh1fPz8Ft48+yHFy+evjyXl18s
/vBATvjBD5e4p3fx/IFPpZfkOYr93BltUeOj3EHhsBEvJbxLCVJIb/STx4/x
HQCYUpulH//6i7dvedvXjvXOUBZfOnfNMZhbjj1WaSV6P48dMle7mIeViERA
DLhppu3ji+zTLUZvFAls4esquNB7V7d7hjHtCAnN2fHd4GqUDGTHMJMKClFS
pGHwgc0R59ZLKFMuE5LvxPgku1i8XLwHW9scEfimTapI+T3haP1WN3jgk/8L
8l3ehC52AAA=

-->

</rfc>
