<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wendt-stir-vesper-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="vesper">VESPER - VErifiable STI Personas</title>
    <seriesInfo name="Internet-Draft" value="draft-wendt-stir-vesper-00"/>
    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob Sliwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="25"/>
    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>telephone number</keyword>
    <keyword>vetting</keyword>
    <keyword>KYC</keyword>
    <abstract>
      <?line 48?>

<t>This document extends the STIR architecture by specifying the use of JSON Web Tokens (JWT) and Selective Disclosure JWT (SD-JWT) for representing persona related information intended to be the output of a Know Your Customer (KYC) or Know Your Business (KYB) type of vetting process. It defines entities called Vetting Agents (VA) that perform a vetting of persona related information and can issue a verifiable token bearing the VA signature, containing information that can be disclosed or selectively disclosed to an interested party. The Vetted Entity (VE) can hold this token in selectively disclosable forms to disclose specific information to the third parties. The vesper token enables the delivery and verification of information with privacy protecting mechanism in a complete, selective or zero knowledge manner specifically supported by the SD-JWT. This document also describes an API standard to be supported/hosted by a Vetting Agent (VA), which allow vetted parties to present tokens proving their KYC/KYB conformance, and incorporates proof of possession to ensure the legitimacy of the entity presenting the token.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://appliedbits.github.io/draft-wendt-stir-vesper/draft-wendt-stir-vesper.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Telephone Identity Revisited Working Group mailing list (<eref target="mailto:stir@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/stir/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/stir/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/appliedbits/draft-wendt-stir-vesper"/>.</t>
    </note>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Secure Telephone Identity (STI) architecture fundamentally defined by STI certificates in <xref target="RFC8226"/>, PASSporTs in <xref target="RFC8225"/>, and the SIP Identity header field <xref target="RFC8224"/> describe a set of constructs and protocols for the use of tokens and digital signatures to protect the integrity and provide non-repudiation of information as part of a communications session most notably the associated telephone numbers. This document extends that architecture to address the association of a telephone number to a persona (e.g. a person or business entity) given responsibility for the right to use that telephone number. Recently, the illegitimate use of telephone numbers by unauthorized parties and the associated fraudulent activity associated with those communications has generally eroded trust in communications systems. Further, basic reliance on the trust of the signer alone to at the time of the communications without has proven to require time and people consuming work to perform after-the-fact investigation and enforcement activities. Other industries, like the financial industry, have adopted well-known successful practices of Know Your Customer (KYC) or Know Your Business (KYB), otherwise referred to as the application of vetting practices of an entity. This document focuses on the representation of the vetting results and the information vetted for the responsible parties before any communications can be initiated. The confirmation and acknowledgement of the connection between a persona or business entity with a telephone number and the responsibilities associated with its use is a critical step towards building true trusted relationships between parties involved in a set of communications. This document describes the "vesper" token, a VErifiable Sti PERsona represented by a token signed by a party that can be used as an acknowledged and trusted as part of a communications ecosystem to represent the output of the KYC or vetting procedures likely corresponding to an agreed upon set of policies defined by a communications ecosystem. Additionally, the use of detailed vetting information required to verify a persona is information that likely requires strict privacy practices and policies to be enforced. The vesper token and architecture provides mechanisms for providing selective disclosure of any personally identifying information to be disclosed to those that are authorized by either the persona directly or, for example, based on enforcement actions required for legitimately authorized legal or regulatory activity.</t>
      <t>In the current state of digital identities, the unique identifier used to identify the persona behind the identifier is obviously a critical part of using an identifier as part of a digital protocol, but just as important is the ability to associate a real-world persona to that identifier as the responsible party behind that identifier. The telephone number as an identifier and as part of a set of traditional communications services offered around the world has been facing a challenge of illegitimate fraud based on the lack of a formal framework for the explicit association of a set of communications to a directly responsible party. The use of "spoofing" of telephone numbers, a practice of the use of telephone numbers by not directly authorized parties, while having very legitimate use-cases, has been exploited by actors of fraudulent intent to either impersonate the legitimate party, or simply obfuscate the actual party behind the call. Fraud and illegitimate activity has proliferated based on the loose connection of telephone numbers to responsible parties.</t>
      <t>The use of vesper tokens in communications will allow for a trust model enabled by a three party trust system based on an agreed set of vetting policies with a set of privacy enabled features to allow for selective disclosure for communications that require authorized use of a telephone number with the ability to support use-cases that require anonymity all the way up to full disclosure of vetted persona information if that is desired. The Vetting Agent (VA) issues the vesper token as the party taking responsibility to vet Vetting Parties according to a set of policies and best practices, the Vetting Entity (VE) holds the resulting token or ability to provide access to a fresh token for proof and disclosure that they were vetted by the VA, and Vetting Verifier (VV) verifies the token based on trust that the VA is reputable and follows policies and best practices. The Vesper token is primarily designed to be used in many ways to represent the vetting of the persona associated with a telephone number or as referred to more generally an STI. This document defines the specific use of the vesper token in the STI architecture.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The vetting process for entities involves verifying their identity and legitimacy, typically through KYC and KYB vetting procedures. This document proposes a standardized method for representing the results of these vetting procedures using JSON Web Tokens (JWT) and Selective Disclosure JWT (SD-JWT). This document does not address how the KYC/KYB should be performed or what documents or processes should be used. Rather the goal of this document is to create a standardized identifier for the Vetted Entities (VE) to present that they are who they claim to be.</t>
    </section>
    <section anchor="vetting-process-overview">
      <name>Vetting Process Overview</name>
      <t>The vetting process is much about registration and authentication of a Vetting Entity (VE) with a Vetting Authority (VA). The VE makes claims about themselves to prove whom they are and associated claims that should be vetted by the VA and will be used to make trusted disclosures to at Vetting Verifier (VV). The vesper token is issued with that set of selectively disclosable claims to formalize that the information has been vetted and represents the VE accurately.</t>
    </section>
    <section anchor="vetting-process-procedures">
      <name>Vetting Process Procedures</name>
      <t>The vetting process generally involves the following steps:</t>
      <t>Placeholder for diagram</t>
      <t>Setup and registration of VE with VA</t>
      <ol spacing="normal" type="1"><li>
          <t>Registration of the Vetting Entity (VE) with a Vetting Authority (VA).  The VE creates an authenticated account relationship with the VA and a unique entity_id is created.</t>
        </li>
        <li>
          <t>The VE submits a set of information to describe itself with uniquely identifiable entity specific information.  This document describes a baseline set of information claims that <bcp14>SHOULD</bcp14> be included, but anticipates future specifications that correspond to future communications ecosystem policies and best practices that may extend that set of information including the syntax and definitions. The submittal of information to the VA is <bcp14>RECOMMENDED</bcp14> to follow the format and syntax of what will be defined later in the document as the token claim format for each set of information, but this document does not specifically define a protocol for the submission of information, only the token that represents the results of the process.</t>
        </li>
        <li>
          <t>The VA performs the vetting functions and KYC/KYB checks according to their procedures.  The vetting functions are something that can be performed in many ways in different countries and legal jurisdictions and therefore this document does not specify any specifics to how the VA performs these vetting functions and is out of scope of this document.</t>
        </li>
      </ol>
      <t><bcp14>RECOMMENDED</bcp14> but optional use of Key Binding (KB) as defined in <xref target="I-D.ietf-oauth-selective-disclosure-jwt"/>:</t>
      <ol spacing="normal" type="1"><li>
          <t>The entity generates a public/private key pair or the VA does it on the entries behalf.</t>
        </li>
        <li>
          <t>The public key is registered with the VA.</t>
        </li>
      </ol>
      <t>VA publishes vetted information digest to transparency service</t>
      <ol spacing="normal" type="1"><li>
          <t>The VA creates hash of their vetting data and/or results. What exactly is included in generation of the hash is up to VA and influenced by the process used.</t>
        </li>
        <li>
          <t>The VA logs the hash of the KYC/KYB data with a transparency service and issues a transparency receipt.</t>
        </li>
        <li>
          <t>VE acts as a holder of Vetting Credentials and provides a method for verifiers to request the vetted information.  Optionally, the VE can use VAs hosted wallet service APIs if available.</t>
        </li>
      </ol>
      <t>VE initiates communications requiring a valid and fresh token with required disclosures</t>
      <ol spacing="normal" type="1"><li>
          <t>The VA issues an SD-JWT containing the KYC/KYB information, the public key in CNF claim (per SD-JWT RFC draft), and the transparency receipt.</t>
        </li>
      </ol>
      <t>VV Verification procedures</t>
      <ol spacing="normal" type="1"><li>
          <t>VV ensures that token signature is correct. Optionally, if Key Binding is used, VV validates KB-JWT.</t>
        </li>
        <li>
          <t>VV can verify the Transparency log signature to further trust the token.</t>
        </li>
      </ol>
    </section>
    <section anchor="selective-disclosure-json-web-tokens-sd-jwt-for-vetted-information">
      <name>Selective Disclosure JSON Web Tokens (SD-JWT) for Vetted information</name>
      <t>This document defines the vesper token using the SD-JWT, defined in <xref target="I-D.ietf-oauth-selective-disclosure-jwt"/>. The vetting process and disclosure of information closely follows the SD-JWT Issuance and Presentation Flow, Disclosure and Verification, and generally the three-party model (i.e. Issuer, Holder, Verifier) defined in that document.  The Issuer in the context of the vesper token is the VA, the Holder corresponds to the VE, and the Verifier is the VV.</t>
      <section anchor="sd-jwt-and-disclosures">
        <name>SD-JWT and Disclosures</name>
        <t>SD-JWT is a digitally signed JSON document containing digests over the selectively disclosable claims with the Disclosures outside the document. Disclosures can be omitted without breaking the signature, and modifying them can be detected. Selectively disclosable claims can be individual object properties (name-value pairs) or array elements. When presenting an SD-JWT to a Verifier, the Holder only includes the Disclosures for the claims that it wants to reveal to that Verifier. An SD-JWT can also contain clear-text claims that are always disclosed to the Verifier.</t>
        <t>To disclose to a Verifier a subset of the SD-JWT claim values, a Holder sends only the Disclosures of those selectively released claims to the Verifier as part of the SD-JWT. The use of Key Binding is an optional feature.</t>
      </section>
      <section anchor="sd-jwt-verification">
        <name>SD-JWT Verification</name>
        <t>The Verifier receives either an SD-JWT or an SD-JWT+KB from the Holder, verifies the signature on the SD-JWT (or the the SD-JWT inside the SD-JWT+KB) using the Issuer's public key, verifies the signature on the KB-JWT using the public key included (or referenced) in the SD-JWT, and calculates the digests over the Holder-Selected Disclosures and verifies that each digest is contained in the SD-JWT.</t>
      </section>
      <section anchor="vesper-token-sd-jwt-and-sd-jwtkb-data-formats">
        <name>Vesper token SD-JWT and SD-JWT+KB Data Formats</name>
        <t>An SD-JWT is composed of</t>
        <ul spacing="normal">
          <li>
            <t>an Issuer-signed JWT, and</t>
          </li>
          <li>
            <t>zero or more Disclosures.</t>
          </li>
        </ul>
        <t>An SD-JWT+KB is composed of</t>
        <ul spacing="normal">
          <li>
            <t>an SD-JWT, and</t>
          </li>
          <li>
            <t>a Key Binding JWT.</t>
          </li>
        </ul>
        <t>The serialized format for the SD-JWT is the concatenation of each part delineated with a single tilde ('~') character as follows:</t>
        <artwork><![CDATA[
<Issuer-signed JWT>~<Disclosure 1>~<Disclosure 2>~...~<Disclosure N>~
]]></artwork>
        <t>The serialized format for an SD-JWT+KB extends the SD-JWT format by concatenating a Key Binding JWT.</t>
        <artwork><![CDATA[
<Issuer-signed JWT>~<Disclosure 1>~<Disclosure 2>~...~<Disclosure N>~<KB>
]]></artwork>
        <t>The payload of a vesper token as an SD-JWT is a JSON object according to the following rules:</t>
        <t>The payload <bcp14>MAY</bcp14> contain the _sd_alg key described in Section 5.1.1 of <xref target="I-D.ietf-oauth-selective-disclosure-jwt"/>.
The payload <bcp14>MAY</bcp14> contain one or more digests of Disclosures to enable selective disclosure of the respective claims, created and formatted as described in Section 5.2.
The payload <bcp14>MAY</bcp14> contain one or more decoy digests to obscure the actual number of claims in the SD-JWT, created and formatted as described in Section 5.2.5.
The payload <bcp14>MAY</bcp14> contain one or more non-selectively disclosable claims.
The payload <bcp14>MAY</bcp14> contain the Holder's public key(s) or reference(s) thereto, as explained in Section 5.1.2.
The payload <bcp14>MAY</bcp14> contain further claims such as iss, iat, etc. as defined or required by the application using SD-JWTs.</t>
        <t>In order to represent the vetted claim information about a VE. The SD-JWT <bcp14>MUST</bcp14> include the following claims:</t>
        <t>iss: Issuer, the Vetting Agent.
sub: Subject, the vetted entity represented by a unique entity_id
iat: Issuance timestamp.
exp: Expiry timestamp.
kyc_data_hash: Hash of the KYC/KYB data.
transparency_receipt: Transparency receipt issued by the transparency service.
(optional) cnf: Public key of the vetted entity, only if key binding is required, defined in <xref target="RFC7800"/></t>
      </section>
      <section anchor="example-issuance">
        <name>Example Issuance</name>
        <t>The Issuer is using the following input claim set:</t>
        <artwork><![CDATA[
{
  "sub": "Business_42",
  "telephone_number_rtu": [
    +18001231234,
    +18881231234
  ],
  "rcd": [
    {"nam":"Business_42","icn":"https://example.com/logo.png"}
  ]
  "business_ids": [
    {"EIN":"123456789"}
  ]
  "address": {
    "street_address": "123 Main St",
    "locality": "Anytown",
    "region": "Anystate",
    "country": "US"
  },
  "contact_given_name": "John",
  "contact_family_name": "Doe",
  "contact_email": "johndoe@example.com",
  "contact_phone_number": "+12025550101"
}
]]></artwork>
        <t>The Issuer in this case made the following decisions:</t>
        <ul spacing="normal">
          <li>
            <t>The "telephone_number_rtu" array and contents is always visible.</t>
          </li>
          <li>
            <t>The "rcd" array is always visible, but its contents are selectively disclosable.</t>
          </li>
          <li>
            <t>The sub element and essential verification data (iss, iat, cnf, etc.) are always visible.</t>
          </li>
          <li>
            <t>All other claims are selectively disclosable.</t>
          </li>
          <li>
            <t>For address, all of the claims can only be selectively disclosed in full.</t>
          </li>
        </ul>
        <t>The following payload is used for the SD-JWT:</t>
        <artwork><![CDATA[
{
  "_sd": [
    "CrQe7S5kqBAHt-nMYXgc6bdt2SH5aTY1sU_M-PgkjPI",
    "JzYjH4svliH0R3PyEMfeZu6Jt69u5qehZo7F7EPYlSE",
    "PorFbpKuVu6xymJagvkFsFXAbRoc2JGlAUA2BA4o7cI",
    "TGf4oLbgwd5JQaHyKVQZU9UdGE0w5rtDsrZzfUaomLo",
    "XQ_3kPKt1XyX7KANkqVR6yZ2Va5NrPIvPYbyMvRKBMM",
    "XzFrzwscM6Gn6CJDc6vVK8BkMnfG8vOSKfpPIZdAfdE",
    "gbOsI4Edq2x2Kw-w5wPEzakob9hV1cRD0ATN3oQL9JM",
    "jsu9yVulwQQlhFlM_3JlzMaSFzglhQG0DpfayQwLUK4"
  ],
  "iss": "https://vetting-agent.example.com",
  "iat": 1683000000,
  "exp": 1883000000,
  "sub": "Business_42",
  "telephone_number_rtu": [
    +18001231234,
    +18881231234
  ],
  "rcd": [
    {
      "...": "pFndjkZ_VCzmyTa6UjlZo3dh-ko8aIKQc9DlGzhaVYo"
    }
  ],
  "business_ids": [
    {
      "...": "7Cf6JkPudry3lcbwHgeZ8khAv1U1OSlerP0VkBJrWZ0"
    }
  ],
  "kyc_data_hash": "8khAv1U1OSlerP0VkBJrWZ07Cf6JkPudry3lcbwHgeZ",
  "transparency_receipt": "dh-ko8aIKQc9DlGzhaVYopFndjkZ_VCzmyTa6UjlZo3",
  "_sd_alg": "sha-256",
  "cnf": {
    "jwk": {
      "kty": "EC",
      "crv": "P-256",
      "x": "TCAER19Zvu3OHF4j4W4vfSVoHIP1ILilDls7vCeGemc",
      "y": "ZxjiWWbZMQGHVWKVQ4hbSIirsVfuecCE6t4jT9F2HZQ"
    }
  }
}
]]></artwork>
        <t>The following Disclosures are created by the Issuer:</t>
        <t>Claim contact_given_name:</t>
        <artwork><![CDATA[
SHA-256 Hash: jsu9yVulwQQlhFlM_3JlzMaSFzglhQG0DpfayQwLUK4
Disclosure:
WyIyR0xDNDJzS1F2ZUNmR2ZyeU5STjl3IiwgImdpdmVuX25hbWUiLCAiSm9o
biJd
Contents: ["2GLC42sKQveCfGfryNRN9w", "contact_given_name", "John"]
]]></artwork>
        <t>Claim contact_family_name:</t>
        <artwork><![CDATA[
SHA-256 Hash: TGf4oLbgwd5JQaHyKVQZU9UdGE0w5rtDsrZzfUaomLo
Disclosure:
WyJlbHVWNU9nM2dTTklJOEVZbnN4QV9BIiwgImZhbWlseV9uYW1lIiwgIkRv
ZSJd
Contents: ["eluV5Og3gSNII8EYnsxA_A", "contact_family_name", "Doe"]
]]></artwork>
        <t>Claim contact_email:</t>
        <artwork><![CDATA[
SHA-256 Hash: JzYjH4svliH0R3PyEMfeZu6Jt69u5qehZo7F7EPYlSE
Disclosure:
WyI2SWo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgImVtYWlsIiwgImpvaG5kb2VA
ZXhhbXBsZS5jb20iXQ
Contents: ["6Ij7tM-a5iVPGboS5tmvVA", "contact_email", "johndoe@example.com"]
]]></artwork>
        <t>Claim phone_number:</t>
        <artwork><![CDATA[
SHA-256 Hash: PorFbpKuVu6xymJagvkFsFXAbRoc2JGlAUA2BA4o7cI
Disclosure:
WyJlSThaV205UW5LUHBOUGVOZW5IZGhRIiwgInBob25lX251bWJlciIsICIr
MS0yMDItNTU1LTAxMDEiXQ
Contents: ["eI8ZWm9QnKPpNPeNenHdhQ", "contact_phone_number",
"+1-202-555-0101"]
]]></artwork>
        <t>Claim business_ids:</t>
        <artwork><![CDATA[
SHA-256 Hash: XQ_3kPKt1XyX7KANkqVR6yZ2Va5NrPIvPYbyMvRKBMM
Disclosure:
WyJRZ19PNjR6cUF4ZTQxMmExMDhpcm9BIiwgInBob25lX251bWJlcl92ZXJp
ZmllZCIsIHRydWVd
Contents: ["Qg_O64zqAxe412a108iroA", "business_ids", true]
]]></artwork>
        <t>Claim address:</t>
        <artwork><![CDATA[
SHA-256 Hash: XzFrzwscM6Gn6CJDc6vVK8BkMnfG8vOSKfpPIZdAfdE
Disclosure:
WyJBSngtMDk1VlBycFR0TjRRTU9xUk9BIiwgImFkZHJlc3MiLCB7InN0cmVl
dF9hZGRyZXNzIjogIjEyMyBNYWluIFN0IiwgImxvY2FsaXR5IjogIkFueXRv
d24iLCAicmVnaW9uIjogIkFueXN0YXRlIiwgImNvdW50cnkiOiAiVVMifV0
Contents: ["AJx-095VPrpTtN4QMOqROA", "address", {"street_address":
"123 Main St", "locality": "Anytown", "region": "Anystate",
"country": "US"}]
]]></artwork>
        <t>Array Entry:</t>
        <artwork><![CDATA[
SHA-256 Hash: pFndjkZ_VCzmyTa6UjlZo3dh-ko8aIKQc9DlGzhaVYo
Disclosure: WyJsa2x4RjVqTVlsR1RQVW92TU5JdkNBIiwgIlVTIl0
Contents: ["lklxF5jMYlGTPUovMNIvCA", "{"nam":"Business_42","icn":"https://example.com/logo.png"}"]
]]></artwork>
        <t>Array Entry:</t>
        <artwork><![CDATA[
SHA-256 Hash: 7Cf6JkPudry3lcbwHgeZ8khAv1U1OSlerP0VkBJrWZ0
Disclosure: WyJuUHVvUW5rUkZxM0JJZUFtN0FuWEZBIiwgIkRFIl0
Contents: ["nPuoQnkRFq3BIeAm7AnXFA", "123456789"]
]]></artwork>
        <t>The payload is then signed by the Issuer to create a JWT like the following:</t>
        <artwork><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb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.XaB1KmNGBE-uKjT8M3VSu65QVWdNMjuhJI1sIEM4TIEs6Ae2f0DfWP80
TAg79QIhbz04IIrrXyrEbzkeZLoVHQ

The issued SD-JWT might look as follows:

eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb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.XaB1KmNGBE-uKjT8M3VSu65QVWdNMjuhJI1sIEM4TIEs6Ae2f0DfWP80
TAg79QIhbz04IIrrXyrEbzkeZLoVHQ~WyIyR0xDNDJzS1F2ZUNmR2ZyeU5STjl3IiwgI
mdpdmVuX25hbWUiLCAiSm9obiJd~WyJlbHVWNU9nM2dTTklJOEVZbnN4QV9BIiwgImZh
bWlseV9uYW1lIiwgIkRvZSJd~WyI2SWo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgImVtYWl
sIiwgImpvaG5kb2VAZXhhbXBsZS5jb20iXQ~WyJlSThaV205UW5LUHBOUGVOZW5IZGhR
IiwgInBob25lX251bWJlciIsICIrMS0yMDItNTU1LTAxMDEiXQ~WyJRZ19PNjR6cUF4Z
TQxMmExMDhpcm9BIiwgInBob25lX251bWJlcl92ZXJpZmllZCIsIHRydWVd~WyJBSngt
MDk1VlBycFR0TjRRTU9xUk9BIiwgImFkZHJlc3MiLCB7InN0cmVldF9hZGRyZXNzIjog
IjEyMyBNYWluIFN0IiwgImxvY2FsaXR5IjogIkFueXRvd24iLCAicmVnaW9uIjogIkFu
eXN0YXRlIiwgImNvdW50cnkiOiAiVVMifV0~WyJQYzMzSk0yTGNoY1VfbEhnZ3ZfdWZR
IiwgImJpcnRoZGF0ZSIsICIxOTQwLTAxLTAxIl0~WyJHMDJOU3JRZmpGWFE3SW8wOXN5
YWpBIiwgInVwZGF0ZWRfYXQiLCAxNTcwMDAwMDAwXQ~WyJsa2x4RjVqTVlsR1RQVW92T
U5JdkNBIiwgIlVTIl0~WyJuUHVvUW5rUkZxM0JJZUFtN0FuWEZBIiwgIkRFIl0~
]]></artwork>
        <t>Presentation</t>
        <t>The following non-normative example shows an SD-JWT+KB as it would be sent from the Holder to the Verifier. Note that it consists of six tilde-separated parts, with the Issuer-signed JWT as shown above in the beginning, four Disclosures (for the claims given_name, family_name, address, and nationalities) in the middle, and the Key Binding JWT as the last element.</t>
        <artwork><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb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.XaB1KmNGBE-uKjT8M3VSu65QVWdNMjuhJI1sIEM4TIEs6Ae2f0DfWP80
TAg79QIhbz04IIrrXyrEbzkeZLoVHQ~WyJlbHVWNU9nM2dTTklJOEVZbnN4QV9BIiwgI
mZhbWlseV9uYW1lIiwgIkRvZSJd~WyJBSngtMDk1VlBycFR0TjRRTU9xUk9BIiwgImFk
ZHJlc3MiLCB7InN0cmVldF9hZGRyZXNzIjogIjEyMyBNYWluIFN0IiwgImxvY2FsaXR5
IjogIkFueXRvd24iLCAicmVnaW9uIjogIkFueXN0YXRlIiwgImNvdW50cnkiOiAiVVMi
fV0~WyIyR0xDNDJzS1F2ZUNmR2ZyeU5STjl3IiwgImdpdmVuX25hbWUiLCAiSm9obiJd
~WyJsa2x4RjVqTVlsR1RQVW92TU5JdkNBIiwgIlVTIl0~eyJhbGciOiAiRVMyNTYiLCA
idHlwIjogImtiK2p3dCJ9.eyJub25jZSI6ICIxMjM0NTY3ODkwIiwgImF1ZCI6ICJodH
RwczovL3ZlcmlmaWVyLmV4YW1wbGUub3JnIiwgImlhdCI6IDE3MTgyOTg3NjYsICJzZF
9oYXNoIjogImEyWTh0bUhrUm9MQXFrWTlKMjR0aXhucWJNLVVxcFg2MUpJRm5BVDIxX2
sifQ.sqzbrv_SfCuI7yk3w7Hot82zFZiaWB-EH2GqsSi2-ZukcgP7z8DQGhPkSV97-WZ
r5hGm-nR0MmSDTXgmoFeViQ
]]></artwork>
        <t>The following Key Binding JWT payload was created and signed for this presentation by the Holder:</t>
        <artwork><![CDATA[
{
  "nonce": "1234567890",
  "aud": "https://verifier.example.org",
  "iat": 1718298766,
  "sd_hash": "a2Y8tmHkRoLAqkY9J24tixnqbM-UqpX61JIFnAT21_k"
}
]]></artwork>
        <t>If the Verifier did not require Key Binding, then the Holder could have presented the SD-JWT with selected Disclosures directly, instead of encapsulating it in an SD-JWT+KB.</t>
      </section>
    </section>
    <section anchor="api-endpoints">
      <name>API Endpoints</name>
      <t>The vetting service provides the following APIs:</t>
      <section anchor="request-vetting-token-api">
        <name>Request Vetting Token API</name>
        <artwork><![CDATA[
Endpoint: /api/request-vetting-token
Method: POST
Description: Requests a vetting token (SD-JWT) from the Vetting Authority (VA).
Headers:
  Authorization: Bearer (VE's m2m bearer token)
]]></artwork>
        <t>Request Body:</t>
        <artwork><![CDATA[
{
  "entity_id": "unique-entity-id",
  "key_binding": true,
  "public_key_jwk": {
    "kty": "RSA",
    "e": "AQAB",
    "n": "lsO0Qe0Qu7FwZQ22T5vlqXN...",
    "alg": "RS256"
  }
}
]]></artwork>
        <t>Response:</t>
        <artwork><![CDATA[
{
  "status": "success",
  "vetting_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
  "transparency_receipt": {
    "log_entry_id": "transparency-log-001",
    "receipt": {
      "hash": "abc123...",
      "timestamp": "2024-06-11T12:35:00Z",
      "signature": "transparency-service-signature"
    }
  }
}
]]></artwork>
        <t>Note: entity_id is generated by VA. The mechanism how persona is vetted is not subject of this document. This API can only be called after the vetting was complete and entity_id was issued.</t>
      </section>
      <section anchor="public-api-for-verifiers">
        <name>Public API for Verifiers</name>
        <artwork><![CDATA[
Endpoint: /api/verify-vetted-info
Method: POST
Description: Verifies the validity of transparency receipt.
Request Body:
]]></artwork>
        <artwork><![CDATA[
{
  "transparency_receipt": {
    "log_entry_id": "transparency-log-001",
    "receipt": {
      "hash": "abc123...",
      "timestamp": "2024-06-11T12:35:00Z",
      "signature": "transparency-service-signature"
    }
  }
}
]]></artwork>
        <t>Response:</t>
        <artwork><![CDATA[
{
  "status": "success",
  "message": "Vetted information verified successfully."
}
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7800">
        <front>
          <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="April" year="2016"/>
          <abstract>
            <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7800"/>
        <seriesInfo name="DOI" value="10.17487/RFC7800"/>
      </reference>
      <reference anchor="RFC8224">
        <front>
          <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
            <t>This document obsoletes RFC 4474.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8224"/>
        <seriesInfo name="DOI" value="10.17487/RFC8224"/>
      </reference>
      <reference anchor="RFC8225">
        <front>
          <title>PASSporT: Personal Assertion Token</title>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8225"/>
        <seriesInfo name="DOI" value="10.17487/RFC8225"/>
      </reference>
      <reference anchor="RFC8226">
        <front>
          <title>Secure Telephone Identity Credentials: Certificates</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8226"/>
        <seriesInfo name="DOI" value="10.17487/RFC8226"/>
      </reference>
      <reference anchor="I-D.ietf-oauth-selective-disclosure-jwt">
        <front>
          <title>Selective Disclosure for JWTs (SD-JWT)</title>
          <author fullname="Daniel Fett" initials="D." surname="Fett">
            <organization>Authlete</organization>
          </author>
          <author fullname="Kristina Yasuda" initials="K." surname="Yasuda">
            <organization>Keio University</organization>
          </author>
          <author fullname="Brian Campbell" initials="B." surname="Campbell">
            <organization>Ping Identity</organization>
          </author>
          <date day="13" month="June" year="2024"/>
          <abstract>
            <t>   This specification defines a mechanism for selective disclosure of
   individual elements of a JSON object used as the payload of a JSON
   Web Signature (JWS) structure.  It encompasses various applications,
   including but not limited to the selective disclosure of JSON Web
   Token (JWT) claims.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-selective-disclosure-jwt-09"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 542?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
