<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-messous-eat-ai-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EAT-AI-Agents">Entity Attestation Token (EAT) Profile for Autonomous AI Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-messous-eat-ai-00"/>
    <author fullname="Ayoub MESSOUS">
      <organization>Huawei R&amp;D</organization>
      <address>
        <email>ayoub.messous@huaweil.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="16"/>
    <keyword>AI Agents</keyword>
    <keyword>Entity Attestation Token (EAT)</keyword>
    <keyword>RATS</keyword>
    <keyword>Trust</keyword>
    <abstract>
      <?line 39?>

<t>This document defines a profile for the Entity Attestation Token (EAT) to support remote attestation of autonomous AI agents across domains. It specifies a set of standardized claims for attesting the integrity of AI model parameters, the provenance of training data, and the constraints of inference-time data access policies. Optional extensions for 5G/6G network functions—such as slice-type authorization—are included for interoperability with ETSI ENI and 3GPP architectures. The profile is encoded in CBOR Web Tokens (CWTs) or JSON Web Tokens (JWTs) and is designed to be used within the IETF RATS architecture.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-messous-eat-ai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/mmessous/draft-messous-EAT-AI"/>.</t>
    </note>
  </front>
  <middle>
    <?line 44?>

<section anchor="introduction">
      <name>1. Introduction</name>
      <t>Autonomous AI agents—software entities that perceive, reason, and act with minimal human oversight—are deployed across cloud, edge, enterprise, and telecommunications environments. Their autonomy introduces new trust challenges: if an agent’s model is tampered, its training data is non-compliant, or its inference policy is violated, the consequences range from service disruption to regulatory breaches.</t>
      <t>The Entity Attestation Token (EAT) [RFC9711] provides a standardized framework for remote attestation. However, EAT does not define claims specific to AI artifacts. This document fills that gap by specifying a <strong>generic EAT profile for AI agents</strong>, with <strong>optional telecom-specific claims</strong> for use in 5G/6G networks (e.g., ETSI ENI AI-Core [ETSI-GR-ENI-051], 3GPP TS 29.510).</t>
      <t>This profile enables verifiers—such as OAuth resource servers, network function orchestrators, or policy enforcement points—to make trust decisions based on verifiable evidence about an agent’s:
- <strong>Model integrity</strong> (weights, architecture),
- <strong>Training provenance</strong> (dataset, geography, privacy),
- <strong>Runtime authorization</strong> (capabilities, allowed APIs, slice types).</t>
      <t>This profile does not define a full AI Bill of Materials (AIBOM). Instead, it provides a minimal set of <strong>verifiable claims</strong> sufficient for remote attestation and policy enforcement. It assumes that richer metadata—such as detailed training data lineage, model cards, or complete dependency graphs—is maintained in external documents (e.g., an AIBOM or SBOM), which may be referenced via claims like <tt>ai-sbom-ref</tt> or a future <tt>ai-bom-ref</tt>.
Traditional SBOMs remain essential to capture the <strong>software supply chain</strong> (e.g., Python, CUDA, framework versions) on which the AI agent depends. This profile complements, but does not replace, those artifacts.</t>
      <section anchor="terminology">
        <name>2. Terminology</name>
        <ul spacing="normal">
          <li>
            <t><strong>AI Agent</strong>: AI agents are autonomous systems powered by Large Language Models (LLMs) that can reason, plan, use tools, maintain memory, and take actions to accomplish goals.</t>
          </li>
          <li>
            <t><strong>Model Integrity</strong>: The property that AI model weights and architecture have not been altered from a known-good state.</t>
          </li>
          <li>
            <t><strong>Training Provenance</strong>: Metadata describing the origin, scope, and privacy properties of data used to train an AI model.</t>
          </li>
          <li>
            <t><strong>Inference Policy</strong>: Constraints defining the authorized input context (e.g., slice type, geography) under which an agent may operate.</t>
          </li>
          <li>
            <t><strong>EAT-AI</strong>: The EAT profile defined in this document.</t>
          </li>
        </ul>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174].</t>
      </section>
      <section anchor="use-cases">
        <name>3. Use Cases</name>
        <section anchor="generic-ai-agent-attestation">
          <name>3.1. Generic AI Agent Attestation</name>
          <t>An enterprise AI agent attests its model hash and data retention policy before accessing a protected API. For a more extensive protection, attestation target could also include behavioral manifests, identity, prompts, tools and capabilities, SBOM/AIBOMs etc in the future.</t>
        </section>
        <section anchor="g6g-network-functions-optional-context">
          <name>3.2. 5G/6G Network Functions (Optional Context)</name>
          <t>In ETSI ENI AI-Core, an Execution Agent generates instructions for network slice configuration. The agent should prove:
- It runs an approved model (<tt>ai-model-hash</tt>),
- It was trained on GDPR-compliant data (<tt>training-geo-region</tt>, <tt>dp-epsilon</tt>),
- It is authorized for specific slice types (<tt>allowed-slice-types</tt>).</t>
          <ul empty="true">
            <li>
              <t><strong>Note</strong>: Telecom-specific claims are <strong>optional</strong> and <strong>only meaningful in 3GPP/ETSI contexts</strong>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="eat-ai-claims-definition">
        <name>4. EAT-AI Claims Definition</name>
        <t>Claims are defined for both <strong>CWT (CBOR)</strong> and <strong>JWT (JSON)</strong>. In CWT, claims use signed integer keys; in JWT, they use text names (with hyphens converted to underscores per convention).</t>
        <section anchor="core-claims-generic-domain-agnostic">
          <name>4.1. Core Claims (Generic, Domain-Agnostic)</name>
          <table>
            <thead>
              <tr>
                <th align="left">Claim Name</th>
                <th align="left">CBOR Key</th>
                <th align="left">JWT Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>ai-model-id</tt></td>
                <td align="left">-75000</td>
                <td align="left">
                  <tt>ai_model_id</tt></td>
                <td align="left">text</td>
                <td align="left">URN-formatted model identifier (e.g., <tt>urn:ietf:ai:model:cnn-v3</tt>)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>ai-model-hash</tt></td>
                <td align="left">-75001</td>
                <td align="left">
                  <tt>ai_model_hash</tt></td>
                <td align="left">digest</td>
                <td align="left">Cryptographic hash of the serialized model weights and architecture</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>model-arch-digest</tt></td>
                <td align="left">-75002</td>
                <td align="left">
                  <tt>model_arch_digest</tt></td>
                <td align="left">digest</td>
                <td align="left">Cryptographic hash of model computational graph</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>training-data-id</tt></td>
                <td align="left">-75003</td>
                <td align="left">
                  <tt>training_data_id</tt></td>
                <td align="left">text</td>
                <td align="left">Unique ID of training dataset</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>dp-epsilon</tt></td>
                <td align="left">-75005</td>
                <td align="left">
                  <tt>dp_epsilon</tt></td>
                <td align="left">float</td>
                <td align="left">Differential privacy epsilon used during training</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>input-policy-digest</tt></td>
                <td align="left">-75006</td>
                <td align="left">
                  <tt>input_policy_digest</tt></td>
                <td align="left">digest</td>
                <td align="left">Cryptographic hash of inference input policy</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>data-retention-policy</tt></td>
                <td align="left">-75008</td>
                <td align="left">
                  <tt>data_retention_policy</tt></td>
                <td align="left">text</td>
                <td align="left">e.g., <tt>"none"</tt>, <tt>"session"</tt>, <tt>"24h"</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner-id</tt></td>
                <td align="left">-75009</td>
                <td align="left">
                  <tt>owner_id</tt></td>
                <td align="left">text</td>
                <td align="left">Identity of principal (e.g., GPSI per 3GPP TS 29.222)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>capabilities</tt></td>
                <td align="left">-75010</td>
                <td align="left">
                  <tt>capabilities</tt></td>
                <td align="left">array of text</td>
                <td align="left">High-level functions (e.g., <tt>"slice-optimization"</tt>)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>allowed-apis</tt></td>
                <td align="left">-75011</td>
                <td align="left">
                  <tt>allowed_apis</tt></td>
                <td align="left">array of URI</td>
                <td align="left">Specific endpoints the agent may call</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>ai-sbom-ref</tt></td>
                <td align="left">-75012</td>
                <td align="left">
                  <tt>ai_sbom_ref</tt></td>
                <td align="left">text / map</td>
                <td align="left">Reference to a Software Bill of Materials (SBOM) describing the AI agent’s runtime dependencies (e.g., Python, CUDA, libraries). MAY be a URI, digest, or embedded SBOM fragment</td>
              </tr>
            </tbody>
          </table>
          <section anchor="ai-model-id">
            <name>4.1.1. ai-model-id</name>
            <ul spacing="normal">
              <li>
                <t><tt>ai-model-id</tt>: A globally unique model identifier encoded as a URN. The URN <strong>namespace</strong> <tt>urn:ietf:ai:model:</tt> is reserved for standardized reference models (e.g., defined in RFCs). <strong>Model owners SHOULD use their own URN namespace</strong> (e.g., based on domain name, PEN, or UUID) to avoid central coordination.
Examples:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> (for a private model)</t>
                  </li>
                  <li>
                    <t><tt>urn:ietf:ai:model:llama3-8b</tt> (for a well-known public model, if later standardized)</t>
                  </li>
                  <li>
                    <t><tt>urn:dev:example.com:finance-agent-v2</tt> (enterprise-owned model)</t>
                  </li>
                </ul>
              </li>
            </ul>
          </section>
          <section anchor="use-of-cryptography-digests">
            <name>4.1.2. use of cryptography digests</name>
            <ul spacing="normal">
              <li>
                <t>The claims <tt>ai-model-hash</tt>, <tt>model-arch-digest</tt>, and <tt>input-policy-digest</tt> represent cryptographic digests of serialized artifacts (e.g., model weights, computational graphs, or policy documents). To support algorithm agility and avoid ambiguity, each such claim is defined as a digest structure rather than a bare byte string.
A digest structure is encoded as a two-element array:</t>
              </li>
            </ul>
            <t><tt>cbor
[ alg, hash ]
</tt>
where:
 * <strong>alg</strong> is the Hash Algorithm Identifier, using either the <strong>integer</strong> or <strong>text string</strong> from the <eref target="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</eref>, indicating the hash function used (e.g., '-16' for SHA-256, <tt>-44</tt> for SHA-384, <tt>-45</tt> for SHA3-256).
 * <strong>hash</strong> is the byte string output of applying that hash function to the canonical serialization of the artifact.</t>
            <t>In <strong>CBOR</strong>, the digest is represented as a CBOR array: [ int / tstr, bstr ].
In <strong>JWT</strong> (JSON), it is represented as a JSON object: <tt>{ "alg": "...", "hash": "base64url-encoded-hash" }</tt>.
This design aligns with the Detached-Submodule-Digest type defined in [RFC 9711, Section 4.2.18.2] and enables future-proof support for multiple hash algorithms (e.g., SHA-2, SHA-3, post-quantum secure hashes) without requiring new claims or breaking existing parsers.</t>
          </section>
          <section anchor="ai-sbom-ref">
            <name>4.1.3. ai-sbom-ref</name>
            <ul spacing="normal">
              <li>
                <t>The <tt>ai-sbom-ref</tt> claim provides a reference to the <strong>Software Bill of Materials (SBOM)</strong> associated with the AI agent. This enables verifiers to assess the integrity, license compliance, and vulnerability status of the agent’s software supply chain.
The value MAY be:</t>
              </li>
              <li>
                <t>A URI pointing to an SBOM document (e.g., in SPDX or CycloneDX format),</t>
              </li>
              <li>
                <t>A digest (using the structured digest format defined in Section 4.1) of an SBOM,</t>
              </li>
              <li>
                <t>Or a compact embedded representation (e.g., a minimal map of critical components).</t>
              </li>
            </ul>
            <t>Example (CBOR):
<tt>
cbor
/ ai-sbom-ref / -75012: "https://example.com/sboms/agent-xyz.spdx.json"
</tt>
Example (embedded digest):
<tt>
cbor
/ ai-sbom-ref / -75012: [ -44, h'abcd1234...' ]  ; SHA-384 digest of SBOM
</tt>
When used, the SBOM SHOULD include:
- Runtime environment (e.g., Python 3.11, CUDA 12.4),
- AI framework versions (e.g., PyTorch 2.3, TensorFlow 2.15),
- Critical dependencies (e.g., NumPy, cuDNN),
- Model serialization format (e.g., ONNX v9, SafeTensors v0.4).
This claim complements model integrity (<tt>ai-model-hash</tt>) by attesting to the execution context in which the model operates—critical for reproducibility and security analysis.</t>
          </section>
        </section>
        <section anchor="optional-domain-specific-claims-5g6g">
          <name>4.2. Optional Domain-Specific Claims (5G/6G)</name>
          <table>
            <thead>
              <tr>
                <th align="left">Claim Name</th>
                <th align="left">CBOR Key</th>
                <th align="left">JWT Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>training-geo-region</tt></td>
                <td align="left">-75004</td>
                <td align="left">
                  <tt>training_geo_region</tt></td>
                <td align="left">array of text</td>
                <td align="left">ISO 3166-1 alpha-2 codes (e.g., <tt>["DE", "FR"]</tt>)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>allowed-slice-types</tt></td>
                <td align="left">-75007</td>
                <td align="left">
                  <tt>allowed_slice_types</tt></td>
                <td align="left">array of text</td>
                <td align="left">3GPP-defined slice types (e.g., <tt>"eMBB"</tt>, <tt>"URLLC"</tt>)</td>
              </tr>
            </tbody>
          </table>
          <ul empty="true">
            <li>
              <t><strong>Usage</strong>: These claims <strong>SHOULD be used</strong> when attesting agents in <strong>ETSI ENI or 3GPP SBA</strong> environments.</t>
            </li>
          </ul>
        </section>
        <section anchor="composite-and-multi-component-attestation">
          <name>4.3. Composite and Multi-Component Attestation</name>
          <t>This profile utilizes the recursive nesting capability of the submods claim (Key 266) to support three specific composite scenarios:</t>
          <section anchor="multi-agent-platforms">
            <name>4.3.1. Multi-Agent Platforms:</name>
            <t>To support a user managing multiple agents with varying configurations, we should leverage the recursive nesting capability of the <tt>submods</tt> claim (CBOR key 266) as defined in [RFC 9711]. In this architectural pattern, the top-level EAT represents the user's platform or trust domain. Each agent is a submodule of that platform, and if an agent uses multiple models, those models are further nested as submodules of that specific agent.</t>
            <t>The following CWT example shows a platform hosting two agents. Agent 1 is a complex orchestrator using two models, while Agent 2 is a simple worker using only one.</t>
            <t>Code snippet
```
{
  / ueid / 256: h'0102030405060708',  / User/Platform ID /
  / nonce / 10: h'abcdef1234567890', / Freshness Nonce /
  / submods / 266: {                 / Submodules Section /</t>
            <artwork><![CDATA[
/ --- Agent 1: Multi-Model Orchestrator --- /
"agent-1": {
  / swname / 270: "Orchestrator-Agent-v2",
  / submods / 266: {             / Nested Model Submodules /
    "llm-core": {
      / ai-model-id / -75000: ":uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6",
      / ai-model-hash / -75001: [-44, h'9a8b...']  / SHA-384 /
    },
    "tool-planner": {
      / ai-model-id / -75000: ":uuid:550e8400-e29b-41d4-a716-446655440000",
      / ai-model-hash / -75001: [-16, h'5e4f...']  / SHA-256 /
    }
  }
},

/ --- Agent 2: Single-Model Worker --- /
"agent-2": {
  / swname / 270: "Vision-Worker-v1",
  / ai-model-id / -75000: ":ietf:ai:model:vit-b-16", /
  / ai-model-hash / -75001: [-44, h'd3e2...']            /
}   } } ```
]]></artwork>
          </section>
          <section anchor="multi-model-agents">
            <name>4.3.2. Multi-Model Agents:</name>
            <t>A single agent utilizing an orchestrator model and task-specific worker models.</t>
            <t>Modern AI agents are not necessarly monolithic; sophesticated Agents can consist of an orchestrator model (e.g., a LLM) and several task-specific worker models (e.g., image classifiers or encoders). To support these configurations, this profile utilizes the <tt>submods</tt> claim (Key 266) from [RFC 9711]. Each distinct model used by the agent SHOULD be represented as an entry within the submods map. This allows for granular policy appraisal where different models may have different trust levels, privacy parameters (dp_epsilon), or residency requirements.</t>
            <t>When a model is represented in a submodule, it carries its own instance of <tt>ai-model-id</tt> and <tt>ai-model-hash</tt>. If the model weights are proprietary (e.g., accessed via a cloud API), the submodule SHOULD include an <tt>ai-model-id</tt> that the Verifier can match against a provider Endorsement.</t>
            <t>The following example demonstrates an agent employing an orchestrator LLM and a specialized vision model. Note the use of the digest format [alg, val] to support different hash types for each model.</t>
            <t>Code snippet
<tt>
{
  / ueid / 256: h'0102030405060708',
  / nonce / 10: h'abcdef1234567890',
  / submods / 266: {
    "orchestrator-llm": {
      / ai-model-id / -75000: ":uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6",
      / ai-model-hash / -75001: [-44, h'9a8b7c6d...']  / SHA-384 /
    },
    "vision-classifier": {
      / ai-model-id / -75000: ":ietf:ai:model:vit-b-16",
      / ai-model-hash / -75001: [-16, h'5e4f3a2b...'], / SHA-256 /
      / dp-epsilon / -75005: 0.8
    }
  }
}
</tt></t>
          </section>
          <section anchor="layered-trust">
            <name>4.3.3. Layered Trust:</name>
            <t>Scenarios where different system components (e.g., hardware TEE, OS runtime, and AI model) are owned or managed by different entities.</t>
            <ul spacing="normal">
              <li>
                <t><strong>Nesting Mechanism:</strong> Components SHOULD be represented as nested EATs within the submods claim (Key 266). Each nested token MAY be signed by a different attestation key belonging to the respective component owner.</t>
              </li>
              <li>
                <t><strong>Verifier Role:</strong> A Verifier receiving a composite EAT SHOULD follow the Hierarchical Pattern, where it acts as a Lead Verifier and delegates the appraisal of individual submodules to specialized verifiers that hold the appropriate Trust Anchors for each owner.</t>
              </li>
            </ul>
            <t>For multi-owner attestation, a <strong>Lead Verifier</strong> SHOULD follow the <strong>Hierarchical Pattern</strong>, extracting nested sub-tokens and delegating their appraisal to specialized verifiers holding the appropriate Trust Anchors.</t>
            <t><tt>
      +-----------------------------------------------------------+
      |  Attesting Device (e.g., Edge Server / 5G UE)             |
      |                                                           |
      |  +----------------------------+                           |
      |  | Hardware Root of Trust     | &lt;--- Signing Key (AK_1)   |
      |  | (RoT)                      |                           |
      |  +-------------+--------------+                           |
      |                | Measures                                 |
      |                v                                          |
      |  +-------------+--------------+                           |
      |  | TEE / Secure OS            | &lt;--- Signing Key (AK_2)   |
      |  | (Submodule 1)              |      (Optional)           |
      |  +-------------+--------------+                           |
      |                | Measures &amp; Isolates                      |
      |                v                                          |
      |  +-------------+--------------+                           |
      |  | AI Agent Environment       |                           |
      |  |                            |                           |
      |  |  +----------------------+  |                           |
      |  |  | AI Model (Target)    |  |                           |
      |  |  | - Weights Hash       |  |                           |
      |  |  | - Config             |  |                           |
      |  |  +----------------------+  |                           |
      |  +----------------------------+                           |
      +-----------------------------------------------------------+
</tt>
_Figure 1: Example of a Chain of Trust _</t>
            <t>Figure 1 illustrates the Chain of Trust. The Hardware Root of Trust (RoT) measures the integrity of the Trusted Execution Environment (TEE) or OS. The TEE, acting as a transitive verifier, subsequently measures the AI Agent's model binaries and policy configurations. The resulting EAT token reflects this hierarchy using nested submodules, ensuring that the <tt>ai-model-hash</tt> is reported by a trusted parent rather than the agent itself.</t>
            <t>To clarify the hierarchical trust relationships in multi-owner attestation scenarios, Figure 2 illustrates the binding of components across hardware, runtime, and AI model layers. Each layer is attested by a distinct owner and represented as a nested submodule within the top-level EAT per RFC 9711 Section 4.2.18.</t>
            <t><tt>
+-----------------------------------------------------------------+
|  Top-Level EAT (Platform Attester)                              |
|  • ueid: Platform hardware identity (e.g., TPM/SE)              |
|  • nonce: Freshness guarantee                                   |
|  • submods: {                                                   |
|      "tee-runtime": {  ← Signed by Platform Owner               |
|          • ueid: TEE instance ID                                |
|          • swname: "Confidential-VM-v2"                         |
|          • submods: {                                           |
|              "ai-agent": {  ← Signed by AI Operator             |
|                  • swname: "Execution-Agent-v3"                 |
|                  • ai-model-id: "urn:uuid:..."                  |
|                  • ai-model-hash: [alg, hash]                   |
|                  • submods: {                                   |
|                      "orchestrator": {...},  ← Model Owner A    |
|                      "vision-model": {...}   ← Model Owner B    |
|                  }                                              |
|              }                                                  |
|          }                                                      |
|      }                                                          |
|  }                                                              |
+-----------------------------------------------------------------+
</tt>
              <em>Figure 2: Trust hierarchy for layered attestation using EAT submods</em></t>
          </section>
          <section anchor="trust-binding-semantics">
            <name><strong>Trust Binding Semantics</strong></name>
            <ul spacing="normal">
              <li>
                <t><strong>Hardware → TEE:</strong> The TEE runtime measurement is included in a platform-signed attestation report (e.g., AMD SEV-SNP, Intel TDX). The top-level EAT's signature binds the <tt>tee-runtime</tt> submodule to this hardware root.</t>
              </li>
              <li>
                <t><strong>TEE → AI Agent:</strong> The AI agent's code and configuration are measured into the TEE's launch digest. The <tt>ai-agent</tt> submodule is signed by the AI operator's key, which itself is endorsed by the platform owner (via an Endorsement per RFC 9334).</t>
              </li>
              <li>
                <t><strong>Agent → Models:</strong> Individual models are signed by their respective providers. The agent's runtime verifies model signatures before loading; these signatures are reflected in the nested <tt>submods</tt> entries.</t>
              </li>
            </ul>
          </section>
          <section anchor="appraisal-delegation">
            <name><strong>Appraisal Delegation</strong></name>
            <t>Per RFC 9334 Section 5.3, a Lead Verifier appraising the top-level token:
  1- Validates the platform signature against a hardware Trust Anchor
  2- Delegates <tt>tee-runtime</tt> appraisal to a TEE-specific verifier holding platform Endorsements
  3- Delegates <tt>ai-agent</tt> appraisal to an AI policy verifier holding operator Trust Anchors
  4- Optionally delegates model submodules to specialized model catalog verifiers</t>
            <t>A submodule appraisal failure MUST cause rejection of the entire attestation unless policy explicitly permits partial trust (e.g., non-critical auxiliary models). This failure semantics MUST be defined by the deployment policy—not by this profile.</t>
          </section>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>5. Security Considerations</name>
        <ul spacing="normal">
          <li>
            <t>Claims SHOULD be bound to a hardware-rooted attestation where available.</t>
          </li>
          <li>
            <t><strong><tt>ai-model-hash</tt></strong> SHOULD be computed on the serialized model file (e.g., ONNX, PyTorch), not in-memory tensors.</t>
          </li>
          <li>
            <t><strong>Verifiers</strong> SHOULD validate claims against authoritative registries (e.g., model hash in secure model catalog).</t>
          </li>
          <li>
            <t><strong><em>Replay attacks</em></strong> SHOULD be mitigated using EAT nonce (CWT key 10) or exp (key 4).</t>
          </li>
          <li>
            <t>Verifiers SHOULD validate the referenced SBOM against known vulnerability databases (e.g., NVD) and reject agents using components with unpatched critical flaws.</t>
          </li>
          <li>
            <t>Verifiers SHOULD validate that <tt>ai-model-id</tt> values originate from trusted namespaces (e.g., known domains, approved PENs, or allow-listed UUIDs). Dynamic model deployment does not require central registration, but policy enforcement may restrict acceptable namespaces.</t>
          </li>
          <li>
            <t>Verifiers are expected to combine EAT-AI evidence with external SBOM/AIBOM analysis for comprehensive risk assessment.</t>
          </li>
        </ul>
      </section>
      <section anchor="privacy-considerations">
        <name>6. Privacy Considerations</name>
        <ul spacing="normal">
          <li>
            <t>training-geo-region reveals data origin and SHOULD be minimized.</t>
          </li>
          <li>
            <t>EAT tokens SHOULD be transmitted over secure channels (e.g., TLS 1.3).</t>
          </li>
          <li>
            <t>owner-id SHOULD use pseudonymous identifiers (e.g., GPSI per 3GPP TS 29.222).</t>
          </li>
          <li>
            <t>Embedded SBOMs or detailed URIs may reveal deployment topology. When privacy is a concern, use opaque digests or pseudonymized SBOM identifiers.</t>
          </li>
          <li>
            <t>High-granularity combinations of <tt>training-geo-region</tt> + <tt>dp-epsilon</tt> + <tt>allowed-apis</tt> may uniquely identify a "private" model even if the <tt>ai-model-id</tt> is obscured.</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-considerations">
        <name>7. IANA Considerations</name>
        <t>## 7.1. EAT Profile Registration
- IANA is requested to register in the "Entity Attestation Token (EAT) Profiles" registry:</t>
        <t>Profile Name: Autonomous AI Agent EAT Profile
Reference: [THIS DOCUMENT]</t>
        <section anchor="cwt-claims-registry">
          <name>7.2. CWT Claims Registry</name>
          <t>IANA is requested to register the following in the "CBOR Web Token (CWT) Claims" registry [IANA-CWT]:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Claim Name</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">-75000</td>
                <td align="left">
                  <tt>ai-model-id</tt></td>
                <td align="left">AI model URN</td>
              </tr>
              <tr>
                <td align="left">-75001</td>
                <td align="left">
                  <tt>ai-model-hash</tt></td>
                <td align="left">Model weights hash</td>
              </tr>
              <tr>
                <td align="left">-75002</td>
                <td align="left">
                  <tt>model-arch-digest</tt></td>
                <td align="left">Model graph hash</td>
              </tr>
              <tr>
                <td align="left">-75003</td>
                <td align="left">
                  <tt>training-data-id</tt></td>
                <td align="left">Training dataset ID</td>
              </tr>
              <tr>
                <td align="left">-75004</td>
                <td align="left">
                  <tt>training-geo-region</tt></td>
                <td align="left">Training data regions</td>
              </tr>
              <tr>
                <td align="left">-75005</td>
                <td align="left">
                  <tt>dp-epsilon</tt></td>
                <td align="left">DP epsilon</td>
              </tr>
              <tr>
                <td align="left">-75006</td>
                <td align="left">
                  <tt>input-policy-digest</tt></td>
                <td align="left">Inference policy hash</td>
              </tr>
              <tr>
                <td align="left">-75007</td>
                <td align="left">
                  <tt>allowed-slice-types</tt></td>
                <td align="left">Authorized slice types</td>
              </tr>
              <tr>
                <td align="left">-75008</td>
                <td align="left">
                  <tt>data-retention-policy</tt></td>
                <td align="left">Data retention policy</td>
              </tr>
              <tr>
                <td align="left">-75009</td>
                <td align="left">
                  <tt>owner-id</tt></td>
                <td align="left">Resource owner identifier</td>
              </tr>
              <tr>
                <td align="left">-75010</td>
                <td align="left">
                  <tt>capabilities</tt></td>
                <td align="left">Agent capabilities</td>
              </tr>
              <tr>
                <td align="left">-75011</td>
                <td align="left">
                  <tt>allowed-apis</tt></td>
                <td align="left">Allowed API endpoints</td>
              </tr>
              <tr>
                <td align="left">-75012</td>
                <td align="left">
                  <tt>ai-sbom-ref</tt></td>
                <td align="left">Reference to AI agent’s Software Bill of Materials (SBOM)</td>
              </tr>
            </tbody>
          </table>
          <t>The range -75000 to -75012 is reserved for this profile.</t>
        </section>
        <section anchor="jwt-claims-registry">
          <name>7.3. JWT Claims Registry</name>
          <t>IANA is requested to register the corresponding JWT claim names in the "JSON Web Token Claims" registry [IANA-JWT].</t>
        </section>
      </section>
      <section anchor="references">
        <name>8. References</name>
        <t>## 8.1. Normative References</t>
        <ul spacing="normal">
          <li>
            <t>[<eref target="https://www.rfc-editor.org/rfc/rfc2119.html">RFC2119</eref>] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997.</t>
          </li>
          <li>
            <t>[<eref target="https://www.rfc-editor.org/rfc/rfc7519.html">RFC7519</eref>] Jones, M., Bradley, J., and N. Sakimura, "JSON Web Token (JWT)", RFC 7519, DOI 10.17487/RFC7519, May 2015.</t>
          </li>
          <li>
            <t>[<eref target="https://www.ietf.org/rfc/rfc8174.html">RFC8174</eref>] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/html/rfc8392">RFC8392</eref>] Jones, M., et al., "CBOR Web Token (CWT)", RFC 8392, DOI 10.17487/RFC8392, May 2018.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/html/rfc9711">RFC9711</eref>] L. Lundblade, G. Mandyam,J. O'Donoghue,C. Wallace, "The Entity Attestation Token (EAT)", RFC 9711, DOI 10.17487/RFC9711, April 2025.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/html/rfc9334">RFC9334</eref>] Birkett, M., et al., "Remote ATtestation ProcedureS (RATS) Architecture", RFC 9334, DOI 10.17487/RFC9334, January 2023.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/html/rfc8126">RFC8126</eref>] Cotton, M., et al., "Guidelines for Writing an IANA Considerations Section in RFCs", RFC 8126, DOI 10.17487/RFC8126, June 2017.</t>
          </li>
          <li>
            <t>[[EAT Measured Component] (https://datatracker.ietf.org/doc/draft-ietf-rats-eat-measured-component/)] Frost S., et al., "EAT Measured Component", Active Internet-Draft (rats WG).</t>
          </li>
        </ul>
        <section anchor="informative-references">
          <name>8.2. Informative References</name>
          <ul spacing="normal">
            <li>
              <t>[<eref target="https://www.etsi.org/deliver/etsi_gr/ENI/001_099/051/04.01.01_60/gr_ENI051v040101p.pdf">ETSI-GR-ENI-051</eref>] ETSI, <strong>"Architectural Framework for ENI in 6G"</strong>, GR ENI 051 V4.1.1, February 2025.</t>
            </li>
            <li>
              <t>[<eref target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=4088">3GPP-TR-33.898</eref>] 3GPP, <strong>"Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G"</strong>, TR 33.898, V18.0.1  July 2023.</t>
            </li>
            <li>
              <t>[<eref target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=4294">3GPP-TR-33.784</eref>] 3GPP, <strong>"Study on security aspects of core network enhanced support for Artificial Intelligence/Machine Learning (AI/ML)"</strong>, TR 33.784 V0.0.0, April 2025.</t>
            </li>
            <li>
              <t>[<eref target="https://datatracker.ietf.org/doc/draft-huang-rats-agentic-eat-cap-attest/">I-D.huang-rats-agentic-eat-cap-attest</eref>] Huang, K., et al., <strong>"Capability Attestation Extensions for the Entity Attestation Token (EAT) in Agentic AI Systems"</strong>, Work in Progress, Internet-Draft, March 2025.</t>
            </li>
            <li>
              <t>[<eref target="https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/">draft-ni-wimse-ai-agent-identity</eref>] Yuan, N., Liu, P., <strong>"WIMSE Applicability for AI Agents"</strong>, Work in Progress.</t>
            </li>
            <li>
              <t>[<eref target="https://datatracker.ietf.org/doc/draft-liu-oauth-a2a-profile/">draft-liu-oauth-a2a-profile</eref>] Liu, P., Yuan, N., <strong>"Agent-to-Agent (A2A) Profile for OAuth Transaction Tokens"</strong>, Work in Progress.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="appendix-a-example-eat-ai-token-cwt">
        <name>Appendix A. Example EAT-AI Token (CWT)</name>
        <t>The following is a CBOR diagnostic notation of an EAT-AI token:</t>
        <t><tt>
{
/ ueid / 256: h'0102030405060708',
/ swname / 270: "execution-agent-v3",
/ ai-model-id / -75000: "urn:etsi:eni:model:slice-opt-cnn:v3",
/ ai-model-hash / -75001: [-44,h'9a8b7c6d5e4f3a2b1c0d9e8f7a6b5c4d3e2f1a0b9c8d7e6f5a4b3c2d1e0f'],
/ training-geo-region / -75004: ["DE", "FR"],
/ dp-epsilon / -75005: 0.5,
/ input-policy-digest / -75006: [-44,h'a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0'],
/ ai-sbom-ref / -75012: "https://sbom.example.net/agents/slice-opt-v3.spdx.json",
/ nonce / 10: h'abcdef1234567890'
}
</tt></t>
      </section>
      <section anchor="appendix-b-relationship-to-existing-standards-initiatives">
        <name>Appendix B. Relationship to Existing Standards &amp; Initiatives</name>
        <t>This document complements:
- <eref target="https://datatracker.ietf.org/doc/html/rfc9334">IETF RATS</eref>: Provides the architectural context for EAT.
- <eref target="https://www.etsi.org/deliver/etsi_gr/ENI/001_099/051/04.01.01_60/gr_ENI051v040101p.pdf">ETSI GR ENI 051</eref>: Defines the AI-Core where these claims are applied.</t>
        <t>It differs from <eref target="https://datatracker.ietf.org/doc/draft-huang-rats-agentic-eat-cap-attest/">I-D.huang-rats-agentic-eat-cap-attest</eref> by specifying measurable, cryptographically verifiable claims rather than abstract capabilities.</t>
      </section>
    </section>
  </middle>
  <back>
    <?line 416?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA819W3MbObLmO38Fgh1xLKlZvOnO2bN7aEm26dFtRcmeEw6F
BFaBZI2LVZy6SOa0OmKezvPGxnnZ1/1p/Us2LwAKRVKW3DM7u44Zt1SFAhKJ
vHyZSMCe59XyMI9UT5zE8MNC9PNcZbnMwyQW18lXFYuNk/71prhMk3EYKTFO
UtEv8iROZkmRif5A9CcqzrOaHI1S9QD99K+9/sDTT32Zq0mSLnoijMdJrRYk
fixnMFyQynHuzVSWQTeekrknQ6/drmXFaBZmGQyfL+bQbnBy/U6In4SMsqQn
6mEcqLmCv+K83hB1FYR5koYywl8G/bfwH6CvPri6flevxcVspNJeLQAaejU/
iTMVZ0XWE3laqBqQul2DflMle6J/ddKHXx6T9OskTYp5T3x+Lz7Db2E8Ee/x
Se2rWsDroFcTnjNr+OUFxmGTq/71EP97nRZZXntQcQEE/SSEHQt/4flWB4XH
MxlG2OTf1Dc5m0eq6SczfC5Tf9oT0zyfZ71Wy3nZgu6g6zCfFiPgmGnBD6jB
TLO9VV0EXrl6rSaLfJoA4zzoR4hxEUW8ZvX+IilG4uxkOLy4GdbpbZJOZBz+
lebdEx8K+ahCcfUvx/RSMfF1id819Tj/NqVGEZICg2G7WpykM+jiAdhSQ0Ep
f2s2m7Wa53lCjrI8lX5eq11Pw0yAIBUzWAIRqHEYq0xIMXdENJ+qlxYmT0RW
zOdJmotUzZJcCem0TMZCVsRc0oIL6adJhsPD1OKsKQa5yObKD8ch0ZCpHD+F
XuJApkH4VxUIP5LhLCOyeARcXyQwjEE5UqQRPoEhZkmgIjGXKXA7V2nWoFYw
LZAYGfsKmwEPwhg7AKmWDQHDUCOUbnoFJEIr4KFKFXzi5eFMUVug3IcFEPMk
Cn0gtiku5jhTGQn1LQfNgJ+ZyN33rb33IlY5qgMsf+xju+y3v/1nVvhTITOR
QRfQNQisYFnRAgBNQJ9gdD8qApg59oaTTJO5SuUojHCujyCI4uR6OBAn5wOa
wPb7y0uS5zBXfl6kSNw1z5wWFJYb5pJgj2Esjt5eXInPasSLmYmNo8/X2Sbq
/cfhxXnlzUd6g0OgxKgsnMTQByz8SIkigx+RFugSOUiGBhW1QgkIH0nfLAyC
SNVqP/0kOrDocZ4mQUF8qdX6a+QEmZWM80dkh0I5RPHIpzIXwAlfgWw3QOpk
lsS8hiDYzJgZrO4M1mRazCRI4QOIQTiZ5pqzYPyiZKECI4Z+lBRBQ6hgAv0p
5PQ8DTOl5UJFCnRsVsShT8uDbHwI0yRGxWEeh6kR8wWuFM0KKI3VI1rJLBf+
VEaRiicK7GYIOhHzBH/72//KtLwCa3MwPiBvQEkI8lcRUXwdJ7EHhMyjUMY5
WWhsZmWURXKBLR/CJAJrHTSsUKu/FNgmE6kEIsQ4TWagZOkDCKAIwiwtSIhx
TVM1KeBjcDYCPJH0pyBGaCxeNARfrt4dHe53OrekamHAiuxq8Bg1krUBiF+1
Fk3xIXlUsFYNdH9gHJCFibFNxgBoO+EjsSgoaR6OYd1pIVyLBjIfaWGZyLkY
LfSXC+SpFFtbsAAqhX5wLNfoWenb2mqwNG1tJUbJtTR4lgqmamuLPgVtQN2q
qD4okGpOmo1SWcGvHyUghl/wiff+yoOHXnu3c9tgHQbl6R42dzvtzaY204Y8
MGCjCLgCPEJTmbrW5AIUaApcBecAqkGrS8Zv2QKB4OCignjBImckR1pyFLoM
XxH35knI+gdcnsmvSstxALNmEzeSqPnQHdOCdAmFy46iKEdJkVekHNwgsPGM
Rd0YbODaBvgwUEygw7UXmw1qfm1UoDTe+AkqBHiIhpioZJLK+XTRgBbhg/QX
+sOrIiaLXTGr+Kkv52xAwZDAkFEEAheI/uUAfiNzTPghW2H8sixK8ucoKm9B
zNBXnIHCIYSC5e4P3l6cbaJ9y3IlSZ1dnTC2STu5rS2Hg1aasmI8RgeDgrxW
Wcg2rS4cuVKZZaADWvhBxKcqFeALJTLOkZgAHsHkgiVTE8EEJVpCNkw+qC+L
CRkfcKnCgEcYmviPcgLMQl8OPcbsYNAdpqgyRiOtIoBcEIuwzyGyCtRsClRC
Bwv0KanSJi0ASyaN3kchSOE9wNtsBPoHbe7xe1wIlBh6Y140ayA5gGlZZXGI
DDkokaosQ0eCmpzA1Ob0LVrJrS3raRDPRAu02SEJDVN9uQBZAj9zdHPcbzi2
jHwLaMQmKgPPA/szVkQzy5gnI1DMS2JLQ4xAWayEpeCcpK/QdidgTkr7ViO/
2YWOVAoylETJZFEjcTdAemur52KsVLngK1uANM4QuTyik0GDeCpTcAan4BIK
+EaQdsIqnZ6ewWxIeHxYK+NggSz4G01cniQRkG3WG2RrBv5Cu0s0FpKxDvIY
8BL5rGwqJgmoR9MxBIPSEPQMVAEPCE6GBrdYTtsIdvGOmRBT+aCIaSMFfkhG
Oc2MvJsUX+PkMfYmSRKgG8pVs2pTLh2b0hNnWj0Q3/hpODLgEqzHJIRpZz5Q
xjPUpsYQi5AE1Jg+JjQEkyaFYjnnKfDYA+urL0lxceAjB3KScTEjG9tF2jQH
CQE/noNSGXkszZVjCDdFAYqZajk0BpgUi8Cj4QIHKYbtrgdkA0canLv+VIMA
iN8wvgsyUT+7GV5jwIj/FecX9PPVyX+/GVydHOPPww/901P7g2kx/HBxc3pc
/lR+eXRxdnZyfswfw1Ox9Ois/+91XoH6xeX14OK8f1pfIZOknqFpyEAODFbA
1o4Wlqf29uhSdHYIs3Q7ncNb+umgs79z2yQt226KGxD0I/AzGT7AJ4BY32vI
YBTOBUO1fuxgx1L/2WZnBNZYnKcym9I8SGaQwJgsurbmIzVGdMCBBoMVWBwU
eXZVTfGODN8MW+mg40GZNiFhYcdP5KjkKD1FFFD8bwILGAj0J0xSMIaAksMx
kgnOKiCkTT4VNBcfkb4TxVX/iZa1RaYcMHHuCx0DsEVuGr6BxWJAdK6RyDsT
C4kNGzwdsXBv1gbxClAij3HyTfkFTYg5T+gN5BkRMChQoXtEZ2kQD2sIqM04
nBSphpgoxLww2ZRYQtgC4Qk4zrSIM9KaOT0N9IJtoHOhHz1cu3tCGdD8UWqY
zkjo/fHlVYnQeXU37o1z9UBJwTtNgIr7hrgP5p6aZ2EEv5nuQIwdpceZWJTp
YBOkhnGLVwaQ2T1Clv8Kmn0OUkB6vR6okn6UeBbcGy4rPIjB482UREoB2uBS
IhZt0VpoywO4hLVjp6nzU+KIOz0mw8Vx3FE5jrElOJVRQkAaokwINSH23LRD
f8RHGHTCIwRNAto0DLnobnTASbARbBuYoOwPSOBHbAcCt2CnhLYRMyzAIULt
08V8ivErUA8+OmfLTOYRjDngZIwh+SWp36YW2B1UdMLneiYbWusb4pjSFV5/
EidZHvqbtdoTNxLnMK544qD6j0DQExJnnl5jhP8ETEIDxIHWU+3JK/88rfnx
aeUV/gYDlrIYBvfQrbe/2263Bb24oxd3/IIY8iRurs49TgXlVqBZxzGCMN7k
vkjjXqjycU+GPWrU8+PYe9i+3xTVUUkDzLidyrjmVRBCoItjH6WLec6uCSSQ
7B4mX6YUngAII0F/wcfT6Dw0Pve4c0tBV5jXd/j6rnxtqXiGDA1vQV8LNpVg
hqgND2n1FvXY5fW2cN7e4dslhschRNticLySaELET307ym963RX0/M55Po4S
iR0eh2PCDQRbDfrQ7RhyBEVKsMEMRoMQavDYqSxzbU+YBnfc4Af4VmYcGJdo
t8UTQ15Zj6YHt6MeCN3kzja5K5to9ml5rMdJrOpoKeuZokw2/9LdmdbveTCA
dyp1V+ZQmKfVFRlol4bUA/9iP5wDJ7Xkv78EC4emwIm9u92uFnvX4ZlxOqRt
y29kmkoaQQ/6AeTZi9QDyNi4dHhmdmy60QzPdHhat5qmrbuch+WQrGj85s68
sUPeXA3g16Ex9RBvcPzOQNJCQB86sNpswyg9QlerMj6/o/BK868F386fxJWJ
ygjVi6GJltYEwBTULSNpA4go55XqAN1Gkoii1wZaUThKZRpiTC4AASKwkzjf
hpZTikzVDHAdJjZxZIzNJogFn8igs0UHm+7YTfC3FTMKYZOYRMkI+APOhPV3
xVKa5KnMiIJzxhLwA/gw8jtzSfmJNab0Hn07uBzMyWjP7ibGbMDLg1pOOFgc
4ClywEROJOSZ0BCa3B9lIeE5UeTSozuzCRtOulMTYPbJOXHw5mZwTMl8+ZCE
gPNg1ogL/QSwfhgzdqqd8PZI1qsJ4fE8iyIMeuODTrAzlsrbD5TvdTpB25P7
e7teuy3b/mFH7Y3Ge/dig1L3bMByPdXNsqcqx6JIzuS2dzCy3z2qKPIophPz
YgTqwz00MJ+K2c4qT52OA/XQczZ2esBTjPo8kkbvoQsjlLjdQ84GhrhSfgDE
IpdBzv3SKC60DGYgTygLGrMs+crGOvfFgcx6G52qOcoKKK1fMcB6MNoZKd2n
TRCYha7408Y6B1fJ+tn0DIjXdbmZI6MJANF8CpH0hHccyDOTdMjZCBA1xQiY
IRaUUKLJ8w4BSy3piXYmjNDRnQMOx3QUBPgAs0Eo4dFoAeIALcBSNGv91U+c
jQvqE9C9pzh5wiawV6vd39/7oyStfUHCG+yrbvFp7RGGA3wvtkB54B0oRMh2
8QO26dtpDqymY5IDrZYKNamImDX6hM+BdVtbZBmZZsz9YsYB230Z9M/74uhi
eFL2jJo/CaHt4nbDbCM+Pj42IUiQzSSdtGSGCJfWoOUnmaK/mt+m+Sz6yS5D
tgmSHge0B6EtKk3SpnUJCGgReON19t6QnYHY2+vu7oEMejs79/bR9sEOPdq1
j7axGWBg4hP2XDLKWR+RFDn6fNzXwyQZkwIopUoLpkBQHyQ4caA4svJqdwXJ
MWnJBeANqB9iA0DPmHPHd1oIyGxqbTDLTyCb1118wagAPFQO5IGJg78FRPDU
GwBwNH4UWFAKdl1ftNeVjP4MWLMn7n8RdeB3vSfqzWYTUw44K/wVbefeTpFG
nhZE0uy6+BVTjVO7KwayB39nvGmAszhWOe6gBN6wGIFaFpHyjnlitOvn2HfM
PwjcPoGomqN4MDvdZueg2b0lzTOpfw6uPYhP0QxoZcU1nBVRHoKN0+mFUvq0
TJAk8H+2IbaHCMb7SwFxaoE7QT5n07Ip+FkiH/P3qfpLEdKq40aWNm4YyqVK
0u66+hbyNuxcprDCOkWpLeY2eVyDMrSFrOZv2WQ4qfHUxRisdy/iDIwjsyzx
Q9zxKllv4IbOu67snJCvyxBaVjeREXGA98t0ijZEV8HG+qGI4nL/FdMrRWZF
2SKbtVnkJuXOHmQEuIJBDCYc+oTbCKmRHiWYeiAEY7NZeu1AQIaXx39C5h8t
fID9Cn7hoI6SB9ZobrDlogjL2M/AvOQPXKkrRa2zSTrN42OXF+hzkQW4p2rx
lVUgVmST0Ld7GoAU2UcCLPYlR1dALXmXmsEPOgHQI/NMVrvligqoMwNSp+zC
LczAdlmLvfe3xV+b2Tz41vxzBgiaOrSDWKJ5+q8Z74sAKwne440c+UGnu70D
duCNuBXiD8ZqGl7CJJFT1OXnqWLzy6aLVlAjM51qw9U2e1LO5nEV8WKKscOw
V3S6zR1e2cGarYbyu2vczBPdJmj0NQhtkr6DCAF+7+zS10dmHdbh7PNidgni
7hfH5+fUmqFl1VRrmdGfXJyf/0k8HIIVkWPFA4JKtYFWbQdZo53NDQOjbY3G
Si4NNyKcgg7We2WzfSbrHbqbK9ypzmjj7pMVON4sm9MOfDgqgQuZOP5FRoss
zGy2p+uUcOgEjw2kTAaI8pf/j9I96/KHJuDdqaQioMFd2WA5Hh0ML8R2Z2/P
64BzmE+l1xXoysqY9Ev9+ASd3rur+u1yLOpmGs3g+25ISg3ubIPlwTG29ozh
qSQzTUCszt6+5Qj/5ur09IijYcpo3mSg63qrIrMgGzwDq5guQgE38Ih6WIqS
3gYLEQzYlHKi4/zh2z58USnkMAKxjek/MFtZiDuuIDtn6Fm9I2PKKkn/6jYx
iCyCcnYpKYocpeZjTZFNGSxsGoxwgdGbDZSl7t5epaoqn6ZKlZlg35KWgZuC
yDiBcMx4XdqkYHI5S34JkRGqMLZxwT2yLMWsP4B7IMxiB80z8qIPMiV8V0mg
Q+jwqEzqHLMbKe4cvna693q+xvWTI6A9JZq1zNZColvKCtM2j5MZxFwYLnYa
s9nNk7lOt+B2lnVUvBY43TcZbmESO1AMdEEDaXxTnGAcw5mSkApXDGBj0rHi
SH/LYMAp4sHOs5KFHMKb7Vsd0CMgGBcpxRPIHsafdpDMjmLXmcELb7qNE9Qy
ZCmmz7UvxEV4pII9M6lpom3oY6IXsqk3Szo8KbbL3yoVIDrWwW8M5WBnoXv+
sqvZEdKQ6IWU+YS2DEAjmqJWO4JPRRaH87nKySf+AvF3SxQKosWWgMiiB061
3Wl329vtnfZue6+93z5408A2N7A0LSOnmDVt0acQOYCRaIlOu6f9sRqjR97d
2z84bMOnLfEOVngaI4I758b0oVGpFspUT/wilv+0xLDku0FALa6g5PdYqqYZ
19PqxL7xwmUctuLP6gxGOhAq/FIzg2SPmGFBMvZhCnX3U1ZO76Fbb5TNv0d2
S5yz0DAZDv2tmmlTj6KZhxsbDhX8rZPp0linjRS9PndjyVzqjyIN3SNw6osG
T4fyYITA6ZZ4rXFTSeivZW913Fn0sLAAkPWP0b2721YHO+22p7qHI28HJgF0
d/aAhL293d0deNNuv5ruzh7Svat2xhW6QW5dumvuf2EWK9ICCHIImgFRHq/T
Z1aXFUHpfk9QPlGBlcffeg8dR0aeY0g1dfYQ5t4IpgS+vLX66TNrFmyrrp67
w7Kame+vtV9JrUtH021WNIMLuXu1vsiIA8Y0kkMkb1wtPNMQjitGsq/lNqU2
MWyLwP5h92m8VNaCJR+xwv1xmeK+ZRInEdag+n+A+GuOg2CeBLfL+RssY8Ey
yJCR+3pabDBzenq2qUEj+rfoexTaCG2GfhC8Wpbp+DIxGeN0KbOWM4xZ8qr5
szhixWlalEBpJ9dNkhcLKCiHqI2nRXmh0cLZCiiB03I+hCoY0oVb0GvsEkR2
OpQmyMc77ZNUxkUkbS4R981lmAHLKOsGpOidK8Mt3IWgop3yDfth8txZoyyu
seXbYqPcFdukxCWQHHL1GWcolMFvFIjJsqDWnR7W45QOlxJCPqBUjIewMgPT
ylhIYArEq7uslKutxi2AScZOLGK3L1OuYoKOc8BPVqiomEMXtEkuOMZajs2G
w2REG9W4EVekSgmBBPzkk05kkGxDiEbwBYvpc64XwZRKKk7iAEI0NVuHJQyO
CNSMa5CwmMKCGjXDGul1mgvqwblgBis6Df1AZktXOwmsQjDAy4C/ahbiC+Vp
H2R064LdUizITnGMgJJGeWZdSvV70carcMVaDMHG2+WCB962YsX/cU72dQ52
398LnnGy2sHWeUm80ii9iuDnnMkrqCvd6LbsMgRorHGlLVHuf5vvd3ui3Tz4
jr+BqOxULqi+j87/9GpDE/+sGBsudXSST0YNpzINKDl3fXLSEBdDsw/JmN4U
622SFvNGUKKjJLah5RDmNAJIo8CCunMd85wpfyrjMJv1ILw8Kgl41ubqaABi
lmyd2V0y+drE649yKr/Xu6K6SgazKQ6dbiUYxlkjBUyfOJkWoGWOGPhBlfzi
7UUzNWtprpJI4bT6pfGBoE+FD1ykVkamGIDpCbO54f0W+IDiN8zTXJrQjdcO
rDFtYVFS/lTJoByCCuVUpCZkn8iLWS9D1QgBEBAUuMlQwmI0Ka5xKrO+tFmR
RIHtCW017keSVIl+7E8xqWVtjmHFO5Nipx3C1GVsg44TVKgGLq0yYGtrHQtw
x0N9o0NZnGqnpYW5eDmfv3EYoHO7eNzE8uDZqeIsbTHpcxNt0taZVsyfvd//
52fdx5PQ+REc+ljRCRNzACIAiDSkcwmg9rvvxc3Jpgs3xVPZx+/+4/Tx3en8
/Lo+nsQHYzOukoTQI/OP3/8XxPZD0DycLSrpRv+Pd53N5T42rpLrzWfG+j1z
+fl3zWV54DMlMzwm9p2vX+jj4cVP1/Xxj5jLE5pw9C28dQWm3G23fl26q+ti
I2nRWVofPVdboeq+/mety7+IQUYnuZ5Zov8v18XWRp84Gx3P0PlcH99r9+o+
nlH/n3+kD5oOR7gb11RIvfkKIpf78MRnHR5QzcGrJrraxxFFjNVG/1R+/N32
9O/zL+in7t5hzKwwL2f2+TCeF0e4y1oa5zvw17qhCKOoMNENusJqUy7iesbG
s9meGXVcOWyMD6glAji7Y+XK/QZYKTpUezHkkQh4alfPxSwQQgNoQvxlXHcD
vT8f2cy5Krsc32jXG7OzNgpjKo9zz4NVcws8MHSA6AWGRXTGyDFV40j5lCKH
aHmqwclC53dLJKJRFZ6NzXSlqQlDl+uCOepOqNyaoGiu+QMBPTLELf8pMxIQ
gato3KQ9CkC8wAbOV0xdvMSJglRFPK1pOKfNnWdAWbk90hBaFrorsjBC9Iip
7LEbLOhTwSZYaKyPEkSE4UimETn9QrlyIqEE4joXo+mLg9UalGU+u2FAdVMD
q1RNtme5TIRx3N+jYUbPQNOvYdhTO+yGzc4zslPpM1im1Hfo47e//W+KyHt2
E6oMv8wZE4MMry/PWsOTZQ9seqGQveek+yeFBK3Jlfo+GdVedES1bkfglb3g
nzqM6ml5qFNfv/3H/yCkwUtu53pBC/5ML/in5A8iGZt7Ghy/mhbTCyeQIXYn
DxFwobj36Qw3GH6gl9/Dn0ov+KcO9oB0eh1zQHUuaM8+Sb/fy8rMrHU1Wyfb
qzN7thcn0wFd2apVrPF6xYxWekFD19P5K/z5drX9d2b0I1xe2wv+qaSikNMw
l18bzG69U0Xi1/9+LzpBRNMyvYjVXt4+28uvr5jE9+bzg9+v9PE7vq/08Tu/
t338Hd9zH/8Ie+3iom5PQ5fSmWMmI9KZM9c/spNH+65l8s5U7+EhWezjrfaO
QzUDaxv62dYWHR61aOm3//ifaLwwJ6SxjS3s16BlpjfU7V0mlIY3O9aezlm5
ZDF6MI6hf3YshiefvOH5ZYOOC0fi+vhPmwxpKs4RABH2JqliGP263jxx7PW9
42Mp+xWWTl6kgPz0CWGYBs7MQC0zPbMF9Sajwhk+D+kiLUob6onTcTXOsEF/
8Ekki5g2ZzAJ3rTFkNSjS1iYOZk8jfgSbTShm69qYU7LM2ji6mjK8ttPyjIH
0t8N2nSI3c2AEkpsb2PxFp0iJyiGM+eD4DjvQZldcyoZKgSGqZtDNDsPmXPS
8k153kNDXANe7Ypl5tRrlEiUuT/oXTKnAS0SA1ZzPFkZ7FRukeH+FadltSj3
baLsWOfQ8CaI2qUzfwuldrGObiX/yB2YTFopdISh8ShExxOfZBQGFlZa/pcS
We7NlDloJw8HvXQ9QyH0UhXbSrJPokCVu5EmaLDpPju4s9wZ9L9d6b8UvWrn
tNOqw4iVro0cVlOI0PeOZ2voIGAps7V6lZ/Ny5obJnIZJZMydVnDbWSrESWB
YxlGyEw6ce5L3FtK1Z/14ul4DNFPWr0po4gje2XTQqhvc7y6CSOrOV6kAIB/
jpXoNsLQpoeu2zFlhbL4FkYhbuixGmzqvVBDUWZMJNM2Kmu7tUrylUP6ahWk
47e//SddXLCo7PzqSx52m5zYQoiMFwSgRum7h7Cqkyvgyi2FUVLEAcuGkS4P
7dmSaeVUu3wAmrEYmrV+KYArE9cjpY+O8KmhtYc2abPaqQ21JambDdqjDwFc
0N0QIudiUR7T6FZWjvagFcgeUzb6wgeic7rIzBykcIpYnRP1YBJ0IXtFrLR1
27rCezWo1FT6X2Fkd6IgBeGECgZKr8gbhXgtFm2cdNoUx4P0iA38na2mncnK
PHhvxV5kQkXBZlJ8iqlaT47HIvGYQVme++l4UweMKOKm/IEJdKJVqtUr4jlu
AeM1abYSNpKP2Us0QhRf3V+mGvVMX3uBbfhoiw7i7bEySyVPRd/j1igPzl+e
nPMpI6oW8KKQvsdTZqg7xwvoyZzgcnXDuQWFdvbtQTS98nq/ZVQeO3UvLcLq
ghRhcYj88n01z+lWnZLsKj/oWrFvc/YoeB9MMhvh7T76cLu9zohYbO+zKW89
sMXEBLJwTVI11dcxpGH2VR8w0LvvqNh7TXGpKxyqeg10rSn0hdk8KDzqQHcJ
8KKQTLiiG+MRUhXg1Gxqx7UOlGECCSdFxr0XrSW4URk7JSzXp0PRaW6TXJuj
te4Jw3mmiiCJF3SbTHkuMnvpIC0R5h7QpNoYe/nQzdUg0yuHc3WlAXwt3XLT
FFTZYWpDdC0jrEyqL6RJ5hKPbNoDcmlJLFkr0j6HZCSJzueaAhbUQF59bWax
BGRt5fXP1dPbPy+f18WZ8AlScDB6SMwE1fW5x7oWephsjFWk1SQaqiBMLxll
uESBlpr9puBzZVWRoTcduovBXix65egJ3iqBn1FODgjSe8ZalzBdxWa9/sLN
brrvrG4PsvVqNTPgOQXoa+4ydcmq2cPDEDhffxgMxfHF0c3Zyfn1LVdd72M9
GZpa7dv0NBa1708grxS0mOlUrzYkE76pOy6nwEf1PHh3C7N5+oR2zy3vf3Lq
9035fqU6/2kpEMNGVETxtHxDg80Y3lydm1adp+XM6dNZpZAIH5rG3bU3IDzp
IJ3vLHDbb4un1esLnq6XryIYHJsPdtwPKucMKh8JfpyZz3bhs8pVBseX5l4C
02QPmqy/iGCwfHGhO4N9+Gz92YN+eUOKc47AfHeAFD1zB8Hxutt2zIeH8KFz
n8CVuUaPI6jSdOj2eAXA8g0ALPXuQ9O448xGn93vl1fPlcf1TXt9FN85Kbd0
/L5ylv7FE3JPXPnFVz/q60KgEz3U8sn0JTjK2rndpBMuP66dfpJidJhwJgH7
4IoWvqjFaGz1ytHndBW+1tczHTRLfmT8oINFZ/rCW/cl3pD2xd7zVDmAm459
j68+pmO48Cv+H9s18ezt5q14m8ogxg2ZIfi3+h/t3VfOXY94MB9nPeCzuTi2
rUkUlEPP6g1931SDQk4coAEGcACYstnZ3znYb2nyGrB0eJ6rc3i43zR07+++
jm5sZ+j+CNgQ4NcZUI1TiDBp8LHJ+xfnEFvIr+GsSGVjhfN41+tmnenEDlfp
5Kdn4OW67c6upZLuzqoeb1b52KUPWxj6TlU4gtHfIlf75jA5XWQxx4tdwTqJ
h0yc4k119AvzmThHu/mfcRWW2Ir9r5LLTzW5JVMPtg+7JbloMbAA56tKS7KD
xG8huUQ7NK+yVeEJeSR/nbPRDMSv1lBETzVFB5YiquB9PUXYHBnZFKcQ+40i
GShAYE3oNw4Wctb42BQXb47BJ0+mhWocAYICA0TXCtZfvstV08/HkZfp56d9
gDMRzKBbigCmUn5kBph5AhUL068qz5e4esX3XfavS/oASkAgBahoKDbwguFN
0XeuCTIkQ6drSKanHwHqYQQPRG87ctvd+xFBgOZA9FGS5xiHVGh+X4CbiOgW
bbQPnzEQ4/LZNeDN5py0CTEiA/2vE2J8+rGA0KSUYoRXZybZaCsNb8XLk+H7
yvGRB9TwtfEmbenZyLIF83yXJhCuDt1Zrh8WyO9zAhCTtGmscu8YRxEbOIL4
/H5Tnw0HS93F41zjtbaa5rV0KW7FqKg8C3kewGmIZVr44G6StqB1C1DVXfvw
sAVftdo7zXYH/ne3125N0jt4DU8f2jvguTvz5jwYw+xwpIbY2qr3K6fK3lWu
KcZDg7BGe+/rWKj3/ooeQF/iE10r0xDv1Cg1cqWVgU47Xl9529vNg8ODcgaY
2QYubk/mcz2J7CvEODo51jLHTllCqr8eU7iUNWU2//bfMvfNIPjXnfbBAcwH
h6X5DPMiwKNZ7qnX8t5KvCUdb14IMQ3HSfUIQBmsQOtMAiNAyk6VTAn1bfQH
rbPTTY8vj9E3RutLuuaYR9PSTJceE4eurwRPuyE+gXkDKRYguZFWO7HMn/2D
nX8Cf7qHOy/whxLYGRcC4AETfYWgiqeS8jfuTQs/yj2HLzBd8akNXGlXTCiz
ZeAdN6cFoDRWS0J4oU/qCajS41TeK4wV6/eLPaGCf8BGDfFHR8OBP0flwU3X
Q5xUL7h/xT8OEOrbGvnKzCHfQEvswONN+Bqs+gQAYtZYMhwGCpVKxbOKQ+8R
sKHyTALbM7UEr2bM810gR/69wFtuz4ERp2HREJfMkc+DM7zShUVes0bfFc5H
jNZOyiU8CgsvwWymJ7vS0/j61TSv/RrJtUSWdKNBo2nliT4FvNHv9qv/9ghf
Fn6NmSG+q1df9v/MNAh0w+whUgm/iX7TFl/pTJmDfehUXPWgSWhvbQlCqe9O
xCRf+U9ExKYjvaeiD3W84kjHyvE5e3OAud9pu96oPXvaAYsB0IX0VGxOPNib
2Tw/jnvLn687kVEeyDBHHzp+OzhUB+N9uTfa9XfwcN24I9ujQ/8g2Fd74125
M9r2u0FHtcdvbnGAdck/PcwODOMczcfWz5yf2MV3a6Jt02jPEiw7o66/Heyo
3fGe3B8d+IdBW3XGXbk92vF3gz21Pz6Qh6O23wm6anu8I3dHe/5+cKAOx20m
+IULO/Bd09zaAVrN93VkrZK7D9vOzR3Y4wsnc8yJkIoovsVAsCwIw0DsxFxK
M9TXgVEdLd5OSngjW/6XT5zLKvCaji/2X7D4USzboyul6SYbvt3IBRXmGguC
FP1rsgx0KUGJKP6vIZ0e389qKwj5Xx/g3aDcvVOBbgxHG0eZx4E5jpXpg4b/
dP+09I82MEbFjH6jejMa7Tqu3KJfvWpM/7s3lfwMGjb6d0lGQCUIFmBY3M+I
VDDhXdNfevyvH6ngX+tjGWWq/iuIz8XxhZC2pWrW/g+neuH2AGoAAA==

-->

</rfc>
