<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-messous-eat-ai-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EAT-AI-Agents">Entity Attestation Token (EAT) Profile for Autonomous AI Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-messous-eat-ai-01"/>
    <author fullname="Ayoub MESSOUS">
      <organization>Huawei R&amp;D</organization>
      <address>
        <email>ayoub.messous@huaweil.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="23"/>
    <keyword>AI Agents</keyword>
    <keyword>Entity Attestation Token (EAT)</keyword>
    <keyword>RATS</keyword>
    <keyword>Trust</keyword>
    <abstract>
      <?line 41?>

<t>This document defines a profile for the Entity Attestation Token (EAT) to support remote attestation of autonomous AI agents across domains. It specifies a set of standardized claims for attesting the integrity of AI model parameters, the provenance of training data, and the constraints of inference-time data access policies. Optional extensions for 5G/6G network functions—such as slice-type authorization—are included for interoperability with ETSI ENI and 3GPP architectures. The profile is encoded in CBOR Web Tokens (CWTs) or JSON Web Tokens (JWTs) and is designed to be used within the IETF RATS architecture.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-messous-eat-ai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/mmessous/draft-messous-EAT-AI"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Autonomous AI agents—software entities that perceive, reason, and act with minimal human oversight—are deployed across cloud, edge, enterprise, and telecommunications environments. Their autonomy introduces new trust challenges: if an agent’s model is tampered, its training data is non-compliant, or its inference policy is violated, the consequences range from service disruption to regulatory breaches.</t>
      <t>The Entity Attestation Token (EAT) [[RFC9711]] provides a standardized framework for remote attestation. However, EAT does not define claims specific to AI artifacts. This document fills that gap by specifying a <strong>generic EAT profile for AI agents</strong>, with <strong>optional telecom-specific claims</strong> for use in 5G/6G networks (e.g., ETSI ENI AI-Core [[ETSI-GR-ENI-051]]).</t>
      <t>This profile enables verifiers—such as OAuth resource servers, network function orchestrators, or policy enforcement points—to make trust decisions based on verifiable evidence about an agent’s:
- <strong>Model integrity</strong> (weights, architecture),
- <strong>Training provenance</strong> (dataset, geography, privacy),
- <strong>Runtime authorization</strong> (capabilities, allowed APIs, slice types).</t>
      <t>This profile does not define a full AI Bill of Materials (AIBOM). Instead, it provides a minimal set of <strong>verifiable claims</strong> sufficient for remote attestation and policy enforcement. It assumes that richer metadata—such as detailed training data lineage, model cards, or complete dependency graphs—is maintained in external documents (e.g., an AIBOM or SBOM), which may be referenced via claims like <tt>ai-sbom-ref</tt> or a future <tt>ai-bom-ref</tt>.
Traditional SBOMs remain essential to capture the <strong>software supply chain</strong> (e.g., Python, CUDA, framework versions) on which the AI agent depends. This profile complements, but does not replace, those artifacts.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>
          <t><strong>AI Agent</strong>: AI agents are autonomous systems powered by Large Language Models (LLMs) that can reason, plan, use tools, maintain memory, and take actions to accomplish goals.</t>
        </li>
        <li>
          <t><strong>Model Integrity</strong>: The property that AI model weights and architecture have not been altered from a known-good state.</t>
        </li>
        <li>
          <t><strong>Training Provenance</strong>: Metadata describing the origin, scope, and privacy properties of data used to train an AI model.</t>
        </li>
        <li>
          <t><strong>Inference Policy</strong>: Constraints defining the authorized input context (e.g., slice type, geography) under which an agent may operate.</t>
        </li>
        <li>
          <t><strong>EAT-AI</strong>: The EAT profile defined in this document.</t>
        </li>
      </ul>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174].</t>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <section anchor="generic-ai-agent-attestation">
        <name>Generic AI Agent Attestation</name>
        <t>An enterprise AI agent attests its model hash and data retention policy before accessing a protected API. For a more extensive protection, attestation target could also include behavioral manifests, identity, prompts, tools and capabilities, SBOM/AIBOMs etc in the future.</t>
      </section>
      <section anchor="g6g-network-functions-optional-context">
        <name>5G/6G Network Functions (Optional Context)</name>
        <t>In ETSI ENI AI-Core, an Execution Agent generates instructions for network slice configuration. The agent should prove:
- It runs an approved model (<tt>ai-model-hash</tt>),
- It was trained on GDPR-compliant data (<tt>training-geo-region</tt>, <tt>dp-epsilon</tt>),
- It is authorized for specific slice types (<tt>allowed-slice-types</tt>).</t>
        <ul empty="true">
          <li>
            <t><strong>Note</strong>: Telecom-specific claims are <strong>optional</strong> and <strong>only meaningful in 3GPP/ETSI contexts</strong>.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="eat-ai-claims-definition">
      <name>EAT-AI Claims Definition</name>
      <t>Claims are defined for both <strong>CWT (CBOR)</strong> and <strong>JWT (JSON)</strong>. In CWT, claims use signed integer keys; in JWT, they use text names (with hyphens converted to underscores per convention).</t>
      <section anchor="core-claims-generic-domain-agnostic">
        <name>Core Claims (Generic, Domain-Agnostic)</name>
        <table anchor="tab-1">
          <name>Core Domain-Agnostic Claims</name>
          <thead>
            <tr>
              <th align="left">Claim Name</th>
              <th align="left">CBOR Key</th>
              <th align="left">JWT Name</th>
              <th align="left">Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>ai-model-id</tt></td>
              <td align="left">-75000</td>
              <td align="left">
                <tt>ai_model_id</tt></td>
              <td align="left">text</td>
              <td align="left">URN-formatted model identifier (e.g., <tt>urn:ietf:ai:model:cnn-v3</tt>)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>ai-model-hash</tt></td>
              <td align="left">-75001</td>
              <td align="left">
                <tt>ai_model_hash</tt></td>
              <td align="left">digest</td>
              <td align="left">Cryptographic hash of the serialized model weights and architecture</td>
            </tr>
            <tr>
              <td align="left">
                <tt>model-arch-digest</tt></td>
              <td align="left">-75002</td>
              <td align="left">
                <tt>model_arch_digest</tt></td>
              <td align="left">digest</td>
              <td align="left">Cryptographic hash of model computational graph</td>
            </tr>
            <tr>
              <td align="left">
                <tt>training-data-id</tt></td>
              <td align="left">-75003</td>
              <td align="left">
                <tt>training_data_id</tt></td>
              <td align="left">text</td>
              <td align="left">Unique ID of training dataset</td>
            </tr>
            <tr>
              <td align="left">
                <tt>dp-epsilon</tt></td>
              <td align="left">-75005</td>
              <td align="left">
                <tt>dp_epsilon</tt></td>
              <td align="left">float</td>
              <td align="left">Differential privacy epsilon used during training</td>
            </tr>
            <tr>
              <td align="left">
                <tt>input-policy-digest</tt></td>
              <td align="left">-75006</td>
              <td align="left">
                <tt>input_policy_digest</tt></td>
              <td align="left">digest</td>
              <td align="left">Cryptographic hash of inference input policy</td>
            </tr>
            <tr>
              <td align="left">
                <tt>data-retention-policy</tt></td>
              <td align="left">-75008</td>
              <td align="left">
                <tt>data_retention_policy</tt></td>
              <td align="left">text</td>
              <td align="left">e.g., <tt>"none"</tt>, <tt>"session"</tt>, <tt>"24h"</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>owner-id</tt></td>
              <td align="left">-75009</td>
              <td align="left">
                <tt>owner_id</tt></td>
              <td align="left">text</td>
              <td align="left">Identity of principal (e.g., GPSI per 3GPP TS 29.222)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>capabilities</tt></td>
              <td align="left">-75010</td>
              <td align="left">
                <tt>capabilities</tt></td>
              <td align="left">array of text</td>
              <td align="left">High-level functions (e.g., <tt>"slice-optimization"</tt>)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>allowed-apis</tt></td>
              <td align="left">-75011</td>
              <td align="left">
                <tt>allowed_apis</tt></td>
              <td align="left">array of URI</td>
              <td align="left">Specific endpoints the agent may call</td>
            </tr>
            <tr>
              <td align="left">
                <tt>ai-sbom-ref</tt></td>
              <td align="left">-75012</td>
              <td align="left">
                <tt>ai_sbom_ref</tt></td>
              <td align="left">text / map</td>
              <td align="left">Reference to a Software Bill of Materials (SBOM) describing the AI agent’s runtime dependencies (e.g., Python, CUDA, libraries). MAY be a URI, digest, or embedded SBOM fragment</td>
            </tr>
          </tbody>
        </table>
        <section anchor="ai-model-id">
          <name>ai-model-id</name>
          <ul spacing="normal">
            <li>
              <t><tt>ai-model-id</tt>: A globally unique model identifier encoded as a URN. The URN <strong>namespace</strong> <tt>urn:ietf:ai:model:</tt> is reserved for standardized reference models (e.g., defined in RFCs). <strong>Model owners SHOULD use their own URN namespace</strong> (e.g., based on domain name, PEN, or UUID) to avoid central coordination.
Examples:
              </t>
              <ul spacing="normal">
                <li>
                  <t><tt>urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> (for a private model)</t>
                </li>
                <li>
                  <t><tt>urn:ietf:ai:model:llama3-8b</tt> (for a well-known public model, if later standardized)</t>
                </li>
                <li>
                  <t><tt>urn:dev:example.com:finance-agent-v2</tt> (enterprise-owned model)</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="use-of-cryptography-digests">
          <name>use of cryptography digests</name>
          <ul spacing="normal">
            <li>
              <t>The claims <tt>ai-model-hash</tt>, <tt>model-arch-digest</tt>, and <tt>input-policy-digest</tt> represent cryptographic digests of serialized artifacts (e.g., model weights, computational graphs, or policy documents). To support algorithm agility and avoid ambiguity, each such claim is defined as a digest structure rather than a bare byte string.
A digest structure is encoded as a two-element array:</t>
            </li>
          </ul>
          <t><tt>cbor
[ alg, hash ]
</tt></t>
          <t>where:
- <strong>alg</strong> is the Hash Algorithm Identifier, using either the <strong>integer</strong> or <strong>text string</strong> from the <eref target="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</eref>, indicating the hash function used (e.g., '-16' for SHA-256, <tt>-44</tt> for SHA-384, <tt>-45</tt> for SHA3-256).
- <strong>hash</strong> is the byte string output of applying that hash function to the canonical serialization of the artifact.</t>
          <t>In <strong>CBOR</strong>, the digest is represented as a CBOR array: [ int / tstr, bstr ].
In <strong>JWT</strong> (JSON), it is represented as a JSON object: <tt>{ "alg": "...", "hash": "base64url-encoded-hash" }</tt>.
This design aligns with the Detached-Submodule-Digest type defined in [RFC 9711, Section 4.2.18.2] and enables future-proof support for multiple hash algorithms (e.g., SHA-2, SHA-3, post-quantum secure hashes) without requiring new claims or breaking existing parsers.</t>
        </section>
        <section anchor="ai-sbom-ref">
          <name>ai-sbom-ref</name>
          <ul spacing="normal">
            <li>
              <t>The <tt>ai-sbom-ref</tt> claim provides a reference to the <strong>Software Bill of Materials (SBOM)</strong> associated with the AI agent. This enables verifiers to assess the integrity, license compliance, and vulnerability status of the agent’s software supply chain.
The value MAY be:</t>
            </li>
            <li>
              <t>A URI pointing to an SBOM document (e.g., in SPDX or CycloneDX format),</t>
            </li>
            <li>
              <t>A digest (using the structured digest format defined in Section 4.1) of an SBOM,</t>
            </li>
            <li>
              <t>Or a compact embedded representation (e.g., a minimal map of critical components).</t>
            </li>
          </ul>
          <t>Example (CBOR):</t>
          <t><tt>cbor
/ ai-sbom-ref / -75012: "https://example.com/sboms/agent-xyz.spdx.json"
</tt></t>
          <t>Example (embedded digest):</t>
          <t><tt>cbor
/ ai-sbom-ref / -75012: [ -44, h'abcd1234...' ]  ; SHA-384 digest of SBOM
</tt></t>
          <t>When used, the SBOM SHOULD include:
- Runtime environment (e.g., Python 3.11, CUDA 12.4),
- AI framework versions (e.g., PyTorch 2.3, TensorFlow 2.15),
- Critical dependencies (e.g., NumPy, cuDNN),
- Model serialization format (e.g., ONNX v9, SafeTensors v0.4).
This claim complements model integrity (<tt>ai-model-hash</tt>) by attesting to the execution context in which the model operates—critical for reproducibility and security analysis.</t>
        </section>
      </section>
      <section anchor="optional-domain-specific-claims-5g6g">
        <name>Optional Domain-Specific Claims (5G/6G)</name>
        <table anchor="tab-2">
          <name>Optional Domain-Specific Claims</name>
          <thead>
            <tr>
              <th align="left">Claim Name</th>
              <th align="left">CBOR Key</th>
              <th align="left">JWT Name</th>
              <th align="left">Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>training-geo-region</tt></td>
              <td align="left">-75004</td>
              <td align="left">
                <tt>training_geo_region</tt></td>
              <td align="left">array of text</td>
              <td align="left">ISO 3166-1 alpha-2 codes (e.g., <tt>["DE", "FR"]</tt>)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>allowed-slice-types</tt></td>
              <td align="left">-75007</td>
              <td align="left">
                <tt>allowed_slice_types</tt></td>
              <td align="left">array of text</td>
              <td align="left">3GPP-defined slice types (e.g., <tt>"eMBB"</tt>, <tt>"URLLC"</tt>)</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t><strong>Usage</strong>: These claims <strong>SHOULD be used</strong> when attesting agents in <strong>ETSI ENI or 3GPP SBA</strong> environments.</t>
          </li>
        </ul>
      </section>
      <section anchor="composite-and-multi-component-attestation">
        <name>Composite and Multi-Component Attestation</name>
        <t>This profile utilizes the recursive nesting capability of the submods claim (Key 266) to support three specific composite scenarios:</t>
        <section anchor="multi-agent-platforms">
          <name>Multi-Agent Platforms:</name>
          <t>To support a user managing multiple agents with varying configurations, we should leverage the recursive nesting capability of the <tt>submods</tt> claim (CBOR key 266) as defined in [RFC 9711]. In this architectural pattern, the top-level EAT represents the user's platform or trust domain. Each agent is a submodule of that platform, and if an agent uses multiple models, those models are further nested as submodules of that specific agent.</t>
          <t>The following CWT example shows a platform hosting two agents. Agent 1 is a complex orchestrator using two models, while Agent 2 is a simple worker using only one.</t>
          <t>Code snippet</t>
          <artwork><![CDATA[
{
/ ueid / 256: h'0102030405060708',  / User/Platform ID /
    / nonce / 10: h'abcdef1234567890', / Freshness Nonce /
    / submods / 266: {                 / Submodules Section /

    / --- Agent 1: Multi-Model Orchestrator --- /
    "agent-1": {
      / swname / 270: "Orchestrator-Agent-v2",
      / submods / 266: {             / Nested Model Submodules /
        "llm-core": {
          / ai-model-id / -75000: ":uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6",
          / ai-model-hash / -75001: [-44, h'9a8b...']  / SHA-384 /
        },
        "tool-planner": {
          / ai-model-id / -75000: ":uuid:550e8400-e29b-41d4-a716-446655440000",
          / ai-model-hash / -75001: [-16, h'5e4f...']  / SHA-256 /
        }
      }
    },

    / --- Agent 2: Single-Model Worker --- /
    "agent-2": {
      / swname / 270: "Vision-Worker-v1",
      / ai-model-id / -75000: ":ietf:ai:model:vit-b-16", /
      / ai-model-hash / -75001: [-44, h'd3e2...']            /
    }
  }
}
]]></artwork>
        </section>
        <section anchor="multi-model-agents">
          <name>Multi-Model Agents:</name>
          <t>A single agent utilizing an orchestrator model and task-specific worker models.</t>
          <t>Modern AI agents are not necessarly monolithic; sophesticated Agents can consist of an orchestrator model (e.g., a LLM) and several task-specific worker models (e.g., image classifiers or encoders). To support these configurations, this profile utilizes the <tt>submods</tt> claim (Key 266) from [RFC 9711]. Each distinct model used by the agent SHOULD be represented as an entry within the submods map. This allows for granular policy appraisal where different models may have different trust levels, privacy parameters (dp_epsilon), or residency requirements.</t>
          <t>When a model is represented in a submodule, it carries its own instance of <tt>ai-model-id</tt> and <tt>ai-model-hash</tt>. If the model weights are proprietary (e.g., accessed via a cloud API), the submodule SHOULD include an <tt>ai-model-id</tt> that the Verifier can match against a provider Endorsement.</t>
          <t>The following example demonstrates an agent employing an orchestrator LLM and a specialized vision model. Note the use of the digest format [alg, val] to support different hash types for each model.</t>
          <t>Code snippet</t>
          <artwork><![CDATA[
{
  / ueid / 256: h'0102030405060708',
  / nonce / 10: h'abcdef1234567890',
  / submods / 266: {
    "orchestrator-llm": {
      / ai-model-id / -75000: ":uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6",
      / ai-model-hash / -75001: [-44, h'9a8b7c6d...']  / SHA-384 /
    },
    "vision-classifier": {
      / ai-model-id / -75000: ":ietf:ai:model:vit-b-16",
      / ai-model-hash / -75001: [-16, h'5e4f3a2b...'], / SHA-256 /
      / dp-epsilon / -75005: 0.8
    }
  }
}
]]></artwork>
        </section>
        <section anchor="layered-trust">
          <name>Layered Trust:</name>
          <t>Scenarios where different system components (e.g., hardware TEE, OS runtime, and AI model) are owned or managed by different entities.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Nesting Mechanism:</strong> Components SHOULD be represented as nested EATs within the submods claim (Key 266). Each nested token MAY be signed by a different attestation key belonging to the respective component owner.</t>
            </li>
            <li>
              <t><strong>Verifier Role:</strong> A Verifier receiving a composite EAT SHOULD follow the Hierarchical Pattern, where it acts as a Lead Verifier and delegates the appraisal of individual submodules to specialized verifiers that hold the appropriate Trust Anchors for each owner.</t>
            </li>
          </ul>
          <t>For multi-owner attestation, a <strong>Lead Verifier</strong> SHOULD follow the <strong>Hierarchical Pattern</strong>, extracting nested sub-tokens and delegating their appraisal to specialized verifiers holding the appropriate Trust Anchors.</t>
          <figure anchor="fig-chainoftrust">
            <name>Example of a Chain of Trust</name>
            <artwork><![CDATA[
      +-----------------------------------------------------------+
      |  Attesting Device (e.g., Edge Server / 5G UE)             |
      |                                                           |
      |  +----------------------------+                           |
      |  | Hardware Root of Trust     | <--- Signing Key (AK_1)   |
      |  | (RoT)                      |                           |
      |  +-------------+--------------+                           |
      |                | Measures                                 |
      |                v                                          |
      |  +-------------+--------------+                           |
      |  | TEE / Secure OS            | <--- Signing Key (AK_2)   |
      |  | (Submodule 1)              |      (Optional)           |
      |  +-------------+--------------+                           |
      |                | Measures & Isolates                      |
      |                v                                          |
      |  +-------------+--------------+                           |
      |  | AI Agent Environment       |                           |
      |  |                            |                           |
      |  |  +----------------------+  |                           |
      |  |  | AI Model (Target)    |  |                           |
      |  |  | - Weights Hash       |  |                           |
      |  |  | - Config             |  |                           |
      |  |  +----------------------+  |                           |
      |  +----------------------------+                           |
      +-----------------------------------------------------------+
]]></artwork>
          </figure>
          <t><xref target="fig-chainoftrust"/> illustrates the Chain of Trust. The Hardware Root of Trust (RoT) measures the integrity of the Trusted Execution Environment (TEE) or OS. The TEE, acting as a transitive verifier, subsequently measures the AI Agent's model binaries and policy configurations. The resulting EAT token reflects this hierarchy using nested submodules, ensuring that the <tt>ai-model-hash</tt> is reported by a trusted parent rather than the agent itself.</t>
          <t>To clarify the hierarchical trust relationships in multi-owner attestation scenarios, <xref target="fig-trustHierarchy"/> illustrates the binding of components across hardware, runtime, and AI model layers. Each layer is attested by a distinct owner and represented as a nested submodule within the top-level EAT per [RFC 9711, Section 4.2.18].</t>
          <figure anchor="fig-trustHierarchy">
            <name>Trust hierarchy for layered attestation using EAT submods</name>
            <artwork><![CDATA[
+-----------------------------------------------------------------+
|  Top-Level EAT (Platform Attester)                              |
|  • ueid: Platform hardware identity (e.g., TPM/SE)              |
|  • nonce: Freshness guarantee                                   |
|  • submods: {                                                   |
|      "tee-runtime": {  ← Signed by Platform Owner               |
|          • ueid: TEE instance ID                                |
|          • swname: "Confidential-VM-v2"                         |
|          • submods: {                                           |
|              "ai-agent": {  ← Signed by AI Operator             |
|                  • swname: "Execution-Agent-v3"                 |
|                  • ai-model-id: "urn:uuid:..."                  |
|                  • ai-model-hash: [alg, hash]                   |
|                  • submods: {                                   |
|                      "orchestrator": {...},  ← Model Owner A    |
|                      "vision-model": {...}   ← Model Owner B    |
|                  }                                              |
|              }                                                  |
|          }                                                      |
|      }                                                          |
|  }                                                              |
+-----------------------------------------------------------------+
]]></artwork>
          </figure>
          <section anchor="trust-binding-semantics">
            <name><strong>Trust Binding Semantics</strong></name>
            <ul spacing="normal">
              <li>
                <t><strong>Hardware → TEE:</strong> The TEE runtime measurement is included in a platform-signed attestation report (e.g., AMD SEV-SNP, Intel TDX). The top-level EAT's signature binds the <tt>tee-runtime</tt> submodule to this hardware root.</t>
              </li>
              <li>
                <t><strong>TEE → AI Agent:</strong> The AI agent's code and configuration are measured into the TEE's launch digest. The <tt>ai-agent</tt> submodule is signed by the AI operator's key, which itself is endorsed by the platform owner (via an Endorsement per [RFC 9334]).</t>
              </li>
              <li>
                <t><strong>Agent → Models:</strong> Individual models are signed by their respective providers. The agent's runtime verifies model signatures before loading; these signatures are reflected in the nested <tt>submods</tt> entries.</t>
              </li>
            </ul>
          </section>
          <section anchor="appraisal-delegation">
            <name><strong>Appraisal Delegation</strong></name>
            <t>Per [RFC 9334, Section 5.3], a Lead Verifier appraising the top-level token:
  1- Validates the platform signature against a hardware Trust Anchor
  2- Delegates <tt>tee-runtime</tt> appraisal to a TEE-specific verifier holding platform Endorsements
  3- Delegates <tt>ai-agent</tt> appraisal to an AI policy verifier holding operator Trust Anchors
  4- Optionally delegates model submodules to specialized model catalog verifiers</t>
            <t>A submodule appraisal failure MUST cause rejection of the entire attestation unless policy explicitly permits partial trust (e.g., non-critical auxiliary models). This failure semantics MUST be defined by the deployment policy—not by this profile.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <ul spacing="normal">
        <li>
          <t>Claims SHOULD be bound to a hardware-rooted attestation where available.</t>
        </li>
        <li>
          <t><strong><tt>ai-model-hash</tt></strong> SHOULD be computed on the serialized model file (e.g., ONNX, PyTorch), not in-memory tensors.</t>
        </li>
        <li>
          <t><strong>Verifiers</strong> SHOULD validate claims against authoritative registries (e.g., model hash in secure model catalog).</t>
        </li>
        <li>
          <t><strong><em>Replay attacks</em></strong> SHOULD be mitigated using EAT nonce (CWT key 10) or exp (key 4).</t>
        </li>
        <li>
          <t>Verifiers SHOULD validate the referenced SBOM against known vulnerability databases (e.g., NVD) and reject agents using components with unpatched critical flaws.</t>
        </li>
        <li>
          <t>Verifiers SHOULD validate that <tt>ai-model-id</tt> values originate from trusted namespaces (e.g., known domains, approved PENs, or allow-listed UUIDs). Dynamic model deployment does not require central registration, but policy enforcement may restrict acceptable namespaces.</t>
        </li>
        <li>
          <t>Verifiers are expected to combine EAT-AI evidence with external SBOM/AIBOM analysis for comprehensive risk assessment.</t>
        </li>
      </ul>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <ul spacing="normal">
        <li>
          <t>training-geo-region reveals data origin and SHOULD be minimized.</t>
        </li>
        <li>
          <t>EAT tokens SHOULD be transmitted over secure channels (e.g., TLS 1.3).</t>
        </li>
        <li>
          <t>owner-id SHOULD use pseudonymous identifiers (e.g., GPSI per 3GPP TS 29.222).</t>
        </li>
        <li>
          <t>Embedded SBOMs or detailed URIs may reveal deployment topology. When privacy is a concern, use opaque digests or pseudonymized SBOM identifiers.</t>
        </li>
        <li>
          <t>High-granularity combinations of <tt>training-geo-region</tt> + <tt>dp-epsilon</tt> + <tt>allowed-apis</tt> may uniquely identify a "private" model even if the <tt>ai-model-id</tt> is obscured.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="eat-profile-registration">
        <name>EAT Profile Registration</name>
        <t>IANA is requested to register in the "Entity Attestation Token (EAT) Profiles" registry:
- Profile Name: Autonomous AI Agent EAT Profile
- Reference: [THIS DOCUMENT]</t>
      </section>
      <section anchor="cwt-claims-registry">
        <name>CWT Claims Registry</name>
        <t>IANA is requested to register the following in the "CBOR Web Token (CWT) Claims" registry [IANA-CWT]:</t>
        <table anchor="tab-3">
          <name>CWT Claims Registry</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Claim Name</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">-75000</td>
              <td align="left">
                <tt>ai-model-id</tt></td>
              <td align="left">AI model URN</td>
            </tr>
            <tr>
              <td align="left">-75001</td>
              <td align="left">
                <tt>ai-model-hash</tt></td>
              <td align="left">Model weights hash</td>
            </tr>
            <tr>
              <td align="left">-75002</td>
              <td align="left">
                <tt>model-arch-digest</tt></td>
              <td align="left">Model graph hash</td>
            </tr>
            <tr>
              <td align="left">-75003</td>
              <td align="left">
                <tt>training-data-id</tt></td>
              <td align="left">Training dataset ID</td>
            </tr>
            <tr>
              <td align="left">-75004</td>
              <td align="left">
                <tt>training-geo-region</tt></td>
              <td align="left">Training data regions</td>
            </tr>
            <tr>
              <td align="left">-75005</td>
              <td align="left">
                <tt>dp-epsilon</tt></td>
              <td align="left">DP epsilon</td>
            </tr>
            <tr>
              <td align="left">-75006</td>
              <td align="left">
                <tt>input-policy-digest</tt></td>
              <td align="left">Inference policy hash</td>
            </tr>
            <tr>
              <td align="left">-75007</td>
              <td align="left">
                <tt>allowed-slice-types</tt></td>
              <td align="left">Authorized slice types</td>
            </tr>
            <tr>
              <td align="left">-75008</td>
              <td align="left">
                <tt>data-retention-policy</tt></td>
              <td align="left">Data retention policy</td>
            </tr>
            <tr>
              <td align="left">-75009</td>
              <td align="left">
                <tt>owner-id</tt></td>
              <td align="left">Resource owner identifier</td>
            </tr>
            <tr>
              <td align="left">-75010</td>
              <td align="left">
                <tt>capabilities</tt></td>
              <td align="left">Agent capabilities</td>
            </tr>
            <tr>
              <td align="left">-75011</td>
              <td align="left">
                <tt>allowed-apis</tt></td>
              <td align="left">Allowed API endpoints</td>
            </tr>
            <tr>
              <td align="left">-75012</td>
              <td align="left">
                <tt>ai-sbom-ref</tt></td>
              <td align="left">Reference to AI agent’s Software Bill of Materials (SBOM)</td>
            </tr>
          </tbody>
        </table>
        <t>The range -75000 to -75012 is reserved for this profile.</t>
      </section>
      <section anchor="jwt-claims-registry">
        <name>JWT Claims Registry</name>
        <t>IANA is requested to register the corresponding JWT claim names in the "JSON Web Token Claims" registry [IANA-JWT].</t>
      </section>
    </section>
    <section anchor="references">
      <name>References</name>
      <section anchor="normative">
        <name>Normative:</name>
        <ul spacing="normal">
          <li>
            <t>[<eref target="https://www.rfc-editor.org/rfc/rfc2119.html">RFC2119</eref>] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997.</t>
          </li>
          <li>
            <t>[<eref target="https://www.rfc-editor.org/rfc/rfc7519.html">RFC7519</eref>] Jones, M., Bradley, J., and N. Sakimura, "JSON Web Token (JWT)", RFC 7519, DOI 10.17487/RFC7519, May 2015.</t>
          </li>
          <li>
            <t>[<eref target="https://www.ietf.org/rfc/rfc8174.html">RFC8174</eref>] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/html/rfc8392">RFC8392</eref>] Jones, M., et al., "CBOR Web Token (CWT)", RFC 8392, DOI 10.17487/RFC8392, May 2018.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/html/rfc9711">RFC9711</eref>] L. Lundblade, G. Mandyam,J. O'Donoghue,C. Wallace, "The Entity Attestation Token (EAT)", RFC 9711, DOI 10.17487/RFC9711, April 2025.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/html/rfc9334">RFC9334</eref>] Birkett, M., et al., "Remote ATtestation ProcedureS (RATS) Architecture", RFC 9334, DOI 10.17487/RFC9334, January 2023.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/html/rfc8126">RFC8126</eref>] Cotton, M., et al., "Guidelines for Writing an IANA Considerations Section in RFCs", RFC 8126, DOI 10.17487/RFC8126, June 2017.</t>
          </li>
          <li>
            <t>[[EAT Measured Component] (https://datatracker.ietf.org/doc/draft-ietf-rats-eat-measured-component/)] Frost S., et al., "EAT Measured Component", Active Internet-Draft (rats WG).</t>
          </li>
        </ul>
      </section>
      <section anchor="informative">
        <name>Informative:</name>
        <ul spacing="normal">
          <li>
            <t>[<eref target="https://www.etsi.org/deliver/etsi_gr/ENI/001_099/051/04.01.01_60/gr_ENI051v040101p.pdf">ETSI-GR-ENI-051</eref>] ETSI, <strong>"Architectural Framework for ENI in 6G"</strong>, GR ENI 051 V4.1.1, February 2025.</t>
          </li>
          <li>
            <t>[<eref target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=4088">3GPP-TR-33.898</eref>] 3GPP, <strong>"Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G"</strong>, TR 33.898, V18.0.1  July 2023.</t>
          </li>
          <li>
            <t>[<eref target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=4294">3GPP-TR-33.784</eref>] 3GPP, <strong>"Study on security aspects of core network enhanced support for Artificial Intelligence/Machine Learning (AI/ML)"</strong>, TR 33.784 V0.0.0, April 2025.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/draft-huang-rats-agentic-eat-cap-attest/">I-D.huang-rats-agentic-eat-cap-attest</eref>] Huang, K., et al., <strong>"Capability Attestation Extensions for the Entity Attestation Token (EAT) in Agentic AI Systems"</strong>, Work in Progress, Internet-Draft, March 2025.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/">draft-ni-wimse-ai-agent-identity</eref>] Yuan, N., Liu, P., <strong>"WIMSE Applicability for AI Agents"</strong>, Work in Progress.</t>
          </li>
          <li>
            <t>[<eref target="https://datatracker.ietf.org/doc/draft-liu-oauth-a2a-profile/">draft-liu-oauth-a2a-profile</eref>] Liu, P., Yuan, N., <strong>"Agent-to-Agent (A2A) Profile for OAuth Transaction Tokens"</strong>, Work in Progress.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="appendix-a-example-eat-ai-token-cwt">
      <name>Appendix A. Example EAT-AI Token (CWT)</name>
      <t>The following is a CBOR diagnostic notation of an EAT-AI token:</t>
      <artwork><![CDATA[
{
/ ueid / 256: h'0102030405060708',
/ swname / 270: "execution-agent-v3",
/ ai-model-id / -75000: "urn:etsi:eni:model:slice-opt-cnn:v3",
/ ai-model-hash / -75001: [-44,h'9a8b7c6d5e4f3a2b1c0d9e8f7a6b5c4d3e2f1a0b9c8d7e6f5a4b3c2d1e0f'],
/ training-geo-region / -75004: ["DE", "FR"],
/ dp-epsilon / -75005: 0.5,
/ input-policy-digest / -75006: [-44,h'a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0'],
/ ai-sbom-ref / -75012: "https://sbom.example.net/agents/slice-opt-v3.spdx.json",
/ nonce / 10: h'abcdef1234567890'
}
]]></artwork>
    </section>
    <section anchor="appendix-b-relationship-to-existing-standards-initiatives">
      <name>Appendix B. Relationship to Existing Standards &amp; Initiatives</name>
      <t>This document complements:
- <eref target="https://datatracker.ietf.org/doc/html/rfc9334">IETF RATS</eref>: Provides the architectural context for EAT.
- <eref target="https://www.etsi.org/deliver/etsi_gr/ENI/001_099/051/04.01.01_60/gr_ENI051v040101p.pdf">ETSI GR ENI 051</eref>: Defines the AI-Core where these claims are applied.</t>
      <t>It differs from <eref target="https://datatracker.ietf.org/doc/draft-huang-rats-agentic-eat-cap-attest/">I-D.huang-rats-agentic-eat-cap-attest</eref> by specifying measurable, cryptographically verifiable claims rather than abstract capabilities.</t>
    </section>
  </middle>
  <back>
    <?line 424?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
