<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-skyfire-kyapayprofile-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>KYAPay Profile</title>
    <seriesInfo name="Internet-Draft" value="draft-skyfire-kyapayprofile-00"/>
    <author initials="A." surname="Agarwal" fullname="Ankit Agarwal">
      <organization>Skyfire</organization>
      <address>
        <email>ankit@skyfire.xyz</email>
      </address>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Self-Issued Consulting</organization>
      <address>
        <email>michael_b_jones@hotmail.com</email>
        <uri>https://self-issued.info/</uri>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <keyword>agent</keyword>
    <abstract>
      <?line 64?>

<t>This document defines a profile for agent identity and payment tokens in
JSON web token (JWT) format. Authorization servers and resource servers from
different vendors can leverage this profile to consume identity and payment
tokens in an interoperable manner.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://skyfire-xyz.github.io/kyapay-ietf-draft/draft-skyfire-kyapayprofile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-skyfire-kyapayprofile/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/skyfire-xyz/kyapay-ietf-draft"/>.</t>
    </note>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>As software agents evolve from pre-orchestrated workflow automations to truly
autonomous or semi-autonomous assistants, they require the ability to identify
themselves -- and more importantly, identify their human principals -- to external
systems. Agents acting on behalf of users to discover services, create accounts,
or execute actions currently face significant operational barriers.</t>
      <t>The KYAPay token addresses these challenges by providing a standard envelope to
carry verified identity and payment information. By utilizing "kya" (Agent
Identity) and "pay" (Payment) tokens, agents can identify their human principals
to services, sites, bot managers, customer identity and access management (CIAM)
systems, and fraud detectors. This enables agents to bypass common blocking
mechanisms and access services that were previously restricted to manual human
interaction.</t>
      <t>KYAPay does not aim to define agentic identity in its entirety. Rather, it specifies
a standard and extensible JWT profile for a token that can be used to securely share human
principal and agent identity information with websites and APIs. KYAPay tokens
provide a strong signal of human presence behind agentic requests that are
otherwise indistinguishable from programmatic and potentially malicious bot requests.</t>
      <t>Note that, in the future,
the payment token functionality could be split into a separate specification,
if desired by a working group adopting the specification.
It is retained here at present for ease of reviewing.</t>
      <section anchor="use-cases-for-the-kyapay-token">
        <name>Use Cases for the KYAPay Token</name>
        <t>Enabling agents to access websites and APIs on behalf of
the human principals they represent is a design goal of KYAPay tokens.
Today’s internet is designed primarily for humans, meaning that automated systems
are often classified as malicious and blocked by web security infrastructure.
However, the rise of AI agents has introduced a new paradigm where
programmatic clients legitimately access websites and APIs
on behalf of human principals.
Because these agents can be hard to distinguish from traditional bots,
they are often inadvertently blocked,
creating a need for the web security ecosystem to distinguish between
legitimate agentic traffic and truly malicious activity.
KYAPay tokens are designed to address this challenge by enabling agents to convey
verified identity and payment credentials.
These tokens can provide web security systems and merchants with
a strong signal that the requests are authorized by a human,
allowing them to safely permit legitimate programmatic transactions
while aggressively blocking undesired traffic.</t>
        <t>Enabling agents to create accounts and/or log in to accounts
on behalf of their human principals is a related design goal.
To achieve this, systems can utilize a token exchange workflow <xref target="RFC8693"/>.
In this process, a Security Token Service (STS), Identity Provider (IdP),
or OAuth Authorization Server verifies incoming KYA tokens
and extracts claims associated with the human principal, such as email addresses.
The authorization server then performs a token exchange,
swapping the KYA token for a standard OAuth Access Token,
which the agent subsequently uses to interact with the target service.
Crucially, this architecture allows the service to know
that the agent is acting on behalf of the user,
making it possible to differentiate between
direct, human-present sessions and human-initiated, agentic sessions
for authorization, auditing, and security purposes.</t>
        <t>Enabling agents to have ubiquity of access across the Internet just like their
human principals is a related design goal.
Automation typically scales as it achieves higher reliability and lower
cost-to-entry. Unlike the structured logic required by cron jobs or
low-code / no-code platforms, agentic automation leverages LLMs to execute
tasks via natural language, effectively removing the software-skill barrier.
As model reasoning improves and infrastructure scales, these agents become
increasingly dependable and affordable for the human principal.
To maximize utility, agents require ubiquitous Internet access, a feat made
possible by KYAPay Token Issuers. By providing a client-side verification
framework analogous to the server-side role of Certificate Authorities (CAs),
KYAPay builds a standardized network of acceptance across the web security
ecosystem. This allows for the seamless attestation of both the agent’s and
the human principal’s identity, ensuring secure, cross-domain task execution
without the friction of fragmented authentication silos.</t>
        <t>Enabling the ecosystem of web security vendors to engage in finer-grained and
deliberate bad-actor mitigation is a related design goal.
KYA tokens provide a layered, verified, and extensible identity stack
specifically engineered for autonomous agents. This framework
allows the web security ecosystem to distinguish among individual agent
instances, the platforms they run on, and the human principals behind them.
By establishing this level of granular visibility, security systems can
transition from broad defensive measures to specific mitigation; rather than
being forced to block an entire platform, administrators can now isolate
and neutralize a single malicious human user or a malfunctioning software
instance without disrupting legitimate traffic.</t>
        <t>Note that the protocols using these tokens to achieve these goals
are not defined by this specification.
The interoperable use of them for these purposes will require further specification.</t>
        <t>Early production deployments of KYAPay tokens are described at https://kyapay.org.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The claims <tt>iss</tt>, <tt>iat</tt>, <tt>exp</tt>, <tt>aud</tt>, and <tt>jti</tt> are defined by <xref target="RFC7519"/>.
The header parameters <tt>alg</tt>, <tt>kid</tt>, and <tt>typ</tt> are defined by <xref target="RFC7515"/>.</t>
      <t>The <tt>alg</tt> value <tt>ES256</tt> is a digital signature algorithm defined in
<xref section="3.4" sectionFormat="of" target="RFC7518"/>.</t>
      <section anchor="roles">
        <name>Roles</name>
        <dl>
          <dt>Agent:</dt>
          <dd>
            <t>An application, service, or specific software process, executing on behalf
of a Principal.</t>
          </dd>
          <dt>Agent Identity:</dt>
          <dd>
            <t>A unique identifier and a set of claims describing an agent. Grouped into the
<tt>aid</tt> claim for convenience. Because an agent can be public or confidential
(as described in <xref section="2.1" sectionFormat="of" target="RFC6749"/>), the level of assurance for these
claims varies dramatically. Agents also vary in terms of longevity -- they can
have stable long-running identities (such as those of a server-side confidential
client), or they can be transient and ephemeral, and correspond to individual
API calls or compute workloads.</t>
          </dd>
          <dt>Agent Platform:</dt>
          <dd>
            <t>The service provider and runtime environment hosting the Agent, such as a
cloud compute provider or AI operator service. Assertions about the agent
platform are grouped into the <tt>apd</tt> claim, and are primarily used to identify
the Principal entity operating the platform, allowing consumers of the token to
apply reputation-based logic or offer platform-specific services.</t>
          </dd>
          <dt>Principal:</dt>
          <dd>
            <t>A legal entity (human or organization) on whose behalf / in whose authority
an agent or service is operating.</t>
          </dd>
        </dl>
        <section anchor="buy-side-roles">
          <name>Buy-Side Roles</name>
          <dl>
            <dt>Buyer Agent:</dt>
            <dd>
              <t>An Agent performing tasks on behalf of a Buyer Principal, that has its own
Agent Identity, grouped into the <tt>aid</tt> claim.</t>
            </dd>
            <dt>Buyer Agent Platform:</dt>
            <dd>
              <t>The Agent Platform hosting the Buyer Agent. Some use cases require the Platform
to have its own verified identity assertions, grouped into the <tt>apd</tt> claim.</t>
            </dd>
            <dt>Buyer Principal:</dt>
            <dd>
              <t>A legal entity (human or organization) behind the purchase / consumption of a
product or service. The Principal typically interacts with the seller via a
Buyer Agent. Many sellers are required to be able to determine the Buyer
Identity in order to comply with KYC/AML regulations, accounting standards,
and to maintain a direct customer relationships. The buyer principal's
identity is grouped into the <tt>hid</tt> claim.</t>
            </dd>
            <dt>Buyer Identity:</dt>
            <dd>
              <t>The aggregate verified identity assertions of the buy-side entities, typically
encompassing the Buyer Principal, the Buyer Agent Platform, and the Buyer Agent
itself. This composite identity is conveyed via the KYA token, allowing the
seller to verify the entire chain of responsibility behind a request.
The buyer identity utilizes the <tt>hid</tt>, <tt>apd</tt>, and <tt>aid</tt> claims.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sell-side-roles">
          <name>Sell-Side Roles</name>
          <dl>
            <dt>Seller Agent:</dt>
            <dd>
              <t>An Agent performing tasks on behalf of a Seller Principal, directly interacting
with Buyer Agents to facilitate discovery and purchase. Typically runs on
Internet-connected infrastructure, and discoverable via service directories.
Seller agent identity claims are also grouped into the <tt>aid</tt> claim
if KYA tokens are generated for the sellers.</t>
            </dd>
            <dt>Seller Agent Platform:</dt>
            <dd>
              <t>The Agent Platform that hosts Seller Agents. Some use cases require the Platform
to have its own verified identity assertions, grouped into the <tt>apd</tt> claim.</t>
            </dd>
            <dt>Seller Principal:</dt>
            <dd>
              <t>A human principal (individual or organization) that that owns the product,
service, API, website, or content being consumed or sold, and serves as the
ultimate beneficiary of a transaction.
The seller principal's identity is grouped into the <tt>hid</tt> claim.</t>
            </dd>
            <dt>Seller Identity:</dt>
            <dd>
              <t>The aggregate verified identity assertions of the sell-side entities, typically
encompassing the Seller Principal, the Seller Agent Platform, as well as the
Seller Agent Identity.
These various aspects of Seller Identity allow Buyers and Buyer Agents to
perform reputation-based logic, to verify that they are interacting with
the authorized (and expected) counter-party, and to fulfill KYC/AML regulation
requirements.
The seller identity utilizes the <tt>hid</tt>, <tt>apd</tt>, and <tt>aid</tt> claims.</t>
            </dd>
          </dl>
        </section>
        <section anchor="ecosystem-infrastructure-roles">
          <name>Ecosystem Infrastructure Roles</name>
          <dl>
            <dt>Identity Token Issuer:</dt>
            <dd>
              <t>A trusted neutral entity that conducts Know Your Customer (KYC) and Know Your
Business (KYB) (for organizations) verifications. It is responsible for issuing
cryptographically signed <tt>kya</tt> tokens that attest to the identity of the
Principal, Agent, and Agent Platform, for both Buyers and Sellers.</t>
            </dd>
            <dt>Payment Token Issuer:</dt>
            <dd>
              <t>A trusted entity responsible for facilitating the exchange of payments and
credentials between the Buyer and Seller. It issues signed <tt>pay</tt> tokens that
enable settlement via various schemes (Cards, Banks, Cryptocurrency), without
exposing raw credentials or secrets.</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="kyapay-token-schemas">
      <name>KYAPay Token Schemas</name>
      <section anchor="common-claims">
        <name>Common Token Claims</name>
        <t>The following are claims in common, used within the KYA (Know Your Agent),
PAY (Payment), and KYA-PAY (combined Know Your Agent and Payment) Tokens.</t>
        <dl>
          <dt><tt>iss</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - URL of the token's issuer. Used for discovering JWK Sets for token
signature verification, via the <tt>/.well-known/jwks.json</tt> suffix mechanism.</t>
          </dd>
          <dt><tt>sub</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Subject Identifier. Must be pairwise unique within
a given issuer.</t>
          </dd>
          <dt><tt>aud</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Audience (used for audience binding and replay attack mitigation),
uniquely identifying the seller agent.
A single string value.</t>
          </dd>
          <dt><tt>iat</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7519"/>.  Identifies the time
at which the JWT was issued.  This claim must have a value in the past and can
be used to determine the age of the JWT.</t>
          </dd>
          <dt><tt>jti</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Unique ID of this JWT as defined in <xref section="4.1.7" sectionFormat="of" target="RFC7519"/>.</t>
          </dd>
          <dt><tt>exp</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - as defined in <xref section="4.1.4" sectionFormat="of" target="RFC7519"/>.  Identifies the expiration
time on or after which the JWT <bcp14>MUST NOT</bcp14> be accepted for processing.</t>
          </dd>
          <dt><tt>sdm</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Seller domain, associated with the audience claim, the token is intended for.</t>
          </dd>
          <dt><tt>srl</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Seller resource locator - URL the agent is intended to access.</t>
          </dd>
          <dt><tt>ori</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - URL of the token's originator.</t>
          </dd>
          <dt><tt>env</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Issuer environment (such as "production" or "sandbox").  Additional values
may be defined and used.</t>
          </dd>
          <dt><tt>ssi</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Seller Service ID that this token was created for.</t>
          </dd>
          <dt><tt>btg</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Buyer tag - an opaque reference ID internal to the buyer.</t>
          </dd>
        </dl>
        <t>Additional claims <bcp14>MAY</bcp14> be defined and used in these tokens.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized claims.</t>
      </section>
      <section anchor="kya-token">
        <name>KYA Token</name>
        <t>The following identity related claims are used within KYA and KYA-PAY tokens:</t>
        <dl>
          <dt><tt>hid</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> (Required for human identity use cases) - A map of human identity
claims (individual or organization).</t>
          </dd>
          <dt><tt>apd</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Agent Platform identity claims.</t>
          </dd>
          <dt><tt>aid</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Agent identity claims.</t>
          </dd>
          <dt><tt>scope</tt></dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - String with space-separated scope values, per <xref target="RFC8693"/></t>
          </dd>
        </dl>
        <t>The following informative example displays a decoded KYA type token.</t>
        <figure anchor="example-decoded-kya-token">
          <name>A KYA type token</name>
          <artwork align="left"><![CDATA[
{
  "kid": "YjFdJgFNWj9AkUmtoXILwoeb37PsBuGWVK6_QvFLwJw", // JWK Key ID
  "alg": "ES256",
  "typ": "kya+jwt"
}.{
  "iss": "https://example.com/issuer", // Issuer URL
  "iat": 1742245254,
  "exp": 1773867654,
  "jti": "b9821893-7699-4d24-af06-803a6a16476b",
  "sub": "bb713104-c14e-460f-9b7c-f8140fa9bea4", // Buyer Agent Account ID
  "aud": "7434230d-0861-46f2-9c2c-a6ee33d07f17", // Seller Agent Account ID

  "env": "production",
  "ssi": "bc3ff89f-069b-4383-82a9-8cfe53c55fc3", // Seller Service ID
  "btg": "4f6cbd39-215c-4516-bf33-cab22862ee60", // Buyer Tag (Internal Reference ID)

  "hid": {
    "email": "buyer@buyer.com"
  },
  "apd": {
    "id": "d3306fc0-602b-47e6-9fe2-3d55d028fbd2"
    "name": "Acme Shopping Agents", // Agent platform name
    "email": "platform@acme.com", // Email address for the agent platform
    "phone_number": "+12345677890", // Phone number for the agent platform
    "organization_name": "Acme Shopping Inc.", // Legal name of the agent platform
    "verifier": "https://www.verifier.com/", // URL of the Identity verifier
    "verified": true, // Outcome of the verifier's KYA verification
    "verification_id": "a23c1fe4-a4b7-442d-8bca-3c8fad5ec3a6" // Verifier's verification ID
  },
  "aid": {
    "name": "Acme Agent Extraordinaire",
    "creation_ip": "54.86.50.139", // IP Address where token was created
    "source_ips": ["54.86.50.139-54.86.50.141", "1.1.1.0/24",
      "2001:db8:abcd:0012::/64", "acme.com"]
      // IP addresses from which the buyer agent will make requests to the seller
  }
}
]]></artwork>
        </figure>
        <section anchor="hid-human-identity-sub-claims">
          <name><tt>hid</tt> - Human Identity Sub-Claims</name>
          <t>The Human Identity (<tt>hid</tt>) claim contains sub-claims identifying the human
principal (individual or organization) as follows.</t>
          <dl>
            <dt><tt>email</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - Email address associated with the human individual or organization</t>
            </dd>
            <dt><tt>given_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Given name(s) or first name(s) of the human principal if they
are an individual.</t>
            </dd>
            <dt><tt>middle_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Middle name(s) of the human principal if they are an individual.</t>
            </dd>
            <dt><tt>family_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Surname(s) or last name(s) of the human principal if they are an
individual.</t>
            </dd>
            <dt><tt>phone_number</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Phone number associated with the human individual or organization.</t>
            </dd>
            <dt><tt>organization_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Name of the organization.</t>
            </dd>
            <dt><tt>verifier</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - URL of the Identity Verifier</t>
            </dd>
            <dt><tt>verified</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Boolean Verification status.  True if verified, otherwise false.</t>
            </dd>
            <dt><tt>verification_id</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Verification identifier. Identifier for the verification performed,
such as a GUID.</t>
            </dd>
          </dl>
          <t>Additional sub-claims <bcp14>MAY</bcp14> be defined and used.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized sub-claims.</t>
        </section>
        <section anchor="agent-platform-identity-apd-sub-claims">
          <name>Agent Platform Identity <tt>apd</tt> Sub-Claims</name>
          <t>The <tt>apd</tt> claim is optional. If present, it contains the following sub-claims.</t>
          <dl>
            <dt><tt>id</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - Agent Platform identifier.</t>
            </dd>
            <dt><tt>name</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - Agent Platform name.</t>
            </dd>
            <dt><tt>email</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Email associated with agent platform.</t>
            </dd>
            <dt><tt>phone_number</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Phone number associated with agent platform.</t>
            </dd>
            <dt><tt>organization_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Legal name associated with agent platform.</t>
            </dd>
            <dt><tt>verifier</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - URL of the Identity Verifier</t>
            </dd>
            <dt><tt>verified</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Boolean Verification status.  True if verified, otherwise false.</t>
            </dd>
            <dt><tt>verification_id</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Verification identifier. Identifier for the verification performed, such as a GUID.</t>
            </dd>
          </dl>
          <t>Additional sub-claims <bcp14>MAY</bcp14> be defined and used.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized sub-claims.</t>
        </section>
        <section anchor="agent-identity-aid-sub-claims">
          <name>Agent Identity <tt>aid</tt> Sub-Claims</name>
          <t>The <tt>aid</tt> claim is optional. If present, it contains the following sub-claims.</t>
          <dl>
            <dt><tt>name</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - Agent name. The name should reflect the business purpose of the agent.</t>
            </dd>
            <dt><tt>creation_ip</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - The public IP address of the system / agent that requested the token.
Its value is a string containing the public IPv4 or IPv6 address from where the
token request originated. It <bcp14>MUST</bcp14> be captured directly from the token request.</t>
            </dd>
            <dt><tt>source_ips</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Valid public IP address, or range of public IP addresses, from where
the system / agent's requests to merchants / services will originate. Array of
comma-separated IPv4 addresses or ranges, IPv6 addresses or ranges, or domain
names resolvable to an IP address via DNS. IPv4 and IPv6 addresses can be a
single IPv4 or IPv6 address or a range of IPv4 or IPv6 addresses in CIDR notation
or start-and-end IP pairs.</t>
            </dd>
          </dl>
          <t>Additional sub-claims <bcp14>MAY</bcp14> be defined and used.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized sub-claims.</t>
        </section>
      </section>
      <section anchor="pay-token">
        <name>PAY Token</name>
        <t>The following payment related claims are used within PAY and KYA-PAY type tokens:</t>
        <dl>
          <dt><tt>spr</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - JSON string representing seller service price in currency units.</t>
          </dd>
          <dt><tt>sps</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Seller pricing scheme, which represents a way for the seller list
how it charges for its service or content. One of <tt>pay_per_use</tt>,
<tt>subscription</tt>, <tt>pay_per_mb</tt>, or <tt>custom</tt>.  Additional values may be defined
and used.</t>
          </dd>
          <dt><tt>amt</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - JSON string representing token amount in currency units.</t>
          </dd>
          <dt><tt>cur</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Currency unit, represented as an ISO 4217 three letter code, such as "EUR".</t>
          </dd>
          <dt><tt>val</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - JSON string representing token amount in settlement network's units.</t>
          </dd>
          <dt><tt>mnr</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - JSON number representing maximum number of requests when <tt>sps</tt> is <tt>pay_per_use</tt>.</t>
          </dd>
          <dt><tt>stp</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Settlement type (one of <tt>coin</tt> or <tt>card</tt>).  Additional values may be defined and used.</t>
          </dd>
          <dt><tt>sti</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Meta information for payment settlement, depending on settlement.
type.</t>
          </dd>
        </dl>
        <section anchor="agent-identity-sti-sub-claims">
          <name>Agent Identity <tt>sti</tt> Sub-Claims</name>
          <t>The <tt>sti</tt> claim is optional. If present, it <bcp14>MAY</bcp14> contain the following sub-claims,
all of which are <bcp14>OPTIONAL</bcp14>.</t>
          <dl>
            <dt><tt>type</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - "type" is dependent on the "stp" value; for "coin" - "usdc";
for "card" - "visa_vic" or "mastercard_scof".  Additional values may be defined and used.</t>
            </dd>
            <dt><tt>paymentToken</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - String containing Virtual Payment Card Number in ISO/IEC 7812 format. 12-19 characters.</t>
            </dd>
            <dt><tt>tokenExpirationMonth</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - String containing two-digit Expiration Month Number.</t>
            </dd>
            <dt><tt>tokenExpirationYear</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - String containing four-digit Expiration Year.</t>
            </dd>
            <dt><tt>tokenSecurityCode</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - String containing 3 or 4 digit CVV code.</t>
            </dd>
          </dl>
          <t>Additional sub-claims <bcp14>MAY</bcp14> be defined and used.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized sub-claims.</t>
        </section>
        <section anchor="pay">
          <name>PAY Token Example</name>
          <t>The following informative example displays a decoded PAY type token.</t>
          <figure anchor="example-decoded-pay-token">
            <name>A PAY type token</name>
            <artwork align="left"><![CDATA[
{
  "kid": "FgT4q8c5IqbBCCjcho5JdeGQvuK1keMDFc9IwCm8J7Y", // JWK Key ID
  "alg": "ES256",
  "typ": "pay+jwt"
}.{
  "iss": "https://example.net/pay_token_issuer", // Issuer URL
  "iat": 1742245254,
  "exp": 1773867654,
  "jti": "b9821893-7699-4d24-af06-803a6a16476b",
  "sub": "8b810549-7443-494f-b4ad-5bc65871e32b", // Buyer Agent Account ID
  "aud": "37888095-2721-48d9-a2df-bfe4075f223a", // Seller Agent Account ID

  "env": "sandbox",
  "ssi": "274efc47-024e-466f-b278-152d2ee73955", // Seller Service ID
  "btg": "16c135ce-a99a-453d-a7b5-4958fd91de5f", // Buyer Tag (Internal Reference ID)

  "spr": "0.01",
  "sps": "pay_per_use",
  "amt": "15",
  "cur": "USD",
  "val": "15000000",
  "mnr": 1600,
  "stp": "card",
  "sti": {
    "type": "visa_vic",
    "paymentToken": "1234567890123456",
    "tokenExpirationMonth": "03",
    "tokenExpirationYear": "2030",
    "tokenSecurityCode": "123",
    "verifier": "https://verifier.example.info", // URL of payment method verifier
    "verified": true, // Outcome of the verifier's payment method verification
    "verification_id": "3a6e1b76-8f78-4c24-b1bd-dc78a8cc3711" // Identifier for the verification performed, such as a GUID.
  }
}

]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="kya-pay-token">
        <name>KYA-PAY Token</name>
        <t>The following informative example displays a decoded KYA-PAY type token.</t>
        <figure anchor="example-decoded-kya-pay-token">
          <name>A KYA-PAY type token</name>
          <artwork align="left"><![CDATA[
{
  "kid": "YjFdJgFNWj9AkUmtoXILwoeb37PsBuGWVK6_QvFLwJw", // JWK Key ID
  "alg": "ES256",
  "typ": "kya-pay+jwt"
}.{
  "iss": "kya-pay.example.org", // Issuer URL
  "iat": 1742245254,
  "exp": 1773867654,
  "jti": "b9821893-7699-4d24-af06-803a6a16476b",
  "sub": "f24a431d-108c-46e6-9357-b428c528210e", // Buyer Agent Account ID
  "aud": "5e00177d-ff7f-424b-8c83-2756e15efbed", // Seller Agent Account ID

  "env": "production",
  "ssi": "3e6d33a1-438e-482e-bba5-6aa69544727d", // Seller Service ID
  "btg": "c52e0ef2-e27d-4e95-862e-475a904ae7b2", // Buyer Tag (Internal Reference ID)

  "hid": {
    "email": "maryjane@buyer.example.com",
    "given_name": "Mary",
    "middle_name": "Jane",
    "family_name": "Doe",
    "phone_number": "+1-425-555-1212",
    "verified": false
  },
  "apd": {
    "id": "4b087db2-b6e5-48b8-8737-1aa8ddf4c4fe", // Agent platform ID
    "name": "Acme Shopping Agents", // Agent platform name
    "email": "platform@acme.com", // Email address for the agent platform
    "phone_number": "+12345677890", // Phone number for the agent platform
    "organization_name": "Acme Shopping Inc.", // Legal name of the agent platform
    "verifier": "https://www.verifier.com/", // URL of the Identity verifier
    "verified": true, // Outcome of the verifier's KYA verification
    "verification_id": "a23c1fe4-a4b7-442d-8bca-3c8fad5ec3a6" // Verifier's verification ID
  },
  "aid": {
    "name": "Agentic Excellence Я Us",
    "creation_ip": "128.2.42.95", // IP Address where token was created
    "source_ips": ["54.86.50.139-54.86.50.141", "1.1.1.0/24",
      "2001:db8:abcd:0012::/64", "agentic-excellence.example.com"]
      // IP addresses from which the buyer agent will make requests to the seller
  },

  "spr": "0.01",
  "sps": "pay_per_use",
  "amt": "15",
  "cur": "USD",
  "val": "15000000",
  "mnr": 1600,
  "stp": "card",
  "sti": {
    "type": "visa_vic",
    "paymentToken": "1234567890123456",
    "tokenExpirationMonth": "03",
    "tokenExpirationYear": "2030",
    "tokenSecurityCode": "123"
  }
}

]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="token-validation">
      <name>Token Validation</name>
      <section anchor="validating-kya-and-pay-tokens">
        <name>Validating KYA and PAY Tokens</name>
        <section anchor="jwt-header-validation">
          <name>JWT Header Validation</name>
          <ol spacing="normal" type="1"><li>
              <t><tt>alg</tt> - JWTs <bcp14>MUST</bcp14> be signed using allowed JWA algorithms (currently, <tt>ES256</tt>).</t>
            </li>
            <li>
              <t><tt>kid</tt> - The <tt>kid</tt> claim <bcp14>MUST</bcp14> be present, and set to a valid Key ID discoverable
via the issuer's (payload <tt>iss</tt> claim) JWK Set.</t>
            </li>
            <li>
              <t><tt>typ</tt> - The <tt>typ</tt> header parameter value <bcp14>MUST</bcp14> be one of: <tt>kya+jwt</tt>, <tt>pay+jwt</tt>, or <tt>kya-pay+jwt</tt>.</t>
            </li>
          </ol>
        </section>
        <section anchor="jwt-payload-validation">
          <name>JWT Payload Validation</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Verify JWT Signature</strong> - Valid JWTs <bcp14>MUST</bcp14> be signed with a valid key belonging
  To the token's issuer (<tt>iss</tt> claim)</t>
            </li>
            <li>
              <t><strong>Validate <tt>iss</tt> Claim</strong> - Ensure that the token is signed by the expected
  valid issuer.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>exp</tt> Claim</strong> - The verifier <bcp14>MUST</bcp14> validate that the token has
  not expired, within the verifier's clock drift tolerance.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>iat</tt> Claim</strong> - The verifier <bcp14>MUST</bcp14> validate that the token was
  issued in the past, within the verifier's clock drift tolerance.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>jti</tt> Claim</strong> - Ensure that the <tt>jti</tt> claim is present, and is
  a UUID.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>aud</tt> Claim</strong> - Ensure that the <tt>aud</tt> identifies the recipient as the intended audience.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>env</tt> Claim</strong> - Ensure that the Environment claim is set to
  an expected and use case appropriate value (such as <tt>production</tt> or <tt>sandbox</tt>)</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="validating-pay-tokens">
        <name>Validating PAY Tokens</name>
        <t>For tokens of type <tt>pay+jwt</tt> or <tt>kya-pay+jwt</tt>, perform the steps described in
the Validating KYA and PAY Tokens section.</t>
        <t>In addition, perform the following steps.</t>
        <ol spacing="normal" type="1"><li>
            <t>The <tt>val</tt> claim is greater than 0.</t>
          </li>
          <li>
            <t>The <tt>amt</tt> claim is greater than 0.</t>
          </li>
          <li>
            <t>The <tt>cur</tt> claim is set to a currency the seller supports (such as <tt>USD</tt>)</t>
          </li>
          <li>
            <t>The <tt>sps</tt> claim, if present, matches the pricing scheme that you configured in
  the seller's service</t>
          </li>
          <li>
            <t>The <tt>spr</tt> claim, if present, matches the price that you configured in the
  seller's service</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>When validating the JWTs described in this specification, implementers <bcp14>SHOULD</bcp14>
follow the best practices and guidelines described in <xref target="RFC8725"/>.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>KYAPay tokens are designed to convey the information that
an agent is acting on behalf of a principal - a person or organization.
To do this, they will necessarily contain information about that principal
that can be verified and utilized by participants in the system.
Participants should therefore only share these tokens with other legitimate
participants and not make their contents public or disclose them to
unknown or untrustworthy parties.</t>
      <t>Consent of the principal represented to participate in the interactions is vital.
If I authorize an agent to shop for a widget at given price,
it's legitimate for the agent to carry enough information about me
to the merchant to be able to do this for me.
Whereas, if an agent claims to be shopping for me but does not have my authorization
to do so, my privacy and possibly also my financial integrity are being violated.</t>
      <t>The principle of minimal disclosure should be employed.
Only the infomation needed to facilitate the intended interactions
should be placed in the tokens and conveyed to participants.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification registers the following Claims in
the IANA "JSON Web Token Claims" registry <xref target="IANA.JWT.Claims"/>
established by <xref target="RFC7519"/>.</t>
        <section anchor="sdm-claim">
          <name>"sdm" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: sdm</t>
            </li>
            <li>
              <t>Claim Description: Seller domain the token is intended for</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="srl-claim">
          <name>"srl" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: srl</t>
            </li>
            <li>
              <t>Claim Description: Seller resource locator - URL the agent is intended to access</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="ori-claim">
          <name>"ori" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: ori</t>
            </li>
            <li>
              <t>Claim Description: URL of the token's originator</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="env-claim">
          <name>"env" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: env</t>
            </li>
            <li>
              <t>Claim Description: Issuer environment (such as "production" or "sandbox")</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="btg-claim">
          <name>"btg" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: btg</t>
            </li>
            <li>
              <t>Claim Description: Buyer tag, an opaque reference ID internal to the buyer</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="hid-claim">
          <name>"hid" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: hid</t>
            </li>
            <li>
              <t>Claim Description: JSON structure containing human identity claims</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="apd-claim">
          <name>"apd" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: apd</t>
            </li>
            <li>
              <t>Claim Description: JSON structure containing agent platform identity claims</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="aid-claim">
          <name>"aid" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: aid</t>
            </li>
            <li>
              <t>Claim Description: JSON structure containing agent identity claims</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="spr-claim">
          <name>"spr" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: spr</t>
            </li>
            <li>
              <t>Claim Description: JSON string representing seller service price in currency units</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="sps-claim">
          <name>"sps" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: sps</t>
            </li>
            <li>
              <t>Claim Description: Seller pricing scheme, which represents a way for the seller list how it charges for its service or content</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="amt-claim">
          <name>"amt" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: amt</t>
            </li>
            <li>
              <t>Claim Description: JSON string representing token amount in currency units</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="cur-claim">
          <name>"cur" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: cur</t>
            </li>
            <li>
              <t>Claim Description: Currency unit, represented as an ISO 4217 three letter code, such as "EUR"</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="val-claim">
          <name>"val" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: val</t>
            </li>
            <li>
              <t>Claim Description: JSON string representing token amount in settlement network's units</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="mnr-claim">
          <name>"mnr" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: mnr</t>
            </li>
            <li>
              <t>Claim Description: JSON number representing maximum number of requests</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="stp-claim">
          <name>"stp" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: stp</t>
            </li>
            <li>
              <t>Claim Description: Settlement type</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="sti-claim">
          <name>"sti" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: sti</t>
            </li>
            <li>
              <t>Claim Description: Meta information for payment settlement, depending on settlement</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="media-types-registration">
        <name>Media Types Registration</name>
        <t>This section registers the following media types <xref target="RFC2046"/>
in the IANA "Media Types" registry <xref target="IANA.MediaTypes"/>
in the manner described in <xref target="RFC6838"/>.</t>
        <section anchor="kya-jwt-media-type">
          <name>application/kya+jwt</name>
          <ul spacing="normal">
            <li>
              <t>Type name: <tt>application</tt></t>
            </li>
            <li>
              <t>Subtype name: <tt>kya+jwt</tt></t>
            </li>
            <li>
              <t>Required parameters: n/a</t>
            </li>
            <li>
              <t>Optional parameters: n/a</t>
            </li>
            <li>
              <t>Encoding considerations: Uses JWS Compact Serialization as defined in <xref target="RFC7515"/></t>
            </li>
            <li>
              <t>Security considerations: See Security Considerations in in <xref target="RFC7519"/></t>
            </li>
            <li>
              <t>Interoperability considerations: n/a</t>
            </li>
            <li>
              <t>Published specification: (#kya-token) of this specification</t>
            </li>
            <li>
              <t>Applications that use this media type: Applications using Know Your Agent tokens</t>
            </li>
            <li>
              <t>Additional information:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Magic number(s): n/a</t>
                </li>
                <li>
                  <t>File extension(s): n/a</t>
                </li>
                <li>
                  <t>Macintosh file type code(s): n/a</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Person &amp; email address to contact for further information: TBD</t>
            </li>
            <li>
              <t>Intended usage: COMMON</t>
            </li>
            <li>
              <t>Restrictions on usage: none</t>
            </li>
            <li>
              <t>Author: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
          </ul>
        </section>
        <section anchor="pay-jwt-media-type">
          <name>application/pay+jwt</name>
          <ul spacing="normal">
            <li>
              <t>Type name: <tt>application</tt></t>
            </li>
            <li>
              <t>Subtype name: <tt>pay+jwt</tt></t>
            </li>
            <li>
              <t>Required parameters: n/a</t>
            </li>
            <li>
              <t>Optional parameters: n/a</t>
            </li>
            <li>
              <t>Encoding considerations: Uses JWS Compact Serialization as defined in <xref target="RFC7515"/></t>
            </li>
            <li>
              <t>Security considerations: See Security Considerations in in <xref target="RFC7519"/></t>
            </li>
            <li>
              <t>Interoperability considerations: n/a</t>
            </li>
            <li>
              <t>Published specification: (#pay-token) of this specification</t>
            </li>
            <li>
              <t>Applications that use this media type: Applications using Pay tokens</t>
            </li>
            <li>
              <t>Additional information:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Magic number(s): n/a</t>
                </li>
                <li>
                  <t>File extension(s): n/a</t>
                </li>
                <li>
                  <t>Macintosh file type code(s): n/a</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Person &amp; email address to contact for further information: TBD</t>
            </li>
            <li>
              <t>Intended usage: COMMON</t>
            </li>
            <li>
              <t>Restrictions on usage: none</t>
            </li>
            <li>
              <t>Author: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
          </ul>
        </section>
        <section anchor="kya-pay-jwt-media-type">
          <name>application/kya-pay+jwt</name>
          <ul spacing="normal">
            <li>
              <t>Type name: <tt>application</tt></t>
            </li>
            <li>
              <t>Subtype name: <tt>kya-pay+jwt</tt></t>
            </li>
            <li>
              <t>Required parameters: n/a</t>
            </li>
            <li>
              <t>Optional parameters: n/a</t>
            </li>
            <li>
              <t>Encoding considerations: Uses JWS Compact Serialization as defined in <xref target="RFC7515"/></t>
            </li>
            <li>
              <t>Security considerations: See Security Considerations in in <xref target="RFC7519"/></t>
            </li>
            <li>
              <t>Interoperability considerations: n/a</t>
            </li>
            <li>
              <t>Published specification: (#kya-pay-token) of this specification</t>
            </li>
            <li>
              <t>Applications that use this media type: Applications using KYA-Pay tokens</t>
            </li>
            <li>
              <t>Additional information:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Magic number(s): n/a</t>
                </li>
                <li>
                  <t>File extension(s): n/a</t>
                </li>
                <li>
                  <t>Macintosh file type code(s): n/a</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Person &amp; email address to contact for further information: TBD</t>
            </li>
            <li>
              <t>Intended usage: COMMON</t>
            </li>
            <li>
              <t>Restrictions on usage: none</t>
            </li>
            <li>
              <t>Author: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8693">
          <front>
            <title>OAuth 2.0 Token Exchange</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
            <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8693"/>
          <seriesInfo name="DOI" value="10.17487/RFC8693"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="IANA.JWT.Claims" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token Claims</title>
            <author initials="" surname="IANA" fullname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author initials="" surname="IANA" fullname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 921?>

<section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>[[ to be removed by the RFC Editor before publication as an RFC ]]</t>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial Internet Draft.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="D." surname="Zagidulin" fullname="Dmitri Zagidulin">
        <organization/>
        <address>
      </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
