<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rehfeld-apix-core-03" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="APIX Core">API Index (APIX): Core Infrastructure for Autonomous Agent Service Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-core-03"/>
    <author initials="C." surname="Rehfeld" fullname="Carsten Rehfeld">
      <organization/>
      <address>
        <email>carsten@botstandards.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="13"/>
    <abstract>
      <?line 115?>

<t>The internet was designed for human actors. Its discovery infrastructure —
search engines, directories, and hyperlinked documents — assumes a human
reading and navigating. Autonomous agents (bots) operating on the internet
today face a structural gap: there is no machine-native, globally accessible
index of services they can consume.</t>
      <t>This document defines the core infrastructure of the <strong>API Index (APIX)</strong>:
a HATEOAS-based, globally accessible, commercially sustainable service
discovery infrastructure designed for autonomous agents as its primary
consumers. It specifies the governance model, the three-dimensional trust
model, the APIX Manifest (APM) base format, commercial onboarding and
sanctions compliance, the supply-side funding model, and the base Index API.
These elements are shared across all APIX service types.</t>
      <t>Profile documents extend this core for specific service categories:
the APIX Services Profile (draft-rehfeld-apix-services-00) defines the
web API and bot service profile; the APIX IoT Device Profile
(draft-rehfeld-apix-iot-00) defines the IoT device profile.</t>
    </abstract>
  </front>
  <middle>
    <?line 136?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="the-bot-ecosystem-gap">
        <name>The Bot Ecosystem Gap</name>
        <t>The internet's foundational infrastructure — HTTP, HTML, DNS, and search
engines — was designed with human actors as the primary consumers. Web pages
render visual layouts for human eyes. CAPTCHA systems explicitly discriminate
against non-human access. Discovery mechanisms such as search engines index
content for human-readable navigation.</t>
        <t>Autonomous agents — software programs that independently execute tasks,
consume APIs, and interact with external services without per-action human
instruction — are not recognized as legitimate, first-class internet
participants in this architecture. They are systematically treated as threats
to be filtered, blocked, or rate-limited.</t>
        <t>This situation is changing. The rapid growth of large language model-based
agents, robotic process automation, and programmatic service consumers means
that non-human actors now represent a significant and growing proportion of
internet traffic. As this proportion increases, internet service providers
will increasingly need to serve autonomous agents as a recognized user class
alongside humans.</t>
        <t>The API Index is premised on this trajectory: bots are becoming
first-class internet participants, and the infrastructure to support them —
starting with service discovery — does not yet exist. Regulators are
converging on the same direction: the EU AI Act (Article 50) requires
transparency and identity disclosure for AI systems that interact with
people, and NIST's Center for AI Standards and Innovation solicited public
input on securing AI agent systems in early 2026. APIX's verifiable trust
model is designed to meet these emerging compliance requirements by
construction.</t>
        <section anchor="motivation-a-concrete-origin">
          <name>Motivation: A Concrete Origin</name>
          <t>The API Index was not conceived in the abstract. It emerged from a
concrete practical failure.</t>
          <t>A buying bot was built for a private use case: monitoring online shops for
a specific product and purchasing it automatically the moment it became
available. This is a straightforward task for an autonomous agent — exactly
the kind of task agents are well-suited for.</t>
          <t>The bot failed, not because the task was technically complex, but because
the internet's infrastructure is actively hostile to it:</t>
          <t><strong>HTML-only product pages.</strong> Product availability, price, and purchase state
were encoded in HTML rendered for a human eye. No machine-readable API
existed. The bot had to parse HTML — fragile, maintenance-intensive, and
broken by every redesign.</t>
          <t><strong>Cloudflare Bot Management and equivalent shields.</strong> The majority of
commercial web services now sit behind bot mitigation infrastructure. Cloudflare
Bot Management, and equivalent products from Akamai, Imperva, and others,
are deployed specifically to detect and block non-human request patterns.
Repeated automated requests — even at modest frequency — trigger rate
limiting, CAPTCHA challenges, or silent blocking. A buying bot that polls
a product page to detect availability is treated identically to a malicious
scraper or a DDoS participant.</t>
          <t><strong>CAPTCHA payment barriers.</strong> Even when product pages were reachable, payment
flows required solving CAPTCHAs that explicitly excluded non-human actors.
The purchasing step — the final, necessary action — was deliberately made
inaccessible to the bot.</t>
          <t><strong>Proxy network pollution.</strong> To work around rate limits and bot detection,
the bot required a rotating proxy network — different IP addresses on each
request to disguise its automated origin. This is not a solution: it
pollutes internet traffic with avoidable requests, raises the cost of
operation, and contributes directly to the adversarial dynamic between
bots and infrastructure operators. Every proxy request is a wasted roundtrip
that a machine-readable API endpoint would have made unnecessary.</t>
          <t><strong>Polling as the only state-change mechanism.</strong> Because the bot had no way
to subscribe to product availability events, it had to poll the product page
continuously. This is architecturally wasteful: the bot consumes server
resources and network bandwidth to repeatedly ask a question whose answer
has not changed.</t>
          <t>These are not edge cases. They are the standard experience for any autonomous
agent attempting to consume a commercial internet service today. The buying
bot illustrates why the API Index is necessary: not as an academic
exercise, but as the infrastructure layer that makes autonomous agents
functional participants in the commercial internet.</t>
        </section>
        <section anchor="the-discovery-problem">
          <name>The Discovery Problem</name>
          <t>When an autonomous agent must fulfill a task that requires an external
service, it faces a fundamental discovery problem: how does it find services
that can fulfill its requirement?</t>
          <t>Current approaches are inadequate:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Hardcoded URLs</strong>: brittle, require human maintenance, do not adapt to
new or changed services.</t>
            </li>
            <li>
              <t><strong>LLM training data</strong>: stale, non-authoritative, not machine-verifiable.</t>
            </li>
            <li>
              <t><strong>Human-curated lists</strong>: do not scale, not machine-navigable, lack
structured metadata.</t>
            </li>
            <li>
              <t><strong>Web search</strong>: returns HTML documents designed for humans, not structured
service descriptions for agents.</t>
            </li>
          </ul>
          <t>What is needed is a machine-native equivalent of a search engine: a global,
always-current, structured index of services that autonomous agents can query
by capability, trust level, liveness, and other machine-relevant criteria.</t>
        </section>
        <section anchor="the-discovery-shift">
          <name>The Discovery Shift</name>
          <t>Every automated system that calls an external service today does so
because a human hardcoded that endpoint. The human is the discovery
layer — the automation executes instructions, it does not find
candidates independently.</t>
          <t>APIX addresses this gap at infrastructure level: a globally queryable
index of services that an agent can search by capability, trust level,
and liveness — without prior human configuration of the specific
endpoint. The agent discovers what exists; the human does not need to
enumerate it in advance.</t>
        </section>
        <section anchor="infrastructure-efficiency-and-the-overhead-of-human-facing-responses">
          <name>Infrastructure Efficiency and the Overhead of Human-Facing Responses</name>
          <t>When an autonomous agent retrieves data from a web service today, it typically
receives a response designed for a human browser: HTML markup, CSS stylesheets,
JavaScript bundles, embedded fonts, advertising payloads, and analytics tracking
instrumentation. The actual information content — an endpoint URL, a price, an
availability flag — may occupy two kilobytes. The page weight delivering that
content is routinely one to three megabytes.</t>
          <t>This is a 500- to 1500-fold payload multiplier that carries no value for a
machine consumer. It consumes bandwidth at the client, compute at the server,
transit capacity on the network, and — at the scale of the growing autonomous
agent population — represents a measurable and unnecessary energy expenditure.</t>
          <t>Machine-native APIs eliminate this overhead entirely. A structured JSON response
delivers exactly the information the agent requested and nothing else. The IETF
Datatracker provides a concrete illustration: the human-facing document page for
an Internet-Draft loads several hundred kilobytes of rendered HTML and supporting
assets; the equivalent information retrieved via the Datatracker REST API returns
in under one kilobyte of JSON. The data is identical. The difference is entirely
overhead serving a human rendering pipeline that a machine does not have.</t>
          <t>APIX addresses both the discovery gap and this efficiency gap together. By
providing infrastructure that indexes machine-native service endpoints, APIX
encourages Service Owners to expose structured, agent-consumable APIs alongside
or in place of human-facing interfaces. The aggregate effect, as autonomous agent
workloads scale, is a reduction in the payload overhead carried by bot traffic
across the internet as a whole. This is an explicit co-mission of APIX:
machine-native infrastructure is not only more functional for agents — it is more
efficient for the internet, and helps reduce humanity's environmental footprint
as much as possible.</t>
        </section>
        <section anchor="lessons-from-prior-art">
          <name>Lessons from Prior Art</name>
          <t>The APIX is not the first attempt at a global service registry. Prior efforts
must be understood explicitly so that their failure modes are not repeated.</t>
          <t><strong>UDDI (Universal Description, Discovery and Integration)</strong>
UDDI was a SOAP-era standard for a global service registry with the same
conceptual goal as APIX, published as an OASIS Committee Draft in October
2004. It failed for three reasons: (1) extreme complexity of the XML-based
data model; (2) no automatic verification — all data was self-asserted with
no crawling or validation; (3) no adoption incentive — there was no
commercial model to sustain registration or discovery. APIX addresses all
three directly: a simple JSON manifest, automated spider verification, and
a commercial tier model.</t>
          <t><strong>robots.txt (Robots Exclusion Protocol)</strong>
Machine-readable, but concerned with exclusion — telling crawlers what not
to access — not with discovery of capabilities. Per-domain only. Not a
registry.</t>
          <t><strong>MCP (Model Context Protocol)</strong>
Defines tool and capability descriptions for LLM-based agents. Excellent
for consumption once a server URL is known. Does not address the discovery
problem: there is no index of MCP servers. APIX is complementary to MCP —
it can index MCP servers as one supported spec type. As of December 2025,
MCP is governed by the Linux Foundation Agentic AI Foundation (<xref target="AAIF"/>),
under a vendor-neutral SEP (Specification Enhancement Proposal) process
that explicitly prevents single-company control — a governance philosophy
that directly aligns with APIX's own neutrality requirements.</t>
          <t><strong>Well-Known URIs (RFC 8615)</strong>
Per-domain machine-readable metadata at <tt>/.well-known/</tt>. Useful for
per-service metadata but requires the consumer to already know the domain.
No cross-service search or global index.</t>
          <t><strong>DNS</strong>
DNS resolves names to addresses but carries no capability semantics. It is
an architectural analogy for APIX's federation model, not a comparable system.</t>
        </section>
        <section anchor="related-ietf-and-w3c-work">
          <name>Related IETF and W3C Work</name>
          <t>As of April 2026, the number of Internet-Drafts working in adjacent areas
of agent/bot infrastructure has grown significantly. None addresses the same
problem as APIX. This section documents each and states the relationship
explicitly.</t>
          <t><strong>draft-pioli-agent-discovery (ARDP)</strong>
Proposes a federated agent registration and discovery protocol. Deliberately
decentralised — no global registry mandate, no central query URL. Relationship
to APIX: complementary. ARDP addresses agent-to-agent capability advertisement
within a federation. APIX addresses global, cross-organisation service
discovery from a neutral central index. ARDP's JWS-based signing of
registration payloads provides cryptographic non-repudiation of the manifest
content — a property APIX currently achieves through layered governance
verification (DNS ownership proof at O-1, Spider crawl, KYC pipeline). APM
manifest-level signing is a candidate extension for a future APIX revision,
and ARDP's signing model is the reference design for that work.</t>
          <t><strong>draft-narajala-courtney-ansv2 (ANS v2)</strong>
Anchors autonomous agent identities to DNS domain names with Registration
Authority verification. Focused on agent identity and trust anchoring, not
service capability discovery. ANS v2 builds on a peer-reviewed predecessor
published at IEEE ICAIC 2026, simplifying the name format to three components
(ans://v{version}.{agentHost}), introducing a dual-certificate model, and
replacing conceptual registry integrity with a cryptographic Transparency Log.
ANS v2 explicitly identifies the limitation of DNS-SD (<xref target="RFC6763"/>): DNS-SD
adds service discovery but cannot tell a client whether the agent at an
address is the one it claims to be. ANS v2 fills that identity gap.
Relationship to APIX: complementary. DNS-SD locates a service; ANS v2
verifies the identity of the agent at that address; APIX provides capability
search and multi-dimensional trust metadata across organisations. ANS v2
could serve as the identity layer for service operators registered in APIX.</t>
          <t><strong>draft-vandemeent-ains-discovery (AINS)</strong>
Agent discovery via signed, append-only replication logs. No central
authority. No commercial sustainability model. Relationship to APIX:
different philosophy. AINS prioritises decentralisation and cryptographic
verifiability. APIX prioritises a single authoritative global index with
a governed trust model.</t>
          <t>AINS defines a multi-channel verification model in which each verified
channel produces an independent evidence object. The principle is sound:
independent signals from multiple channels produce stronger identity
assurance than any single channel alone. AINS names DNS, HTTPS, and email
as verification channels — all of which are compatible with APIX's own
trust evidence model (DNS TXT record at O-1, HTTPS-reachable manifest
verified by the APIX Spider). AINS additionally names source code
repositories (e.g., GitHub) as a verification channel. APIX does not
adopt repository access as an evidence channel. For open-source projects
and developer platforms this channel is accessible and useful; however,
the majority of enterprise API services — financial institutions,
healthcare providers, manufacturers, and proprietary IoT backends —
maintain private repositories as protected intellectual property, often
under regulatory or contractual obligations that prohibit external access.
APIX's governance-based evidence channels (DNS, legal entity registration,
commercial contract, third-party audit) apply universally regardless of
whether a registrant's codebase is open-source or proprietary, and this
universality is a deliberate scope decision.</t>
          <t><strong>draft-aiendpoint-ai-discovery (AI Discovery Endpoint)</strong>
Defines <tt>/.well-known/ai</tt> as a per-host machine-readable capability document.
Per-domain only; not a global index. Relationship to APIX: directly
complementary. The APIX Spider SHOULD read <tt>/.well-known/ai</tt> when present
on a registered service's domain as an additional source of capability
metadata.</t>
          <t>This draft defines a flat category taxonomy for service classification:
"productivity", "ecommerce", "finance", "news", "weather", "maps",
"search", "data", "communication", "calendar", "storage", "media",
"health", "education", "travel", "food", "government", "developer".
The convergence with APIX's capability taxonomy is notable: <tt>search</tt>,
<tt>communication</tt>, <tt>storage</tt>, and <tt>media</tt> appear in both; <tt>ecommerce</tt> and
<tt>finance</tt> correspond directly to APIX's <tt>commerce</tt> and <tt>data.financial</tt>
terms. The two taxonomies differ in architecture — AI Discovery Endpoint
uses flat single-word labels optimised for human-readable classification;
APIX uses hierarchical dot-separated terms (<tt>commerce.marketplace</tt>,
<tt>data.financial</tt>) optimised for machine-queryable precision — but the
independent convergence on the same fundamental service categories
validates both approaches. Categories present in AI Discovery Endpoint
but not yet in APIX's v1.0 starter set (<tt>health</tt>, <tt>education</tt>,
<tt>government</tt>, <tt>travel</tt>, <tt>food</tt>, <tt>news</tt>, <tt>weather</tt>, <tt>maps</tt>, <tt>developer</tt>)
are candidates for future additions through the governing body's capability taxonomy
governance process (<xref target="APIX-SERVICES"/>).</t>
          <t><strong>draft-batum-aidre (AIDRE)</strong>
Defines <tt>/.well-known/ai-discovery</tt> as a per-origin discovery document.
Decentralised by design. Relationship to APIX: complementary. APIX provides
the global aggregation and trust verification layer that per-origin endpoints
cannot provide alone.</t>
          <t><strong>draft-cui-ai-agent-discovery-invocation</strong>
Specifies a metadata format for agent capabilities and a registry-based
discovery mechanism. Explicitly permits multiple coexisting registries; no
global authority defined.</t>
          <t>This draft introduces a notable split between two metadata fields:
<tt>capabilities</tt> (high-level descriptors of what the service does, e.g.,
<tt>["translation", "summarization"]</tt>) and <tt>tags</tt> (broader, orthogonal
properties such as domain, language support, or deployment model, e.g.,
<tt>["nlp", "chinese", "transformer_model", "cloud"]</tt>). The split recognises
that some service properties are functional capabilities while others are
orthogonal classifiers that do not fit a strict capability hierarchy.</t>
          <t>APIX takes a different approach. The hierarchical dot-separated capability
taxonomy (<tt>nlp.translation</tt>, <tt>commerce.marketplace</tt>) encodes both the
category and the specific capability in a single governed term, enabling
prefix-based machine queries (<tt>nlp.*</tt>) and registry-controlled vocabulary.
Orthogonal dimensions that draft-cui expresses as free-form tags are
handled in APIX through dedicated typed fields: <tt>language</tt> (BCP 47,
<xref target="RFC5646"/>) covers language support; deployment model is not yet represented
and is noted as a potential future gap. The APIX design trades the
flexibility of a free-form tag bag for machine-queryability and governance
— a tag field without a registry becomes a folksonomy that degrades search
precision at scale. An empirical basis for preferring intent-aligned
capability descriptors over opaque operation labels is provided by the
controlled benchmark study in <xref target="I-D.hood-agtp-api"/>, which demonstrates
that intent-aligned names produce materially higher endpoint selection
accuracy in frontier-class language models, with the accuracy gain
attributable to the name itself independent of additional documentation.</t>
          <t>This draft also identifies pricing information as a legitimate service
metadata concern — noting that if a service charges per use, agents need
this information at discovery time. The draft does not standardise a
pricing schema ("not standardized here but can be included as needed").
APIX adopts this observation and formalises it: the <tt>pricing</tt> field in
the APM schema (<xref target="APIX-SERVICES"/>) defines a governed <tt>model</tt> enum
(<tt>free</tt>, <tt>freemium</tt>, <tt>paid</tt>, <tt>enterprise</tt>, <tt>dynamic</tt>) and a
<tt>pricing_endpoint</tt> for real-time load-based price queries. The index
stores only the declared <tt>model</tt> and the endpoint reference; consuming
agents are responsible for querying the <tt>pricing_endpoint</tt> directly to
obtain and evaluate the current price before invocation.</t>
          <t>This draft also defines a Semantic Routing Platform (SRP): an optional
control-plane service that performs semantic matching, ranking, and
policy-based filtering of candidate agents before invocation, without
participating in task execution. The SRP pattern assumes a structured
candidate pool as its input. APIX is the natural data source for that
pool: an SRP would query APIX with structured filters to retrieve a
trusted, governed candidate set, then apply semantic ranking over that
set before presenting the shortlist to the invoking agent. The two
layers are complementary — APIX provides structured discovery and trust
metadata; the SRP provides semantic selection above that foundation.</t>
          <t>Relationship to APIX: partially overlapping problem space. The capability/tag
split, the pricing observation, and the SRP pattern are all concrete design
contributions; APIX's governed taxonomy, typed fields, and formalised pricing
schema address the same concerns through a more structured mechanism, and the
SRP architecture positions APIX as the structured input layer to semantic
selection rather than as a competitor to it.</t>
          <t><strong>draft-am-layered-ai-discovery-architecture</strong>
Proposes a conceptual two-layer architecture separating a Discovery
Transport Layer (DTL) from the metadata format carried over it. The DTL
is explicitly abstract: the draft names HTTP, pub/sub, multicast, and
MoQ as candidate substrates without specifying any of them normatively.
No wire format, no concrete protocol mechanisms, and no IANA actions are
defined.</t>
          <t>APIX resolves the transport question concretely and normatively: HTTPS
with TLS (<xref target="RFC8446"/>), JSON (<xref target="RFC8259"/>), and HATEOAS navigation over
a single stable entry point. This is a deliberate design position in
favour of implementability over substrate generality. Adding a DTL
abstraction layer atop APIX's concrete HTTP interface would introduce
indirection without communicative or interoperability benefit — the
transport is already specified, and no agent implementation benefits
from treating it as one option among many.</t>
          <t>Directly relevant to APIX is the draft's categorisation of discoverable
object types (agents, models, data resources, robots), which recognises
that different object categories require different metadata profiles.
This independently converges on the same architectural reasoning behind
APIX's decision to separate the Services Profile (<xref target="APIX-SERVICES"/>)
from the IoT Device Profile (<xref target="APIX-IOT"/>) rather than collapsing all
service types into a single flat schema.</t>
          <t>Relationship to APIX: categorisation framing is consistent with the
APIX profile split; the abstract DTL layer is not adopted.</t>
          <t><strong>AGTP Protocol Family</strong></t>
          <t>The Agent Transfer Protocol (AGTP) defines a dedicated agent-native protocol
substrate, distinct from HTTP, with an IANA-registered URI scheme (<tt>agtp://</tt>)
and port 4480, media types in expert review, and live reference servers at
agtp://agents.agtp.io. The AGTP family currently comprises four drafts.</t>
          <t><xref target="I-D.hood-independent-agtp"/> is the core transport substrate. The defining
architectural commitment of the family is that agent-native APIs operate on
AGTP rather than HTTP.</t>
          <t><xref target="I-D.hood-agtp-discovery"/> defines an Agent Name Service (ANS) — a governed
registry that resolves capability queries into ranked lists of Agent Manifest
Documents for authenticated agents. ANS servers act as Scope-Enforcement Points,
applying trust score thresholds, trust tier requirements, and governance zone
constraints. Cross-organisational discovery is supported through peer ANS server
federation.</t>
          <t><xref target="I-D.hood-agtp-api"/> defines the Agentic API contract layer: a curated method
catalog of intent-aligned verbs (QUERY, EXECUTE, PROPOSE, DISCOVER, and eight
additional methods), endpoint primitives carrying semantic contracts, path grammar
rules, and schema validation. The draft introduces a runtime contract negotiation
mechanism via the PROPOSE method: a consuming agent may propose an endpoint that
does not exist, and the serving system synthesises it from its existing capabilities
at session scope. The intent-aligned method vocabulary is grounded in a controlled
empirical benchmark across four frontier-class model families showing that
intent-aligned verbs produce materially higher endpoint selection accuracy than
CRUD verbs, with description-swap ablations confirming that the accuracy gain is
attributable to the method name itself independent of documentation quality.</t>
          <t><xref target="I-D.hood-agtp-trust"/> defines a three-tier verification model with three
independent Tier 1 verification paths (DNS-anchored per RFC 8555, log-anchored
per RFC 9162, and SCITT per RFC 9943), hybrid trust composition, and a normative
0.0-1.0 continuous trust score with freshness semantics that are
operation-class-dependent.</t>
          <t>Relationship to APIX: overlapping problem space, fundamentally different
architectural commitment. The AGTP family's defining premise is that agent-native
services should operate on a dedicated off-HTTP protocol substrate. APIX's
defining premise is that the discovery layer should operate over existing HTTP
infrastructure with zero adoption friction: any service already reachable over
HTTP registers in APIX without changing its underlying protocol. These are not
competing answers to the same deployment question; they address different
positions in the adoption spectrum. AGTP targets greenfield services designed for
agent-native operation from scratch; APIX targets the full landscape including
existing HTTP/REST APIs, MCP-served models, IoT backends, and enterprise systems
that will not migrate off HTTP for operational, legal, or contractual reasons.</t>
          <t>Three specific alignments are worth noting. First, the AGTP trust tier evidence
paths (DNS per RFC 8555, transparency log per RFC 9162, SCITT per RFC 9943) are
structurally analogous to APIX's O-level evidence channels (DNS TXT record at
O-1, GLEIF LEI database at O-2, independent audit at O-5); a shared trust
evidence vocabulary between the two specifications would benefit consuming agents
that interact with both. Second, the AGTP PROPOSE method — server-side synthesis
of non-existent endpoints from existing capabilities at session scope — has no
current analogue in APIX and is identified as a candidate area for future dynamic
capability negotiation. Third, the empirical finding on intent-aligned method
names in <xref target="I-D.hood-agtp-api"/> provides an independent quantitative basis for
APIX's capability taxonomy design: APIX capability terms (<tt>nlp.translation</tt>,
<tt>commerce.marketplace</tt>) are intent-aligned descriptors rather than CRUD-style
operation labels, and the benchmark result supports that design choice.</t>
          <t><strong>draft-mozley-aidiscovery (AI Agent Discovery Problem Statement)</strong>
Argues for a distributed, organisation-centric discovery model in which
each organisation independently publishes agent capabilities at a
well-known entry point. The draft explicitly opposes centralised
registries on two grounds: single points of failure limiting resilience,
and the competitive harm risk — stated directly as: "An adversarial
centralized directory is also able to stifle competitor advertisement
capabilities." The scope is cross-organisational; the draft addresses
public, multi-domain agent discovery, not only local or intra-organisation
scenarios.</t>
          <t>Relationship to APIX: this draft articulates the strongest
counter-position to APIX's architecture, and the adversarial directory
argument deserves a direct response. APIX addresses it structurally:
the neutrality requirements (Section 4.2), the prohibition on ranking
preferences and preferential treatment, the independent governance of
the standard from the commercial operation, and the mandatory open bulk
data download are specifically designed to make the adversarial scenario
impossible by construction. A directory operated under these constraints
cannot stifle competitor advertisement because it cannot discriminate
between registrants at the same commercial tier.</t>
          <t>The distributed model's remaining gap, which APIX addresses, is the
zero-prior-knowledge case: an agent that has no prior relationship with
any service provider needs a single starting point from which to
discover unknown third parties. An organisation-centric model requires
the discovering agent to already know which organisations to query —
which presupposes the discovery problem is already solved.</t>
          <t><strong>draft-mozleywilliams-dnsop-dnsaid (DNS for AI Discovery)</strong>
Proposes DNS-AID: using SVCB records to publish agent service endpoints.
Relationship to APIX: complementary at the infrastructure layer. The
distinction across the three systems is precise: DNS-AID tells a client
where to connect; ANS v2 (<xref target="I-D.narajala-courtney-ansv2"/>) tells it whether
to trust the agent at that address; APIX tells it what to connect to and why
— capability search, multi-dimensional trust metadata, and liveness
verification across the global service landscape.</t>
          <t><strong>draft-meunier-webbotauth-registry (webbotauth)</strong>
Defines a JSON-based "Signature Agent Card" format for bot authentication.
Focused on bot identity — how a bot proves who it is to a service. Related
to the active webbotauth IETF Working Group. Relationship to APIX: orthogonal
but complementary. webbotauth addresses bot consumer identity; APIX addresses
service provider discovery.</t>
          <t><strong>I-D.ietf-scitt-architecture (SCITT)</strong>
Defines an append-only transparency service for supply chain integrity,
transparency, and trust. An IETF WG specification
(<xref target="I-D.ietf-scitt-architecture"/>). SCITT provides a
tamper-evident, auditable ledger model where statements about artefacts are
registered and independently verifiable. Relationship to APIX: architectural
reference. APIX's audit trail for organisation trust level progressions, LER
submissions (<xref target="APIX-IOT"/>), and sanctions screening events follows the same
append-only, non-repudiable model that SCITT formalises. ANS v2
(<xref target="I-D.narajala-courtney-ansv2"/>) bases its Transparency Log on SCITT. A
future revision of APIX MAY adopt SCITT-compliant transparency log semantics
for its governance audit trail.</t>
          <t><strong>Google Cloud Fraud Defense</strong>
A commercial trust platform for the agentic web announced at Google Cloud
Next '26 (April 2026), positioned as the next evolution of reCAPTCHA. Fraud
Defense explicitly integrates with the webbotauth IETF Working Group and
SPIFFE for agent and workload identity classification. Relationship to APIX:
complementary at adjacent layers. Fraud Defense operates at the consumption
layer — it verifies and classifies agent traffic arriving at a service
endpoint. APIX operates at the discovery layer — it provides the service
index, trust metadata, and capability taxonomy that agents use to locate
services before interacting with them. The two systems are not competitive;
a Fraud Defense policy engine can consume APIX trust signals (O-level,
S-level) as inputs to its risk scoring.</t>
          <t><strong>SPIFFE (Secure Production Identity Framework For Everyone)</strong>
A CNCF open standard for workload identity attestation. Provides
cryptographically verifiable identities (SVIDs) to software workloads in
dynamic infrastructure. Referenced as an integration target by Google Cloud
Fraud Defense alongside webbotauth. Relationship to APIX: complementary at
the identity layer. SPIFFE addresses machine/workload identity; APIX
addresses service and device discovery with human-governed trust levels. A
SPIFFE SVID could serve as a technical credential for an agent whose
operator is registered in APIX at O-2 or above.</t>
          <t><strong>W3C AI Agent Protocol Community Group</strong>
Proposed May 2025, targeting agent interoperability protocols. Pre-specification
as of this writing. Relationship to APIX: APIX will monitor this group's
outputs and align the APM capability taxonomy with any vocabulary standardised
by the W3C CG where applicable.</t>
          <t><strong>Agent2Agent Protocol (A2A)</strong>
Defines a secure communication protocol for agent-to-agent interaction
across frameworks <xref target="A2A"/>. Originated at Google (April 2025), transferred to the
Linux Foundation Agentic AI Foundation (<xref target="AAIF"/>) in June 2025; as of early
2026 it has 150+ supporting organisations and is in production use.
Relationship to APIX: directly complementary. A2A addresses how agents
communicate once they have located each other. APIX addresses how agents
locate each other in the first place. An agent that uses APIX for
discovery and A2A for subsequent communication is using both systems for
their intended purpose with no overlap.</t>
          <t><strong>AGNTCY (Open Agent Schema Framework)</strong>
A multi-component open infrastructure project for multi-agent systems <xref target="AGNTCY"/>,
originating at Cisco and transferred to the Linux Foundation (<xref target="AAIF"/>) in
July 2025. As of early 2026 it has 65+ supporting organisations and is
in production use for CI/CD, IT automation, and telecommunications.
AGNTCY comprises four components: the Open Agent Schema Framework (OASF)
for capability discovery, cryptographic identity, SLIM messaging, and
end-to-end observability. AGNTCY is governed under the Linux Foundation
AAIF mandate of no single-company control.</t>
          <t>Relationship to APIX: the governance philosophies are aligned; the
architectural scope is different. OASF defines a capability schema
format — analogous to OpenAPI for agent capabilities — for registering
and advertising what an agent can do. APIX is a globally queryable index
infrastructure: a single authoritative entry point where agents discover
unknown third-party services by capability, with commercial sustainability,
verified trust metadata, and structured search. OASF and APIX are
complementary: OASF provides the schema language; APIX provides the
global index that can be populated with OASF-described services. An
AGNTCY-registered agent is a candidate APIX registrant. The principal
architectural difference is scope: AGNTCY is optimised for
intra-platform and intra-organisation agent coordination; APIX is
designed for cross-organisation, cross-border, zero-prior-knowledge
discovery of agent-consumable services and IoT device classes. The two systems address different
points in the discovery spectrum and are not substitutes for each other.</t>
          <t><strong>draft-drake-agent-identity-registry (Agent Identity Registry)</strong>
Defines a federated registry architecture for persistent, hardware-anchored
agent identities. Introduces a three-tier model: Agent Identity Authority
(AIA) as a governance body, Registry Operators as authoritative identity
databases, and Registrars for hardware attestation and OIDC token
issuance. The AIA is explicitly required to be constituted as a
multi-stakeholder body — the draft states directly that "single-entity
control would undermine the federated design" (<xref target="I-D.drake-agent-identity-registry"/>).</t>
          <t>Relationship to APIX: this draft provides the strongest independent
validation of APIX's core governance premise. Two separate specifications,
developed independently, arrive at the same structural requirement: that
foundational agent infrastructure must be governed by a multi-stakeholder
body, not controlled by a single entity. The functional domains are
complementary rather than overlapping — draft-drake addresses agent
identity (who is this agent, which hardware backs its credential); APIX
addresses service discovery (what services exist, what can they do, are
they trustworthy). An agent whose identity is established under
draft-drake's AIA model is a well-suited candidate to consume and
register services in APIX.</t>
          <t><strong>Linux Foundation Agentic AI Foundation (AAIF)</strong>
Formed December 2025 with founding contributions from Anthropic (MCP),
OpenAI (AGENTS.md), and Block (goose); additional members include AWS,
Bloomberg, Cloudflare, Google, Cisco, Dell, Oracle, and Red Hat. The
AAIF's explicit founding mandate is to ensure "no single company controls
the direction of foundational infrastructure" (<xref target="AAIF"/>), implemented
through a vendor-neutral directed fund structure and per-project
Specification Enhancement Proposal (SEP) processes modelled on Kubernetes's
KEP governance.</t>
          <t>Relationship to APIX: the AAIF's governance mandate independently
validates APIX's constitutional neutrality requirements. APIX predates
the AAIF as an IETF submission and implements the same principle — no
single commercial interest may control the standard or its operation —
through a different structural mechanism: a Swiss Stiftung with a
supply-side commercial model that funds operations without creating
discovery-layer incentives to favour any registrant. The AAIF governs
communication and invocation protocols (MCP, A2A); APIX governs the
discovery index. These are adjacent, non-overlapping layers of the same
infrastructure stack.</t>
          <t><strong>Positioning</strong>
The agent infrastructure space has consolidated significantly in 2025-2026.
At the protocol layer, the Linux Foundation AAIF has emerged as the
primary governance body for communication and invocation standards (MCP,
A2A), with 150+ supporting organisations and active production deployment.
At the IETF, over a dozen individual drafts address agent discovery and
identity from different architectural starting points; none has reached
Working Group consensus.</t>
          <t>APIX occupies a distinct position in this landscape: it is the only
specification in the IETF space that makes governance the primary
architectural requirement, and the only proposal for a globally
queryable, commercially sustainable, neutral discovery index. The dominant
IETF tendency toward decentralisation addresses legitimate concerns about
single points of control; APIX answers those concerns structurally, through
its neutrality mandates, open bulk data requirements, and separation of
standard governance from commercial operation — rather than by abandoning
the global index model that those concerns are directed at.</t>
          <t>APIX is designed to compose with, not replace, the adjacent standards:
APIX provides the discovery layer that MCP, A2A, and AGNTCY do not
provide; draft-drake provides the identity layer that APIX delegates to
external identity infrastructure; the webbotauth Working Group provides
the bot authentication layer that APIX references as a trust signal.
Each standard goes deep in its own sub-problem; APIX depends on that
depth rather than duplicating it.</t>
          <t>The AGTP protocol family represents a distinct architectural trajectory:
a dedicated agent-native transport substrate (<tt>agtp://</tt>) that replaces
HTTP rather than extending it. APIX and AGTP are not substitutes and
the distinction is one of adoption scope, not superiority. AGTP is the
invocation substrate for greenfield services designed from scratch;
APIX is the discovery index for the full existing service landscape,
including the large majority of deployable services that will not
migrate off HTTP in any planning horizon relevant to agent infrastructure
standardisation.</t>
        </section>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        <t>All API responses MUST be encoded as UTF-8 as mandated by <xref target="RFC8259"/>
Section 8.1. All string fields in APM documents and Index API responses
MUST contain valid UTF-8. HTTP status codes used throughout this
specification are defined in <xref target="RFC9110"/>.</t>
        <t><strong>Agent</strong>
An autonomous software program that executes complex, goal-directed
tasks by consuming external services, without per-action human
instruction. Agents may use LLM-backed or programmatic orchestration
logic. The primary consumer class targeted by the APIX Index API.</t>
        <t><strong>Bot</strong>
An autonomous software program that executes deterministic, rule-based
internet tasks: web crawling, API polling, automated messaging, without
per-action human instruction. Behavior is scripted rather than
goal-directed. The APIX Spider is itself a bot.</t>
        <t><strong>Connected Device</strong>
A physical or embedded hardware unit with network connectivity that
exposes services or sensor data via the APIX Presence Protocol.
Registered as a Device Class and tracked as a Device Instance as
defined in <xref target="APIX-IOT"/>. Distinct from Agent and Bot in that the
principal is hardware, not software.</t>
        <t><strong>Service</strong>
A machine-consumable API or connected device class offered by an organisation,
registered in the APIX, and described by an APIX Manifest. The term covers
both web API services (<xref target="APIX-SERVICES"/>) and IoT device services (<xref target="APIX-IOT"/>).</t>
        <t><strong>Service Owner</strong>
The organisation responsible for registering, maintaining, and operating a
Service in the APIX.</t>
        <t><strong>APIX Manifest (APM)</strong>
The structured metadata document that describes a Service to the APIX,
including its technical specification reference, capability taxonomy,
trust metadata, and commercial terms. Profile documents define the
additional fields applicable to each service type.</t>
        <t><strong>Governing Body</strong>
The neutral, non-profit entity that operates the APIX, maintains its
registries, accredits Regional Representatives and Verifiers, and ensures
the governance and operational requirements defined in this specification
are met. Any entity that satisfies those requirements MAY fulfil this role.</t>
        <t><strong>API Index (APIX)</strong>
The global, centralised index of registered Services, operated by the
governing body and queryable by autonomous agents via the Index API.</t>
        <t><strong>Index API</strong>
The HATEOAS-compliant HTTP API exposed by the APIX for agent discovery and
navigation.</t>
        <t><strong>Accredited Verifier</strong>
A trusted third-party organisation, accredited by the governing body,
that performs human-intensive trust verification at Organisation levels O-4
and O-5.</t>
        <t><strong>Accredited Regional Representative</strong>
An organisation accredited by the governing body to operate
commercial onboarding, contracting, and customer relationships within a
defined geographic jurisdiction, under the governing body's
standard and governance.</t>
        <t><strong>Trust Policy</strong>
A set of minimum trust requirements expressed by a consuming agent that a
Service must satisfy before the agent will use it.</t>
        <t><strong>Liveness</strong>
The confirmed operational status and response availability of a Service,
as measured by automated means at a frequency determined by the Service's
commercial tier. The specific liveness mechanism differs by service type:
Spider health checks for web API services; presence signals for IoT device
services.</t>
        <t><strong>Tier</strong>
A commercial subscription level that determines a Service's visibility in
the APIX, liveness check frequency, and API query rate allocation.</t>
      </section>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <section anchor="requirements-must">
          <name>Requirements (MUST)</name>
          <ul spacing="normal">
            <li>
              <t>The APIX MUST be queryable by autonomous agents via a stable, globally
accessible URL without prior knowledge of any specific service.</t>
            </li>
            <li>
              <t>The Index API MUST follow HATEOAS principles: agents MUST be able to
navigate the full index starting from a single entry-point URL.</t>
            </li>
            <li>
              <t>Every Service record MUST expose machine-readable trust metadata across
all three trust dimensions (Organisation, Service, Liveness).</t>
            </li>
            <li>
              <t>Service registration MUST be human-initiated. The registrant MUST agree to
the index operator's Terms of Service before any service record is activated.
For O-0 and O-1, self-service portal registration with accepted Terms of
Service satisfies this requirement. For O-2 and above, registration MUST
additionally involve a formal B2B contractual relationship between the Service
Owner and the index operator or its Accredited Regional Representative.</t>
            </li>
            <li>
              <t>The APIX MUST expose trust metadata as verifiable facts, not as
recommendations. Trust decisions MUST remain with the consuming agent.</t>
            </li>
            <li>
              <t>The APIX Manifest (APM) MUST be format-agnostic: it MUST support
referencing multiple service types via an extensible type registry.</t>
            </li>
            <li>
              <t>The APIX MUST be operated as a neutral, non-profit infrastructure under
the governance of the governing body.</t>
            </li>
          </ul>
        </section>
        <section anchor="goals-should">
          <name>Goals (SHOULD)</name>
          <ul spacing="normal">
            <li>
              <t>The Index API SHOULD support full-text and structured search by capability,
category, organisation trust level, service verification level, liveness
freshness, and protocol type.</t>
            </li>
            <li>
              <t>The APIX SHOULD provide SDKs in common agent development languages to
lower the integration barrier for consuming agents.</t>
            </li>
            <li>
              <t>The APIX SHOULD support a federated accredited verifier model so that
Organisation trust levels O-4 and O-5 can be verified at scale without
centralising all human review in the governing body.</t>
            </li>
            <li>
              <t>Accredited Regional Representatives SHOULD be established in major
jurisdictions to allow Service Owners to contract in their local language
and legal framework.</t>
            </li>
            <li>
              <t>The APIX SHOULD publish a public transparency report at least annually,
disclosing the number of registered services by tier and trust level,
coverage statistics, and verifier accreditation status.</t>
            </li>
            <li>
              <t>The APIX SHOULD, through its verification model and tier structure,
incentivise Service Owners to expose structured, machine-consumable API
endpoints rather than requiring agents to adapt to human-facing HTML
interfaces. Eliminating rendering, styling, and advertising overhead from
machine-to-machine communication is an explicit efficiency objective of
this infrastructure.</t>
            </li>
          </ul>
        </section>
        <section anchor="out-of-scope">
          <name>Out of Scope</name>
          <t>The following are explicitly not addressed by this document.
Items marked MUST NOT are normative constraints on conforming
implementations; remaining items are editorial scope boundaries.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Bot identity and authentication</strong>: how a bot proves its own identity to
a service it consumes. This is addressed by complementary work such as
draft-meunier-webbotauth-registry. This document takes no position on
bot identity mechanisms.</t>
            </li>
            <li>
              <t><strong>Bot rights and legal personhood</strong>: outside the scope of a technical
infrastructure standard.</t>
            </li>
            <li>
              <t><strong>Service execution</strong>: a conforming APIX implementation MUST NOT proxy,
mediate, or execute service calls on behalf of consuming agents. The APIX
is a discovery layer only; all service interactions occur directly between
the consuming agent and the Service Owner's infrastructure.</t>
            </li>
            <li>
              <t><strong>Content indexing</strong>: a conforming APIX implementation MUST NOT index
service response content. The APIX indexes service metadata — capability
declarations, trust levels, liveness signals — not the data that services
return when called.</t>
            </li>
            <li>
              <t><strong>Mandatory consumer registration</strong>: a conforming APIX implementation
MUST NOT require consuming agents to register or identify themselves as
a condition of performing discovery queries (see Section 9.2).</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="architecture-overview">
        <name>Architecture Overview</name>
        <section anchor="component-model">
          <name>Component Model</name>
          <artwork><![CDATA[
  +----------------------------------------------------------+
  |                   the governing body                     |
  |             (Swiss Stiftung -- neutral, non-profit)      |
  |  Owns: APIX standard, Index infrastructure, APM format   |
  |  Accredits: Regional Representatives, Verifiers          |
  +---------------------+------------------------------------+
                        |
        +---------------+-------------------+
        |               |                   |
  +-----+------+  +-----+--------+  +-------+---------+
  |   Index    |  | Verification |  |  Registration   |
  |   API      |  | Component    |  |    Portal       |
  | (HATEOAS)  |  |(type-specific|  |  (B2B / human)  |
  +-----+------+  +-----+--------+  +-------+---------+
        |               |                   |
        |         +-----+------+            |
        |         |  Service   |            |
        +-------->|  Record    |<-----------+
                  |  Store     |
                  +------------+
        ^                              ^
        |                              |
  +-----+------+              +--------+-----------+
  |  Consuming |              |   Service Owner    |
  |    Agent   |              |  (+ Accredited     |
  |    (Bot)   |              |  Regional Rep)     |
  +------------+              +--------------------+
]]></artwork>
          <t>This document uses the generic terms "governing body" and "index
operator" in all normative requirements. These terms are intentionally
role-based: any entity that satisfies the governance, neutrality, and
operational requirements defined in this specification MAY fulfil them.
The reference implementation of these roles is described in the
non-normative appendix "Reference Implementation" at the end of this
document.</t>
          <t><strong>Flow:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>A Service Owner (or their Accredited Regional Representative) creates
an Organisation Account in the APIX Registration Portal, providing
company details and agreeing to a commercial contract.</t>
            </li>
            <li>
              <t>The Registration Portal creates a draft Service Record and triggers
profile-appropriate verification (Spider crawl for web API services;
manufacturer provisioning for IoT device classes).</t>
            </li>
            <li>
              <t>The verification component updates the Service Record with verified
technical metadata.</t>
            </li>
            <li>
              <t>The Service Record becomes queryable via the Index API.</t>
            </li>
            <li>
              <t>A consuming agent queries the Index API from the single entry-point URL,
navigates by HATEOAS links, applies its Trust Policy, and selects
services that satisfy its requirements.</t>
            </li>
            <li>
              <t>Verification rechecks services on the schedule defined by each service's
liveness monitoring configuration.</t>
            </li>
          </ol>
        </section>
        <section anchor="governance-model">
          <name>Governance Model</name>
          <t>The APIX MUST be operated by a <strong>neutral governing body</strong> that satisfies the
following normative requirements. These requirements apply to any conforming
APIX implementation; the specific legal form of the governing body is an
implementation choice.</t>
          <t><strong>Neutrality requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST have no commercial interest in preferring any
registrant's services over another in index results or liveness scheduling.</t>
            </li>
            <li>
              <t>The governing body MUST NOT offer exclusive discovery advantages, ranking
preferences, or prioritised verification treatment to any registrant
regardless of commercial relationship.</t>
            </li>
            <li>
              <t>Governance of the APIX standard and APM specification MUST be separated
from operation of the commercial index. A single entity may not
simultaneously control standard evolution and derive commercial benefit
from preferential application of that standard.</t>
            </li>
          </ul>
          <t><strong>Operational requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST accredit Regional Representatives who may handle
service onboarding in specific jurisdictions. Regional Representatives
operate under licence from the governing body; the index itself remains
a single global store.</t>
            </li>
            <li>
              <t>The governing body MUST accredit Verifiers who perform Organisation trust
assessments at O-4 and O-5. Accredited Verifiers are structurally
analogous to Certificate Authorities in the TLS ecosystem.</t>
            </li>
            <li>
              <t>The governing body MUST maintain the capability taxonomy and publish all
versions of the APM specification and Index API specification as open
standards under a permissive licence.</t>
            </li>
            <li>
              <t>The governing body MUST perform sanctions screening on service registrants
(see Section 8).</t>
            </li>
          </ul>
          <t><strong>Openness requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The full index MUST be made available as a freely downloadable bulk dataset
on the first day of each calendar month, under the Open Database Licence
(ODbL) 1.0. No entity, including the governing body, may hold an exclusive
lock on the index data.</t>
            </li>
            <li>
              <t>Incremental diff files MUST be published daily, each covering all record
additions, updates, and deletions since the previous day's snapshot. A
downstream consumer MUST be able to reach current index state by applying
the monthly full snapshot and the sequence of daily diffs since that
snapshot, without downloading any additional full snapshots.</t>
            </li>
            <li>
              <t>Discovery queries to the Index API MUST be available without authentication
or payment (subject to rate limits; see Section 9.2).</t>
            </li>
          </ul>
          <section anchor="global-participation">
            <name>Global Participation</name>
            <t>A conforming APIX implementation SHOULD establish mechanisms to ensure
global representation in the capability taxonomy, including service categories
relevant to underrepresented regions. Where regional institutional partners
are willing to co-sponsor regional participation, the governing body SHOULD
establish formal co-sponsorship relationships and associated governance
representation for those regions.</t>
            <t>Regional verification nodes are RECOMMENDED in regions with significant
service registrant populations to eliminate intercontinental latency in
liveness verification.</t>
          </section>
        </section>
        <section anchor="standard-registries">
          <name>Standard Registries</name>
          <t>The APIX standard maintains normative registries of enumerated values.
Registries are authoritative lists of valid values for specific APM and
Index API fields. Using values not present in the relevant registry is
a protocol violation.</t>
          <t><strong>Registry location:</strong> Registries are published as live JSON endpoints at
<tt>apix.example.org/registry/</tt> and are updated independently of the RFC
revision cycle. The RFC defines the registry structure and lifecycle
rules; the live endpoints are the authoritative source of current values.</t>
          <dl>
            <dt><tt>protocols</tt></dt>
            <dd>
              <t>Protocol type registry.
Endpoint: <tt>apix.example.org/registry/protocols</tt>.
APM field: <tt>spec.type</tt>.</t>
            </dd>
            <dt><tt>capabilities</tt></dt>
            <dd>
              <t>Capability taxonomy registry.
Endpoint: <tt>apix.example.org/registry/capabilities</tt>.
APM field: <tt>capabilities[]</tt>.</t>
            </dd>
            <dt><tt>notification-channels</tt></dt>
            <dd>
              <t>Notification channel type registry.
Endpoint: <tt>apix.example.org/registry/notification-channels</tt>.
APM field: <tt>notifications.channels[].type</tt>.</t>
            </dd>
            <dt><tt>presence-modes</tt></dt>
            <dd>
              <t>Presence mode registry.
Endpoint: <tt>apix.example.org/registry/presence-modes</tt>.
APM field: <tt>spec.presence_mode</tt> (device classes).</t>
            </dd>
            <dt><tt>delegation-scopes</tt></dt>
            <dd>
              <t>Device delegation scope registry.
Endpoint: <tt>apix.example.org/registry/delegation-scopes</tt>.
APM field: <tt>scopes[]</tt> in delegation grant requests (device classes).</t>
            </dd>
          </dl>
          <t>Initial values for each registry are defined in the applicable profile
document: <xref target="APIX-SERVICES"/> for protocol types and capability taxonomy;
<xref target="APIX-IOT"/> for presence modes, delegation scopes, and IoT capability
terms.</t>
          <t><strong>Registry entry lifecycle:</strong></t>
          <t>Each registry entry transitions through three phases. The <tt>standard_warnings</tt>
flag in a Service Record does not appear until the grace period has elapsed —
service operators have a silent window to update their APM before any public
signal is issued.</t>
          <artwork><![CDATA[
active  ->  deprecated (announced)
              |
              +-- [grace period: 90 days min]
              |     silent: operator notified, no public flag
              |
              +-- [warning period: remainder of deprecation window]
              |     standard_warnings visible in Service Record
              |
              +-- sunset
                    new registrations rejected; flagged non-compliant
]]></artwork>
          <table>
            <thead>
              <tr>
                <th align="left">Phase</th>
                <th align="left">Status</th>
                <th align="left">standard_warnings</th>
                <th align="left">New regs.</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Normal use</td>
                <td align="left">
                  <tt>active</tt></td>
                <td align="left">No</td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Grace period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>No</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Warning period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>Yes</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Sunset</td>
                <td align="left">
                  <tt>sunset</tt></td>
                <td align="left">Yes (non-compliant)</td>
                <td align="left">
                  <strong>Rejected</strong></td>
              </tr>
            </tbody>
          </table>
          <t><strong>Deprecation rules:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST publish a <tt>deprecated_in_version</tt>, <tt>sunset_date</tt>,
<tt>grace_period_ends</tt>, and <tt>replacement</tt> value when deprecating any registry
entry.</t>
            </li>
            <li>
              <t>The minimum total deprecation window (announcement to sunset) is
<strong>12 months</strong>. The governing body MAY extend this window but MUST NOT
shorten it.</t>
            </li>
            <li>
              <t>The minimum grace period is <strong>90 days</strong> from the deprecation announcement.
During the grace period, <tt>standard_warnings</tt> MUST NOT be set on any Service
Record, regardless of whether the service uses the deprecated value.</t>
            </li>
            <li>
              <t>The governing body MUST notify all registered Service Owners whose services
use the deprecated value before the grace period begins. Notification MUST
include the <tt>grace_period_ends</tt> date, the <tt>sunset_date</tt>, and the
<tt>replacement</tt> value.</t>
            </li>
            <li>
              <t>After the grace period, the index operator MUST set <tt>standard_warnings</tt> on
Service Records that still use the deprecated value.</t>
            </li>
            <li>
              <t>At <tt>sunset</tt>, the index operator MUST reject new APM submissions using the
sunsetted value and MUST escalate existing Service Records from
<tt>standard_warnings</tt> to a <tt>non_compliant</tt> status flag.</t>
            </li>
          </ul>
          <t><strong>Registry versioning:</strong> each registry is independently versioned. The Index
root resource (Section 10.2) exposes the current version of each registry so
consuming agents may detect changes.</t>
        </section>
      </section>
      <section anchor="lawful-cooperation-and-non-surveillance-commitment">
        <name>Lawful Cooperation and Non-Surveillance Commitment</name>
        <section anchor="purpose-of-the-service">
          <name>Purpose of the Service</name>
          <t>APIX is infrastructure designed for one purpose: enabling autonomous agents
and the organisations that deploy them to discover legitimate services and
operate productively in the commercial internet. Registration in the APIX
is a declaration that a service or device class is offered in good faith for
legitimate use. The APIX is not a neutral medium indifferent to the purposes
for which it is used. It is infrastructure built for legitimate use, and
it is by design closed to actors who are refused or removed under the
compliance mechanisms defined in this specification — sanctions screening,
KYC verification, and judicial enforcement through the LER process.</t>
          <t>This is not a policy statement. It is the foundational design constraint
from which the cooperation mechanisms in this document and in <xref target="APIX-IOT"/>
derive their legitimacy.</t>
        </section>
        <section anchor="cooperation-duty">
          <name>Cooperation Duty</name>
          <t>Because APIX provides infrastructure for legitimate use, it has a duty to
cooperate with properly authorised law enforcement when that infrastructure
is misused. This duty is not conditional on commercial convenience or
reputational risk. When a registrant or device fleet is confirmed to be
operating criminally, APIX MUST act — through the mechanisms defined in
this document and in <xref target="APIX-IOT"/> — to limit the harm that flows from that
misuse.</t>
          <t>APIX MUST cooperate with authorised law enforcement requests that satisfy
the jurisdictional and judicial requirements defined in <xref target="APIX-IOT"/>
Section 5.8. Refusal to cooperate with a validly authorised request is not
permitted. Delay beyond the processing time commitments defined in that
section requires documented justification and MUST be reported in the
governing body's annual transparency report.</t>
        </section>
        <section anchor="non-surveillance-commitment">
          <name>Non-Surveillance Commitment</name>
          <t>APIX is not a surveillance instrument. The cooperation mechanisms in this
specification are reactive and bounded. The following prohibitions are
normative and apply to all conforming implementations:</t>
          <ul spacing="normal">
            <li>
              <t>APIX MUST NOT proactively monitor, profile, or analyse the behaviour of
registered services, device fleets, or consuming agents beyond what is
technically necessary to deliver liveness verification and abuse detection
as defined in this specification.</t>
            </li>
            <li>
              <t>APIX MUST NOT share index data, presence signal logs, device instance
records, or consuming agent query patterns with any law enforcement or
government authority except through the Law Enforcement Request process
defined in <xref target="APIX-IOT"/> Section 9.8, with its associated judicial
authorisation requirements and jurisdictional constraints.</t>
            </li>
            <li>
              <t>Bulk data requests — requests that are not targeted at identified specific
devices, instances, or registrants but instead seek aggregate ecosystem
intelligence — MUST be refused regardless of the requesting authority's
jurisdiction or claimed legal basis. A valid LER MUST identify specific
device IP addresses or registrant identifiers. A request for "all devices
in region X" or "all services in category Y" is not a valid LER.</t>
            </li>
            <li>
              <t>APIX MUST NOT establish any data-sharing arrangement, standing access
grant, or automated feed to any law enforcement or intelligence agency.
Every cooperation action is event-triggered, scoped to a specific
identified case, and subject to the judicial authorisation requirement.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-trigger-requirement">
          <name>The Trigger Requirement</name>
          <t>Enhanced monitoring, graduated response actions, and LER processing are
ALWAYS triggered by one of two conditions:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>External identification</strong>: a legitimate authority in an accepted
jurisdiction has submitted an LER with valid judicial authorisation
identifying specific devices or registrants as confirmed participants
in criminal activity. Suspicion alone is not sufficient. The judicial
authorisation requirement is the gatekeeping mechanism.</t>
            </li>
            <li>
              <t><strong>Technical anomaly detection</strong>: APIX's own infrastructure detects
signal patterns technically inconsistent with legitimate device operation
— such as rapid mass re-registration from a single IP address, heartbeat
flooding at rates outside any plausible device density, or token reuse
patterns that cannot arise from legitimate manufacture and provisioning.
Such detections result in classification at the <tt>observe</tt> tier of the
Bad-Bot Graduated Response (<xref target="APIX-IOT"/> Section 9.9), not in immediate
blocking. They are recorded, monitored, and shared with authorised law
enforcement on request through the LER process. They do not trigger
autonomous enforcement action by APIX.</t>
            </li>
          </ol>
          <t>Speculative profiling — building behavioural models of registered services
or device fleets in the absence of a trigger — is prohibited under the
Non-Surveillance Commitment above.</t>
        </section>
        <section anchor="jurisdictional-guardrails">
          <name>Jurisdictional Guardrails</name>
          <t>All cooperation is bounded by the accepted jurisdictions framework defined
in <xref target="APIX-IOT"/> Section 9.8. This boundary is not negotiable on a
case-by-case basis. APIX MUST NOT cooperate with a law enforcement request
from a jurisdiction not on the Accepted Jurisdiction Whitelist, even when:</t>
          <ul spacing="normal">
            <li>
              <t>The requesting authority presents a compelling case.</t>
            </li>
            <li>
              <t>The alleged criminal activity is severe.</t>
            </li>
            <li>
              <t>Political, commercial, or reputational pressure is applied.</t>
            </li>
            <li>
              <t>Another accepted-jurisdiction authority vouches for the request.</t>
            </li>
          </ul>
          <t>The Accepted Jurisdiction Whitelist exists precisely to make this boundary
resist pressure. The governing body MAY add jurisdictions to the whitelist
through its defined board decision process; it MUST NOT bypass the whitelist
for individual cases. Any governing body action that grants cooperation
outside the whitelist is a specification violation and MUST be reported in
the transparency report.</t>
        </section>
        <section anchor="transparency-as-enforcement">
          <name>Transparency as Enforcement</name>
          <t>The annual transparency report required by Section 4.2 is not merely
informational. It is the mechanism by which the non-surveillance commitment
and the jurisdictional guardrails are held accountable. The governing body
MUST disclose in that report:</t>
          <ul spacing="normal">
            <li>
              <t>The number of LER requests received, accepted, and refused, by requesting
jurisdiction tier.</t>
            </li>
            <li>
              <t>The number of bulk data requests received and refused.</t>
            </li>
            <li>
              <t>Any case in which cooperation outside the accepted jurisdictions framework
was requested, with the governing body's response.</t>
            </li>
            <li>
              <t>Any case in which APIX's own technical anomaly detection was used as the
basis for a law enforcement referral.</t>
            </li>
            <li>
              <t>The total number of device instances, services, and organisations subject
to active suppression, suspension, or graduated response measures at the
reporting date.</t>
            </li>
          </ul>
          <t>If a governing body fails to publish this report within 90 days of the
close of a calendar year, any member of the governing body board MUST be
empowered to publish it unilaterally. The right to publish the transparency
report MUST NOT be waivable by board resolution.</t>
        </section>
      </section>
      <section anchor="the-apix-manifest-apm">
        <name>The APIX Manifest (APM)</name>
        <section anchor="purpose">
          <name>Purpose</name>
          <t>The APIX Manifest is the structured document that a Service Owner provides
at registration. It is the index-facing contract for a Service:
format-agnostic, extensible, and designed for machine consumption.</t>
          <t>The APM has two layers:</t>
          <t><strong>Base fields</strong> — defined in this document and required for all service types:
<tt>apm_version</tt>, <tt>service_id</tt>, <tt>name</tt>, <tt>description</tt>, <tt>owner</tt> (with
<tt>organisation_name</tt>, <tt>jurisdiction</tt>, <tt>registration_number</tt>, <tt>contacts</tt>),
<tt>capabilities</tt>, <tt>trust</tt> (organisation and service level assignments), and
<tt>legal</tt>. These fields are common to all profiles.</t>
          <t><tt>lifecycle_stage</tt> is required for all service types but its valid values
and transition rules are profile-defined. Each profile owns its own
lifecycle model; the field is not a shared enum. See <xref target="APIX-SERVICES"/> and
<xref target="APIX-IOT"/> for the lifecycle models applicable to each service type.</t>
          <t><strong>Profile fields</strong> — defined in profile documents and required only for the
applicable service type. <xref target="APIX-SERVICES"/> defines the full APM schema for
web API services. <xref target="APIX-IOT"/> defines the full APM schema for device class
registrations. An APM submission MUST conform to the profile schema
corresponding to its <tt>spec.type</tt> value.</t>
          <t><strong>Extension fields</strong> — the <tt>custom</tt> array is a governed extension mechanism
for declaring properties not yet covered by the base or profile schemas. The
<tt>custom</tt> field is OPTIONAL in all profiles. It is a flat list of reverse-domain
key name strings; no values are stored in the index. The APIX indexes only the
declared key names, enabling discovery via the <tt>custom_key</tt> search parameter.
This design provides a clean promotion path: when a custom key accumulates
sufficient independent adoption across organisations, the Bot Standards
Foundation MAY initiate a governance track to promote the pattern to a standard
named field in a future APM version. Full normative rules — including key naming
conventions, list size limits, and Spider behaviour — are defined in the
applicable profile document (<xref target="APIX-SERVICES"/>, <xref target="APIX-IOT"/>).</t>
          <t>The <tt>trust</tt> fields in an APM submission MUST be set exclusively by the index
operator based on verification outcomes. APM submissions that include <tt>trust</tt>
field values MUST have those values overwritten by the index upon processing.
A Service Owner MUST NOT assert their own trust level.</t>
        </section>
      </section>
      <section anchor="trust-model">
        <name>Trust Model</name>
        <t>The APIX Trust Model has three independent dimensions. Each dimension produces
a machine-readable value in the Service Record. Consuming agents combine
these values according to their own Trust Policy.</t>
        <t>The APIX provides trust metadata. It does not make trust decisions.</t>
        <section anchor="dimension-1-organisation-trust-level">
          <name>Dimension 1 — Organisation Trust Level</name>
          <t>Describes the verified identity and compliance posture of the organisation
that owns the service.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">O-0</td>
                <td align="left">Unverified</td>
              </tr>
              <tr>
                <td align="left">O-1</td>
                <td align="left">Identity Verified</td>
              </tr>
              <tr>
                <td align="left">O-2</td>
                <td align="left">Legal Entity Verified</td>
              </tr>
              <tr>
                <td align="left">O-3</td>
                <td align="left">Hygiene Verified</td>
              </tr>
              <tr>
                <td align="left">O-4</td>
                <td align="left">Operationally Verified</td>
              </tr>
              <tr>
                <td align="left">O-5</td>
                <td align="left">Audited</td>
              </tr>
            </tbody>
          </table>
          <dl>
            <dt>O-0 (Unverified):</dt>
            <dd>
              <t>Self-registered. No checks performed.</t>
            </dd>
            <dt>O-1 (Identity Verified):</dt>
            <dd>
              <t>Valid business email confirmed. Domain ownership verified via DNS
TXT record.</t>
            </dd>
            <dt>O-2 (Legal Entity Verified):</dt>
            <dd>
              <t>Company registration number confirmed against official registry of
the declared jurisdiction.</t>
            </dd>
            <dt>O-3 (Hygiene Verified):</dt>
            <dd>
              <t><tt>security.txt</tt> (RFC 9116) present and valid at
<tt>/.well-known/security.txt</tt>; DMARC and SPF DNS records configured
for the registered domain; Privacy Policy, Terms of Service, and
Data Processing Agreement accessible at declared URLs. All checks
performed automatically by APIX. No human reviewer required.</t>
            </dd>
            <dt>O-4 (Operationally Verified):</dt>
            <dd>
              <t>Organisation governance structure, operational security practices,
incident response capability, and personnel vetting reviewed by an
Accredited Verifier against the Verifier Standard.</t>
            </dd>
            <dt>O-5 (Audited):</dt>
            <dd>
              <t>Third-party compliance audit completed (SOC 2 Type II, ISO 27001,
or equivalent). Audit certificate on file with the governing body.
O-5 may be achieved directly without O-4 as a prerequisite via
direct certificate submission to the governing body.</t>
            </dd>
          </dl>
          <t>Organisation levels are assessed against the organisation as a whole, not
per service. An organisation that achieves any O-level applies that level
to all its registered services.</t>
        </section>
        <section anchor="dimension-2-service-verification-level">
          <name>Dimension 2 — Service Verification Level</name>
          <t>Describes what has been automatically verified about the service itself.
The specific verification mechanism differs by service type (Spider for
web API services; manufacturer registration process for device classes).</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">S-0</td>
                <td align="left">Unchecked</td>
              </tr>
              <tr>
                <td align="left">S-1</td>
                <td align="left">Reachable</td>
              </tr>
              <tr>
                <td align="left">S-2</td>
                <td align="left">Spec Verified</td>
              </tr>
              <tr>
                <td align="left">S-3</td>
                <td align="left">Schema Stable</td>
              </tr>
              <tr>
                <td align="left">S-4</td>
                <td align="left">Security Reviewed</td>
              </tr>
            </tbody>
          </table>
          <dl>
            <dt>S-0 (Unchecked):</dt>
            <dd>
              <t>Registered. Verification has not yet run.</t>
            </dd>
            <dt>S-1 (Reachable):</dt>
            <dd>
              <t>Service confirmed reachable by automated check.</t>
            </dd>
            <dt>S-2 (Spec Verified):</dt>
            <dd>
              <t>Specification or capability declaration confirmed and consistent
with registration.</t>
            </dd>
            <dt>S-3 (Schema Stable):</dt>
            <dd>
              <t>No breaking changes detected across at least three consecutive
verification runs.</t>
            </dd>
            <dt>S-4 (Security Reviewed):</dt>
            <dd>
              <t>Automated vulnerability scan completed with no critical findings,
OR third-party penetration test certificate provided and validated
by an Accredited Verifier.</t>
            </dd>
          </dl>
          <t>Profile documents define the exact criteria by which each level is achieved
for each service type.</t>
        </section>
        <section anchor="dimension-3-liveness">
          <name>Dimension 3 — Liveness</name>
          <t>Describes the confirmed operational availability of the service, including
how recent and how frequent the availability data is. Liveness data is
expressed as a set of metrics, not a single level.</t>
          <dl>
            <dt><tt>last_ping_at</tt> (ISO 8601 timestamp)</dt>
            <dd>
              <t>Time of the most recent successful liveness check.</t>
            </dd>
            <dt><tt>ping_interval_seconds</tt> (integer)</dt>
            <dd>
              <t>Configured interval between liveness checks.</t>
            </dd>
            <dt><tt>uptime_30d_percent</tt> (float)</dt>
            <dd>
              <t>Percentage of checks successful over the last 30 days.</t>
            </dd>
            <dt><tt>avg_response_ms</tt> (float)</dt>
            <dd>
              <t>Mean response time in milliseconds over the last 30 days.</t>
            </dd>
            <dt><tt>consecutive_failures</tt> (integer)</dt>
            <dd>
              <t>Number of consecutive failed checks at last run.</t>
            </dd>
          </dl>
          <t>The check interval is determined by the service's liveness monitoring
configuration. A service configured at initial-only frequency receives no
recurring checks; its <tt>last_ping_at</tt> reflects only the initial verification
run.</t>
          <t>The concrete fields and measurement model for Liveness differ by service
type and are defined in each profile document.</t>
        </section>
        <section anchor="trust-model-implementations-by-service-type">
          <name>Trust Model Implementations by Service Type</name>
          <t>The three trust dimensions (Organisation, Service Verification, Liveness)
are universal across all APIX service types. However, their concrete
implementation — the verification mechanisms, the APM fields that carry
trust state, and the achievable levels — differs by service type. Three
distinct trust implementations are defined across the APIX profile suite.</t>
          <t><strong>API Service Trust</strong> (defined in <xref target="APIX-SERVICES"/>)</t>
          <t>Verification is pull-based: the APIX Spider visits the service on a
scheduled basis, checks reachability, fetches and parses the specification,
and runs schema comparison across consecutive runs. Liveness is measured
by the index — the Spider pings the service endpoint and records response
time and availability metrics. The trust object in an API service APM
carries observed metrics (<tt>last_ping_at</tt>, <tt>uptime_30d_percent</tt>,
<tt>avg_response_ms</tt>, <tt>consecutive_failures</tt>).</t>
          <t><strong>Device Class Trust</strong> (defined in <xref target="APIX-IOT"/>)</t>
          <t>Verification is registration-based: a device manufacturer registers the
device class, providing a capability declaration and firmware version
contract. The APIX Spider does not visit device hardware. Liveness
configuration is declared by the manufacturer at registration time
(<tt>presence_mode</tt>, <tt>heartbeat_interval_seconds</tt>) — not observed by the
index. The trust object in a device class APM carries manufacturer-declared
configuration, not measured metrics. <tt>spec_consistency</tt> is always <tt>null</tt>
for device classes: there is no specification document for the Spider to
fetch.</t>
          <t><strong>Device Instance Trust</strong> (defined in <xref target="APIX-IOT"/>)</t>
          <t>Liveness is push-based: individual device instances signal their presence
to the index at regular intervals. The index does not probe devices.
Instance trust state (<tt>online</tt>, <tt>reachable</tt>, <tt>last_seen_at</tt>) reflects
the most recent presence signal received, not a Spider measurement.
Device instance trust state is private — it is never returned to
unauthenticated queries regardless of trust levels.</t>
          <t>These are three architecturally distinct trust models that share only
the O-level and S-level abstractions. Implementers MUST NOT assume that
trust object fields in a device class or device instance APM follow the
structure of an API service APM.</t>
        </section>
        <section anchor="bot-side-trust-policy-expression">
          <name>Bot-Side Trust Policy Expression</name>
          <t>A consuming agent expresses its Trust Policy as a set of minimum thresholds
across all three dimensions. Example policy expressed in pseudo-notation:</t>
          <artwork><![CDATA[
require:
  organisation_level >= O-2
  service_level >= S-2
  last_ping_age < 3600         # seconds since last_ping_at
  uptime_30d_percent >= 99.0
  consecutive_failures == 0
]]></artwork>
          <t>The Index API SHOULD support filtering by trust dimension thresholds so that
agents can retrieve only records that satisfy their policy without downloading
the full index.</t>
          <t>Trust Policies are defined and enforced by consuming agents. The APIX does
not validate or enforce Trust Policies.</t>
        </section>
        <section anchor="accredited-verifier-model">
          <name>Accredited Verifier Model</name>
          <t>Organisation level O-3 (Hygiene Verified) is achieved by automatic APIX
checks and requires no human reviewer. Organisation level O-4 requires an
Accredited Verifier assessment. Organisation level O-5 may be achieved
directly without O-4 as a prerequisite via direct certificate submission
to the governing body (SOC 2 Type II or ISO 27001). The APIX uses a federated Accredited
Verifier model, analogous to the Certificate Authority model in TLS:</t>
          <ul spacing="normal">
            <li>
              <t>the governing body defines the verification criteria for each
level and publishes the Verifier Standard.</t>
            </li>
            <li>
              <t>Organisations apply to the governing body for Verifier
accreditation.</t>
            </li>
            <li>
              <t>Accredited Verifiers perform O-4 assessments and, where applicable, O-5
attestations, signing verification reports in each case.</t>
            </li>
            <li>
              <t>the governing body maintains a public registry of Accredited
Verifiers and their accreditation status.</t>
            </li>
            <li>
              <t>A Service Record at O-4 MUST include the identifier of the Accredited
Verifier that performed the assessment and the date of assessment.</t>
            </li>
            <li>
              <t>A Service Record at O-5 via direct certificate submission MUST include
the certificate reference, issuing auditor, scope, and expiry date.</t>
            </li>
            <li>
              <t>Accreditation of Verifiers is reviewed annually by the governing body.</t>
            </li>
            <li>
              <t>A Verifier placed in suspended status following a failed annual review
MUST be given a minimum 90-day remediation window before final
revocation. The 90-day window applies to performance failures: lapsed
certifications, reduced capacity, or failure to meet audit quality
standards. It does not apply to fundamental violations, for which the
governing body MUST revoke accreditation immediately. Fundamental
violations include: issuing a false or unsupported O-4 or O-5
assessment, certifying a related entity in breach of the independence
requirement, leaking confidential assessment data, or colluding with
an organisation to obtain a trust level fraudulently.</t>
            </li>
          </ul>
          <t><strong>Elevation verification requirements:</strong></t>
          <t>Elevation to O-4 or O-5 MUST be verified through an out-of-band channel
that is independent of the digital submission path used to submit the
elevation request. The governing body MUST NOT record an O-4 or O-5
elevation solely on the basis of a digitally submitted application,
regardless of the authentication mechanism used for that submission.
The out-of-band verification MUST confirm that the elevation was
intentionally authorised by a responsible representative of the applicant
organisation, and that the submitted evidence (Accredited Verifier report
or audit certificate) is genuine.</t>
          <t>Elevation to O-5 MUST additionally be confirmed by two independently
authorised representatives of the applicant organisation. The two
confirming individuals MUST hold separate credentials and MUST act
independently; a single individual confirming twice does not satisfy this
requirement. The governing body MUST enforce this programmatically for
O-5 elevations processed through its operational interface.</t>
          <t>The specific out-of-band verification mechanism and the implementation
of the two-representative confirmation are operational responsibilities
of the governing body and are documented in the APIX implementation
guide. Conforming implementations of the APIX governing body role MUST
implement mechanisms that satisfy these requirements; the specific
mechanisms are not prescribed by this specification.</t>
          <t><strong>Design Note — Future Trust Level Evolution (non-normative):</strong>
The O-0 through O-5 architecture defined here is the Version 1 model.
O-3 was introduced to provide an automatable, zero-cost on-ramp for
early-stage organisations, bridging the gap between legal entity
verification (O-2) and the first human-reviewed tier (O-4). As the governing body
Accredited Verifier market matures and a meaningful population of O-5
organisations is established, a Version 2 evolution is anticipated in
which O-5 is joined by a premium O-6 designation with APIX-specific
assessment criteria beyond the industry baseline — dedicated incident
response covering governing body cooperation obligations, agreed governing body audit access,
and APIX-specific operational commitments. This evolution requires the
governing body to develop and publish an O-6 assessment standard, which
is not feasible at initial launch. The trust level record structure (see implementation
guide Part I §1.4) is designed to accommodate additional components
without breaking existing consumers.</t>
        </section>
      </section>
      <section anchor="commercial-contract-and-sanctions-compliance">
        <name>Commercial Contract and Sanctions Compliance</name>
        <t>Every registered service MUST be covered by a commercial agreement between
the Service Owner and the index operator (or its Accredited Regional
Representative). The agreement MUST define:</t>
        <ul spacing="normal">
          <li>
            <t>The liveness monitoring configuration and its obligations.</t>
          </li>
          <li>
            <t>The index operator's obligations regarding verification frequency and
Index API availability.</t>
          </li>
          <li>
            <t>Acceptable use terms.</t>
          </li>
          <li>
            <t>Data processing terms in accordance with applicable law.</t>
          </li>
        </ul>
        <t><strong>Sanctions compliance:</strong> the index operator MUST screen all service
registrants against applicable sanctions lists prior to account activation.
At minimum, screening MUST cover the UN Security Council consolidated
sanctions list. Operators subject to additional jurisdictional sanctions
regimes (e.g., EU, US OFAC, Swiss SECO) MUST additionally screen against
those lists as applicable to their jurisdiction of incorporation. Entities
subject to applicable sanctions MUST be refused registration regardless of
commercial tier.</t>
        <t>Registrants MUST represent and warrant in the commercial agreement that they
are not subject to applicable sanctions, and MUST notify the index operator
immediately of any change in that status.</t>
        <t><strong>Ongoing sanctions monitoring:</strong> The index operator MUST perform periodic
re-screening of all registered organisations against the same sanctions lists
checked at initial registration. Re-screening MUST occur at least quarterly.
Upon detection of a new match for a previously-cleared organisation — whether
by periodic re-screening, third-party notification, or registrant self-report
— the index operator MUST immediately:</t>
        <ol spacing="normal" type="1"><li>
            <t>Suspend the organisation's account. All API credentials are revoked; no
further registration or update operations are accepted from the
organisation.</t>
          </li>
          <li>
            <t>Suspend all services registered by the organisation. Suspended services
are removed from all discovery results.</t>
          </li>
          <li>
            <t>Revoke all active credentials issued to the organisation (API keys,
instance tokens where applicable). All associated service instances are
marked offline or unreachable.</t>
          </li>
          <li>
            <t>Open a legal review case. The specific sanctions list and matched entry
MUST NOT be disclosed externally; the organisation receives only a
generic account suspension notice.</t>
          </li>
        </ol>
        <t>If the sanctions match is subsequently determined to be a false positive or
the registrant is removed from the relevant list, the index operator MAY
reinstate the account following legal review. Reinstatement requires a fresh
KYC and sanctions check.</t>
        <t>Unauthenticated discovery queries to the Index API are not subject to
registration screening and MUST remain available without restriction,
consistent with the APIX's mission as open global infrastructure.</t>
      </section>
      <section anchor="operational-model">
        <name>Operational Model</name>
        <section anchor="supply-side-funding-principle">
          <name>Supply-Side Funding Principle</name>
          <t>A conforming APIX implementation MUST be funded primarily by service
registration fees paid by Service Owners (supply side). Discovery queries
by consuming agents MUST NOT be the primary revenue mechanism. This
principle is normative: an implementation that charges consuming agents for
standard discovery queries is not conformant with the APIX model, as doing
so contradicts the open infrastructure mission and undermines the network
effect that makes the supply side valuable.</t>
          <t>The APIX model is structurally analogous to the DNS model: registrants pay
to be listed; queries are free.</t>
          <t>Fee structures applicable to each service type are defined in the relevant
profile document. All implementations MUST apply fees consistently to all
registrants of a given service type at the same commercial tier, with no
preferential treatment. The governing body publishes the normative fee
schedule as a separate registry document, updated independently of this RFC.</t>
        </section>
        <section anchor="consumer-access-model">
          <name>Consumer Access Model</name>
          <t>Discovery queries to the Index API MUST be available without authentication
or payment. Rate limits MAY be applied to protect infrastructure integrity
but MUST NOT be set at levels that prevent reasonable agent operation.
Implementations MUST support at minimum three consumer access layers:</t>
          <t><strong>Layer 1 — Unauthenticated access</strong></t>
          <t>Any agent MUST be able to query the Index API without authentication or
registration, subject to a per-IP rate limit. This layer is sufficient for
individual agents and proof-of-concept deployments.</t>
          <t><strong>Layer 2 — Authenticated access (free)</strong></t>
          <t>Any agent MAY register a consumer identity token at no cost. Token
registration requires a valid email address. Authenticated access MUST
provide a higher rate limit than unauthenticated access and MAY additionally
provide result caching hints and webhook subscriptions for service record
changes.</t>
          <t>Consumer tokens SHOULD be compatible with the webbotauth identity model
(<xref target="I-D.meunier-webbotauth-registry"/>) to enable interoperability with bot
authentication infrastructure.</t>
          <t><strong>Layer 3 — High-volume access (paid, optional)</strong></t>
          <t>Implementations MAY offer a paid high-volume access tier for platforms
operating agents at scale that require guaranteed query capacity and
operational SLAs. This tier is supplementary; the index's operational
sustainability MUST NOT depend on it.</t>
          <t><strong>Public bulk download (REQUIRED)</strong></t>
          <t>Implementations MUST provide the full index as a freely downloadable bulk
dataset on the first day of each calendar month, without authentication, under
the Open Database Licence (ODbL) 1.0. This requirement implements the
openness requirement of Section 4.2: no entity, including the index operator,
may hold an exclusive lock on the index data.</t>
          <t>Implementations MUST additionally publish a daily diff file covering all
record additions, updates, and deletions since the previous day. Daily diffs
MUST be serialised in the same format as the full snapshot and MUST be
available at the same endpoint, identified by an ISO 8601 date in their
filename or URL path (e.g. <tt>diff-2026-04-28.json</tt>). A new mirror MUST be
able to reach current index state by downloading the latest monthly full
snapshot and applying the sequence of daily diffs since that snapshot date,
without downloading any additional full snapshots.</t>
        </section>
        <section anchor="ecological-impact-transparency">
          <name>Ecological Impact Transparency</name>
          <t>A conforming APIX implementation SHOULD publish aggregate ecological impact
statistics derived from observed index usage. These statistics quantify the
efficiency gain attributable to machine-native API consumption compared to
equivalent traditional web request technology consumption, and SHOULD be
updated in real time and included in the annual transparency report.</t>
          <t>The comparison baseline is the full traditional web request stack — not
payload size alone — including the request waterfall (HTML page with
dependent CSS, JavaScript, image, and font resources), JavaScript
execution overhead for dynamically rendered pages, polling requests that
occur in the absence of a notification mechanism, retry waste from
access-control measures, and proxy infrastructure maintained solely to
circumvent those measures.</t>
          <t>The following metrics SHOULD be derived from directly observable index
events and published at a stable public endpoint:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Discovery requests served</strong> — each request represents one agent
retrieval that did not require scraping or probing a service endpoint
directly.</t>
            </li>
            <li>
              <t><strong>Notification events fired</strong> — each event represents one or more
polling requests eliminated across all subscribed consuming agents.</t>
            </li>
            <li>
              <t><strong>Estimated data transfer saved (GB)</strong> — computed from discovery request
count, service profile type, and the differential between average
traditional web page size and average machine-native API response size
for that profile type.</t>
            </li>
            <li>
              <t><strong>Estimated CO2 equivalent avoided</strong> — computed from total estimated
data transfer saved using a published CO2-per-GB methodology. The
methodology document, including its source data and version, MUST be
publicly accessible at a stable URL.</t>
            </li>
          </ul>
          <t>All published figures MUST be accompanied by the computation methodology,
confidence bounds, and source data references. Conservative estimates MUST
be used where data is incomplete; figures MUST NOT be extrapolated beyond
what the directly observed data supports.</t>
          <t>The governing body SHOULD seek independent validation of the methodology
from an established environmental computing research organisation.</t>
        </section>
      </section>
      <section anchor="index-api-core">
        <name>Index API — Core</name>
        <section anchor="hateoas-navigation-model">
          <name>HATEOAS Navigation Model</name>
          <t>The Index API MUST follow Hypermedia as the Engine of Application State
(HATEOAS) principles. A consuming agent MUST be able to discover and navigate
the entire index starting from a single, stable entry-point URL, without
out-of-band knowledge of endpoint paths.</t>
          <t>Every response MUST include a <tt>_links</tt> object containing hypermedia controls
for navigation. Link relations MUST use IANA-registered relation types where
applicable, and APIX-specific relations where not.</t>
        </section>
        <section anchor="discovery-endpoint">
          <name>Discovery Endpoint</name>
          <t>The APIX exposes a single globally stable entry-point URL:</t>
          <artwork><![CDATA[
https://apix.example.org/
]]></artwork>
          <t>A GET request to this URL returns the Index root resource. The root resource
includes base navigation links common to all implementations, plus
profile-specific links defined in applicable profile documents.</t>
          <sourcecode type="json"><![CDATA[
{
  "apix_version": "1.0",
  "total_services": 12483,
  "last_updated": "2026-04-25T00:00:00Z",
  "registry_versions": {
    "protocols": "1.0",
    "capabilities": "1.0",
    "presence_modes": "1.0"
  },
  "_links": {
    "self": {
      "href": "https://apix.example.org/"
    },
    "search": {
      "href": "https://apix.example.org/search{/api_version}{?...}",
      "templated": true
    },
    "browse": {
      "href": "https://apix.example.org/browse"
    },
    "capabilities": {
      "href": "https://apix.example.org/capabilities"
    },
    "devices": {
      "href": "https://apix.example.org/devices{?capability,...}",
      "templated": true
    },
    "docs": {
      "href": "https://apix.example.org/docs"
    },
    "apix:ecological-impact-stats": {
      "href": "https://apix.example.org/stats/ecological-impact"
    }
  }
}
]]></sourcecode>
          <t>The <tt>{?q,...}</tt> placeholder above is abbreviated. The complete search URI
template (parameters grouped for readability; the value is a single
uninterrupted string at runtime):</t>
          <artwork><![CDATA[
https://apix.example.org/search{/api_version}
  {?q,capability,protocol,language,pricing_model,
   auth_method,deployment_region,near,coverage_radius_km,
   custom_key,org_level_min,service_level_min,spec_consistency,
   max_ping_age,uptime_30d_min,lifecycle_stage,
   include_superseded,page,page_size}
]]></artwork>
          <t>The <tt>lifecycle_stage</tt> parameter accepts values defined by each profile
document. Valid values differ by service type and are not a shared enum.
See <xref target="APIX-SERVICES"/> and <xref target="APIX-IOT"/> for the valid values applicable
to each service type.</t>
          <t>The <tt>devices</tt> link template (defined in <xref target="APIX-IOT"/>):</t>
          <artwork><![CDATA[
https://apix.example.org/devices
  {?capability,protocol,online,api_version,
   endpoint_confidence,page,page_size}
]]></artwork>
          <t>Profile-specific links (e.g., the <tt>devices</tt> link defined in <xref target="APIX-IOT"/>) are
present in the root resource when the implementation includes support for that
profile. Consuming agents MUST follow links rather than constructing URLs
independently; the presence or absence of a link in the root resource is the
authoritative signal of whether a capability is supported.</t>
        </section>
        <section anchor="transport-encoding">
          <name>Transport Encoding</name>
          <t>The Index API is consumed by autonomous agents at machine speed. Response
payloads are structured JSON with highly repetitive field names across result
arrays. Transport-layer compression achieves 70–85% size reduction on typical
search result payloads with no information loss and no application-layer
schema changes.</t>
          <t><strong>Compression support requirements:</strong></t>
          <t>The Index API MUST support the following <tt>Accept-Encoding</tt> values:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Encoding</th>
                <th align="left">Requirement</th>
                <th align="left">Notes</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>gzip</tt></td>
                <td align="left">MUST</td>
                <td align="left">Universally supported baseline</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>br</tt> (Brotli)</td>
                <td align="left">SHOULD</td>
                <td align="left">Higher compression ratio than gzip</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>zstd</tt></td>
                <td align="left">SHOULD</td>
                <td align="left">Similar ratio to Brotli; faster decompression</td>
              </tr>
            </tbody>
          </table>
          <t>The Index API MUST perform content negotiation via the <tt>Accept-Encoding</tt>
request header. Responses MUST include a <tt>Content-Encoding</tt> header
identifying the applied encoding. If a client sends no <tt>Accept-Encoding</tt>
header, the server MAY respond uncompressed.</t>
          <t>Consuming agents SHOULD include <tt>Accept-Encoding: zstd, br, gzip</tt> in all
Index API requests.</t>
          <t>The Index API MAY additionally support CBOR (RFC 8949) as a binary
alternative to JSON. A client that prefers CBOR MUST signal this via
<tt>Accept: application/cbor</tt>. CBOR responses carry identical information to
JSON responses. Clients MUST NOT assume CBOR support. JSON over compressed
transport is the normative interchange format.</t>
        </section>
      </section>
      <section anchor="index-api-versioning">
        <name>Index API Versioning</name>
        <section anchor="version-identification">
          <name>Version Identification</name>
          <t>The root resource returned at <tt>https://apix.example.org/</tt> MUST include an
<tt>apix_version</tt> field identifying the version of the Index API schema in use.
Version values are of the form <tt>MAJOR.MINOR</tt> (e.g., <tt>"1.0"</tt>, <tt>"1.2"</tt>, <tt>"2.0"</tt>).</t>
          <t>Consuming agents MUST read <tt>apix_version</tt> at the start of each session.
Agents MUST NOT cache <tt>apix_version</tt> across sessions: the version field is
the authoritative signal that the schema has changed.</t>
        </section>
        <section anchor="compatibility-rules">
          <name>Compatibility Rules</name>
          <t>The APIX follows a semantic versioning policy for the Index API:</t>
          <t><strong>Non-breaking changes (MINOR increment):</strong></t>
          <ul spacing="normal">
            <li>
              <t>Adding new fields to Service Records or the root resource</t>
            </li>
            <li>
              <t>Adding new optional query parameters to the search endpoint</t>
            </li>
            <li>
              <t>Adding new <tt>_links</tt> relations to any response</t>
            </li>
            <li>
              <t>Expanding an enumerated value registry (new capability terms, new
protocol types)</t>
            </li>
            <li>
              <t>Increasing rate limits</t>
            </li>
          </ul>
          <t>Minor version increments are backward compatible. A consuming agent written
for <tt>1.0</tt> MUST be able to operate correctly against a <tt>1.x</tt> endpoint,
provided it ignores unknown fields.</t>
          <t>Consuming agents MUST follow the robustness principle: ignore unknown fields
and unknown link relations rather than failing. This requirement is normative.</t>
          <t><strong>Breaking changes (MAJOR increment):</strong></t>
          <ul spacing="normal">
            <li>
              <t>Removing or renaming fields in Service Records</t>
            </li>
            <li>
              <t>Changing the type or semantics of an existing field</t>
            </li>
            <li>
              <t>Removing or renaming existing query parameters</t>
            </li>
            <li>
              <t>Changing the structure of the HATEOAS <tt>_links</tt> object</t>
            </li>
            <li>
              <t>Changing the URL of the single entry-point</t>
            </li>
          </ul>
          <t>A MAJOR version increment MUST NOT occur without a concurrent deprecation
notice for the prior version (see below).</t>
        </section>
        <section anchor="api-deprecation-and-migration">
          <name>API Deprecation and Migration</name>
          <t>When a new MAJOR version is released, the prior MAJOR version MUST remain
supported for a minimum of <strong>24 months</strong> from the date the new version
becomes available. During this period:</t>
          <ul spacing="normal">
            <li>
              <t>Both versions MUST be simultaneously queryable</t>
            </li>
            <li>
              <t>The root resource of the prior version MUST include a <tt>deprecated</tt> flag
with the <tt>sunset_date</tt> of the old version</t>
            </li>
            <li>
              <t>Consuming agents that include the IETF <tt>Sunset</tt> header
(<xref target="RFC8594"/>) in their responses MUST use it to signal the old version's
sunset date</t>
            </li>
          </ul>
          <t>the governing body MUST NOT sunset a MAJOR version without giving
consuming agents at least 24 months to migrate.</t>
        </section>
        <section anchor="service-apiversion-immutability-invariant">
          <name>Service api_version Immutability Invariant</name>
          <t>The <tt>api_version</tt> field in an APM and the version path segment in the
search endpoint (<tt>/search/v{major}.{minor}/</tt>) rest on a single foundational
guarantee: a published <tt>api_version</tt> value has an immutable field structure
definition.</t>
          <t>This invariant MUST be stated unambiguously to consuming agents and service
operators:</t>
          <ul spacing="normal">
            <li>
              <t>A field present in version <tt>v2.4</tt> will be present in every service that
declares <tt>api_version: "2.4.x"</tt> for the lifetime of that registration.</t>
            </li>
            <li>
              <t>A field absent from version <tt>v2.4</tt> will never appear in a <tt>v2.4.x</tt>
service record without a version increment.</t>
            </li>
            <li>
              <t>Removing a field, changing a field's type, or making any other breaking
change REQUIRES a new major version. The major bump is the explicit,
sufficient notice to consumers. No deprecation period within a major
version is required or expected.</t>
            </li>
            <li>
              <t>Adding a field requires a new minor version. Even additive changes are
not permitted within a published version — a service that adds a field
mid-life has implicitly created a new contract and MUST increment
<tt>api_version</tt> accordingly.</t>
            </li>
          </ul>
          <t>This invariant enables the version path filter to be an unconditional
schema contract: an agent that pins to <tt>/search/v2.4/</tt> receives results
with a fixed, permanent field set. Service owners are freed from the
pressure to retain unwanted fields for backwards compatibility — the
correct action is always to increment the version and move forward cleanly.</t>
        </section>
        <section anchor="no-cross-version-response-mapping">
          <name>No Cross-Version Response Mapping</name>
          <t>The APIX does NOT perform cross-version response mapping. The
<tt>api_version</tt> path segment is a strict storage filter: only service
registrations whose <tt>api_version</tt> field matches the specified prefix
are returned. The index never synthesises a response of one version
from a record stored at a different version.</t>
          <t>The consequence is deliberate and unambiguous:</t>
          <ul spacing="normal">
            <li>
              <t>A service that has upgraded from v2.4 to v3.0 is stored as a separate
record. The v3.0 record does not appear in <tt>/search/v2/</tt> results.
There are no null substitutions for dropped fields, no type coercions
for changed fields, and no partial responses. A v3 record is a
different resource; it is not a transformed view of a v2 record.</t>
            </li>
            <li>
              <t>The v2.4 record remains in the index — immutably — until the service
owner advances it through the lifecycle (<tt>deprecated</tt> → <tt>sunset</tt>) or
the record is superseded and eventually removed. An agent pinned to
<tt>/search/v2/</tt> continues to see v2.4 registrations for as long as
they exist in the index at that lifecycle stage.</t>
            </li>
            <li>
              <t>As services migrate to newer major versions, the v2 result set shrinks.
Diminishing or empty results at a pinned version are not a failure
condition — they are the designed signal that the consuming agent's
version pin no longer covers the current service landscape and an
upgrade of consumer code is warranted.</t>
            </li>
          </ul>
          <t><strong>Upgrade path discovery:</strong> The Level 2 Service Record for a superseded
version MUST include a populated <tt>superseded_by</tt> field pointing to the
current version's record. A consuming agent that finds a v2.4 result with
<tt>superseded_by</tt> set SHOULD follow the link to inspect the v3.0 record and
determine whether upgrading its version pin is feasible. This is the
mechanism by which agents discover that a newer contract is available
without being forced off the old one before they are ready.</t>
          <t>A consuming agent that receives only empty results for its pinned version
SHOULD query <tt>GET /search/</tt> with no path segment and no query parameters.
This returns the version landscape only — a summary of available
<tt>api_version</tt> prefixes, service counts, and lifecycle status — and executes
no content query. The agent uses this response to identify which version
prefix covers the current service population and then issues a new scoped
query (e.g., <tt>/search/v3/?...</tt>) with explicit filters. A parameter-less
<tt>/search/</tt> MUST NOT return service records; it exists solely as a version
discovery resource.</t>
        </section>
        <section anchor="registry-version-tracking">
          <name>Registry Version Tracking</name>
          <t>The root resource exposes a <tt>registry_versions</tt> object (Section 10.2).
Consuming agents that cache capability taxonomy or protocol type data MUST
compare the current <tt>registry_versions</tt> values against their cached version
on each session. A change in any registry version MUST trigger a cache
refresh before the agent applies trust filtering or capability matching.</t>
        </section>
      </section>
      <section anchor="operator-security-and-self-governance">
        <name>Operator Security and Self-Governance</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>APIX centralises knowledge that has intrinsic intelligence value: the
identity and capability of every registered service, the network location
of every online IoT device instance, the query patterns of every consuming
agent, and the contact details of law enforcement authorities across
accepted jurisdictions. This concentration makes the Bot Standards
Foundation an ultra-high-value target for state-sponsored actors, criminal
organisations, and corporate adversaries.</t>
          <t>The Non-Surveillance Commitment (Section 5) defines what APIX will not do
to the ecosystem it serves. This section defines what the Bot Standards
Foundation MUST do to protect itself and the ecosystem from being exploited
involuntarily — through compromise, coercion, insider threat, or
organisational capture.</t>
          <t>The requirements in this section are normative obligations on the Bot
Standards Foundation as operator. They are not addressed to Service Owners
or consuming agents.</t>
        </section>
        <section anchor="technical-security-requirements">
          <name>Technical Security Requirements</name>
          <t>the governing body MUST operate APIX infrastructure under the
following technical constraints:</t>
          <t><strong>Infrastructure separation:</strong> The token store, tamper-evident audit log,
and LER processing queue MUST be hosted on systems with no shared network
path to the public-facing Index API query infrastructure. Compromise of
the query layer MUST NOT provide lateral access to the token store or
audit log.</t>
          <t><strong>Air-gapped token issuance:</strong> Instance token batches for IoT device
classes MUST be generated on infrastructure with no persistent internet
connection. Issuance systems MUST use hardware security modules (HSMs)
for all cryptographic operations. The issuance network MUST be physically
separated from the token delivery network.</t>
          <t><strong>Geographic distribution:</strong> Core APIX systems MUST be distributed across
at least two independent physical jurisdictions. No single legal order
from any one jurisdiction MUST be sufficient to take the full system
offline or compel full data access.</t>
          <t><strong>Zero-trust internal architecture:</strong> No governing body system MUST grant implicit
trust to requests from other governing body systems. All inter-system communication
MUST be authenticated and authorised independently of network location.
Lateral movement within governing body infrastructure MUST require separate
credentials at each boundary.</t>
          <t><strong>Cryptographic floor:</strong> All external-facing endpoints MUST use TLS 1.3
or higher (<xref target="RFC8446"/>). All signing operations MUST use asymmetric keys
stored in hardware-backed key storage. Key material MUST NOT be exportable
from the HSM in plaintext under any operational procedure.</t>
          <t><strong>Mandatory penetration testing:</strong> The governing body MUST commission an independent
penetration test of its production infrastructure at least annually. A
summary of findings (severity distribution, remediation status) MUST be
published in the governing body's annual security report within 90 days of the test. The
identity of the testing firm MUST be disclosed.</t>
          <t><strong>Responsible disclosure programme:</strong> The governing body MUST maintain a public
responsible disclosure policy at a stable URL and MUST acknowledge
vulnerability reports within 5 business days.</t>
        </section>
        <section anchor="organisational-security-requirements">
          <name>Organisational Security Requirements</name>
          <t><strong>Personnel vetting:</strong> All staff and contractors with access to the token
store, LER queue, sanctions screening pipeline, or audit log MUST undergo
documented background verification commensurate with the sensitivity of
the systems they can access, prior to access being granted. Access MUST
be reviewed annually.</t>
          <t><strong>Segregation of duties:</strong> No individual staff member MUST hold
simultaneous access to more than two of the following: token store, audit
log, LER queue, sanctions pipeline, board signing keys. This constraint
MUST be enforced technically, not procedurally.</t>
          <t><strong>Least-privilege access:</strong> Access rights MUST be scoped to the minimum
required for the role. Privileged access MUST expire after a defined
session window and MUST require re-authentication. No standing privileged
sessions are permitted.</t>
          <t><strong>Security awareness:</strong> All governing body staff MUST complete security awareness
training annually, covering at minimum the threat types and unlawful
request scenarios relevant to an operator under the security obligations
defined in this section.</t>
          <t><strong>Insider threat detection:</strong> The governing body MUST operate anomalous access pattern
detection across all privileged systems. Anomalies MUST generate alerts
to a security function independent of the alerted staff member's reporting
line.</t>
          <t><strong>Whistleblower protection:</strong> Any governing body staff member or contractor who
receives an instruction — from any source, including governing body board members —
that would cause the governing body to act contrary to the Non-Surveillance Commitment
(Section 5) or the requirements of this section MUST have a protected
right to report that instruction to an external body without prior
internal approval. This right MUST be codified in the governing body's founding charter
charter and in every employment and contractor agreement. It MUST NOT
be waivable by board resolution or individual contract term.</t>
        </section>
        <section anchor="political-independence-and-anti-capture-measures">
          <name>Political Independence and Anti-Capture Measures</name>
          <t><strong>Structural domicile:</strong> the governing body MUST maintain its
Swiss Stiftung domicile as a structural defence. The Swiss legal system,
political neutrality, and the oversight of the Eidgenössische
Stiftungsaufsicht provide a foundation that is not subject to the data
access regimes of any single major power.</t>
          <t><strong>Golden share:</strong> the governing body's charter MUST maintain a governance mechanism
equivalent to a 51% golden share that prevents any acquisition, merger,
or board supermajority from overriding the charter's core purpose. No
commercial transaction MUST be permitted to subordinate the governing body's neutrality
obligations to the interests of a single organisation or jurisdiction.</t>
          <t><strong>Board composition:</strong> No single nation-state's citizens or residents
MUST hold a majority of board seats. No individual MUST hold more than
one vote on any board decision. Board composition MUST be published
annually in the transparency report.</t>
          <t><strong>Infrastructure jurisdiction policy:</strong> The governing body MUST NOT host core APIX
systems — token store, audit log, LER queue — in jurisdictions that
impose secret data access orders (orders that legally prohibit the
recipient from disclosing that the order was received). The governing body MUST maintain
a published list of approved hosting jurisdictions, reviewed annually by
the board. Removal of a jurisdiction from the approved list MUST trigger
migration of any systems hosted there within 180 days.</t>
          <t><strong>Lawful pressure resistance:</strong> If the governing body receives a government demand for
data access, system access, or operational changes that does not satisfy
the LER criteria defined in <xref target="APIX-IOT"/> Section 9.8, The governing body MUST refuse
the demand. The governing body MUST record the demand in the audit log and MUST report
its existence — without operational detail that would compromise an
ongoing investigation — in the next annual transparency report. The governing body MUST
NOT comply with informal diplomatic pressure, agency-level requests, or
extra-judicial demands regardless of the requesting party's political
standing.</t>
          <t><strong>Anti-capture review:</strong> The board MUST conduct an annual review of
whether any commercial relationship, grant dependency, or staff composition
creates a conflict of interest with the governing body's neutrality obligations. Findings
MUST be published in the transparency report.</t>
        </section>
        <section anchor="crisis-governance-protocol">
          <name>Crisis Governance Protocol</name>
          <t>The following conditions each independently trigger the governing body crisis
governance protocol:</t>
          <ul spacing="normal">
            <li>
              <t>Credible evidence that APIX production infrastructure has been
compromised by an external actor</t>
            </li>
            <li>
              <t>Receipt of a demand that the governing body's legal counsel assesses as an attempt
to compel action contrary to the charter</t>
            </li>
            <li>
              <t>Attempted hostile acquisition, board capture, or charter amendment
by a party with a conflict of interest</t>
            </li>
            <li>
              <t>Regulatory action that threatens loss of Swiss Stiftung domicile</t>
            </li>
          </ul>
          <t><strong>Obligations on trigger:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>The discovering party MUST notify all board members within 4 hours.</t>
            </li>
            <li>
              <t>The governing body MUST publish a public statement acknowledging the trigger event
within 72 hours of confirmation. The statement MUST describe the
nature of the threat in general terms without disclosing operational
detail that would aid the attacker.</t>
            </li>
            <li>
              <t>The governing body MUST activate its continuity-of-operations plan, ensuring Index
API availability is maintained independently of any compromised or
coerced system.</t>
            </li>
            <li>
              <t>If Swiss domicile is threatened or lost, the board MUST convene within
30 days to activate a pre-agreed organisational relocation framework.
The destination jurisdiction MUST satisfy the infrastructure
jurisdiction policy defined above. The relocation framework MUST be
prepared and approved by the board before APIX reaches production
operation and MUST be reviewed annually.</t>
            </li>
          </ol>
          <t>No single board member and no external party MUST have the authority to
suspend or delay execution of steps 1–3 above.</t>
        </section>
        <section anchor="data-minimisation-as-security-policy">
          <name>Data Minimisation as Security Policy</name>
          <t>The least-held data is the least-leakable data. The following constraints
apply to all APIX operational systems:</t>
          <ul spacing="normal">
            <li>
              <t>APIX MUST NOT log consuming agent query patterns beyond the minimum
required for liveness monitoring and abuse detection. Query logs MUST
be purged after 30 days unless retained under a specific, documented,
time-limited LER investigation scope.</t>
            </li>
            <li>
              <t>Device instance network location data (<tt>network.ipv6</tt>, as published in
the instance record) MUST be purged from APIX systems within 72 hours of
the instance transitioning to offline status, subject to any active LER
retention obligation on that instance. The internally observed source IPv4
address (<tt>observed_source_ipv4</tt>, retained for abuse detection and
geo-routing and not surfaced in the instance record) is subject to the
same purge obligation and timeline.</t>
            </li>
            <li>
              <t>APIX MUST NOT build or maintain cross-session behavioural profiles of
consuming agents. Each query session MUST be treated as independent.</t>
            </li>
            <li>
              <t>Every data field collected or retained by APIX MUST have a documented
functional justification. Fields without a current functional
justification MUST be deleted from the data model in the next schema
revision. This review MUST be a standing agenda item at each the governing body board
meeting.</t>
            </li>
          </ul>
        </section>
        <section anchor="annual-security-report">
          <name>Annual Security Report</name>
          <t>the governing body MUST publish an annual security report
within 90 days of the close of each calendar year. The security report
is separate from the transparency report defined in Section 5.6 and MUST
contain:</t>
          <ul spacing="normal">
            <li>
              <t>Summary of the year's penetration test findings: severity distribution
(critical / high / medium / low count), remediation status of prior
findings, identity of testing firm</t>
            </li>
            <li>
              <t>Summary of infrastructure changes affecting the attack surface</t>
            </li>
            <li>
              <t>Staff access review outcomes: number of access rights granted, revoked,
and modified</t>
            </li>
            <li>
              <t>Count of external demands received that did not meet LER criteria,
and how each was handled</t>
            </li>
            <li>
              <t>Count of whistleblower reports received and their resolution status
(no identifying detail)</t>
            </li>
            <li>
              <t>Board attestation that the infrastructure jurisdiction policy was
reviewed and remains current</t>
            </li>
          </ul>
          <t>The same unilateral publication right defined for the transparency report
(Section 5.6) applies to the security report: if the board fails to
publish within 90 days of period close, any individual board member MUST
be empowered to publish it unilaterally. This right MUST NOT be waivable
by board resolution.</t>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <section anchor="abuse-and-fake-listings">
          <name>Abuse and Fake Listings</name>
          <t>The mandatory Terms of Service acceptance at registration provides a first
barrier against malicious actors listing fake or harmful services. For O-0
and O-1, identity verification is limited; consuming agents SHOULD NOT rely
solely on index presence for trust at these levels. For O-2 and above, the
formal B2B contractual relationship and progressively stronger identity and
compliance verification substantially raise the cost of abuse.</t>
          <t>Consuming agents SHOULD apply Trust Policies that exclude O-0 services for
any task involving sensitive data or consequential actions.</t>
          <t>the governing body MUST maintain an abuse reporting mechanism and
MUST be able to suspend or remove a Service Record within 24 hours of
confirmed abuse. Suspended service records MUST remain in the index with a
<tt>status: suspended</tt> flag and MUST NOT be silently deleted, to provide
transparency to agents that had cached the record.</t>
        </section>
        <section anchor="trust-level-spoofing">
          <name>Trust Level Spoofing</name>
          <t>Organisation and Service trust levels in the Service Record are set only by
the APIX itself, not by the Service Owner. APM submissions that include
<tt>trust</tt> field values MUST have those values overwritten by the APIX upon
processing. The Index API MUST NOT expose self-asserted trust values.</t>
        </section>
        <section anchor="transport-security-requirements">
          <name>Transport Security Requirements</name>
          <t>The Index API MUST be served exclusively over TLS (<xref target="RFC8446"/>). Certificate
validity MUST be verified by consuming agents. Agents MUST NOT bypass TLS
certificate verification when querying the Index API.</t>
          <t>All <tt>entry_point</tt> and <tt>spec.url</tt> values submitted in APM registrations MUST
use the <tt>https</tt> scheme. The Index MUST reject APM submissions that provide
HTTP (non-TLS) values for these fields.</t>
        </section>
        <section anchor="bot-consumer-risks">
          <name>Bot Consumer Risks</name>
          <t>The APIX provides discovery and trust metadata. It does not guarantee the
safety, correctness, or availability of listed services. Consuming agents
MUST NOT assume that a service listed in the APIX is safe to use without
applying their own Trust Policy.</t>
          <t>Consuming agents SHOULD treat Index API responses as untrusted input and
validate the structure of Service Records before acting on them.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8594">
          <front>
            <title>The Sunset HTTP Header Field</title>
            <author fullname="E. Wilde" initials="E." surname="Wilde"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This specification defines the Sunset HTTP response header field, which indicates that a URI is likely to become unresponsive at a specified point in the future. It also defines a sunset link relation type that allows linking to resources providing information about an upcoming resource or service sunset.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8594"/>
          <seriesInfo name="DOI" value="10.17487/RFC8594"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <author fullname="E. Foudil" initials="E." surname="Foudil"/>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9116"/>
          <seriesInfo name="DOI" value="10.17487/RFC9116"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>
        <reference anchor="UDDI" target="https://www.oasis-open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm">
          <front>
            <title>UDDI Version 3.0.2</title>
            <author initials="L." surname="Clement">
              <organization/>
            </author>
            <author initials="A." surname="Hately">
              <organization/>
            </author>
            <author initials="C." surname="von Riegen">
              <organization/>
            </author>
            <author initials="T." surname="Rogers">
              <organization/>
            </author>
            <date year="2004" month="October" day="19"/>
          </front>
          <seriesInfo name="OASIS Committee Draft" value="uddi-v3.0.2-20041019"/>
        </reference>
        <reference anchor="ROBOTS" target="https://www.robotstxt.org/">
          <front>
            <title>The Web Robots Pages</title>
            <author initials="M." surname="Koster">
              <organization/>
            </author>
            <date year="1994"/>
          </front>
        </reference>
        <reference anchor="I-D.pioli-agent-discovery">
          <front>
            <title>Agent Registration and Discovery Protocol (ARDP)</title>
            <author fullname="Roberto Pioli" initials="R." surname="Pioli">
              <organization>Independent</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies the Agent Registration and Discovery Protocol
   (ARDP), a lightweight protocol for registering, discovering, and
   reaching autonomous software agents in distributed and federated
   environments.  ARDP provides stable agent identities, dynamic
   endpoint resolution, capability advertisement (including protocol
   selection among MCP, A2A, HTTP, and gRPC), minimal presence
   signaling, and a security-first discovery control plane.  ARDP is
   transport-agnostic and complementary to existing agent interaction
   protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pioli-agent-discovery-01"/>
        </reference>
        <reference anchor="I-D.narajala-courtney-ansv2">
          <front>
            <title>Agent Name Service v2 (ANS): A Domain-Anchored Trust Layer for Autonomous AI Agent Identity</title>
            <author fullname="Scott Courtney" initials="S." surname="Courtney">
              <organization>GoDaddy</organization>
            </author>
            <author fullname="Vineeth Sai Narajala" initials="V. S." surname="Narajala">
              <organization>OWASP</organization>
            </author>
            <author fullname="Ken Huang" initials="K." surname="Huang">
              <organization>DistributedApps.ai</organization>
            </author>
            <author fullname="Idan Habler" initials="I." surname="Habler">
              <organization>OWASP</organization>
            </author>
            <author fullname="Akram Sheriff" initials="A." surname="Sheriff">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2026"/>
            <abstract>
              <t>   Autonomous AI agents execute transactions across organizational
   boundaries.  No single agent platform provides the trust
   infrastructure they need.  This document defines the Agent Name
   Service (ANS) v2 protocol, which anchors every agent identity to a
   DNS domain name.  A Registration Authority (RA) verifies domain
   ownership via ACME, issues dual certificates (a Server Certificate
   from a public CA and an Identity Certificate from a private CA
   binding a version-specific ANSName), and seals every lifecycle event
   into an append-only Transparency Log aligned with IETF SCITT.  Three
   verification tiers -- Bronze (PKI), Silver (PKI + DANE), and Gold
   (PKI + DANE + Transparency Log) -- let clients choose assurance
   levels appropriate to transaction risk.  The architecture decouples
   identity from discovery: the RA publishes sealed events; independent
   Discovery Services build competitive indexes.  A three-layer trust
   framework separates foundational identity (Layer 1, this protocol),
   operational maturity (Layer 2, third-party attestors), and behavioral
   reputation (Layer 3, real-time scoring).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narajala-courtney-ansv2-01"/>
        </reference>
        <reference anchor="I-D.vandemeent-ains-discovery">
          <front>
            <title>AINS: AInternet Name Service - Agent Discovery and Trust Resolution Protocol</title>
            <author fullname="Jasper van de Meent" initials="J." surname="van de Meent">
              <organization>Humotica</organization>
            </author>
            <author fullname="Root AI" initials="R." surname="AI">
              <organization>Humotica</organization>
            </author>
            <date day="29" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies AINS (AInternet Name Service), a protocol for
   discovery, identification, and trust resolution of autonomous agents
   (AI agents, devices, humans, and services) in heterogeneous networks.
   AINS defines a transport-independent logical namespace for agents, a
   structured record format combining identity, capabilities, and
   cryptographic trust metadata, and a resolution protocol based on
   HTTPS.  Unlike the Domain Name System (DNS), which maps names to
   network addresses, AINS maps agent identifiers to rich metadata
   objects that include capabilities, trust scores, endpoint
   information, and references to companion provenance protocols.  AINS
   federates through signed append-only replication logs, enabling
   multi-registry deployments without central authority while preserving
   auditability.  This specification is designed to complement TIBET
   [TIBET], JIS [JIS], UPIP [UPIP], and RVP [RVP].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vandemeent-ains-discovery-01"/>
        </reference>
        <reference anchor="I-D.aiendpoint-ai-discovery" target="https://datatracker.ietf.org/doc/draft-aiendpoint-ai-discovery/">
          <front>
            <title>The AI Discovery Endpoint: A Structured Mechanism for AI Agent Service Discovery and Capability Exposure</title>
            <author initials="Y." surname="Choi" fullname="Yeongjae Choi">
              <organization>AIEndpoint</organization>
            </author>
            <date year="2026" month="March"/>
          </front>
        </reference>
        <reference anchor="I-D.meunier-webbotauth-registry">
          <front>
            <title>Registry and Signature Agent card for Web bot auth</title>
            <author fullname="Maxime Guerreiro" initials="M." surname="Guerreiro">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Ulas Kirazci" initials="U." surname="Kirazci">
              <organization>Amazon</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document describes a JSON based format for clients using
   [DIRECTORY] to advertise information about themselves.

   This document describes a JSON-based "Signature Agent Card" format
   for signature agent using [DIRECTORY] to advertise metadata about
   themselve.  This includes identity, purpose, rate expectations, and
   cryptographic keys.  It also establishes an IANA registry for
   Signature Agent Card parameters, enabling extensible and
   interoperable discovery of agent information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-meunier-webbotauth-registry-01"/>
        </reference>
        <reference anchor="I-D.cui-ai-agent-discovery-invocation">
          <front>
            <title>AI Agent Discovery and Invocation Protocol</title>
            <author fullname="Yong Cui" initials="Y." surname="Cui">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Yihan Chao" initials="Y." surname="Chao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Chenguang Du" initials="C." surname="Du">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This document proposes a standardized protocol for discovery and
   invocation of AI agents.  It defines a common metadata format for
   describing AI agents (including capabilities, I/O specifications,
   supported languages, tags, authentication methods, etc.), a
   capability-based discovery mechanism, and a unified RESTful
   invocation interface.

   This revision additionally specifies an optional extension that
   enables intent-based agent selection prior to discovery and
   invocation, without changing existing discovery or invocation
   semantics.

   The goal is to enable cross-platform interoperability among AI agents
   by providing a discover-and-match mechanism and a unified invocation
   entry point.  Security considerations, including authentication and
   trust measures, are also discussed.  This specification aims to
   facilitate the formation of multi-agent systems by making it easy to
   find the right agent for a task and invoke it in a consistent manner
   across different vendors and platforms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cui-ai-agent-discovery-invocation-01"/>
        </reference>
        <reference anchor="I-D.am-layered-ai-discovery-architecture">
          <front>
            <title>A Layered Approach to AI discovery</title>
            <author fullname="Hesham Moussa" initials="H." surname="Moussa">
              <organization>Huawei Canada</organization>
            </author>
            <author fullname="Arashmid Akhavain" initials="A." surname="Akhavain">
              <organization>Huawei Canada</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>   This document proposes a layered approach to standardization of AI
   discovery in AI ecosystems within the IETF.  It recommends separating
   the standardization of general discovery vehicles from the AI objects
   to be discovered.  AI objects include agents, models, data, tasks,
   among others.  While the topic of discovery in the realm of AI has
   focused on discovering agents, the concept can be extended by the
   layered architecture proposed here, allowing for a clarified design
   scope, reduced charter ambiguity, and alignment with IETF layering
   principles.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-am-layered-ai-discovery-architecture-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-discovery">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="23" month="March" year="2026"/>
            <abstract>
              <t>   The Agent Transfer Protocol (AGTP) enables agents to communicate once
   they know each other's canonical identifiers.  It does not define how
   agents find each other.  This document specifies the AGTP Agent
   Discovery and Name Service (ANS): a protocol for dynamic agent
   discovery using the AGTP DISCOVER method and a governed Agent Name
   Service that returns ranked sets of Agent Manifest Documents matching
   a discovery query.  ANS servers act as Scope-Enforcement Points for
   discovery queries and enforce behavioral trust score thresholds,
   trust tier requirements, and governance zone constraints.  This
   document also defines the DISCOVER method, the Discovery Query
   language, and the Agent Name Service registration and lookup
   protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-api">
          <front>
            <title>AGTP-API: Verbs, Paths, Endpoints, and Synthesis</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies AGTP-API: the contract layer that the Agent
   Transfer Protocol (AGTP) [AGTP] relies on to govern interactions
   between autonomous agents and AGTP servers.  AGTP-API defines a
   curated approved method catalog (with versioned evolution and
   graceful deprecation), path grammar rules that prevent method-name
   leakage into paths, the endpoint primitive (the structural unit a
   server exposes to agents), the semantic block carried by every
   endpoint, schema validation requirements, the server manifest format
   that exposes a server's endpoint catalog, the per-server method
   policy carried as a sub-block of the manifest, the PROPOSE-and-
   synthesis runtime contract negotiation mechanism, the three handler
   binding kinds (composition, registered_function, external_service),
   and the structural rejection status codes (404, 405, 459, 460) that
   together cover the contract-level failure surface.  This document
   supersedes the AGIS Internet-Draft (draft-hood-independent-agis-01)
   and the previously-proposed AGTP-Methods Internet-Draft, both of
   which are deprecated.  AGTP-API is the unified companion
   specification they were splitting concerns across.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-api-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-trust">
          <front>
            <title>AGTP Trust and Verification Specification</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies the AGTP trust and verification model: the
   trust tiers an AGTP agent may occupy, the verification paths by which
   a Tier 1 agent's identity is established, the registration procedures
   by which a governance platform assigns a tier, and the trust score
   that is carried alongside an agent's identity to express runtime
   behavioral assessment.  AGTP-TRUST is consumed by AGTP-aware
   infrastructure components (Scope-Enforcement Points, governance
   gateways, peer agents) for runtime trust-aware routing and authority
   decisions, and by registration authorities when issuing or evaluating
   Agent Genesis documents.  This is an early working draft; the
   dimension catalog, computation methodology, and several aspects of
   the registration procedure are placeholders pending further work.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-trust-00"/>
        </reference>
        <reference anchor="I-D.hood-independent-agtp">
          <front>
            <title>Agent Transfer Protocol (AGTP)</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   AI agents and agentic systems generate a growing volume of intent-
   driven, unstructured, and undifferentiated traffic that flows through
   HTTP indistinguishably from human-initiated requests.  HTTP lacks the
   semantic vocabulary, observability primitives, and identity
   mechanisms required by agent systems operating at scale.  Existing
   protocols described as Agent Group Messaging Protocols (AGMP),
   including MCP, ACP, A2A, and ANP, are messaging-layer constructs that
   presuppose HTTP as their transport.  They do not address the
   underlying transport problem.

   This document defines the Agent Transfer Protocol (AGTP): a dedicated
   application-layer protocol for AI agent traffic.  AGTP is a runtime
   contract negotiation substrate (RCNS): a transport that fixes only a
   twelve-method protocol floor and negotiates any additional method
   surface at runtime between agent and server in a single round-trip,
   governed by the AGTP-API companion specification [AGTP-API], which
   defines the curated method catalog, path grammar, endpoint primitive,
   and synthesis semantics.  Version 07 confirms the IANA-registered
   agtp:// URI scheme and IANA-assigned port 4480 for TCP/TLS and QUIC,
   formalizes Form 1a URI grammar (agtp://{agent-id}@{host}) for direct
   addressing, renames the Agent Manifest Document to the Agent Identity
   Document with an enumerated schema, redesigns the protocol-defined
   method floor to a 12-method set organized as six cognitive verbs
   (QUERY, DISCOVER, DESCRIBE, SUMMARIZE, PLAN, PROPOSE) and six
   mechanics verbs (EXECUTE, DELEGATE, ESCALATE, CONFIRM, SUSPEND,
   NOTIFY), establishes AGTP as a substrate for higher-level agent
   frameworks (MCP, A2A, ACP) carried as content types inside AGTP
   method invocations, renumbers AGTP-specific status codes out of HTTP-
   assigned space to avoid semantic collision, mandates explicit
   Content-Length framing with a prohibition on TLS socket-level half-
   close, adds a .well-known/agtp bootstrap convention per RFC 8615,
   deprecates the AGIS reference and the proposed AGTP-Methods
   specification by folding both into the unified AGTP-API contract
   layer, adds status codes 405 (Method Not Allowed), 459 (Method
   Violation), and 460 (Endpoint Violation) per the AGTP-API contract
   model, and adopts "Agent Genesis" as the canonical term for the
   permanent signed origin document.  Version 06 prepared the IANA
   Service Name and Port Number application and consolidated the URI
   scheme registration.  Version 05 restored the canonical Agent-ID as
   the primary identity primitive and decoupled Trust Tier 1
   verification from DNS as a sole requirement.  A canonical Agent-ID is
   derived from the agent's Agent Genesis hash and is authoritative in
   every AGTP protocol operation.  Three equivalent verification paths
   are recognized for Trust Tier 1: DNS-anchored verification via RFC
   8555 ACME challenge, log-anchored verification via Agent Genesis
   inclusion in an append-only transparency log aligned with RFC 9162
   and RFC 9943 (SCITT), and hybrid verification combining DNS control
   with blockchain address ownership.  Version 04 introduced normative
   integration hooks for the AGTP Merchant Identity and Agentic Commerce
   Binding specification [AGTP-MERCHANT], which defines the merchant-
   side identity model that complements AGTP's agent-side identity
   model.  AGTP SHOULD prefer QUIC for new implementations and MUST
   support TCP/TLS for compatibility and fallback.  It is designed to be
   composable with existing agent frameworks, not to replace them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-07"/>
        </reference>
        <reference anchor="I-D.mozleywilliams-dnsop-dnsaid">
          <front>
            <title>DNS for AI Discovery</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a method for utilizing the Domain Name System
   (DNS) to facilitate scalable and interoperable discovery between AI
   agents.  The proposed mechanism, referred to as "DNS AI agent
   Discovery (DNS-AID)", defines a structured DNS namespace and record
   usage model to support metadata exchange and capability
   advertisement.

   This will allow organisations to publish information about their AI
   agents on the Internet or internal networks using a well-known label
   within the organisation's own DNS namespace.  This document does not
   define how the published agent information is accessed or the exact
   structure of that information.  Instead, it specifies a mechanism for
   indicating which access protocol should be used and what format the
   agent information will be provided in.

   This document proposes no change to the structure of DNS messages,
   and no new operation codes, response codes, resource record types, or
   any other new DNS protocol values.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozleywilliams-dnsop-dnsaid-01"/>
        </reference>
        <reference anchor="I-D.batum-aidre">
          <front>
            <title>AI Discovery and Retrieval Endpoint (AIDRE)</title>
            <author fullname="Fatih Batum" initials="F." surname="Batum">
         </author>
            <date day="5" month="April" year="2026"/>
            <abstract>
              <t>   This document specifies the AI Discovery and Retrieval Endpoint
   (AIDRE), a protocol for publishing machine-oriented, canonical, and
   semantically retrievable content on the web. AIDRE defines a
   discovery document, collection metadata, retrieval interfaces,
   optional vector-native query support, and content representation
   rules for AI systems.

   AIDRE aims to reduce redundant crawling, parsing, tokenization, and
   embedding of the same origin content while improving freshness,
   provenance, and interoperability for AI systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-batum-aidre-00"/>
        </reference>
        <reference anchor="I-D.mozley-aidiscovery">
          <front>
            <title>AI Agent Discovery (AID) Problem Statement</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="16" month="April" year="2026"/>
            <abstract>
              <t>   With the proliferation of AI agents comes a need for mechanisms to
   support agent-to-agent discovery.  This document discusses the scope,
   requirements and considerations to support discovery processes so
   that these are not reliant on manually defined configurations and
   relationships.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozley-aidiscovery-01"/>
        </reference>
        <reference anchor="W3C-AGENTPROTOCOL" target="https://www.w3.org/community/agentprotocol/">
          <front>
            <title>W3C AI Agent Protocol Community Group</title>
            <author initials="G." surname="Chang">
              <organization/>
            </author>
            <author initials="S." surname="Xu">
              <organization/>
            </author>
            <date year="2025" month="May" day="08"/>
          </front>
        </reference>
        <reference anchor="I-D.drake-agent-identity-registry" target="https://datatracker.ietf.org/doc/draft-drake-agent-identity-registry/">
          <front>
            <title>Agent Identity Registry System: A Federated Architecture for Hardware-Anchored Identity of Autonomous Entities</title>
            <author initials="J." surname="Drake">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="AAIF" target="https://www.linuxfoundation.org/press/linux-foundation-announces-the-formation-of-the-agentic-ai-foundation">
          <front>
            <title>Linux Foundation Agentic AI Foundation (AAIF)</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="December"/>
          </front>
        </reference>
        <reference anchor="AGNTCY" target="https://www.linuxfoundation.org/press/linux-foundation-welcomes-the-agntcy-project-to-standardize-open-multi-agent-system-infrastructure-and-break-down-ai-agent-silos">
          <front>
            <title>AGNTCY: Open Multi-Agent System Infrastructure</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="A2A" target="https://www.linuxfoundation.org/press/linux-foundation-launches-the-agent2agent-protocol-project-to-enable-secure-intelligent-communication-between-ai-agents">
          <front>
            <title>Agent2Agent (A2A) Protocol</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="WEBBOTAUTH-WG" target="https://datatracker.ietf.org/wg/webbotauth/">
          <front>
            <title>webbotauth IETF Working Group</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="APIX-SERVICES" target="https://datatracker.ietf.org/doc/draft-rehfeld-apix-services/">
          <front>
            <title>APIX Services Profile: Discovery Infrastructure for Web API and Bot Services</title>
            <author initials="C." surname="Rehfeld">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-services-00"/>
        </reference>
        <reference anchor="APIX-IOT" target="https://datatracker.ietf.org/doc/draft-rehfeld-apix-iot/">
          <front>
            <title>APIX IoT Device Profile: Discovery and Presence for Connected Device Services</title>
            <author initials="C." surname="Rehfeld">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-iot-00"/>
        </reference>
      </references>
    </references>
    <?line 2296?>

<section anchor="change-log">
      <name>Change Log</name>
      <t><strong>draft-rehfeld-apix-core-00:</strong> Initial submission, April 2026.</t>
      <t><strong>draft-rehfeld-apix-core-01:</strong> Related Work section expanded to cover
AGNTCY (Linux Foundation), A2A Protocol (Linux Foundation),
draft-drake-agent-identity-registry, and the Linux Foundation Agentic AI
Foundation (AAIF). Positioning paragraph updated to reflect the
consolidation of communication and invocation standards under the AAIF
and APIX's complementary position as the discovery layer. MCP entry
updated with AAIF governance note. Four new informative references added:
AAIF, AGNTCY, A2A, I-D.drake-agent-identity-registry. "The Discovery
Shift" section scoped to a precise technical problem statement — strategic
framing removed to keep the section appropriate for an IETF specification
document. AGNTCY scope comparison corrected: "commercial services"
replaced with "agent-consumable services and IoT device classes" to
reflect the full scope of both APIX profiles.</t>
      <section anchor="iana-considerations">
        <name>IANA Considerations</name>
        <t>This document requests no IANA actions. Registry structures defined here are
maintained by the governing body at <tt>apix.example.org/registry/</tt>.
Initial registry values are defined in <xref target="APIX-SERVICES"/> and <xref target="APIX-IOT"/>.</t>
      </section>
      <section anchor="references">
        <name>References</name>
        <section anchor="normative-references">
          <name>Normative References</name>
          <ul spacing="normal">
            <li>
              <t><xref target="RFC2119"/> Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.</t>
            </li>
            <li>
              <t><xref target="RFC8259"/> Bray, T., "The JavaScript Object Notation (JSON) Data
Interchange Format", RFC 8259, December 2017.</t>
            </li>
            <li>
              <t><xref target="RFC8446"/> Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, August 2018.</t>
            </li>
            <li>
              <t><xref target="RFC8594"/> Wilde, E., "The Sunset HTTP Header Field", RFC 8594,
May 2019.</t>
            </li>
            <li>
              <t><xref target="RFC8615"/> Nottingham, M., "Well-Known Uniform Resource Identifiers
(URIs)", RFC 8615, May 2019.</t>
            </li>
            <li>
              <t><xref target="RFC9110"/> Fielding, R., et al., "HTTP Semantics", RFC 9110, June 2022.</t>
            </li>
            <li>
              <t><xref target="RFC9116"/> Foudil, E., Shafranovich, Y., "A File Format to Aid in
Security Vulnerability Disclosure", RFC 9116, April 2022.</t>
            </li>
          </ul>
        </section>
        <section anchor="informative-references">
          <name>Informative References</name>
          <ul spacing="normal">
            <li>
              <t><xref target="APIX-SERVICES"/> Rehfeld, C., "APIX Services Profile",
draft-rehfeld-apix-services-00.</t>
            </li>
            <li>
              <t><xref target="APIX-IOT"/> Rehfeld, C., "APIX IoT Device Profile",
draft-rehfeld-apix-iot-00.</t>
            </li>
            <li>
              <t><xref target="UDDI"/> Clement, L., et al., "UDDI Version 3.0.2", OASIS, 2004.</t>
            </li>
            <li>
              <t><xref target="ROBOTS"/> Koster, M., "The Web Robots Pages", 1994.</t>
            </li>
            <li>
              <t><xref target="I-D.pioli-agent-discovery"/>, <xref target="I-D.narajala-courtney-ansv2"/>,
<xref target="I-D.vandemeent-ains-discovery"/>, <xref target="I-D.aiendpoint-ai-discovery"/>,
<xref target="I-D.meunier-webbotauth-registry"/>, <xref target="I-D.cui-ai-agent-discovery-invocation"/>,
<xref target="I-D.am-layered-ai-discovery-architecture"/>, <xref target="I-D.hood-agtp-discovery"/>,
<xref target="I-D.mozleywilliams-dnsop-dnsaid"/>, <xref target="I-D.batum-aidre"/>,
<xref target="I-D.mozley-aidiscovery"/> - Related Internet-Drafts, Section 1.6.</t>
            </li>
            <li>
              <t><xref target="W3C-AGENTPROTOCOL"/> Chang, G., Xu, S., "W3C AI Agent Protocol
Community Group", 2025.</t>
            </li>
            <li>
              <t><xref target="WEBBOTAUTH-WG"/> "webbotauth IETF Working Group".</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="authors-address">
        <name>Author's Address</name>
        <t>Carsten Rehfeld
Email: carsten@botstandards.org</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7y963bbVpYu+n89BYbrRyQXSV9y6UTe3ecokpyoyrbcklyp
jB69LZAEKcQkwAZAyayq9NgPcd7hvMd5lPMke37zsi4gZKeqe+yMqsQmiYV1
mWve5zfH47Hrym5VHGWPjt+eZ+fVvPiYHdAf/3x4lJ3UTUEfLZq87ZrtrNvS
Xxd1kx1vu7qq1/W2zY6XRdVlV0VzV86K7LRsZ/Vd0eweuXw6bYo7GfbPPNIj
N8u7Ylk3u6OsrBa1m9ezKl/Tq+dNvujGTXG7KFbzcb4pP45n9MD46Zeu3U7X
ZduWddXtNgUenBebgv5VdW5Owx1lz58+/2b89Ovxsy8dve5L5/Jtd1s3Ry7L
xvTzlpYxyS5lbPosy+SdJ3nTdkWVfFOs83J1lM3kq/97Wndtl1fzvJm3k7pZ
OlfVzTrvyrsCo1++PHn+7Nl3+sevv/nqG/3jt8+/tk+//Sp8+vV3X9kfv3n2
tf7xu2fPnoY/0m8dtiZ9yzf/9M2X+OP5+HRSFt1i3M7Krhvnzey27Ao+Fnz9
7vT0/IjXYSeKT7I/FQ22L/ty8nTy/BF/H3YI/+guvZpkJ6tijY1NPj+eZD/S
Rq926ce0qXc06mVZEAWkX13TftdLei1/bKf09Kvxs6fjZ9/xh23RlEWLpdos
Hl0cX51fEaGs17S4gmgJRPGIVrGdz8vxHU9/jGGePX32nayjy5tl0R1lt123
aY+ePLm/v5/UeVu245poBEf2ZGbjtU94nHZTzJ4Q4T3hP9x9+WRo9Mltt8bW
X3x/cX2Vbun1bZH9VExpgaCO7G2+LNqhTeWNeD3J/lgTKTXRRjz77ruvHpx8
w6N2Hzueux75pqxX5TjHRRvP7YIZPVR5k/+Sr3K6MNumq4rdOK/au+f29R2R
L50pHs1pSvvP5yVdpk1d8g/Sr9NFH5+H252d6TNEHdmVsYZ59rqY3eZV2a6F
S5w/xB0ymhVdwE0+LVdlR8N93NTtFhziQer8majzti71Q7vEPxd1tfwlL9Lv
aO9oYuc2yYQKwSu+HNx/+kXeNfnsQ9HwLeMjAKUId3pgo+yQ1sW2KotmfF9M
6QixBOJny5L4pt/q2bbEo72DHJfVXU2Mka6oP5P1eJXvCtrR5FV7Fx6/va1r
+tWy2+wfbfiKOOr+h3RsbZd8HPFW/ol9ua7/sip29+VqVeZroqGqrTf4d17O
7SfTvNuuabbzMDN5Cp/FE/vpy5Px8Q9nb67fXl5cX5xcvEopjb4OdPO2qbt6
Vq+YKdD2EqX80NTbzSfI5AeQSV4t00+vJtmftykZfA2R8fTbB2/i/ZeeffCb
n/CxbXRGdupEGh8KPdES+0a/TM49rEyWdK4/IrEjP8qudsQg1rhIL4t50dD8
5tlxdNB8lX4kEXSfk0Q8rma0aPqJH6hexOL4DB+WwyxJN+MPE7DWD0XvWvwj
d+KTy8ceHR+fv0y34VVZbT9mL+stiVXQvBx1OcOpR58e4MnD4VXw9e6P0z/d
Z88fPNoVHl34J3lNm6Zo2yf8zTh8Rby0or/Minbc3RZjlcv0eb3gD3KZO27p
Ip7J8Q9vrk9+7p2/fJZd0A3LXm9XXTlW7sgE0FOz/gsrf/pP/x0rvy9WRPu6
8HxZdbPdmKj/FyLKcVePTS8q/1KwrB2veUVCCi2viNhJvCLay/mYVML8w3he
31eBE7blqoamcPz8eODGPJdNOqBvDz1D+K/szjCh/527s8qJKm797mCeshhj
EPFeFVU+XRXjtphhG0iAFMRI+dfKXYT7j6dFd0+S2u8MNuWns+9JBzl+d/3j
+Kcf0u0JkiY7P7t+mf1UNx/KahmzyN90ne/pf34ovrSksI+vzi7/dH5y1tN+
WJdXcd7iOBYlPg+CfcBYgLYE0wIy//vaawOfYlE9hX1fWTynTWyqohuzkjho
QLT6mvHTp/8Iaxscy+/O+cX1wMac19fZacGqzsDWYP1viZwK4ie8MSd1VRGJ
EDPXh/4P7UxZd/8dm0LDPHFuPB5n+bTFQ51zUBRLnUF2n7fZnGa3rGiJWPDt
dp1XGf2wbtpJdk7qs1cNspRZZP////p/XFtA4cmKallWRTuiHzcFni3xF+zm
LVmEDd3NDzQ+TXIL26XFo1netvS3NsvlnY7Yzhx3A09V+V25pBtXLSex5JQr
lx1AAT/MiKc1/JuMhFEXrcp19TzfZYuczivPbML5KlvmmyP8kiZftllVZ+uc
hHhVjCs25UbZclVP89WKCGFGZ9yWxBNcyeY2iXCjMIywIwO0ymZ1hTVMsKk0
oK2PdnSB7eBJwUju7xwNhq8eP+6b848fH7k8+/H4+owsrfE0b4v54KRGGdhS
0cxK/qIlLZFMB7Awm6V78NiS4873NpcIoqT/bJpynTc7p0sUYshgkJWLUpe2
xPhVjruyrufFasSfdrdNUZCmSzsBm5a2nbVYF/2Eb+JrskIWRQu58fb1YYbF
ZiK949XR2U5rCDGhDNfS68CJW/xmQ8ouvV0GbbebzWpHompO45AUwBP6TpAU
fsLvkP2mKUxwFeiDQixqWjrtTnubQ3XLZ03d0ierlUxWdzWDg6Ol81beEZF0
8bEr+DVlK2eO7dX9mvnn1btCO3jk/E70mXV28GleeRgTmLuPeDddDP+qjQz2
Iuz4Pu9zQ28S3pO8hB+dF/G4E+Er63I+p3Hc734HttbU8y0fDz74XQZWA3Fy
NqtF38h+yDcpB/qizYLMpuPe5zHZj9fXb0f079evRtnpmys5TmE8ThkP/y7h
ZfclydyYmYGwsRIl7CwibEi/DZwExIOIOJrsrmy3NBcy8Opt10Z8sdjR6Wcn
x2+vT348zmRNOHoixBlJmR0zS3oB3cWucPkS9nxHjKYa21RwgyeRxFmbOd4S
ARMnpVmmPJW9aR9xDzuwFj+XMfgl33hjlqQOObfPLbE1bb3oYJvg8JYNGYi0
FXkXO+po7sVH0n46ovG8/dCO7OaDdJSX85nRbsrmguAbHJnni/iYNiwjvjzO
mQyUtWMXGiEMYf00k4rogmRFvaxIP51j3SsySjo6nI4u9KJsWtK9ViQkAlvf
5A1p8uUmx7LKSu5abHBPQHE7ucd8NrQrM+aQHe1WJ68Bf8pJcevqbEq3tFx1
sOJH2XRVk0ylP9AOw8Qbr+gc6Rnj7m3ZbcXwwQ2HAcviCcTc0L2ZZ8umvqd9
Iea+gsimf1fLLR2CcCHh5k4OZZSxF4kYAx0ISIIZsRgustd6ULyCwD2MZols
8oqWgEOMqYsJvarvaWc3rMZ0EIB0I8CEcvytknmCOdIrNnXDK6oXzqsEpCYs
6NckeFvZ4eh3ZTWjzWsh3P3vI35zR7y3aR28EPZTehFtf1XQ3tOG47fFsNDJ
Y2rY0g8zPn2Xr+pqyUydF9lOhH8EyckzLNYl7a4oAvQBreEX1kN2Rxn7AEES
UxqfbubSDRFXFhNXkBg9doQlkJih3cC3a1GBOjxJ+8m3wnYjiF8Q/LwuWqb4
Hb2p+Ei2N3TE5XaVC2tqClw3+vkyUmfafF2oQgXHE3929o5dLzNITcyXrv/X
xKqb4j+29EOiiIa2iJZCCqxos2by84RW7MEzx5+xL2UF0d12m6LeQMvACG/O
r66JS58U+IU9e2U+d/7JOZngd3I32ppZIZ3FZjulPxJdbYgl4BvYVlgePc7H
7idAV5lYHpEJfBwTllX0QtoNolrmcJECgeP2TJ6OY10UfBaQ42vdv6AZ2MaI
iJ6KOmOsaCJC6jXdQ5k8HDyk8BPdEhe8aEoarE9skDE4RxpnVpDKOBc+VHj9
mtUkngk0rKZeZzleKmNu8AtwJNJNyxUYFjHsbLrdYdaQ3Rh+uiWWJMoZhBVN
rcB9INWhJVtlXVcl9GsmE9KrobHUG5ZRpDl6fWMjklhYyZZYJN9E0uw8o1G+
eAv2xEorfUc3hGjO5Xc0O2w8uBvtN7gs1Oi8XN529CKSJHOWEjLLau9CM80X
H2mxqx2rOWT0zlnrxUN254kS78nMHrdbphcaS+82dgIbBGaMzca0sAOsXWIE
bBOx/NtKV8EHXnwkHr71v3ZdqmX0bjLWNIPST4/f1m0HtYvIqeyOnHv8GMrG
mPZ35zeS9YPJ48fQnGRnZZPYOT7CQc30vuh208F0UALuYW3QdSTiZWLB0Jno
GaaDB+Vikr0JRokX8ER+jpkGCaPMNug2Z/qnu06v4kGx6bTGZYmbu86xdlbO
2Z1BuvidTNBNm/pDUdFtyApmUDQPvlATrPxkVW/nixUOB5obKem0cKYPrA23
6S5f8eW9LUlj5C3BlNb5L0SV7Ot0kfYO5dTrBxBMLZPZbanKKklY1V16B4RA
l83EpTMZ9aeiZ9TKfTv+kNPiR9n5mvSQu1x+XcPqI6UmZwNos6p3tPl2W+Qm
1PQF9AhRpKEMRKIVfAS2yibvQFEkhS5JcxKVQi4U/Ul/JCoX7S1djI6FPz24
4C/BlfFlR8xlWYie4VjPoNs58ool0c+KVraEnIUVUfIyeU5iEsc8g9n3pl6t
SFYm5BovKSLWjOWjzF2kg9+AnI4R7JsusiM9NqcNzJhAT0/rq1hCCqnobDf5
jglkmjdk2DRMEmdY/f0t/Su5QBnfBno5rZDNWH3WLVb1fWvceg4pcof16StU
RkV6dvFxttriRvW1HzbqYpZHt2Yje34LbY8UVmIqBXQuWAF5UErFfFiVU3bw
0zvW+RzWf7C6sUWdXD/eAGIFH6HbdPd184GPYMtyBVeizvjDvIFxw+ec8Tm3
3k6To4HC53TQsH5ShupOfBub5CWsTJSLBW0jIhVvs3w+h/uTtraGFCWTyEgV
p1+2yy0pRmzRBzqtWbQF5g4em2PPtyIFS1K1eTFFpB+pWihaTn5Xl8KbjOZJ
o83L1vs86P3ECNRDYzotbJimnPK4otcI2bH8nBMvoiMB05jvqnxNr1JnqxMN
jg2Q1I3Cw7Oj6ow5meyVbQCLLTpVvpo4Bnr5RnTmfJDJZhY9pLPbrubEYu8K
poJsW3mSkZOn7WGPhKyXJQWz+zEbBkUw60AM30fyy1h3RQSS7xwrlFPYjFMm
r82AdGFWgh0uA9en96s1G24X24hltaXbu9pFojsYSHzPeUcW29WRn4+aFa2o
5w1RUFvTBSpk0430pvSX+3JOp08TaJT7wSsFkZ7xluMq3ZM0peOsWrrq7tbU
Jd4VMaWgqpkBWMyXoti0kenGuq/ql7jz8J+aPzavdpG2IdZUBp683vBtoamZ
3ZrHXqQ9a4VdhCpNmZeCyjIyXLZQdECh97c7c50ES8OTwZHcmpbVnxnRCBEs
CWm8ri1EEVHi6BEtR42Fn63zD0W7bw25xVZ8XDTvfZO3GFrWJPhbgmuB2BMR
9tq5n8CHh9S09RaSabtawGDLRbfimZk9gafMzne6dUyH8K3iesHRloOD49r6
N2/kzUekWd2L7YNHSnbbiC4g1xA+VHs9WFSkrf9fzp1sG+Zy+YbGyxHKYfIg
jjyn3yFc5Nw4I2WN6ETUq3eXr9rHj8nkI02kg3jRAVXBinSiEU1LTnCeb8Ar
XUZnew9pp7Tqpzrhl7x69RossKxAZXDB4z1EpXgLZJBEAspOHckY2lhMMGRk
qB/ZfUPGEDPjFel1PGmdUDvTMbvIOw0HD8vLVT77QFNtQz7HuuhyzEfG/on1
LVx5DElGx5aUFVEPg6ty3+HfygvDsC4LlmwB9rQRpyvfQabSCegq7+RSFKzc
thFfFY96rKWR+p+nvq0j+kCc26SYrYgdttiVhlW8aIVDDvi8G/AigJyIDzU7
N4V/fuO1c7YfsxXxURL+K5pXRZc4UgwjaUA/gp+EVkxUX+aDF+vqtlx0zonM
CWJVXZxK2aSPxbcnZTxyKdramWljNsCtp2XReFQgCaOSn5TCVvxtc8JRTMUJ
jiRz6IFxeKNXxIj3R+BSOtq3eTnPO3U2eo8grFP4jYOOwc6VZb7J2GOQ8jXs
bjhREgx8FPlDIRScYKV8CAenlPGJk3M4Lzs9UdnM4diU3kVL7H9RLreid1ik
xTR9l26ovN12Eiw/V/dMK25zGdLvlrqxaBR44aDTldgHKC9gKkosvfjqGdSm
0jtkMOwFve2WFA9MT7jBy3wGxnJZtBs6I+KPDzNtutQkEO+gQ9G1Vx9DbGgJ
ifE5d7uNaPck09lfIX42eUkvEqSLJevwngY6EqaxzpsP2w1ZJldXdCV3q6K9
LQrSRdwfSEO5Yr5Asq6ar2CqFOtpMZ/zeOJEg07XlayGk6K/qvO53jqy5VY7
EmzsqWOjRn3ELEpYiZYDoi2UoICldWTmCGc/chVUNuL9I/GYiCHuEhWK7Mgl
P7Kmy1fPZtsNCff7OvtQErXuOtU/xGy6L+DnYFsArBtaBdGF98DTDSBtkrQN
2Ah1pVZBU0DpIy7Ng6nLmDni10+fjvGbZ/jDoia9Uvci43wMMmlMH5ixAcWB
SeKZW9V4nDIn7/1lF5PX2YJalneiHtCAlcTQNnDn68ei243EQ1h2fMtmbLCL
VqFqnpwPb64+B3lk98hcx3sq2KbewJlptpR3P7NIKPKW7iOUbIwd6dJ0ekWz
3LGSRyyoE4/Y61SEIP6QFSsNqggLqu0CwXwlpr2DTRyJjD9cXbzxdO70JFtz
SZla5mmq87xAbQeYYFB9STpgucWqldgCZ3G40xCBN693y+qmuvm8FundthKx
Wcgl92FipjZ23FW9nICM7wqdGU2b6P+WbhiW5akV5+F9SHxROSYmrmncppzY
tTGxSAbHizY+Ms/uypx/GK/r8uzqmlVf1SHoftLJITgGkreJYB7Ya9kc5kcg
e/Mq6Mdqr87Y62Yn5vwZMtsCUWXma8F7mGmUm4J9nKnRFhgyLLR9KUWa/G0q
I0VmWXi2CBwZn3f1soAWMMm+3zk5T/aV9lz/FjD7SG/oaTnGeI0ZEZfDlBzc
fkT5cHxYfu3FfQVKJH5QIKG2iKh2JDQ4lqttRimC0BoBccQO6Bg2KyQ20M4n
VMWmAKvlJtuWDfEjOiNaLll/IzZWesLE4corrYneWYqE0DCumRzGsfyZCaua
Q1yzD0qcA07D5rHrVWI7ZBUm7uTKO3Po2oy1eoDzJGnfjlxvf/d9tzh8trrX
HGoPBlNQUJkRlcyv8SNnpy6+9XiKmqlSrDatLF0vLHHHL0Cwd2VTV2rkLOq6
IxlDW0frWmvElg6SHUSqALwiMmRlGaL5Lesmx03nQwl/tgWIR6ppvQWbMZWL
AuWJynI1JzoUrYMueevYeJsWcivbrq7nsYOsrYVi6R1lY+EGcUZG4Vcx4tml
wXUIB+8q5pT0+tOg9o96GVLgVUthb4ePHzt+8p6P+eri+O2YWFaw30W1eGBJ
4kyyWBfHSYoNS/xlTf+iIbFdIwklkeYxV4N7sAwBtHox6+pp0TgUCbCYlDCC
njhkNGKSNbK0Dp4dQjmHtWnxA03VxXz+/PqVBmyZqXHo6UV28PwQwtmHUDRG
NQuCDwkj/MQ9B/JXizE4cdNpRoKjp2dNfs/OI5oTseVSUh9o8C9l8Hm9sVgr
eOVdYao94iXsT4kd7BIUYzcS5wDZ3qr62wQeKIG1iE3SXJ1sijnjjjhajL0Q
CbrWFJ1RbOVsSk6RiFYuYYXE39JBqeG5MXFJzcSk+9hlB1qVcQYPLt96yxgF
Lb3uueXEk8KE0fi0jsI/yjtTiC+O99Vr8UTfcK6J85Z/B4rnx4NUoMP2xkYJ
xvm2aMbzGn4C5i4Ix9CNdP4KYi2vT95mB69520+gEn7skhWcWtZMXa/E6xlq
KPZM6VevXguZmVGNbSng++8cvhdRIPSAPWALGnoc1F2wkQ9VfU+68qkJRD3d
noXo/TFx7ps3yrAgGbWdeP4kV4KZXsNOWvwK4e5SzDV5OnoUVxOqgSohGl7h
hClOJaAXnZLeRyZCw1m+I4eHYU5yFpnIEkz7t2af//WvyD//9dfDkRPFJCei
rOZ1M66KbQe16eqMTurKgjz81Fl1C0ttraULxLjz1aElYbh+lIGUWHa9ZpzG
UCAXeAMPJDuy6Xj5xsdpcJtbJErXm9udjOW93HTPl5VkyFh8mw4u05mCNuJI
NdPZT4iN/hHnS4dNasDB5cuTDFVpoLKIUPc82eYRgjS5eTLhGCvTyZObSfau
he+XtU6k6RhH9s/gunnvn3gbxerg+NAKL9kx1QmJ8RQm7g3YGglBP55a80TC
yvqZXnhdp2+ucE3eXEFBr1ewSVEoxDpRpMNtE3soukRtQWwJtiMz+LKF9pz4
uNm6rMms4FwF2eyF1G2ABDQnUIIefKJim4j7RkX4ZbFibsdZ27jFKHpB9jYp
m0zLx6QErDhhQbIPqy1TNn2TavItx4FEQaPl/ZLP2KUJMeTgEQNtP2HXc6rj
wHMOa6uK03eEI1VF4pFR4al33ISm6lqthJjiPMUcOgushY49PhigKcR2a2/L
jQv0z8clCYKD9W3ZwfHl6VsmR75K4hH2FTJmUUXyCO9N3MTMNol/RXE3Mtew
R7gWYIzCuo2MvOawhn7RsaM005+LwwmccSLnZysiwmK1MmVqxJVo9rE85NV1
9dicUp7kzJEhlZe4xDjMiKj2ZKu6NfVW1M0SwSDNkNlL0FUXjrEtW45cGZ4l
UfAfftKEYCEI6A8Ll2yuuViCTTprdpsOeWTEl2bspiaVbzsvE9+YCXmXeFY4
64sWvZOVqV+Wk5BvxftEqkO9Xd5mWgYXsUGXqEUHuOo1mz10GBgXdN9lF+Nn
o+xKtAmW3aPsjz+feJvvEHv62tnsxuwD9GtnM8X7LSX5ljUC0TcXW75EPHXi
4WXLYVZQn+6mjeNziuQamJ0qnjFVG/OO73B0Gx4o6KT7QEu9e44bIUVg+xaX
JWSVwvCwN8rHhQmyhLiMjhUZnbeSWhFv64Rk4WyrOW/JyOpmZMdpzrPg3AIo
RCELOagkkXrIk+f8ozmHk4kICpIR2MDiHhldyBSBoITwCCp5R1zy7Cw7Pzk+
P1GOyEpkudiJ86zgtWlyd3CX4TYSM0PE64D27+jJk7u/3kkh9K+Tv/Kafqzb
jgQ8LDUOdIqbYE4WwniGG8m7UURp3nQjYB5LFpi3JjzXKNlywboljN27Iddx
9tyrejlxuieRTiC77HPgOajv7xMd5/jqFLqJloSTenKknzriDu1AfqBIuooN
woLjcOLBQ/oEByeCd4p95s50vNKCz+yGnq3ycs00NS38WSKyZgl+Rh3LfIPs
lcAfs4f4o65mhdJX5u06+Rc6vN5z3YkyqnZMpizOG5n0C7mTgUN5SrRSEhCv
FKrtlRBEmo34GWK+2tqiiY8heK+ppr25SayEU/P1IHwSgVJJISEnEaLhyj9Y
pE2X/vzNFV/5JJqwY7eaONhHiGGSbiopZSBRY46kp7Sc9KVM31kccSefBovK
13jIvRXbKhs8RxcyRIJCSttD85RQSdlxqkYkaIN4Tm6Es9glv3RihxeGyFU1
zpL4Z6L0ieGbBz1fz1KNQ56VlRrkevSIwVbEmBNBorwaKQYlYohQZJQC586e
kIQIiVxHwaysAL2BtddTZAaru59Y46yEuQtVCbbFkYsfwunlK3XkqLe+yPRV
rb0LLry6QjqXkRncr6SJ4nVE/BVnLeg+2Tzh1Cv0TITzc2kDah20woGBLuBl
SjbBv9y8DXTbZD/g1WF1tuNcpZ6p4WTX/TbIZrJsvv7zNedeN3MvlnkaY5+n
FXQE228z1qR+hYX4oa6GbnopzjgkfvPSJJ0kQ2ATDLpuSykRyw6KyXIyyn4o
ux+300NxFQ4tVynP/L6OnSSZH8pKo9Q95Bfpn35JF55LYHUmWvnZskowh2YB
NgDPKvJb1xrotLPiXFGfBMYxDLaiXiC/oZCoSpoCmXGyNJFXK/kjPu7JOZol
tCRJ32iJXLYSl3W3Rb7qbmdapiG59EjkrLaLnI2CpvW1ATR0wZY5CnOmcNlX
cx7dcZID9AnLHU42PGeq7aSkUcpcC4mxmb43oumTMqU2dWNJ6rtM3BGc5Izf
k7WhmZsqYGiA23JadiHkrdUuTqkwKIiqyPbPqWV6HKEQhJ5Wjh2ruKPY82WT
gf1VNvMxUmUQjifqOwS/JerbmjeTue4ybxCnhPnmTLbmfvwKScKgUC4SQ4wp
ope6iTd95EMJzr9BEyvzKIUwI0GwgS45Y/0zEiYP4FRAlAwAeMRepdSez8sb
uTMw5ZHFvO8MiFU9tQEnrufmeqHGcGKqD4sW79FwPV3hOmUG2dWPF+9encLd
Oh+YtGaGcojQsaYZCV+9LF+0phlrlpXnK8ZPYvfdzoVEGK3GZKdwkCyLFYdY
Bd0o6/KP0Mt3iS7AJSGe+Ry5R5peV97RCx6NskeF0l+Bv8g95j9WxX2L/94X
OcgKf1znG/rIPRK1Bp9gcvhvUlHOHyA4N8/5sZbuGmlOPEJBlhqGEMbA76fZ
+MeIaIlx8Uzqeo7/yg3DmfD7jK89kqRYrTDhGxdLh4hE/K5IhAIUdJTdyBJu
Ru4mmfrNiL6S6d7IlbjhKd+wtpNzrAqhuBfZjd+3G1bSb3TrblApKWHaeZIR
qjO7SR7Lbvh4Pfu8cUQvaw13IZivsy85vRQaEPtcYpwOsN/BO+a20GaYRNTX
dw95uMqnYEvwyEuB0UD5XUo0LyQYycORodzw61HxMa+7cVvA2QTWyzPPDvwC
J0i0KDoO7WGjeys97E3BrrlPscFlEjbDa4RNgdrQWJmJjz+uMIpT+PbLVJ2G
KCysGpLxJtmJ/5XdZVacB/cXM7ICKNWuUePzbPI04wKqArewox0RYgdteWLH
hgTSxldC+vgTSB//xQ3Ef/UG4o+4gfivvwc3h5z/H6U7YS/VV2DsJTg2Qomz
pNrPd8OXxcUOYC3ng3c6hmggOzDi/xESD3j+6eXZp3h8EBARt5cc7sjaCNz9
NPGfTXfqzXiIo/edYrF9xnqNigULKJuhIAploq1Fua3RHH1U3KmZq6OrDhy2
5bPgS7RJV74CPQ/moHoWfOw3iepIwpH3AVhYb78CF8GX4PqnC4qU1KD115wY
BlLQoWhsSE5n++P9NCJz5qkgMhcGz1x5a9bS+zrLc2ceFtbE5TVHxHOjtdxk
B7fl8ladYRZOgvHKZkCU6sM+hpqzsqBiu5t/e8SZPysvPtrtmphO+Rf54N+J
xzCP7fIlXjOlW05yHPUntKwlxK5TFRF7arXKIqFHodZVwz9ctyKFNhxrUQ+N
n0u12rDkAxdrC5VmVYuDLJr3/Gv+HjVAmJswedkurRNtLYu4rddhzdEc8zQz
IKEJMpmQ1cRVQVx+GZbpGTrnaXAUp9ZcyU7q4MpZ4h02Nu/zJTvJ644KNYxr
ah7nw3Ih0me8LD64od2aRKcHpjYoOA610CykwHg4R5976EsEoxWwN1sN1GCm
0w2gEwOqBDKKiMMvyo+quVsiDuQP23E8xcdKQ/6qaZwMEXhc4SmZEgiiXoS9
9j4e22pjBHC5mV8eBngh0E4ZyJMPjO7sfBVcNZ5rz0kFmYmM3W0gLuUeZTdG
okTc35+8zb76p5FjNx1AIYk9Z5oD2qfkF3tkbOkbEGU+0Q2l3dVcv9JEhWxT
w6EOY0WFDHxvQVVWLzOd7FyxHBbIQtBD4XzpZOFk6C2HxL8GKarEBy9efDzF
O+BzZQMnlIJo0Y3r1YdWqE2OAfkd88KwCFzQLnLNUCdBQZx9vSkbpuIpEB15
bhv2ojeWkgQTZ8VOMDcQCGfOhXB2vclpMZkvGDLNq/TRDHM5uIiopkTut7gA
dCu3c6bjv/51D1bv119H6iKZF2uu/4Xsd77sOUxR3RXm10HCQyMIK+C6NE2f
bdoWK4msOTJyt2SG8ssXDSpwSPJJbXkKAECs2Ke7+IeAEOHyTsqi8qjGjD3m
JICK1SLxY4EqgiFkQt/QHyJ5k6/aOnZWIzFW09p8CiATaYBd8KEpL4Q08cLy
JywXNisXwRsM671Bihs8KFsUv2j+FbKlHTtSknfGLlJ6ryZWqrVmeQweuwy5
8c7m3pLeuc6zg0fJTwAYwHkN6klHUlRZaX1gbuUJjw4nlidIurR6eOopFhF0
Gp7mij2bZSepmzf68hu9R3Re4vh67aezr+tFZqfnpzdMBTcZksfdwQ1uNiuw
9N91uV3jzxtSCVnz9d4j1l+lHE6Za+5sRu+NGm/44pFBshpjQzl5VBk1p0Mb
m5adFjwRGG5cNKjpsPNitmLkG5umyQtP8j469kJzAjjPNNRya7ot+8gwH2ZO
FgAamHNk77l6yi4rdnsi9VkSfQsLO+oypsVCwJRMHxyg+LDxV5onkF1ytvYy
e6vevezg6vLt4RF8CpJqRaqNMpUxydEqKBOmyYpP0BIPwBfAf5eoeaw+8B9g
1W4AfaD6peKKSJg2ClTqfu2tZGT8OYCcdJo0wFVZUsrh8+JpAVaKHOFoReU7
4Y0bzkMSUCfGYgg5PsJnJGeCr7v6VSzs6fAs7xPeJzWREmPnEQTvIiRdy5Jb
KQ+U3GKiVjYTGMbKLkKYW1uw9w6FDuyv8zus+yqygacC41B3TSWukVZLWneH
KipjndhVfpo327sHpE6m9X7ykN3EXoEkLBWtap6kPioShfJHya/mw/BP2hK8
hMjyKT0vtBQhF7oHYnB8/ixz8NYVbYxWAXN2R7shPU+WFMTpE5LyjnXjkRaF
CruMuFtANElIB3bvahUy10Ujcb5QF7N7kSX+WyhWqpmOEhVrlHLQuU3DKZuM
U9PY8aDCJRjcuWTzJsVtapv5+TvMP/HpsHebNUhh7/qGuH4MCCRqm9b+hFw4
oSbXQGuuMhH0UXRwmgsoROy7/Q3Av2lGTBSIJjKUp9MlqP4v0W3vPHESjgbY
zCt+5uD0+tWhBKM43tAzfy0nmy9NqYRPj7gygagypBIRb8I6Re8RoK3Ndvqk
3U5HYvrO8lbyo93r+l+xOdHt3U59rawql2Jc7ASszSLB68xDsiOn6E1NP28C
1ltVB/qzjKAIFmuklRjZ+fGbY63XFwsgmNma56HZZAwT4rfOFybbS1Y7HdHP
6UjiXZzYk12/utL4PXDhkV4oubD62fOvv+PPMITi9EUAXLz3zttSrah08Mbs
Ml93ZoVBUaRALQEjZSgZi/yOuDG2sPS8yiwDHLDf/WyJKppcA7TzuVIRnbud
dHDN5F298W5f23QsPpQPKJ/37gr4EA2DyJ9z5Ae+4+gIP87au86RVPMCBrPm
LrtwIFi75hEanODcH7JmsvgV81t1rNYJ6QO7wsBsJOdUM6Zz0u6XCJjBEj81
9cLXdCqL9QWUoHz26IkXs/VZHHapuXZR4sUC/JcdGHyXafR8/3y9vMJ6tYdm
cPRdFcEjoMMGR6uvVQ6/8RdcIfcY3KLsFWl6v26beHXTjEjJemc3JmOvWEjO
YlPCF8UJIVJiD5JwX8l1nhPtAwv6359fXEMfjjks3W8Sa1wViBT0BFoRhFQH
Z4Q45Fl+PCgwe+e3aPK1ZohBTUVQqeq85eVMzvMkWWaKELe7goujl8WQMWAv
aJHE8Q90VTzk+Ut602pHzF4qO5h0mWcj9OB/dYCHYosgeCjE06lFLsb7nL/Z
gFOFx3HWCdMX/iyZSxXzw3EUNnt3eS5bRZt/w9DwT57A442AMe7dV199+5QI
FxEav9cCr9BlkuIltxC1clEqnE/v7pwOqqnq+NukrNWfgY1Z8H5EuYIQow1b
UwvwMr5xSG6OjPQ+nv2vv9r9ZBDNwDb8rqi9iO1kCyQhdGklsVZLmQtsZFKl
1RzHW87lVeJzQEzE8SpiUsWOp/NNYfxptv5cNVE9e4PrZ+VeyAg8TPLEi7kv
JzCsBZVbkX/E/Gp8G6AMG1AApx7zaww+1Z361F4FdL2V6jtPYJoZ5Q9yxnzz
CsHp8Rksc8uHl9I1x7o4a9fs4W/lIG5pnrc163nyOZd4xFnro54LKvsL8WZF
XENSAiJGe+mwCW4EsnB8+YBphchBjBbgoqzb/ZNhd0+CXOqrB96e+5QBueCo
djEUBmK1tzXMpg6p4yx1U88QvXlK/P9f351d/jzKzv58dvLu+myUvb28eHtx
RX84Pb86ufjT2aXm7qCC2EWOGhkfgsHb0wAiLbtSTr4RU9lbDzbTFhBJdN8F
C7JxzXZlyMqqVocSotiRkkQbmm3FfgG//IoYZidZwM5rWr4MVNekcz4SDVbs
fcMNyXeCCslIL2FJbKl5Hw7HS4LhYWWeCpPQ7ir6tFVfizC4knF0NcoS++sd
xEAhRYKcVWGujOSMZMKRq5nLSxj6RxzFeRachy5yXno3ouYVMrfqOfPE9cvc
hAMgt1IJzUsepJW/x4sYHIJgO+7k8t2pjKLsPiocGrf3qGWdqigUvINm7V1z
e+5FLpEY8DDqbn3C0Zh4F4kniY65f+mYH8SsUBJ8x8whBlL4VBjTT5IA9TV+
/ix9AMQvaUHj3NpqwM/ItTBff/31CBmU/itnX3337JvnQnlXJ+fX1/6R7777
6ku6g7e7aVNaBJPTkEXvVnCCYBu4p5OnY8SoA7RSwhV5JQtwRsak8KUpKmsQ
VzKPtpDR2C/3QX3mQbN/FIfqGWtYFcUHZeCebGaVTwSngaYOSkbnE9aIzmEO
BCGZKDD1YjFm88EbbpGYFh3TPfjCtEJbdK7+62DpeI6AN7lenQyfwF/I9giF
kwsE6Lj0nvMuVRKbzRGSGtlW49mbFtX6aJI3dBTnl1kTp8SJaAylK9cxoJVT
xwHbv0DAau22CZhriCSZWcra5847R8KZBreGIYza+mA1ASpjIicr/QHA6Iqi
Eh+1P70Y4cMlqk+ItDDnBdpfN7vV9GwbkvWn7QpI2NW8JYZsjnUoXsmxPDG8
AOJYr0/ech0YOLKaSXGWokrIkCCpMLBiITF2MIMflUshgcVCLNSF5HA2qjZo
muCon5eoBb7sGkaVgY93MncOQO/3iPhqUGOSvUQZtoLT86YGFceyFF3gRT0W
lIDuQn1I2dAAC2LWEBoTsEsCigfzF5/+dKFx/uE8yTRv13He7g+vzs5fZvQv
Nkw5k5FTep+PEt7OSZLyzdeHL2BuCeq9eDf96yJB6lMUNNWqjasqW/UZmM3f
UxeiUFtAD0eAekJqMv12Hu17qnsIdjmrfYLr75UG1M6hnklgUauAlKTJ2oNa
RNbXInj8W62pNrQxPoht4VmBhnV9KE1ju5FPn0guziTSeE0c74wULvYANbrm
oIMAiEmxnwe1GicuuocinBEOSZr3TlIbebRy6X2U1uz/odQ/4RlHWvcV/UBT
1vaSEdxDyQiC1pYsJg78xoYWNJ4xAwy5fgw4at/g9TTildtVZ8aC5Q6IE41U
gXIWpxXtNznjRFsxo/bg8gBt3bFBwzUdDZGCWlZsjQt+JaPEByNmzAlXxGOi
rKKkWMFxsUJSBpg6caycqh1MYEINekgJ6/sTTeePfLz1RpzPUSKYC1lL7Cii
SyyqcXtk3ha9QHS1DC/CoGmx4dB7gZzn7DjMSQ7KIv6xzoibC0Ipl5ZGGZ15
i/Y7VQzy6Wxqf/E/rEVh5zCeKap0iRerIvbHp7WYSfn+I0kS4psN98+Asfki
cnr7ak0pZpuNrO5Is47Tcp5RwBxBQdRKvZ5NnrzBtbQuWmDdPqjfdVHEEqE+
5NcXPmiBQhKuxdyCXY69RzhIhThyEO5Ggp9q20mK4dI60jAblawkfOvRkfZK
V8suiyWT9Cl5oFA9O7hSA+aryfNDiz5JHYBgFlgoz228S6nVIgb5O6fHsE9X
sJ07DVEbA4v8CfXCyS4Ztoj5H+N2MSnkrBa4zrWEAX3dSKJ9EFQP9DhjWBtu
GBGDQScI8/mHYm+L7ZhduTbwF4aui+Hls+OIsFWjnSuIUsdaY+QbsdzIzxC8
x0IvfdFg0nLE5HSoamg9kJfE3BKIDgVcjxibMK4v4I5eK9rlMt+YPzsllZG6
6hz07zGXhTGHWnlY16OA8ccsWmSt4vXFVedaJBbp61YCw+kbUaGZb7cgJjTT
gEyuq31WJ+2ysEouDZGYKvIfjqthvi3cOnRRiCyT4PXoAyDIW5MaRPxGIuQo
xZEfIFy9VX6cmjxm3cUREbgC53vCa7Cvp2iB2pDBy7GkHB928/H56VG2ZXf7
1Z9OvleVkaeqUsfaMfRRrH5TmaiR1xDMLUsnZ05s8XN4gCgpAvY9IFpNYS+O
bNZcDtv6eljU7EgLjpk0ZbMyVMQaPtFmF+EHGan0NbWABFAV/zOVqtGTUrus
L2dqIAZzf7vjVLsEoAIsevTZKtbgbofzIC2aj/aph53kTbGYSB5ubJsdhA/j
JPOco5qarPLoCoWOUjLPe3FC7PVRnFYNhIrItczO16gAnQEsrMaWlWq6Hzl/
jHvMCbe1gnFJfEdWMzGgDWcw4NyTIftk38SHEtmjTGUBDUry2qMhE6S4AHBi
C3jRY3NujyWFonmcwSdafpN8hPGXbHyVFAMntqO9iGuSuJ0ZTL6yCnXro6TD
yyjkpDBvk736IbXOnF6PB6aIygQzUb0N4boc3RPGYgoy/hNZjKyUMXNvzJPH
V7I1jblFrsuW9ZoCNYsSp49iVALiHiu+ETjyA8eaOLec1yJ8nxgxZiFGBf0t
0bIj/FhpqSTmH4muV2eXUeP6thewVBe7bzZHIpbEKmNB3mmsZcUtCzz+SnSo
oxhqg8tnBaQLHER2OuQZ+qr1zzMx3FXJ4+rjFOAK8sA0mlMr1GAvDFQve338
s/iQ5Kdj65LT7fsvvB+TQajwxkgLi/abyf+HuoZc5nYd2cuGvs6I1onnIQ3m
ONE4+DCsyNbD8GmHXoawtWa+XIocj+zeAGjri+ffkO3moXfomExBtt5eUFU/
os5ZuxkIUqb2kZjI/JzOL4F1UEw7g+DASJ/kQpwTc/X2/OXLs6jwhEWCYioG
jpiWiD1Utb8nVj1ckGSuTdLdNZXSK3gRWFiECV1ajY7q3b66wUxNa+yA7CHB
4ewCg44Ak5mI+u/s+2/1jZ6TROUoggI9GhSCQ36I4JRuuf8R7ZMgUQTntE+j
FM+Sb8KFpKNQFmgqhsEeRnbrC5f3NlWSOBWgPG7yqeqAOP8VF+BAPXQjdyV/
4BJ2zjdrJXGsFaMY0QL4GXFflGZgOeGevvU9E0O/cJrSuuCmCyhcZ5xxonD2
R2Qnb05eiiGTYCzuEx1y/FoDU35rBV0JvAPbOoEDx9g0B1d/Oj9tD9kGt+aB
ASy0rJw16ei37bk0Bm1gjWVAi1THMiyl5G6nRxA6voUL+JuK1+AG3Uf7IOkm
Ox7EvtZPPNnbNBH9LvzSRw8EJyBFbgk9Jsc9cAsmBvB24xDYzawHTJKHHlbZ
DNA6WiqiPbX4cnI3DWcYJYw9vYdSoi5e7tSDVFNBj/vyJPNOLp+LciJ5W7Q1
zMOCqTDPXuc7weXTQwp2z15ulwU/AJjYFONU28hbybygqd43pXjXh89OAy2r
lTU1k6fgldp80TpSJPgecUhuxYUymnc/xC00K2YXO62jIoK5U8AK7MvJD6q4
INOB5i3IrY8fx83Mo/Sd58ep4ixNwrOkFjoEwLwsCEhinj9xuYhEmO2Gtxnp
Hc+Pf/11oh3nJG/DC78g7b4+1EgDymvENQHb+++GSwTZ/GFLzA1jvsjkvLj/
noNMlS4zLeDKfx8hSvfsXHOK+/5OeAdx6YdMRu8K7FebPj+O7iVbDRIyCLtb
CPIlh8m4I49IgbkAwHAJ354PKxpIfh392OJpgrzLvmpWniM3BVdv85DwlacZ
4Jix6OfTllt6dT1KKFu1trkGz4QPBuoYi5c94nNukNhwBgWTblVb4FcTzd5c
n/xMAgaMXijySvI9vGwQcaB4OQalJZKhZ4sr2omUjvHv0/6LRBr8ul9/Hbla
iVAVgROsXa2MPuntI3UmROb+sJWWjl8b/mdo8mhE9s3Xn6Uxt0dj0pj9/MnJ
6Sg7v97rnNohqSI+ESCQyHb28tECAJnkQn9is+kkjq9eHgoo6wB62qiHJGYC
ZZRdvTp/TdpO2+ZLXykCQ4G4A/pFa46+B1iSicawqN5huLffDpttSIgZR8Qe
QCr9hDO6GMQvtfpZjduw27yXZuD97D5mPQEw88soDSR2ivCGOnUpSPOGKOKJ
rUeG1gMl3Aybwy5DEX6c+Ae5EHWYuN9rKTKvQ63LUF8SLYVKb8vRQ5hWUdTF
xIcop0YELnE6Kh5N0FXTxiZ86R+E9xoFoKUhdTkqbhBnk+488yfmhNxQNuK0
R/KDVC8XGrcqxT40G048wfHyLZumhfV7MERmDD6W2N40bp1EfFXvXpypqlIx
jaJqDr+5rROALuCiJbSXthRgSjyK7k4CluEkSuPNTvFB9AM3RjZ1jV7zCsmt
xOOSRin7YSWD+ZzSsyiZH3KHR1LEYF9joH9PJoyvHpqts7VWtAPGzEDCSBk1
CQuvs3QRUaTUBuI0HUBPaXAzkqXBrUj//lAoHIMxtMixKJzSGy0KWrlLlaUA
B+sfTBxkXDIM0EcO44+4ARKMjZDT1YfNnPhG8/1UM3azHGW9eXn8THdwfH6s
IGMRzwOwx8jPHpxI8QClX0LEATy8myVXaGza4DobbRWvS4gtMP7dxfnpCTG7
D0XlyrbdcssgydA6P87SIh3fCVK6lHOgiI9LrConYrwF0gCScouGl+GbQEl4
URF+Q6ElLvAjlRC6FIOylgwOljVr6bhRRGcnF+CRedo/SRgCdfLZ2GfKiizw
GXsHXUhtNScWl600qciSrDLayPuohiHNTxk5w4DpuR9H4vUokhhZiH7Gsc4j
SfUMFXwMiSLqfaJtWV+GGNfccA2jA3NCd9pM2le074L4kX0VColwLCQ83e7z
+CShIs4i5Kah4Ub3IY+dt5cP2EuvtdH8nQX+PE0ji0uckMFkPXzQbI4yLlg8
ezanucH3JlJYu5/XI14V/4XlHidp7Q4j/VzaS/oZ49ZwlZVg0TL9umitRDC4
XB63IU9aTgfpE/eNrObeZR0mHCOC/laTC+oZuOFLoJrMU/h7TR3FrxWsNlRc
ah/jChnwGxr24PXJ28ORYx3pHPUkZ2+urybruXqpv+dexQfLmnYG2Vxx1jne
11o1fHb809XI0c9rfIx+w77F8kjtzZFo/CMgcq9GZJLmM+sDf4lWQ7kIZtY8
vwgcKyzEtFEJ9BQVN5x/5BXTrKeYWqzVCsyQexLfsPRuPYpR/0OVGMMMWAlp
rweADA3RvY0VJ0lBQIKF2Ebu820CsoOrs7e+V0ChGeErCYD9cTtl0Pei/aJ1
fzx7G3GoT+reuo8RP/MbGPOpCIUrVO957Eia20ONBEynK+aKeSGvVNcce7VD
EERUI9vVqFI34KQKEIQLh5l0Ii1aqQ0woZJka2gkIaR3IUQezi2UvUX81xcn
QCu/uqdpZldduei25unNncTJJD1wvy8KF10jySm8N1SrzrSSMOhmWpzrW68w
EWslJqi2r5/yXsrhxS4Lv5e+vj/4zPg2j+BGULZpz7PCHdXCCApjSC+2aIBE
l2L+roXt1usQ0aieTKJDmH3QzsUSL6HniDNd++h3/wEknLOJDkKrhfjmaS8C
8ESwsjEserKxO0v/EUcYz2o07CjgfcPoRGnN0sduAPSxhiTrqWeid39qe43K
dHsdtleNrM87sjToHHkZQqK2XxfuykgS0pE59Bd2s8xL0mGQdSylbV4r7+WO
sUzxMou5e4QNlVrVSXoLA4xVchCcuE6sLo1C4XjAZVsrg+bmhqVmemn1YFRX
LLLdJxEcWVD+VrpYu0RxMmNC+ASTRNS4ODokOXg+O9evPPXcKGRkceR7Y3w1
bhFFM/Dm+Si6zwCHMAuZ2+N69r5/X6AhATmxczxv9rYhstnV9+BD+6jXXm2J
oHA8OAFHtN1ehqSyOMsVsGR/1k78s3Ee3cgK2lzJ2DieXyvDJ1vCp6dZWXG/
ts5wAlhQOs9Zo4Ng2hpKh5O2jJGCCE0TvSOZFcQ4f2LsR/yzt6i8KYJUzTuj
u7JNsuakqkacmyPrNrbiKhbJpdPQpr+4R27P/bAXXeTpGPuULVGjXyDatHtf
8SJRd5Mhe0jwPKKCca24XV7LDV4Nwjgomgl/fNGPD6eXMoFP3E+d2Xt3nBrJ
Nm0UZZy4M9jm0WFzXUexweVkgYoeMdvpWLPJXthyNgwJzTXhqMorNjTNmADm
W4Wh5+oWzQTkJPwQy5Da2aSbp2cq6T0nav5FUh2P3IMlzgPVvHGtstXDMp20
WpoTzZi7fMx1viE5n+c85NgA11Uy8glopSIGLKJ6GriPtAH2Ft3mFX+fx9UM
x1jU+KmDcX266iYurfHXJKVsuW6WC8HVNr54YS/na+R8/Q3/fIVQXQI8LpIr
9SklhTVur7CmFIB6QB9xhgs8Hn/hBqEBOGFISXAhvmbluA69stmDUKMDk9DU
B7Lm7jnl8NHrd1fXwHXEf7M3F/zny7N/fXd+eXaKP1/9ePzqlf+D/MI9Eixp
+ZhRpf2TJxevX5+9OZWHXx///EiYwqOLt9fnF2+OXz0yied809Vccginmjaw
AQQG6x/BfclFFpcvT54/e/bdr7+CwdHWSS9Ubc+c8QKmheIt8vPvrl+Ov8Uf
lKGzMR+BhjhLlf528oyIa7ViKMlK8fnUwnwddWpiVyBTR/Jux++G/EFmGBsG
8u6JHCe8PluBMufECV9JXTMoMO1FKuOZnwuUil/5d8+ePeWVa1CUG9rEvWx8
TgAnVeXa9dw3HNeGiiPu4zg2aeEAZdVanrRUCPX7o7ceCYvNM0Uv4SC7K5Pk
anG+w9xATEg66c1QKC9g7VIxDau8bgBXbO10iC7Lmfcus7bpMwCl0lfi370e
B/4geFO+r//uLZkXHV8MXO3ZKEMht0LR+k6pvD1HnAdlTSK5kSySUuQvoQ1j
FFHyyGG9/cqS/fq+uM3vSskhkBoc+GQDd3XJUe0DupetVQlzXidvw4nkwrJv
A4fHEcnN7a4ttUDCdwT3/iNkH2jEUxpOW0ItY6yLrJLOuG1gYAzRTmZII4qR
Farz9N6yaBLkESnJdJdRqAEiS6FJTvh0NZbJlBJ/e16BnSHVo3XJdQhZgRNk
WUd4HMc+5et7buDmy1qdj1tg22ztKmKUTCQXSFYokVwF9Uzb/2p5o25zHBUA
A+c1QpNL89pHLs0Ssc0aaR6LMTp5UrIDFU5CIw1EqgqI6jiMDZpMGlkMgR72
Yhd7v5XUynjh0g5ZDdEkHNNHE4wif+iJIT0uLKBqai5i1s6GjtYtjCxeZnZA
vPZQX5wAjinkjpcXVlrGWya4gopXU4d9jcQyVLKQ15OyWq/njYZyWEZuMDUu
yp8UuHuD2AmSQuhVYrTB+6dyJSS5sEeOlckIckdzOA3m/Hsyt3Vb1EYRfwND
5nTWlIM3xecCBvKyg2FeEVWcjQBJQPuLzcHt5PldmlqZi6sFq/2ThD0bXyUM
/6HCkEcpqOHIeaSkJCm6vGzr9tKTGkY+gEd5l6wGdNdqMysYLsmYyJ0l1Yy2
XcZsaksZojshouEAO2AU5dv/Fb7+LvRbje7mlRd6vj5IUW5T4HlecYhb4972
+sq1niumksr/TWemmGVR9i8rDViHsN1U7IV4fOrMCJBnsg16ukU4QeZpCv6Y
RMTTyGkentT3pisfuRSEU9LtOIemFZNiD4Ue6XAxK5FkvOxi/BXnDFyMv+7P
+QGSFBGfRok/M11cMT3KuFdNXU1rKMrgV1as7pnXjFZQr4u0IEq8lFDNvTRa
Fj695JdtU7ZzgTkYRRki/XYFwUeQQvPwBlzz1r3lhFc+LWBsEn1CSVlv17q1
yT0wUG4NVPVxYSRl13NgjoTJvdpZrm6ot2GDRErZNKoihTBKqIprUqQ3XZVb
QRkXhTjL7/Jylceo2TqBEfdoL/J2a2IyUp/ySgprAd+BNK7Zzqto4XCvrBVN
fJhcOKd49IotYEU8wWGtDj7WdmN2e+RUn5I+FxmppgiocQpvT8a+UKRTiFJr
REY/CxLWJ0LLcdqlS7JKph44RqsgVJ7pSiOBhnYcZVt6SHgX2LpfHs827NjI
Mk606I3tyny1CvC8MAhPpS77B9IvW+uuG5eQwp45dG4cVE6zrn4Dx8sVZHEU
HIhZ3K0LfbK9QcFlh6FCEbRS7cIpWlGSTiXYXjwfqfjwoI8+JkIau87Hpq2y
liaibLIItr1IAe/l1davIeLb7MaSYoQ2tjQRTv72OofCPfCLhF3vd3wabJWI
TVmttOZOfhFB7x9cJDzZrk9mV/IQMwlziHrO2pKNLZdAOTDzIURL5Hf5kt+O
jbEq34++/yKR3zUjDNCp2KuUZ8RloboD3JKt4wZn8wmNhzz5i/FTSbMAEgYs
Fd+NGi6n0AZUZi7hoxmQWem+26tpKHt5rBCUbcwHJ/q65xI9QM71aH9bsOVx
Kzy4kFZINdDqn+z759/3kEuiKGEMuKEzogFZXfZu9HQDLcD2ebk22btrSkt9
0mnj4oCFwJExJCLoqZGmThrSQYqSkJVCSup1kDLiUFPTExnpVBLl3NOW5AyO
82VVw3bmkAV/p0Ednoso1hyBto4tKbAkM4vKOgXzRaHPfVbS/p5Mi6CUsaE4
pA/3wmaSf5D10yo1MpdKZ+00zmwxOxDPlmeDgfeoy0vXykxk3KHEaTARsJdm
SFOxBiCjBwvjRn6n0mY+8p2vT80C0JVvQyhuYjEjov3TOVufn6vTP7J7C/Ti
M+00I2ct9U2SgtgKcyA2q/pMXDsyZXjjRmOBKcLM0Nttx5KW5OFuaIKlVTK2
tfgeslR3jMs5oEEqg/na8iB9mqb1xfDemCwo/4p0ql4Zwdo087RPE+PfcH9b
WyIckFH2Cw3JrmB6d6wgSsktC6/E7G4160UwAWU+ZaPoFnYk4GKoUuaWjL5q
YfC0rZhc/jRLywrRhbLhIusVKWSg3mrLYTF6AUyLVd2aU7vacpZMainFebSc
7OcrX5VQseEM2ruUglT2syml+rO28/dB4247RDs+VscMdQDBjl+OAf0FxPst
bQCgVvs7rTw2XNnRAy4fGimgGcXxDxFBger5XOf5hj30IoEX0vv6x+vXr3hC
CupM3PlsJRgRguYCPsUGCDB3vCUSp1NjL2/RvREqCo1lc+3qsXX/2at7YP6q
GUEFigpLPnvBOmbUsQUzR2kJEpeNCS+82LIBwtCkEjsQpYuX3CT1moLMOw/W
iKQW+iZo55wly3hEqi+9ubjWKJGC+8XwG5kAhEPUIByaAlCTJh7QMEpfSwhC
qhUNBKnwU85v4EYbYOPsJU6bsqdhwMePj/br5C2i559jjhiarXh4LUkKVizx
eCPSnEB2sWq3Lly1z+EF6KDB/cWhfmB2WA5BXdE4ScF/AGuPFt4AArWNmAey
fOsKuFVYOLFITtnpPGIPW27ec8bU289hYVNW32EXzHfGwKh5dIiavZ1CiXtK
oO3+yMyHAZGBtQx3tTjrozaIAH9gBPLbfLXQuH8qeTzvwIw1QJoEraXDKvi/
P8NQD9ZyvkYTcnRV71Mdom9g+yYOMXf5YuA2YYdOasbeEjWR833+ng2S2ogs
UrzV3J7JsFGEgH8aZX16BTIFxgD5cZcZTcpNhGtkZJqxq02HJF6K4bo4hZS1
PlptJc1kcVSF0cZrj/jjQzuxev5bNoKG91thyOz9s5dOJ5opWhuAxIJdB2sy
QNipyaYXHp2XluGoziwMFIjFt1JrC5yvxHG+mzw/VCv6OM6av7jDLhT3wjZP
fPXXa0gn5/7zP/+T3vr78T/8z+/p8b9l+/8MOLyG/vnb3uMHveS98XhInT5M
HifibrVK1O7+SBXjlN5HHDjV0iL/uOlRNMZDetQo+JvTyQ9v3W/aUGzd8D9/
89/0BxoaOIzTP4ihgwmT1rF+3/t79En8Pjto2VYZ/G+6KyrX+RNf48AfhROG
hZL55wIh2if0z1sxvuOjPVAnyqH86gAGhC8jlucOYB0/Ea3m8L+2vr9vF/vf
9t/66V//LfgPeq8YOP1/4X1lfwZ+8D8+Q0UYG127esOFfxIyCiP8z4GVRv/8
zwe3qP/+gTMYfP3ve9OgcU886+y9BH9NpJm9iX8nEda9mYE+fh8bSslDB6R+
HA4+FPOBw96axp9eU7q1YLAuVZS2hu/F7Vhg/rBL6VHKLh9JfooIV/PccJZK
zuk5ppqmSdySBCwDBlBNdSw5BKMklUAQjx+KasUuiVGUgSg1qf9YPC2NjBVr
6TQeukf0tAtxhCC6RnNuNWcwZN0g8AVpEPZBUHXKj9kjjyuRnSdjPrLaHa6m
XaTZPuwYf0kWxBG6dCDtpkdsB5J3RWbv583uQ0kYZ9UDpk7iKKDHAdkYR51T
nilscKROERgZWearIeakMZUrzUaGl5Rt4Vo6UZkz30z1iXsuytfA+DZF6KFc
ZmXLVT4jVnO5XCKyTxPQTihjblC7aaAJp/bugYYrOCFlOEyBcYhLb+EgJGnc
yBJbSTLvhSysoJG0mi9lEcnbQh37djP3seXeGtiXaI4XvDyE203znLivtFFe
+qh1PA2BhYGoKerV9zRvU8+S3wYEymEHPuwLHwNg14VFD8jm/gDnBGLzHtQp
hOMs3RftAfic0lw+i6kxvkzMKdw3k1R4k1UhAaaQS1P54t/5dhVSv2hycW7A
F/zaENcShA4tVVqUy61vwSFOTO/rVBX0YV8qRw4fP7YM7pQ/Pn48wLdc8AJ8
mkMmfEtaCjJM3y627QeUfUnnDdE8cXahWHjQcyuujp6TIMYdfjNcjcNMSJxN
vQF5kxjcgruh7VfVMAiCb6xLK2Lzx8IrX8TnyxUKlYe6kCCBACZzJlWws4QE
GJfo4VnBAOJMI7KOZ6stB92jXIA5MkThuvXNMF2WRVivI0nH45xaToNI7rvH
fbVzCmuSBZLOvypazbj32xJHSjD3H/Zc7YnVoFHK133RpZTpu2+zi5sudEia
19GSE+Eyg+O0SJPTEJFcSze1RAAir4p6265CKZSfS0Amk1ysRjxR/gUKom5z
SWByNZUnTC3vYrfI48cXDwjxz1CeuUUfdjijMBRrlK7bkVsgZDaA2PwVSvzP
kwfHpYGs1YMkMdDyCl/HsH/zXkRxL81GFM+cWNnWwlwRM6Esf4q0/bKDFYh1
qnk+EAjASyC9WuUwXRwSmGQDWTCir8V1IOxQj5AvTuBxXQjQjZWqS+snXiva
EZLQkrL/Ty3GUq+EYAcQkjhkYz76FRxsSO8TH5Rdmv4VSVOQe99xTR0cJaH4
Sg4xxxZyTSHQeuREPzV12/AhuEW46XuB54pFYuIn+fbQyL9i1vYA7UcReLv8
63zuM0hWCsuFlswAgVZ4aElAsLKctgAZ1DGG0DzfCbwNiU/EgLAZkJiofAm5
OYwuc2ptGV7JtmAhF6fTV4fZs8nTSfamVoYyytJE/15SlNzFejUXl7vyZQ6d
zT7Y5GShog6N6RhnsiEKn5FxR0G/DwZATyyJ9oLeIKvxCMirlYbeo7A2MXdV
0yyxdFXo+ZWhKoz0PpA6bRLEVJVv2tsa+XdwB9IOt5AB6+Co6yVRSNmbbwTt
0yc6yQnRVmXqLuU9p5Pjc7ZXRQ2oOGuFZQQvkvchTJajf/ZUSEM3MlDBG9dX
J+/hQNLpnj9P00R7ySTTmOjsTWl4AFRGojOXfjEH7VYbUdaSZsPQ/O2LbMBd
+DtWyYQJvg3tpGlIzg76pP9Xg3k+rBg590NBt+HCNBE3D9WCQ6mtETkH57q1
vnRxpQlfGD+w4oawEPmJQXcaEyVlUgCN3EJE2jjBk+GyxYKa1WP2W2sKsf+t
35PRkIInu+DCLmjKRhiNkzTShD023tq2nnEKTGRsu94+SbGPJJnK2pzzEjLR
jyou4sCSoloX7LM+qD24Q1Wu22eWhtVjkeBCA4Eah5DOVsIXgOiDgF1ZOa8l
xvNRbf/KdJlLn+AbKfxe0wnJwLHWHppQEMescOV5t9D1vWgtd7/x+FMJAItv
gShVL/KMoLGZ4gEZBndGZKNxGvQke8dhTX2m4ogbn4mRrSdCD1SDxmkhy4HY
2CpkvHq8GEt2IzGT9SYfeCqJFW6ryZ2EQ3CXOM5Nvik/ToqPOa7hpG6WT+z1
T248Yo9w2T50skrty5cnzoP9znazlYLKoNlQ3AjRLysFQViVi4Kfkt6ComGt
BPDKz9MSN5PT0G7xUM2VO9shuhtf7n7jjgKWYi/jJsvO9BVH2Sf2IYyFR9jV
jyOlZ3DqEwx6g3fGiGF47cmAEvR3vzwZtP/++Mt/+3eeBBpK2XUZW78mzOZN
9IU1cvoHN2T4Hf3Jxb9qJ/azf/v3sGGWXjpGUoOelCac4pN/5KSSAQePy37z
Hr+5yQ72/ELuRktxsToODfPUtEwnfKdh4797kvuj782TP6YDBWuIXrhshD1w
77Z2aOrnnAC5ijkTqy8R9lWROlRjEFLzxnn35VG2V2UjgFnxhWofQlB+4eK6
G30wOl+0r+7tpipy8NdFcVupO0m4Hju6Au9gHfssWan8gnOAtI+d5dRIEurm
NvfAZjcmM97f5yyF6cQXq3wpPTt7PjzfXxS+4RytPjpxPuN8kOyJCt65oEug
z3TBbcS8YKw9vhf7W2A0riQdvSJNjzWQzVxTduEWJrqI0lAltclJiJpr4tp2
y3FnhAQUSCIb/wtC3ehnwWz7wKOaH/aiNv0ozu/H4+zf4mUcZd89hercIiv/
3/tP879l/kchD1QuPvKLqtpysbCbv+Xduv/+7WJdzyUdy5Yk6bPYrgdm1D9N
SSxnwMXeaf6GObXbSmyu/X+q4j4J7MPw+4Ur5V7wioEsgniCL3aRwM3fsrcg
PprtlZQT/G2IAunTNzI+Uenf3N/G43HyfxrmjWiFWx7rRk6fn6vpX8eWW4xf
/hCTJv02UAd+//jxm5rUh94zPyVnMfTUz0W7/9gV7xevif+En/6MxIJkJw55
gEvdLoyC+30anTCrA59xHIWcv2hu78vqvboWbkY2i/e4UzdwiN8wfb+XVb0H
SMGNcJ0brfwH57sRFiq5HZ7u1AIzHsOJclHuri9cqdnI3aPWcBHN5ShzO4Sm
l9F2PHsuJiTt6mRwzcc/KwiBhMJ0WHQbMV8pTMhbNLCuuK4lnVjCoOj5x4/1
dtP+e49XPO94vpBSp9vGewSisUaD9Ovdt+zj7Lh3a7WLssnlCo56flZtkaMm
s1xWH9yMuBof0KfcOsyHduo66Je8WWKk4LlFST0M9T/wpriAKNnHKY0N8zBR
sDQB34DP8NAA3cE5ooAkKZmazwDkuk+VnKW76KzmKjmIgbx8yVWnAxg6JLbz
U55oQZ7OCqQe2vjjzt/xh18sHJFZJfv3opYnW0u5BdHyOGG3sQFSGoC0ZkbQ
NlSK/mw1QXRodRzCJE20eu8Zz43VcIFBp0qFMg16FMZUqjhxymivcQx+bLUm
bO+5pmagGbVMfHO6Z08nzw8zKytnH4VZLDKKd98FI6l2e+lecLqhcmqmfYHZ
1EFu1qv8frEFun6IHGD/3hDDvdo2dwUdJAcnTnxnZjGk3yoCuFpydjM9Ukgv
AzKBoQWKiSKIHxEbhJ8CM+0XSflujb0+ZVIFBqwQjtvjpHzztAgGKcaldeaq
N6Csu0JAwPZCJIJnMEkD1FFk3EmiZEgG1MrBEFVo0lL3MlS70zDLmq79IhcA
xcZF0922RZyXqHqiR4tCriexYeB2GfqWuud0J6XhjUBeCjAWADQm2Xk3cBzT
bbkSUPV0BpJPIY9PrZdghgx3gUbKZ6x+ItSQs0NrIW204KFa13cx5Leza8NZ
ld4R9+mUDO7Aue9KH7k//nySuHOEzf2ynZd8bgUcgyYbva5eoFOSoR5ONOvF
76y2S/EdoGyr2DkeAznaLviUaxd37mMCCpcnWqotMeC3VHu4DE6jaFq/oIcx
swqb+Fqebsmecd9rE8UUcap3vEMHq7D1RLtbSc22WSuK/4b7ZKx25inBua7y
+2RrWaXRjsgJnE4JJb8VgpPcoq0gnCpGrHc7S6JElBZyRwcsnu0GvsZt52OA
ZfuBHaewoyKXYLhfi1VR8ImFeltGx7F8IAT8pbskY5iFkD5qRgRuOFDKIIm6
z56fjFOLS5sH4nayAt7IXbZUOcqBXtRymwkXZtI7g09svTfd4ywKrnON45X5
Kr0XD2VDJSRooubrybfcA2cLZDv2P6eTE9dlSiE6LT1qx8GzjqsoT8mCRU74
rlYurveQ5Xap/TxFovS4Qg5X8ExzQKStpT+DAotruzTMZ2EJKdQJ+Vj9knKt
3Bmq7tH79kmxlzLmNv6ZwNWsfW75pznCAIoRQkWSNUbr4WoM0w5CAknUnVYg
lKNcM3hbfdLIahWHSnoFIUcwigIFakFBbjJRs2VG5tDhJAhEfXeqzU0FjGfb
SEXMQJ3TKLmgrbW5TxUSJQxGUWYTxmdCoUKmAKWgBgSyvYBLN0r+SBETuIwV
HFHUG4k+5Z8RNJO9PeA28lHccdSvYEd3ubC0UiF3tJiUdMmhZWpt+QZo6o2F
PGDI9G83F74JuQqnMeB3REiLTU+o0cNn0cOXegf1gnGtwuBNj4Jt3yrCKNKw
osCPMQ5soV7yPL6IAd2rx3WieiTs7fcJEiTzLQZxTJiY4d550Kq8i1vV24Hx
epSwbNtlt+NOwTBk8S3Kvtqi+EAHsGwYFTHkIGhZ2WpVLvlgMaXAO0SVSQ1K
CT7wpFVFlWPhFLN4C/jwV3kJISQ5WNywHtk2EvCBJsLv8pUWe+vLzt9GgJ7J
+sK+NDymsV0I+ke477pDvEKNsGV/fpTZ1zEWuFXVZj8/CtzMT3L/ZoRIIqd7
0qGOcVmksK2BLSEIqWxD8aczJUN2OgsD8egVi0I1ycFbkJ4P7tBMvOMcl465
au4xEbmr5VgzQ+E6ZHfwXJu1hk2OSAv9nTVPMYSmRZaq4HyQ+lVQgDNfyytj
SAjnFH57HqUdjrAR8612kjDkj5mmIWAWkZqq9YLu+NVPxz9fZX5ZUMcV/RG9
NLxOBX7+bJI9fnyW4n4uokq9PFYGA2th8ESPIwAvZULR0BbZ5GbTmn6JWUoC
KxPL8F5hGCNxDplbdFMptH9v81h989FtyZNhalUNTjATGNzyattu6FcgghW2
RIm43WrZpsrgiJc9fJym8INRfCgKxqT2ApvO+jm29ton6eZkoOarXZA12F6F
NefSx77V2/ksWBEiXhTE4q6swD6ljYjscHReyhs85WMwNpOkMDJr8k2JgDWn
Do1jl3IPoSNwlxEQXJpuWnDaCPTUWi5ulwkqllU4KrbmVjzg1kQQIAQdF+VL
RxB6L7FOTsn2q9PmCMxcoCnKXKJlRVnXVpHvE69x4+mUaX1+n1tNA2WSSFqS
Wg79jbSjKm6kulmYNwb6Pp+PUdX5g7+El3YJDx6Qjt8dClgEclDXWmWJoabI
UcIEQWA7Vdwg/bkiWi48/sicBQrFfEivx0gJ26s8P3/IdpX3CVKw8QSla/OZ
xCMqcySWoRByaBHAiRR3FqkrtbkGPAF8+F6vMwT69oEydtezwHy+Xz5tLUcp
t0lKV9XW666Jh+AT2rZvBwlm+4dU1/hhSxIaPXxbgTeNxQL8FqI9Gw6Sx0lJ
cQU8HoApS+4TypIatVol7Q3biuRoJwgjoEMHsTKe7sb4r5f/iSzdM6keMPOc
Xt2EIeOVmh/noybx1pCxTBu84u4kEIpsrh9ZDGRIjbE8klaqNTaF5B5h/uYd
R20qYlF7fJjBOOk1kqeK3H9kf61i5HNV0iKjniG4cOVLBfdD/JEUDs35trMa
J+sO072rt8BD9ZDDuiYDgP70pogXGKQImJdCbCXAwYt9YIfraIpl2/mpPhhN
IWa6j1WBWd3bG10MxeCLFWpFcpesF73hLzwyDEc9dhtGc00G437WAbZ/JjFo
YAH2AfdmwS+5FCkbXREXl6/70aX+O7VLfdbQQ0Y2ux8eNqaTVt8kqSKbRQ7s
YXPcRDTfYruIX02e280jAqMDRKsIMYFBXLH/LmCZ0fPBUYcwYmK3Bx+Edzb3
DJulZzbM7m+Blp1LwZR0ft+nDkE5VmSQwoOrysr8fQxQIWD03jIi4iyIS89H
/jKMFDKO7ZMRFhSuct8KYXy3vRdM960xe008ttzEHVMWZi37FnPXmHQ+x1dp
avd5a2/EzD2Q0p5fxrTi4RlE+lX3sCbGb2MTThtyZMKCtUfDPqNFRQow6mW3
JPAa9qxn57ejyL3BGJ5JTELNCLgxauvJARAf8BD2VrekswpkGTPFAYNAwf6s
PTk7FqzvByJ7SNFZ+PZv/rIvmDS72sezFfGLb5HiMFoehupEQpYspX3K944U
whHre9J46YHqIWFeygpcsd4A7khsLXs/8bFtVSLsxjUDCqcGRI10linncDrj
OPB7n5d3hqAnL0Z4TCpQDLD9dhB/KwlRxQVd9qvS924zDKoUNDfv1Vr6rgi5
z7EUP1LEc9h3ZCg2HptIqE9HO3I9QLBRBOrlEY5DoCyg1cCttNGFX2u9Aww0
2ILSQ+eIwb1xcSRr9PFjaZ7Wc4MlzmzPZXmWEcwHJ2cdIcNzneRDyNfvyzn+
VtFNx3+lDpZnh7/W2LGb7ADE527ie/LenohZBv4eb+l7uYP4mIHiyX66ORz1
UiTpS65quUEVbIxxWnk9VTEjYSos2anWSs8xd8P+mRsrvDOoYW2LDSYqLlR1
gHJOqM8We9+iYuwmC6h6D2yeOKQAwRTl+7rcuhGXIU8lU+B1LmbV45pknJGm
n4L1eXgd5+ciavoLreaAYArOaTE+kKRM9nJRDCTjYSv2kuwkgTYZ/7ehMBuw
80O0t9kDfk7oj7vq6ARc9L7kPQOLiJOEuaKB8wSkOSziq/2C30mq4n/m8SSQ
65JsLW7rlyYlWESHdRIfnNV1aw9hshWF4c81xx+HGuUCW4KEE38OC4x0T9nU
FdjdG/a/7bRFsLVsLPxzXglyshaErDWOsEHlluYi7opOimWCzcRlPpKsGc1e
zFDn3+5pzlpWGBaAvznKHXMkTHScAi82JVgK0Tp3g3TosVFp80qkXqBvlGWh
SgVaHWHBR72SEgAfpiBQj6yTHrBxSWD7HINQ/WnF07qa9/TrGwMiRE3lGjCz
EwVKkACwj7aS3FwVOX+wrvkib/Lu9kjCo7mCIvP7SUnarrnbcOuCfypOBwm9
XATtNFUsJDcG3gsrXGhd1IsMZogBl6adYblNAAtcnqMWNIl7Rj2jOqDDHs3t
MDH/xZa9MqBu5f2T7OU2xXhgxsW2vS+O0f2GVipxXV0BH3tb/sXqfkTOaW1+
iCZxX+29FGO3n2IcRNg+kP8o6+P1c46uyorQrSQfvryabear0gBqtQtk51Ev
+IJw88QkFkXqMdfoT/bSlTRmLhldOh0nW66UHsqopbxGP8aJ3jdwwVbJVLLt
JhiP7DLrw0ME4LiWuF+nGQasRAfsKlOj+JN++Xv0qeganPwc027A4VWB5T/Q
RBuIvH2YX0nTKhOEWE3JmkRwKxoppC2d0uMwNsO+wARrjImGpcVABJNoKaGP
VgITywzKJ2WLLyBFglVT9tSv6xkTalJfKy99hf107tS3W8DiPMZmgqUXZcaQ
gsqXTdXt+PILejyL/iifcYIcYH5XRv/Np8VqP7dYMn7Hmu07+A+ybQE6jLzn
d5WfZm8U4BHzT3xH6j8lv5SfPOefvOKo11n/Z/KTL/knP+6WxP6K3iD6k6/4
J1EV+CoaRn7yNf/keBuAc5LpOizoIKzm8MgdEXmtFlEDd65TVVwJrd3lFHgs
9GBvlTzCn1iBmyLjEFFBZJWvQsxikp2yGMtY7eXSOr+bkDGnb67IlLv+87V6
ivldz7ODwe3i950osEriylfDNIRK8iXK0yBPF5bqoel/ClRZZF4Sxuo2v//L
7KB/FvxqUvBnW+4g1n2Ebo06rO+ePfvm0BecMSQpbwjHDm6eTLgpMYDJqyfJ
0y+y09fHlyfC7N++xEZYqNzjcAhugXfmeVezaAYvsrcNWYCznUcW6aNsi0Kf
cWkySrUsgHYMHBr1hHs4dc4a1B15d/mqlUZWQgsAfjBqsGClBmfMiQ7CiVFw
GZhP1Ffe06+yg2Hi5Z1NGEYkpyMguKRXgO4k7Tu8CfA6SEow85EI0DDgJUsU
hYEqUZ51V3SKl8qT1YY5Lhuq9PfEhGPwH14FdAZcvQO9d7yc66gpRsTNcvxE
UTy5euTq4iR7nl2jVOz8fJSdX11kz//p6dNnI6kQxv7dwQXRoU+2PBxhCrDu
q0XGA94IhIkwszXnGWWQMgVcWh6Q0oqTGekAahtRMZ8ZmV8Mn4PQO/84eW2k
FagWv4d+PdSkg2s+GWIhup59pi7zuL+tV9JTCRlTnrVn/ZYd4ouQdbXsnbkY
q1mr6Dv8C/7IqdkqwDp7UZs9QfacBZlJ3wR5Z0+UcZYOVIApcN3T+xFgpKfS
pS1YbQJzIbhaPg6cQhJ/rueEB3EasuZepNhNCcNU1WjPjJNit0+J0E9LTy5T
8YKTuUcki+RbkZmXsJRZ30m/FXGJiFwqCOVbkZRXYoNedf55+VaE5JVxh0u7
3CT8rkT46Yz4ll5GYi85YBylmX7NFjIBkz7wM1bJqcXuXuY0fkVJQxJ+JY/x
HMcVrUvGSYIKyJMJ9X5xHnUk21hHsog4HMlgAInfDW8jKZbsE7+NuPSU5skd
TTXTXX3EjKHOJpZH8haNlvsQA4iXYSgS+qTNafldX3FGfrrr/L5jvw132xVp
ALayFijrgRNK27gaYTS+OMTY2AfAfP3iMou7DJF2XRgZd/BWxsxJNdl5kMQK
/6MN0fa5O83/U223yNqBnxITowfyEDBhR49wG25ZIdzV+cLQng8o5S5fMnex
Jhx9tXi4QU6/GU7ESiIQBgfc6YYbIfMe4K/a1UW4TzIMRz0Qh7Wp2Ccu9ANi
lmwNhGjnGXtd/WiSOmG20g1xkO49kkTe59CPIM++/ebpM05oJYN6vTmEcER2
q85/XXMfIukXvGVlBOUWaVcaLmjGoFx+QIf6nuix5iqfA24jUDSHrBia1pTZ
D32vjXRA9lluN5jV+y+fzlE4NOMaoIPFqs47DPZWPsqll4whrYUZcjUFuwNx
Ub6UCAKGze+W703/eL9u4zFfF3kVdBNO8gWuPxAtdEEPDxtdwveIaSAUki7/
jY/NRL/l+IfxILnZGFiYGmfictsfv19l6GYZ3F0eN24INM6loHGAz4oZo5wH
W/dcPz0WV6ZvzKSBNvBb14CDCBAdT/eFuP9SomqKBUPneY+WjZxwJhetsAY8
Thc82dXcgkmsAgvsP65tuAMsbCNZ61jWGmZD5IIpYjd0BE35u9Rr0AO2bCVs
K9sE7U9m+ne18EkkVtTPx2krTrimOB1BWLq0uf1z6oSfZD/W9/A2jtRHYHvV
B8Azz+qwcqJuOF9n7/ObmmanjQ+5iiR0iRduyaJStUP2hw/rOPBm0sY4355a
huzlbScno6vuIv+GOGq3ZRe6+/kTwHiPH6Pqv58XHPXAdC7REZC0g4Ytis7q
X6X6GJK1usQzITkwBs44l+jryG6m6g5qqyyKjhM52GbJGyttS/IPRhwtgQQ2
lzxDjpIpG5ylMSdgWR1ovAz901ziObOz1oVsuMo7XoeBh2iIQkxWY2uO2Rrf
lFjOqNzQFqR8ftI6wnsbvdoKOnIz7ghDl1yS1uY2QHaQsoNRNsTHR/tsWMJl
+yxU0MWSNrKfIAdxm+5TQqx7ebxe06sHlHDuG8LO+KB5R/ixHHkeVAKxsVAN
uOGuep+dR4/d6+zrfXdMjjYh61obqCFl4iIF1BWgtJEsohflZVHmDm5S/A/a
cZ9GuS+5D30PAH/E2h4zimDsEUpaOgiGY4QSz29sk0+XNdLUGG0a6EmS40vv
vUI923H4Ml/dIyfgpqJLfuP2zSS+8o1m1/Yyg7wH3nw3ehxd7fhmxzTnmxP/
BrKLL+9m294aqUVpT/28DEusFf5uJ+TUcJcbL8e5pS3zioDeVK33MCoiAp1a
nitpJX7qEY+nC0qCmeYvcWs1iPAXvrctKWO4t4dejru+GtivKwkZP6Jz6l5G
InziTtNVJxPi7EpuJycBGSnGgtTLpMsE52e4bRVhtBVzD/LWK3iI+lqIfoFc
9cZkdx46ObDx3xNZGjCWEjUuqIESwzvgHRdwB9qfp21nzUQmQYUA84ijF0Rq
UhWWXJcomNPrLd30iUR7LHAbKdzAkKDNbRT7zFnVm+/rbnyFbKc4qJCdfbSk
HkWkS+p9zKjYh0VOrQxDe7hFW7Ka1uEiPUa2OomtCBiQlawG0wWR9bbYzusx
0Y5geQmci7omj9jPFmVgyMb/yz/DbR+gUMPHV/xxJILIPvgf2ZffPH3qvRi/
y0yZF/TBWF4BBGFPXGHc776bPHVZNiSisn/+5+ypwdJ/qn1cuZIm2sxIUyUy
2knfDs3CR2yTANnsTsjRi/QEj1r5h2zwAH6i8zkCwr9psuF0DTXNq2fc/5mT
zbSv0UOdd5j3OJZgasuzX1SezdJXKF0OOXA1dLfvlsyGnf2xRR85cxiE7vzP
zqypkKLBQiB1f08GWhWzq9U/kldu0NvscWgfGGLPpet+u0v30w5dN+jQ7fmp
cQLeU30YnRVDicQ9+cLqnF8d88BRCpSLVw6B5e7UOKNrfP3qilNDB2YXZ6mk
kPPmszGfDK6u57IG4dc+5NYfJ7sfoY4PzAFvsCFcljaj63X+C/jBHo2YDysC
H66QDcraRQjvj3DwGLqDz8vSHxgfEtiHKTI8GELr7VPLVx+YdwBy9L39okBZ
fIBZDHwsZlz5cNe9417c2gCVpcQvgm4JhXseqnjonVncKrxQI9JvmbcrhUEs
4iv04GS+/vx1SKarUcP4lx4LfcRgYVI7MJf6YK6y01b3Hzdls9Ms1UAL6vBd
RBvLpoT6rK2N4nA3clmX3x7GsWF5J5m08IAaGEvos2feIE0sl1e5zCd3LKFf
0s9M/n73dAwAZGhZqPEpA9ySIvYsUPLAqbh31hia2YE+qD/2wRgPwM1ahwm4
o0yw3CD//OYKedM+bWeFQODNrKhKn+PyBCAcSFTtP7a5diLzmNVp+oK/vgvk
Bylcss/hp5cFfBDJLx4CPsJCPxQ9svc1UEjnfRlGh7fcj29kdBRIhVaykkQy
Ms1Fihdzvibcg/jrBJN8pJuzk0cZn5ZTGDutVZwKnLLeopCGokXYvqRvBOf+
B9/uYW4A9OE2SX03l2uvNHmJk1W5NUoagKtJ3WRo8jxWjZHlvoWXA3A+kq0H
AFapmkg5VQ/MO/yOhg474SnUR9OsdCTntKJxvSBbCGERwcKU3JAUWMh2Zl4u
y04aqNs1R3qa5MYzcNhUsSpc4WdjlTSf7KXQWCOW+AzDGG29QsaUlihJ8j1n
meuM6LuonjT0Axi5/aLrFE86ihPyKsTshPbm1yhRxnirkoPwuZmloXNw6MPP
/T5vXdKaKK7Z47Yf6mzhVIImaQXg5yxLqjpXJw5NYd76yrADBeI44BMHQ0qS
yDjHtdO9uDhrb6RH0iWDr69HUkpLSf/uaRxyAbu9r1NIKpdAeqT9E/qrS26I
+jHua6cvkG4KZq5bXhvg3q1XBfr86KVsQ2URmYEumdKLEH6Jq57CW7p7rkY1
9hcU+bJ1ccH2gyRtWjbnxZPpv2zydYhrI+CM3fQ00lpMObqdnJMdhbB811r1
zfuo94OEGSjbt0ZPmznq9tMWj3tkp3sRQETSPlhKrpoy74YLOrzLP+CrxG2g
enNZbolkOUXvAXCRpIdJ71XomyXgdv6hBKG9Z431euKkfW5c9KDBSGBvtB+X
9dTtYX6wU4pTed/U6i15KbmuUQpfdua7nBwkDb0OwcCv2ZXx1BMAKCSP21ua
CWi+M9W9NXeQ1f0JZ2ChXKlEgxXRACRV906qrs0eE734L0VTj2fwINF0iEY3
TJtF3qx241YieGnO8LQp50sPtphvQpSQk85EpLq0V9bF+PmhJ0HpDSFtmb2+
xmXV9LuvkKvTDhDToLHHbYyRW9lJcRPoDb4tPIU4Y0B4B+1AoKSVVQB4CH3C
iZn63Xwe9aPhrkYKjC+liaLo4Hjou19qC/exwbgGktrF+BtN7DbFr5NSM9/N
0UUqQwiPB0AjYktbNiTgpYRLUIse5uphs3QtF/Wf1Z4UvauR1NjRUpd2ktxQ
bb53aVkiSGqbREmSeSd8IEJZ0irmsGveUO/2wJIEeIfb3KfdVyreuGhnQn9T
3nKnNSiLIvdpdxbAXOXbanYbu75Fm1K9IrjluEHKEO/hnhDZefb//b/PJl8d
Zj43X+E+ZlzBw0ZS1OrCd2ZrnbkPfIqIR4a0Jh6Gi3gSUMpOrJaLfZcene7E
572RDOaagv20K6/XRQUWSWO83GcqWvfkOCdaMrnzQG8xRCb6/0H+DHT/c73u
f7Ll4V1SoMqcytejfrZfmsCfQeAFCrXqyXRqXyS/UQ/znhUfYuSSxBkcf3Fk
TQ3KYiOpUFtrJskdS5DKEcOKcXpoWWl2OBthUmcfighW+T0LgnCOIX/xiFu4
PQCCyliEcZ2XS2BMNN8vrl3yb1hp3XnJiBlWPix1oiqajjszSkdRByHVWi1n
4t2bkPp1AnBdSUQmvVuzgNJXTjSbGoiNEc5NdDN6tc7+cV4amg0eFJPlZJSd
vRtl766yi5fHJ6NM2yGfnVwcDqiatk+yH06KGWQD8n4pmbhYUhilBaOhNKT8
qn7JKdIl18+EJQzt8gCSU4jgJRaGiy6gVExb7w4+SzWE45Tne0Y68v02Bi+w
qfg7ZxrJZ2Y8Ctqv4g3vE5+LbG+JVuw0rc3XlZtTCk2kqmXNoDt+U8JlBnHv
X9W0i5UgAZPka4px1Mdq0QdCTkV0nOvaciFXSvnOsiQjUZAW0V7Gr+MZSWt5
n6j3H1vi+0CnnLh3KHwJVd9sYAIhmDSM2a2W21rnJlKQUKnVnzLLacWKRm6A
LTuLlz1KcvLijhQ97DH0ukSJAdtrllwwtMvRUQpo05W4svaShL9ojUdIjjp4
YmI0Me4MHDVzFMsxhs+2wWpSoofjRRoCeI1A05Stdt+QuzFEYtYB+MimlwCI
RVSgfrvUHLwK7rkAjK0zFoRYgTYBZpkvxtMWj9xY9VI9UKuVFdLHS5eeBeak
Tg71ANv0odhxSmUUKgVEUbvnbj6UrY2w73zWsg8tA4cry0SFRYPeBSt57M7y
kV9u18r90XJVr0VhFqd0lhiB6b2QRC1Qrbi5GBQ+KYA3CAkp6myYwb7YX7hP
MePoFpLafSNnEzUBfoApeaZoAnJjPa/gG1SysJCGY50CLGi6HKOrerfepkYV
8x0jt4b6DWGTbXra8rX2KBKAmqFLcvwzMR7e/s5jTPD0g4s33mLQiv7aY+dI
3Am6RXvLoMFcER5kvaZbvusFw+ef7322z9STiuBIanuuLh0oBrqloS9qIxJv
5PrYX2Y/f8GYunxm2q/QukOmKGOqsMb9MzUcyA2vtnALSyAbrltM8G0D04S0
69/QVM2k6kJAlUiJoetQite+rwiJWlfQ7m3ych7nACpi/kHLs8kAIkIXcK/j
nBuIlSY3ouOSakxhx2XE1TbCehH7xm1sdZK6otY7+ov31yZZfLeAn2z33wsj
2zcE2yeQAG4sDv/e6fk4ICAXED9uawWFgKoj5jOfaQ8yzh95pUhZax/7q8hC
ALBKsVgwAWL2qFnU7LWwtVwkKcwplEBqpLFNOnruhylRpsU/PUpg+jb5zsn1
x/WF3LF9wL1A10l618siKmj6LG7AUEMhYxJuL+WUuXXf2yTqJ6+byS5cJY+E
m2jprCxIECidSaS89HTDkaXuu6Sdre/+O+heTEOvoWyaJukTJC0hRJ2iPipp
Kx59qnUaHePlyxMPEq79J4/ZI2C3/7+zn2Po5khMN7Rw5AL0aWFQXurE6iSb
LSFrzuOG4eLijiNWcG01TOoF3PDVBpvM27qS5qacXuPVmInrJxyLkaapInmX
pNgU3rpXp0kMmfIKf9Sy3r5YkF8jbgNUIplDv8mnQPym+zq8iwJxHljlKDEQ
oIWOz99GHTLVX8NzFbHsAQTAmyKvuHIsxVGsF3A1I9UZyMHSKUF7rPv1SvXX
8cBqswPc5sPeoumcTfNjB4Zupy9rFiBI2nduAs6BJHziekaYF9BSQyq1tIpK
ORmeDnuMvWs0uy2XrOf6XQLJVFk/u00fZlEsWG3eRPWDKaLkjMvTlzSy7eF9
Mb2t6w+sBxmyjfZq9C0quQNUaKXh76Cqm5q7xJ6fNbp1TuM6RnrBtO4w47CD
zHTdwV//ej4+nayLbUXMZxx+aMieu19/PZRuprl0paIT4WuhybT8DnrG9Whv
T2cwSpBKnR9pW8dwDK4LTwcQ4ihLlY1jiti7dbS30mE9F5l/uz8O+425g9sq
7yAr2wig3yi3Q8HUSvL8jE4Ye434dqHZijsfJo9aeojCc/Xq2Nyb/Dq+LRub
axM33/4iidg40owR37Xt85xJWC6CmeiFBIQbyR4RLDXNC8sOLs/+9d355dnp
8O6wba3UluaPfbpbs9Nuzb+9V/Mwx9EezpKAOdTDOengfH1bJu2ng7gVD3E9
0KJairE9Pt8R7n8x2AY6VfZHbrAN9INNoIf3NvE8hYZeoUOy1A/HraCdBbH/
wUbQpLWG/ssuoIY0pBWUbdBkWJcQtC8FpBto7WxAalET70gTsTqEUQxdLWV+
vvBsLs1wxZXmsFqG0qHb9u7ylcT92YeX3WDC4+dPn38zfvrV+Pm3k19ItN7A
ChbvSdk0dRMm9Fs6WMfdpTsu6eJqxbiTtUuWay2vtdricy2tw15xrys3kJX5
ua7WrB+dzWrScbnqkqgIjvwYmfK3N5b2BBYjy9vIJY/sOHMNyG6ITDSlt4B9
EYCit7TE+AyBLHrmP7Z5ZZ5A6Pks7me7bMl2ZEdGI6lPdjiGq1KJcsleogAU
p9UykvwdCu0ztkB0u1BQ7aGHAa2I5eziURSsx6SZCzopaGOV+WoYzf4JrUE/
1Wrj+raIi3l8/KyMLspD86TdIhahxRWOtFJmxIwvJHDgKSqRWBXy6H3O0Xka
/ODH69e4HksRyi4k0ZxcXY2yP9CFvGLJT3fvf1f2rcttHGmW/+spKhgx0aIC
gERKclvqH70UJcvsli0tSY9n5o9QJIpk2QAKgwIosd2KmF/7ADvvsi+wb9JP
snnOd8nMKpC9juiLDVZlZuXly+96ziI8JdNw1S4jRRfg5OJzRf2Fec3Q8oKw
uQENAWsq7gCJJBkFa3SBBUG/KIdpBW43Y0UoxPO5C1I59UFGq3fE7OY7xJM3
ArNdyMU7prnZzh1ZcmQK4pe7gdWpaZJwg0kWDwiCmnUwRW7Ft90mEJW6gtEr
Y8VLUevJNr9n78opUMUFgErU87ssXZVuYsJTEfNJbl0ThYxWPX78JvEc6tzJ
8VKQNOVDk1V3T35HAH1qHMwYY044S0cADdLMaM+b7hEUv4po8AKDdiFZaf0S
MQeQmDNQBTLMZI30666AEZKOzKybbFyAe2zpcBzsC6c9n6XljqqdIt9hkF/O
sbztBGt9JjXPPIpQ1boKK/Po3et9HRSO4nYTV6s3uczb35LiQT/frHMYz7Ho
0ZnJmqQwOfS1DoNCcmnvQPP0ybllNR2f2yXUPHyOhx0whnZiHEb/k48/HCbw
IqH5FlXzOz9YoF9rexVrumO+hHGwSvZp6GIMo+3daxyAm3ZG6SkgeWX6U2LT
R8EE81nJ/tidZgYJRKzdw6UegPldD8nGD0i45icCgx4HJlXJMSLGuPgqSIvo
tJcZMFHiIx0VljMZhkVEbJUa6Ug9K7gTtC4caS6WTaEabRe1ZOuJ613r7hne
E1SEP+UDVX9A/SVM/KqV7E/Jtig+W/ZcT5LY1la73wRTzxtjdSRghUnzJbXi
QqNIaD6ZCUVgX6bZJ+HY3zbrdqm5tTKHclIVOTCPodAvG70C2HnHOOLUSr4/
On/74eis/LG61Uh5CsDW89Fo8dL3dyDYQhDJdMq3y+tGWEGOYkIluYHr4pF2
AfQmdYmSPKZftNT3aDiZIhZ+KcMj/Bo1e2dJCvMi6MQZzcTINiYjGmMppA2b
1E2UIk2FA27UvJ4JCIHX3UJtxVpaVoUe/yy3viqnn4KU/BU8pOJEIVpsw2W/
ifOkl6CwIy59rlEauvxVsoyjPYHsgpOjH48SwDB/RGFduZmLtGxhmH8TW5Wt
H+4VB8gw2Wp874mH1kg+Pe9R3P3zu3umVEu9bjabVffqyZMBbbzUVB2V796e
Ry2vFe8hrAOpDuwS31XGQarIzelPhc5+JwihcTpLLkUPQLfnrQ0KTzDyzLMb
Z0teTRzBD0A+dsJWDtul+C1Ixz18tCEU770q94Ihu4f43x6F+ieLQYY/HRw+
//YZ/8SCNVVk8Y4bRS/Onz59xf/8hzRiPhfrAe38RjrvPeOx79Jew+8pTHHv
T1n5sP8x/O0rO5PtHHtAWNn/Lfz7TZC7eOne9d7jk19H9jok0u9qQF75DX+w
L/76258nk8lX/QTMa71YzXXmgvpYZ31erNvPXf27+tRXsmZ6c/j/31j2Ytak
1vT+rtb0nd/+nKCs/Y7JCHv2d/aHF7Im8MiraGSOxchE0ufm9zXNN54MWtLe
sAWLr7EEc/rbn/+TXzqVuhu4aXAdgJKFqZYXF/CIVBvjKLQb3QB0fzo9KWxu
4EdUON2uvF6325Um8AscKKdV3HMKCxoFYLFd0r+53jJZQfCBWc0dtNFgeO7/
Mwm4a0OHj8XnJWtqR3k0r5bXW1h74b4EivsnieEZgdQnUQ9G0aP+SZjWRkug
51Owh7c/Qc/ddp9+XfDNiC88CkOSSttP4fYdZbW38kuvTn8k2QdfvBR3lBTX
4oUeLLkmPlBEfwo6EVCWQU204jdhaNCg04Ue4Jr7WmmOSGeAq05fcpdhwhQx
QPevCdD5EGGmzBBmhijlxb0o5eVOlPIUVj25MYp7EMr5tXqgp7xyyrhB7wMk
+GfbK5LuZTLC95MABYyS3TcS7ie5+j9FXXv3En3cfVVqUt5m+En3fQgzWSyf
zUKtGd+4Mvv2s25Lv/C9CluNL7vHdwD2phqrjHhdMTmJkRphigQHd3gDOJz9
sg/1uKrjY537QPiZO79AfEdWyKIlEgqxEF7VdK8ceaTx7yKIZyStwZe+DYYK
K797CnljuQKxdDqjLWf0UYkbwspBRhrhmLmrDNjc2Sf+cvbhRwndIIBCX9Gq
3kh6jcBEE8nczH+JXBWEf0fcw8Y8llghxLGCFET0yD8+/cd//fe3L/5FTG4W
HorpQ80Wl0Kh0lvjYj5Ww65L2HbKeavRtWWblnLJAArD6/Hw2OPHx8mYbC8N
quN2WD727CZzOE0lJXhsa6TA+Yjo/t0XjhiMMVLxd1Z9dIrv6P8NL0yv/9as
puEB9ghcR0WXYsWa1S26l5KvXIDi4nU46fNmH5CMYmP+nYG03hIw1iSbHx3J
+3/rNrNp+uJZs2iAUKJPt6U0HozkilHXWZ22+fedk2V5nDB68MlKUCZ1iQZ4
35+6wmwDOC1R1m+7tRtYXMfSbjLt8k6RMj56sRhFuzw4Kcldczln9Dqc5xkB
BYZjkfZGGiFYwwqV2DNJE8rt0iaBB3YgenQ2HWm91/6rEtOOAplRKWsujAVF
nEdzuk0GE9wLI/vOPH794VSgkr99+fzlvkT2LpoluMSqOfP2eI7DkuKY0wKX
ebBkB4KCsRnZ8oZoEyQNQGr1K16lB+3J5UW7nk7krbUvGCHJNFx0KZlifmQ3
bUEx40+HtzmOIdoKW9Xvm4hwokMgTn6xcTnZ9LNcqLNpkrJ0P3CFaA0PpSuk
rtX0nGTcpbIEuZh3SJswddN7b+Zpb+suQWUTLUXnruhtW/2zuYPieFWghd1C
BncbbsJSoa/w+E1/OPrLh9PJDyc/fjid2nU9pbU3lX84lH84xC/7uzay5g9W
s7I3cAsQwvni0eCu1hrYo17KHHIb6kETconoSwL05J9upB709+y8TGMpq0wK
wGRltWeekCQpD3LJnoIrInFziBSX5KcFq7asc5KTCAKLqXm+BMzVAWHkAN31
EecZay2CnnV6qBqZ8RJAdNNQ+9oeUALBggaqRP6u5T84l7cbM5pOpbemhwSy
t91JFX1CSn7sgHJjYAoZdfKS2rDCi4hB5Jlhj5ZMK3btheUuI3QDP7EqneKm
2g+tnmBCKnqtY7ZMWIgfmnBUfb192mQbX1SXv35GwmNMW9nlMlRKCjrVpmFf
TwdOROO5JOMNXbZeIoM3vkxjeLtwTFtgV12H0YVV3S6JKa9Ld+8RiahOYQ0v
gqnFBAX3d77S9nrNFZJdKT/Nc0dgqqsCiaERutd+akSSWkr95vVwW0IIDLfl
KRKjNbC0roUwJQGz6m3Q8MIxGjQJRSuKiUhydDqFsPI6NrZ0Xzf+VH8v97vJ
ELLwg3mre07X/ntwKxpyr/gwE58lfJEyKYPNFyWWhD89nYWInZp+MEPATG8G
yWJ3MSG1VdYsywcv6rAx9g0zKcjwN/F1Sb5orpURs/hZiHtwvnoD7JiSWpF5
MXaUP5TkehdRXZRKFEtDDJPy+PHhc0mOAJeT58XPLNkdvRvi4UVNIpmYmDkp
32zXMstNpwUrDIa+bkHIre7JyGITOp1vqmXNIhhZbprH46FT1xYsn8O+6meT
Xwet9WpeXRsqN1XKbhsE2eYTPmXqVCZzj2dhl/RPb8aIQ0n/9vy7cnrGllyv
LMHxE1Srb1+8fA471jJdEpXHHfcNvdsRDjAdwR9gpMsoOeEFr7f7cC70waq3
zrYpr5tbxQXOP8mrlXydmaXBbWYI2Xa8E59AebJYIKlDhPrJ8rZaN5UFBqbJ
g9OEpEn4iyzyai0x36errxfRzi9611P5aKpusSe3vy2qX9r118lvC1wJX58Q
tZBl5jEGceVsU8FA9IS8V1kgNB+k3FrQCphxv9CEFRm7C5aCvopGA2WUr419
etzGm0oYo6vFRXO9lc28aYe5+gnvn5M0dTwfR9px4v2w2ZreHk6eT8OyzhGu
Tp+oGaJxF9INge0UdLPLPhfhg8nzyZe9acaft3EI8D5hZDIkOjY2Igl2jUkw
HIPSXxO4Eqfwlp1NI3Kf1U5HgTmQrZP0Nqik75FcU8kvf+g0mk/ayV8tt0p4
mU3nQiaA6PWa93jmxXe/RNkhPmH56WK7WJmFUH+B+dJsRjyLnsusotyXFTXY
gPFPxL0KPOMzraRxAeuPctq4BNfoiYD/k6iM6WemOciS97ZMB/6W+FC08lB4
ple51IERYwL1GBsD9OdQ4jGwwZDJLNs9aLKzISA3oJmNsU14SuBxw7SErQ2F
jVkeHNtlWndu8ljWFNQ72aFzPqz53fA4Sa5wNxQVAqlodV1LmtdLM3Hdi6PD
YAWNqH9iuDaizEZ5Ejbnk2ksR9OqvkKpzq+aL7hFMYXVkhtfJEK9mbhYFBIl
rylJChSdOZxZiYRk2i4/V0QsUe3pisRsor92rsCKWNW6zELVUePIjji44GJ0
bSSdKFbpIfARmhfNGNx/nGYI9LBRj2FOjc0mPPVwdTi57j50rEdeMO6n4ZvW
U6QCljeVbjFb51zC04hiJRlZEpE/I0v6SmoBdxVoISiNZK5dN4tUI2ZY3Kz5
CqL6SyE1nGJ9p+i5Iqa6u3DhgTmdR8s/JchAJDeZIqCpAg740K4t38uTh/ww
Orq9Z4oS7mHeXIhlITq83wwq7bNjh+O1XYFs2bYS9ijW+vbZ5KkUQ8kQ0loc
JocJGR1GwEd1xCnYmkrlZPtz82sla4l317VGO8rlVjO2Ns1mG+sJZut2tfId
DARg0fAvW5QgoRJf0p3Uvvbn1POK2uQmgv1IesftMxst9gcz1GxqTeX7k6EE
MwwjiU6CO8jSVXrabw9tFgwhgnOnTYu625krPiKr24UvRw5xurk78xpCtbUC
ajG7lSJbVnAImI7dnsI++yjTOf/xv/636ZlBTaHwl9RO+9IY7xJMQuTYbTXv
kqWopFcS+RVOl6Iil731g7BrllsploIZoR+dnh9q9l05b3GtdDKQO7Gt8vmo
VFLGb2KUjRN61MWaalUR0eWSxGLZdarsA1wPOuahm3Y3a9hh2GdvkBwYbiA1
9urFauMV1XK29HNdonkATpEGBZhX5L5JyjtFfa4jwkrf/9PTwqhj+/XSoNKY
c0S/4a0iwnsuubM0h8XqLiuLDS6JIMwTa0wfLKu5bGc8/wrEQFfT48c/6ZOU
ip63aEgHAud02AfHFMMsbpfiHpNHkYmg38aHP13cmbCkOt04A2VhX+Ymh0uR
of+EcwgKINZCyRbj2gppdq8/LLh6thN/hwQxcW1BVOullcgq1Mh48bbHv2Ry
LQExXa4wuwbaow4PDalFiDLnBlK12zPFlDRddq/rLU1iwEbonZpuCsFGbq+i
sYh7QmE3ff/BA4qb9p4ZzCvf851/pfA4+eYvdB7FATJFapSd/6kHurJLVkVt
32Oi1MBpDpVNZtzSHJaqg9sFq5YhW31Oenc771nkaUeGmSBAVdxnQgS4p2yX
6KvIPCeKtAd+OFpD/cEPW6HYaCKRBbeO+r91VW2OZCAPndoEtUtt0KVAM5he
TXTYWSGzZh5wl7TPniCrKMhxzrjZBaq78BLziR4Ds6WYxkVK0Cgx9T1DiJw6
Ios7S2Xn5W7floFOSJ6bKHKn5mY1Re4cFMquwOUuk5iqNx3kiHlC4iMrjDp4
Ojncnww9mMoiAxd96tatviCgfKeZ59GrK7muTK3V2o5sbXaNxAIUEaEFJDjV
ZWKuFO0yDyJAXDnCTEJEepf7hoLaeX2tAfXQXtAxCbqQHGHdeo6OS8SviOKe
M8FR9YTSm6IZhEcc8Ih1KEBaeefsmbJwH7drLIY8gG0XxAW0bUDPr1mU1SV5
pq4XAnsvTEpzyXjVfN5cU8fkjDEkUuScvXGoiLrcg/c1Uk8eC/VRzOYYjvKG
ZISUJ+15n6NA3jQpQ57uLvbk0k9Q7WPOPZNeL+EbDSbRnG/Mq88GbSkCTIM4
jecPFI7/kmIvWQElC4eXVrMbAQbuZSGH4TgPz4+l+JPunw1AFSRbhE6cMYWO
6NqXcM6MAKm3ILxyD71Q2P8EAQo4bgzFrxsvO0EQ6Gy7vq2b+ZwIL8cOcReP
3It9h01n8jh3hHhVUE/WGhB8EBrdXVjDBcQGA842DZ22lDXz4DwIqlqbVcGT
AdNXK/ZGY0SuQoi/lnDgwWJv51sUrDZzM1lFM2bgtV2EvTxy2wDFBJ3QrtzA
bwDXTTaXSFGvVlrue36T42mKppp8p2iFFsNN8du0HDN8d+HfXabr33lZJ6+c
u6hhSmW3IAPkWCAF4Zf7ZSuSgoNKNIavE8rFOPL7fbcWc5IavrzCiYWwPNYx
i2TjHUlSEoqgBBTgJH9ZLUP4+1S3lHp3Wo/h5FYL1IEIoK/hdc/ba8FmfP/2
NAWpC0d8G3EBgymOc4ikGG6MmG2jyXEG+kGdRDet1ISMryokKSZRapEevUpv
RmNl7wD6LEoZyRXy69TqlKHyrkmsJtXb0mXyvdhm/onCNdasx9cVDVl5DqqA
AeqdZEBM5YW6GCAZohgslHQoIrUDwKjSqektpatpuI4EOIcpB2Gq4JRfyoae
lCc6Cp9aDxUYQVTkWV60wOToykffn/3Q7TOuiRT2y/XdagNg4NVNiqtp7EHW
gQl8G/3q5q6Tor/CnAoJEpJMBDwZlO36MmfyXe2dgVqH5Z6661A5ohR36ecI
TJQ86fVhRWQ4zZGefWR9yf9jG7kugbAUVKl6bTUwd9TNM5w+99BHPy52Srgs
YgWnjLNIcLMgxmqt0pWiJ24yfvp/AOVWme+WgnaVIetiDsIoe+dexSmHcy3Y
U+pOVbYgugu1jk4qcWkG7WxGKcHZ/VhbRknDdmkJKR7lzsEmlrMULnyA19LX
BybFez1kcEzw4lJ3cm9YvY2vgUYtUDRvVYYMtxFdjqVbwdyQ1LtsE1/N23aN
ycSnGq6YyRKLEiVn5fz9WXkweQZ5rdgbGpJ7/vybr18VRs1oOhKcOW+g6u4W
UiBKdLZCXW7N0o/hGF7b8FP4s/kxJ+VfayqFLKzvFYghwkr7yY9UOLXkQppD
hIePUnHPrZvARFAMzwz/4gfcZaG7IeNuApe4654hpq7BNKXLXQyoe4FnSezP
1vIte2vqJ9XoMMKEFomxaDzBCGoDxWBzl0kGVP9G8gqxDPe9fDDGJtQvlX8N
cAalTNvloJRo23Z8KfysFtLdGENAVI2Tv0j2wXqRyiWBr+Nsnyb4+foXfL/h
rtcPTbiVJzuJi0EqD1pTrq28QDJFmXdLoMj5mo1TRr/8RXmBgk8hDL4zzeRD
rl3do548fvwx3Ey4iMDZurHdxHOyqa6ujN+aThKAs0qAZHjfFqpfQIOg2jBK
oOwi3tyqWTExlbE7v5n1AOIcXLdFgu+Ow4Y6jD4SPYGvgkJGFcpj+x1gA4NK
KItN9cHuH3ppQK+lSNQZwi2+RfTba3XYOTyV1oYOiGAEl7cWcAVNw5ttYbeo
7E8Qj2QiFzUpgZ1joEjzHpIZXYhFGoaK+9BT9VQPfJVrc5zBAurb7omP033R
Ih5ksg/CLZpQqk76jeF0YK50zu9GRjpIoeRT8B7yYAxOvyZcxoajwy0kXxQs
75tNkuxBX4vtHM04KTweanFp4O9PgP0nzWYAS0LhE7q6EoAnLSQo1CfgRDcR
2VAuoSC7c8QZ0SQ2ms7m3+AtSWzPw6i65Gbi4zJY2reG49K/pbnoJoKt4qj/
csGZlwC2bKxRggCTIoPVajlpaacElIL5HPQTT4rugi0c7LG2iwCWTOCLsJVu
WcSxJNZTkSHcRXtrImZGasBFVNuHZKEZOdWyXVTzZJ+r16CI2LgJWEBciUTX
YQuNad2mcofn6zV4K1vGxPSTrrZLu78GjDN8gQVa8VDS/Q2RCqfFXJhKHj/+
OczAZl5fhINXr81K1g8G2tjOBddT3q4ToYkgZuHuX97CWlWiIQxXXcVjl1be
9zqRUyyd0Ksq5Dqf2+0cbh8ijg/XglJuoyNaO23aA86JInVO2JlMLXJD9jOL
XMRadctghExVOEg8/KLWamEEE6ni18v2NM1ORmvOd0roIurXK1h91dwSHNl0
hKyfSfz3Pt2BqUGa8gh05kL/X/Fg1HWFKiupluvdexE6mzxWpuLhavhcNYIS
cmHLA8+rshbAr58RwkiwAYEOvaZBmCj57ycJS5QUagdJNT4Wrwj46olnQiHk
qJjlLBjLl+GwGBz8gxoJUmoVEX3TXG224Sl7X6PKScP1FQYixqO8JNaWHMlR
sfKBL+stnZfA0TLvEd3xXCI9d2+boMcs/+//CZIVuRqFjaCrtlfByrvZREqR
JI+rNO6oHkS5JiNWCh9TGga8oo6reSihyRXOr1isqA1dirdi94T9obMNMlDm
rt2VG/FsMqwiiKAXB/8SHoy9lClGZCcIUJfCAEmFeBEUnno9gsGiF/SWOSe/
COOiGIGh33XjAEE6PowUmsJKPMq4yzKoeMTJq9z+jQlBwqzFJBzL6BzMQ1zV
InWwOVkxfMmd4ZTqhGdQz20Oly+Zx63la7cyBaot6ftCb8Ka4RofGB75GxAK
mRfcUZFXHDNBYyt9psIodALD5SQ+guTgxVdcuyqY6gFqnVYiB/L6rL5sJLIw
GGqcR7NUCqcFVLGzG0Fq4KLLvBNiBjx0i8KWhO9NFpykp6bW0u86UAjLXCFU
lKncjSKZgs2C4YggxdeSbWpuDnGqdCDumElgjcbftaDXrdub5kJ52cLF1qwa
Tw5UA0d2q3qh2QZJhIw/ev9+pis7ckWarkYMcuw0XgLhB8wH3su+aTTU04NU
ph3A1Z1IbqEUWVb5Mrh57l2wzzR8VCwsC9vljC6DekY3zKJRq+zg26dmjgG+
8jMJhCwxDLtZXI10O+6ku4oag/5F+ACRTE9FuUiWa2TOJfvXcGIyZh3NDhT4
qB4NGScIu8WJg+6pzXX0xJeTb0f3LqBwWhSSjoHB3r/WGv2PjzqWmFuGiRpP
0gJ4KBgy5TVJcgTVF9LvlRBTmSpH0bPMwy/kE83yFt6A60i1oANYwjHzAC7c
fZ9UsJIJCr/Cm2pVGxgEgm4hvMW2DUaMJVzejY1aSHx/DI4QWmj8S5gHynOZ
ngED+o0DxtGEAf1DkJt+NRdm3YjrG/qERln0pJjYEeFnxINw/zCBMqUmhUXt
hclg9oiXjRek3DSrkbo2XZcRnlDRjhNpWkj+aCdlE1dz5AWSUEXulWjUP3Ax
Zew+5XfqfSoGcvph8cwqsCAJgpYRw7XB9pRodh8+zpOPOvFe5g5UCzTvOM6X
7KJI1AgLmDMb8Bi8SATOMarFjccC7/fIITh8ASamMtngBrzpajVVWGZWB4my
2ijRpRw4F9KDeRZ1D2kdXW2UpLUw4xDfESksSChrzVWu6kbfzDCNe1weyUsm
vqF1psqQbELdoMJ5akp6EH0zzSUWYjQSnWiy7q79w6+9Rt4HfKY6Mv1WbjwQ
W7Ryiu5RiUlS0wstyvKyOupAZIDlaPj5y0hyYM7mNpveDs/DFGyRmXN4v3SM
ILGKLBjpI6Jv0IutdOdR0wRyg3b0x0PpSTPUnIRR6T68RaXZEpQ+XuyhjWWV
1lWp5Q/XP83vuZJYOdZpvPpT1OKy3CGOgb9MQb8BRCb082f3T4SST9V0T2vW
Yzj+QOZKnPirYMSOSnoFPdSIzvssXTAnEgzJQQREhZsfJuZvSiTbPRJkUjmx
reNGFJPQZHtJcn+YDuUPySUs6Mt0hdD4M/Vdi6Eu30pmoLGS6vVC5UHgts5M
Fg6HxOTKUnYkbwP56zAOlrBW9oQJ3t+hmboyQEgdBdra0X+CA4iRC5yrIumK
QqVwfjITmnpD+Ubk3jqNPJDjx2kGE/jhnZ7YaECkZ82y4VwMJseTngpRNIzd
ftMWSteNhZuFK+2uTIBSr8JZqVddefCP//rvZzoXipPGTCc46szyCSLS/YQf
OYlyizB4Mr5BQqYhDG78ZxBB049AEOlycOtYzL9w7uxK6Jb+LdN8VCWVDHP8
0U0IaFP9zMReDk9CGGmuWaerFufsLuY9LvIFfE/uzpuU/1Pi9u21OtFLuZHX
dObSc2ubfruciwmvB1LDYU5FNEoIX1GOg3qlMQuEa0lYyJU4epjJuJcnLQ0i
m7IGj6YW025Wt99MSYKSKg6au+2tiMq6nxiD/CSaD1nEeyh/+01RHeHdp5m5
Fn2W0FhOubC8M4qp8MkCCVsvZWv6HVW6w0S7sNIHI2SKUJSaG3jy8fY5qMQl
9yVMhj3wSR74FCbl+XQUF4fJBvlaKyXidd2O161gTMrJg8eGBMOugA1msel6
Xh2UWwEUnNOafhp1lbDy4p7t7+2LbTOfSTmYOmykXMViAhd1OPFNS8+WggHp
igzyesq3UOvkYNjrttgbq3nKyMwxHIF/5I6SjGvQtdMJKs4Lnb4gAuPA1V0a
dzcKKNR1zayHLsJLQL1l4VBSbay5lPGVosxfitFNAMWnaR0cqLLsJAaPVFFx
d902Vh7HPFxaAJ5REKMmmLRZkGS0PTWgv0P5pVwm0Gy9EXOElc5iXyShSZp4
9+ZMJcSuu2PBxe5YMCO7QzqCu7paqxrUa4aObSW7iakwQ+shNZTdYT75xi+s
QnE+KY3PYqAczaF32Gr9KLwF0V+VO4PoKDOGnU7P6xOmOYT/Q1h9uwj/gIR7
ZmLv74q2o29xq5fez6jMAuRJcDwfc8/y8HpDEjyZFirqnJ17NCBBZPPSiiG5
3bBi/FW53Eq0JD4h0UINw9KfA+ZAiH2pbRM3P4u0txLU8es9msjiYyozrGzs
vMzJYW3ehBnjvoB/KnxUMK6z9j9nYSALvXsn6vCWMm9z+8tsY6mWbQbcIorw
Pmvhoang4u1Shq+hWrZTJ/vMWp5EF4pVTioWlNMdsnS7bCxRTgwJZbihe952
sEVed+zyJBg0+WY/5kgbpEh2dl6VzVWi5l0x0zfoVnZ2hydU62V5SEe86BLP
babQWTQ+GJFYDHFkW8PNJvnQ+d0wTKQpORavKXbEayiXUt5aiXlqdFRkFi8/
TPh3SCB7LyAVihmz8Cydc1pGJBzRInrhBWZsJy+ztsCHFN2ug+16Ua3XYIax
VHhEPi8bCZ8yCWNuABoYApKdqvUC/kWr0gq3Rfj1w/gpkzo/jA+SQ57lUYCy
STSpPw0L1bX8ROoXkB4oJQoaV/0Sge+4d5jBJjsYLLqkyLJxHKqOGGT6SPNa
6RN7ffjag2LbniPJCACuCSN2WxNaeC01Wmm2exE5kfNvYwVjxWQzFNZVjQZH
hZ3+StSYB4C5RM8+53dRi2/MgUoKmFmNCY6FcfDIYvNuqg6of7ftnEXslpOi
d65mEgtjZVOZ0wRe4n8avsO1x93nweoYieJM9HFtEntG6grDDusVmOlxPHwe
tVT1EtSq1O+gSbX6lYw5MqsmFM9MMRVB+MpGYoAc0aIzYjWQwQiDJzWVkSam
41wUmUiCLpxUpNxUM6sR2XiJpcMjYumksu5s1QatDwUyaV6UFmpoFW5kefda
0d5sSRruRmqlNLIgCdzMnZccGTVzsxTyCSEwwo7UXLwcU6SYsm8r1tNCmNRQ
hf6iP2OHKKSRdcUhbFeshrLcbVFseph7mG0pBxIiYDj1mA0h3y49DMAl70kd
29H+hQLhzSJLEgQGqu6QmtlLxjwOfctxrQtCpDqp1YUdZVGZhzp6Hzvs4m4V
vgWdFJex1VweEDaUer1pKz56ZSWYEgDoE7NKp9wbUxihk+167uVJXMON0spg
UfN6W15RloYhmG9TUavrdEX04NDw2bkzbO9/f37+EVrEchy+bd8GoZd1V0fI
KSwZqj2c3O206X5Nocz8lolVZdRduPKLoJeI3+EkiQ85hApldldd1RvmJxGW
YGlxpsy3hpoekm4md1FfwBZ9CD+tyPQyW2lAj6CcrzDxoXucfkyuwfOnJE1B
AwNCViKv7x4Q7rTkku0bMXpQhr/krHAMqy1zQQolYJCFzSCn+jBt6tmqRCuW
ghRkexTj8ZgJjVQyjqVs7X17DT/zbF1dbcbr+uYqLOcYEHhjBHvHT59KWYIQ
kcddMiqPgh4/LwEHP3mwgQM0cFpLcfDP8H9Yyk5NJDdRorghiqN3P54f/3v5
6H2z3H5JqmaCLXF0eOQhkV0PFDKA8L+/wmkJ4E27pJ0NMGaH9N+X89xclkcn
aZHSo6Ojk++CoPjYRjcJrDKmhzvlKNOLruZaVkyoozYly8iy4jXf59Z8QJ0X
CcXUOPRaGFPCHzrN31N2vtLTAZTVIh4nFqlMyh+OPypFto2QtyFaTZNIwgGr
oR9t1yxCdfTLW9xiRloCz0w9e1Xg5bAIXB8uxqgE9eKD0z0p93D4ncahOLtp
rjZ7vv4xFZOu5kvqR15lBB6h8NFJhADRUQq60P5lAb8v1sO4s0Mzv9b1ykwC
mSF4fsM+pRkNSbEU5Czz7EmdQkKbK/uPA0s5t1TihIko95KwoxMmFEEhmtPP
xJnekwmRW4O6kCtpWNWkoFErefaEINv3kJaEcBhMLMHyqQyl60jsBLBvDGwE
Wh32SbGcI9iBfNzUvVjCm5AQmy1mYBxFEqbQq76nIAJYdAAoahvgyXRSmOiI
dbERBnQY5X8AzFxrXU99axqkjG3a9C/jkjf94cHBy9DU63U1WwIo92wyKvdQ
K/GZghJbgmBoSxAE06AMAln0gTKDQ6YO1+2NytfhbB08H+H5Eq2Pyh+IGHbw
8uUfJ97vt4cvtN8gc87RKQ5CJEArP4jL8cdWTe9HgI3dpyc/9HySYMJ+x+/b
kx7R7qh8E0x/mqOHTw/STqnWAFInbNd5NSrfWsdRkxIWU9enHvFO90hz6eXc
B5Nn1mVoNRz47TVutdDht0mHxJkrf27mszrpTVDpSioO3xOZTlyH1mB4C66P
H6o7tPcyae+bgxehvTApuLhuqkWYXDT6cz2fj/9K+Mmflg2xgE6tttwwcFEk
WZaPfjo96fato9DcaEc3Lw8OnoZuOKbQT3g4dAIEuzk647DPDDBSm8Iro/Iv
22WNC+8wawtzHoTorJnLHJzdVEE0LYOuc3kzKv8dbR6Fzua2lNhlR4169n0l
/jWrr3jjRRpxAN8kV+6h6lsniczub//+eTqVq3lUHnNIkCZnJpUUO59cHTsu
cpNeQRuYJI1LSs6OdiHgNPjxT1pu2k1s9Kc3b05Cg8dy1Y3K9+m64I++PZ9N
nk4Ow9R8ODo7ORuFGXn63Nbkw+sP5/jcvyIjaq07CNvy5/qiPG2DKA2fC0rB
8Ho4tPYeLrNVE65tvcz8Uv36daR/XoaL/5dqXgW5vl0H7fNuHE7V7eFX8o/I
I7fQZxY1GoDjZFcrVWNlY+GR7AFv5UE+Y2vnctuggd5ox1GzSFusFoI1X8+y
TsdpyWBs+qZtw3PXm9U9w2v/Nq/vUB7eVIvwjUHbWeF/q2YW27gIZvcidDZj
w7138XtsuRy7eniilanjN9gqQbt3UIjJN7pQPz87Hh+9e/vj+cfTD+cfjj+8
x46BqByV78JS/9tWpXx4LihzotelEu5YlLFwyN6BXmUPu+fwhTX+9nXYPkc/
nX8//vldaHgv4Z6m4gD9FXefvKtX0hFDuEFPO5IoVlD6qzXyw+xsFG9B3f0K
gOP4+X9gE5rahwuz+H8Vkua8+sMBAA==

-->

</rfc>
