<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rosenberg-diem-architecture-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DIEM Architectural Considerations">Digital Emblems - Architectural Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-rosenberg-diem-architecture-00"/>
    <author fullname="Alex Rosenberg">
      <organization>Veridigo</organization>
      <address>
        <email>alexr@veridigo.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="15"/>
    <area>Applications and Real-Time</area>
    <keyword>digital emblems</keyword>
    <keyword>architecture</keyword>
    <abstract>
      <?line 38?>

<t>This document explores architectural considerations for digital emblems as discussed in the DIEM working group.
It is intended to complement the use cases and requirements in <xref target="DIEM-REQS"/> by sketching one way to think about how the pieces of a DIEM architecture might fit together.
This document does not seek to propose a specific architecture. It instead captures the author's current mental model to help inform the requirements process and subsequent architectural work.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ohmantics.github.io/diem-architecture/draft-rosenberg-diem-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rosenberg-diem-architecture/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ohmantics/diem-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 44?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The DIEM working group is developing standards for digital emblems: a means for associating metadata with physical or virtual assets, perhaps to indicate what treatments they should receive by reference to various normative frameworks <xref target="DIEM-REQS"/>.
The requirements document identifies use cases ranging from International Humanitarian Law protections to trade and logistics labeling, and derives requirements for emblem format, discovery, validation, and extensibility.</t>
      <t>This document sketches one way to think about the architecture.
It is not a formal proposal of any kind, but an attempt to capture the author's mental model that may inform ongoing discussions.
This is offered as points for conversation, not remotely as conclusions.</t>
      <t>The mental model described here is primarily concerned with the shape of the data: what an emblem record looks like and how use cases configure it.
Discovery follows naturally from DNS (given a FQDN, query for records), and trust follows from the existing DNSSEC chain of trust.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The following terms are used in this document to describe concepts in the mental model.
These are not formal definitions and may evolve as the working group develops its architecture:</t>
      <dl>
        <dt>Profile:</dt>
        <dd>
          <t>A description of how a particular use case shapes the data in an emblem record. Other possible terms are "schema" and "template" but this document uses "profile" for now and the final terminology is an open question.</t>
        </dd>
      </dl>
      <t>Terminology for "(digital) emblem," "asset," "emblem issuer," "authorizing entity," "validator," and "validation" is defined in <xref target="DIEM-REQS"/> and used here with the same meaning.</t>
    </section>
    <section anchor="roles">
      <name>Roles</name>
      <t>From the perspective of this mental model, there are really only two actors: a domain holder who publishes emblem records, and a validator who queries for them.
The FQDN identifies the asset, and the DNSSEC-based chain of trust provides attestation.</t>
      <t>Everything else (who authorized the emblem in the real world, what legal framework applies, what visual symbol is associated with it) lives in the data as (possibly) optional fields defined by the profile.
An emblem with specific legal protections would include a field referencing those protections.
An emblem with a specific visual appearance (a Red Cross, a UN logo) would include a field carrying that representation, possibly as SVG or an image format.
The architecture does not need to distinguish these concerns from any other metadata.</t>
    </section>
    <section anchor="data-model">
      <name>Data Model</name>
      <t>At its simplest, an emblem record is a dictionary data structure: a collection of key-value pairs, including arrays and dictionaries as value types.
Some fields are common across use cases (the asset identifier, emblem type, issuer identity, profile identifier).
Others are defined by the profile for a specific use case, such as a UN Number for hazardous materials or a serial number for a consumer device.</t>
      <t>Some value types are more complicated and require consideration such as the bounds of a protected location. Are such types constrained to the surface of Earth? Are they two-dimensional or three-dimensional? Must they be presented as pre-decomposed into convex shapes? Nearly every other value type the author has considered is simpler or has obvious precedent.</t>
      <t>There are fields whose values are included in a cryptographic hash of the record (proving the record has not been tampered with) and fields that are not part of the hash and may change over time.
Live GPS coordinates from an IoT-enabled shipping container are an example of the latter.</t>
    </section>
    <section anchor="hierarchical-structure">
      <name>Hierarchical Structure</name>
      <t>Emblem records are presented in a hierarchy.
It is easiest to reason about this with physical assets, though the same structure applies to virtual ones.
A pallet of smartphones, for example, has a record for the wood pallet itself (citing ISPM 15 compliance) and roughly 1400 records for each boxed smartphone.
Each phone might carry an identifier record (serial number, model, color, branding), a hazardous materials record for its lithium battery (UN 3481), and recycling instruction data.
The manufacturer attests to these device-level records. (Conceptually, some of this data could also live on the device itself and be read out via RFID, though that level of discovery is beyond this scope.) That may then be wrapped in shipper or customs facilitator records for logistics purposes (customs valuation, origin, carrier details).</t>
      <t>This hierarchy is effectively a Merkle tree of chains of trust.
Each level includes hashes of its children, so the integrity of the entire structure can be verified from the root.
Different levels can be attested by different domain holders: the manufacturer attests to the device records, and the shipper wraps them in their own attestation at their own domain.</t>
      <t>How deeply a validator walks the tree depends on the use case.
A customs officer scanning a pallet might verify only the shipper's top-level attestation.
A recycling facility processing an individual device might need to verify the hazmat data back to the manufacturer.
A full audit would verify everything.
The architecture supports the full tree; the use case determines how deep you go.</t>
    </section>
    <section anchor="serialization">
      <name>Serialization</name>
      <t>Almost every realistic use case produces records larger than the roughly 1500 bytes of a typical UDP DNS response, so a mechanism for delivering larger payloads is needed.
DNS could serve as a bootstrap (pointing to where the full record can be fetched), with the actual data retrieved over HTTPS, an extension to TCP DNS, or DoH.</t>
      <t>An emblem record is a dictionary, and the choice of serialization format is an open question.
Typical dictionary serialization formats are JSON, XML, Property Lists, and CBOR.
Of these, only CBOR has direct support for selective disclosure through sub-dictionary encryption, allowing different fields to be readable by different validators.
This is needed for use cases where some emblem data is confidential.
Similar selective disclosure could be achieved in other formats through application-layer encryption of individual field values.</t>
    </section>
    <section anchor="discovery">
      <name>Discovery</name>
      <t>Given an asset's FQDN, a validator queries DNS for emblem records.
Emblem records are most likely to be published in a designated subdomain of the asset's domain (e.g., <tt>_diem.hospital.example.org</tt>).
This would allow the zone to be delegated from the asset's regular DNS server to a DIEM-enabled authoritative server, which would use a different backing database laid out for emblem records and possibly integrated with an asset management or inventory ERP system.</t>
      <t>For payloads that exceed DNS response sizes, the data could be retrieved via an extension to TCP DNS or DoH, or DANE could bridge from the DNS lookup to an HTTPS endpoint, maintaining the DNSSEC-based chain of trust through the transition.</t>
    </section>
    <section anchor="profiles">
      <name>Profiles</name>
      <t>Profiles are expected to be defined in separate documents as extensions to the base standard, each specific to a use case.</t>
      <t>Fields fall into two categories.
Signed fields are included in a cryptographic hash of the record, proving it has not been tampered with.
These are the immutable assertions like identifiers, classifications, and legal protection citations.
Informational fields are not part of the hash and may change over the lifetime of the emblem, such as live GPS coordinates or estimated arrival times.</t>
      <t>Some signed fields may also be encrypted (for example, internal forensic data about who created the record, when, and on what equipment).
This raises an open question: how is an encrypted subrecord included in the hash when the raw data is not accessible for validation?
The ciphertext itself could be hashed, or a hash of the plaintext could be presented alongside the encrypted data, or some combination.
This is a question for the cryptographic design work.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document sketches architectural considerations rather than proposing specific mechanisms, so detailed security analysis is left to the standards-track documents.
A few observations:</t>
      <t>The DNSSEC-based chain of trust proves integrity and authenticity for a given domain, but does not help a validator distinguish a legitimate domain from a deceptive lookalike.
For example, a domain using Cyrillic "а" (U+0430) in place of Latin "a" (U+0061) is visually indistinguishable from the real domain but resolves to a completely different zone.
How validators establish that they are querying the correct domain is an unsolved problem.</t>
      <t>Some use cases (notably IHL) require that the act of querying for an emblem be undetectable.
This involves making DNS queries anonymous, which is not the author's area of expertise.</t>
      <t>A full audit of a hierarchical emblem structure (validating every sub-record back to its origin) is a case of write amplification.
For a pallet of small items, this could mean thousands of cryptographic verifications each including a DNS query.
Use cases should consider whether full audit is actually required or whether top-level verification is sufficient.</t>
      <t>Use cases employing selective disclosure (encrypted subrecords visible only to certain validators) introduce trade-offs between confidentiality and transparency that each profile will need to address.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="DIEM-REQS" target="https://datatracker.ietf.org/doc/draft-ietf-diem-requirements">
          <front>
            <title>Digital Emblems - Use Cases and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="CHARTER" target="https://datatracker.ietf.org/doc/charter-ietf-diem/01/">
          <front>
            <title>Digital Emblems</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="May" day="27"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 182?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>AI was used for editorial review of this document. The author takes full responsibility.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA5Va23IcyXF9768ojx4EWDNDYJcrrWBZNASASzgAEAJAhRUO
h1XTXTNTge6udlU3hsON/Rd/gr7BX+BP0snMqr6A4DL2gUFMX+qSl3NOZvVi
scha25bmRM3O7ca2ulQX1ao0VVALderzrW1N3nYe189cHWxhvG4t/pplerXy
5olevLy4/sqzuW7Nxvn9ibL12mVZ4fJaV5i18HrdLrwLpl4Zv1kU1lQLPYxl
FkdHWehWlQ0BQ7X7Bi9dXjy8zequwhsnWYGhT7Ic05g6dOFErXUZTIaFfZtp
bzQWeNo0pc1lLUrXhbozulw82MrMskez3zlfnGQKGy6iCYyYgK+NF5M9mboz
9Cye23YrjO22la5bm4dXny19hudKrC60eG7btk04efWqf34pQyyt+/zNV181
y3LbVuUsy3TXbp3n1eOfUuuuLMWyp6X5qO7SCHzT+Y2u7Sc2xIn6i/EWG3Z8
y1TalidK4yX/b0/xzjJ3VZbVzld45Qn7zsh7/S+lyPOLu4s/35/wIK32G4PN
pr3CNbr1On80fmlNu15iAa/g+rg9uiQ78+Z/OutNZeo2yEhfjMkPwagzHUxy
5PDijN/kcFDfHH3zW/w8e3d693Bx9wtXl2+1b40f1vfq6PjVeFnPVjWd97vF
0XeLb36XZYsFgmcVaIo2yx62NiiM3tFalfnYlM7TJiZpk0/SRsHWz0NSaYxi
Q96FYAokk2q3ht2gEMWPtt6ojXdds8wuW4UJbd2ausCTrcPgVVOyqfilDobM
e0OOPUDD/vhj79ufflKrvQqPpsVSMYGrjdrpPQ3Z4sIjNum6Vm3djsdtrMkx
qFsrLQsbh62q7GbbqrXFGhy8sYXtn5mmcHi7dq0KxjzSJI13DcIYw4XG5HZt
88mQS0VbrUNrdIENNXQt8EokN34dVN55T0PT+DBl5QpT0shbUzZKQppfmBgB
02IfYh0AUMA9GmPqMDL6Ulxd2aIoTZb9Sl3WrXdFl5MTyfEvOYicU5gnU7qG
roUW02hfvOhzpCWWrmNA6BBcbhEheK0yraYwVjtgiWq2+wCYK5Hn6sn6tsOf
eNq0Ya4a47e6CbRrWxcEhnDiVsMNgMhWdgwTwM9b15UUD7lBkpPnvVkbmC83
9PKT9tZ15KAIA2rtATe0tzANmiXvfGLS3seIcWDg2sJRQxh6XW9oU2vvKrKh
8TXnAXbxrgNowiTe6lpd6R05h3zAWUJx6HVh2FOl29hA8ArkXZkS4835OpIK
iw3T9ZA5xcZKYG3OueWAf/s5tlraglcgQ5iPyKVgV7a07X75PKMlPyjwX04P
Dshx2MYMpUjXMn0ZQ508iOyp9wrxUszVCq9j37ptTdW0nMoS5tMon0Y3+bbC
MmJ4u3rjyLgRO8hwMfEs5Sp5uCBsafBUtAzACIYI0QK0TtgNZi/39CDu5mUX
B2JXT+YvTMi9XWFQpLihSRpvKzgQb9OrcC7ucdjSJgKC09Cu6QdF9IlEJ7Yd
HYSABE3Dvw6BVtpHcTeBzhBBGHhtN2QY2y6z8+RK7KYs3Q621py1WALH2PnN
vTrYICxgW/X2z+c3c4Uc5+d9nC8ciu9b34W2H4ffppWajxRsMCuGur84U2AO
YCdtg55fEhickRXrQXqcm7VFKNNvMRsECEEDUn92/eH+YTaX/9XNe/4byfTh
8u7inP6+f3d6ddX/kcUn7t+9/3B1Pvw1vHn2/vr64uZcXsZVNbmUza5P/zqT
/c3e3z5cvr85vZoJp4wjW3vO/JVhNvGNNy3HSjb4GO/86ez2//73+DUw4J/u
3p59c3z8e/CG/Pj++Hev8WO3NTGTXA0XyE/CnEw3jdGeRoFzKLgJ/QBaCDPA
0a7mGII1//k/yTL/daL+sMqb49d/jBdow5OLyWaTi2yzz6989rIY8YVLL0zT
W3Ny/Zmlp+s9/evkd7L76OIf3gC2jFocf//mj5nEiAQeBRocQCLAM38XnzsL
jkpukTxrhM/bZwnK6EykipEotSMAFUN0sqcIQcyTK4HzWkh1ymKRwjBFO9Ey
pBVvvVtbyKUMWjQuqqGRKT8ob7VqoLNs3pXwfUpiQYLQ4wAHxTMQWKr3JByA
VQAyXB8ZZRaAwZWeSVATXpIAnzGETg3VEWDMGlnjjFO+pkVRspPFLfEODWxr
B1LZE4RhIa4BWgAlAu2EgG/0BI0xO4jkfRjXPJ+pGZMw/RG3gVoGOMN3GLzt
J7IooUS7p6uReRw9whsZqGgmwgHLE+9PdRo9zHHBoDugKxiaFQSmYVC6c6UB
/LxNOAZ1QNqK+ZxB2E7phPPUS7RALxCCcg63O6egbp1njVK4iuBv60qwLfIb
0q1blTYQK04cGAQGtOo3yk8T+JIkIDtivkoUBAHzWDAw57FBe2cJ+i5WmrY+
xWCi1Ce8HZg+IbOi3y6IGFrWswblojqgBSRvGBk2eauO4lD0XglGZm4qzQZX
evmjNFWZJsS7TzaQ/gr7auVKDp6o2xLt2fYQPEaaJE7A4Y4sO4hxvT9EtEUB
hJ2XxeB4qDJ2m0TvMjvtM4SH7nWyLHEslnas7ixxNykmGbiXeIwwWxLbo3c+
G34kxOMuBcA1acQDjaKsUGeoXcnN6sMNaTJ3+IWZc+39XqbVJDDALoECT0RH
sgSZ5f4vP5CwRQ5CR2xMVGwSI5MSoy8gaiOFTyEk3SESyWzBJAUSmZyUlmNE
SXqak+Sc/HFN4Z9lpy0jXLBUQgUOvWfChDyMmdhkGhqCvYnirxM4xM0cIC4m
pegE7S8Q/h1Mra2HqcQyZAqYRO8Ff/sBKfJhBHmDuiBwy72rTIoMykwUeBUG
1znZfiSLDvqUGfLIz9P6abB5hKR4HyiUYmv0xuEyY9yVyV4ORalQhvhIi5ij
hMq3tAOOiBvu3fDDW/0JdQ+VFPAm8h/Er2QM/qHq4VHN9THg2xPv2JwkAdtg
ZBVeW+XEGtL1IbEyVLjTGrtfFu0BOr0uYuUa49+Q4pTO0VKd4m1+XmaigVB4
sBVY7NNdv9Y5Y+gFuG37ht/hugpQuShsRRUEZzRjnDdmfPGNuibI4udXZFPO
hSjMPR41tCknxM8VPbTlx0iZb9QNcrAkviYNKwE9WGZUK8DmoTeD4dCVwPYq
3nSrJ67yGioDKQBE4kcGiCG3Y6DgGcTsMbeZl+Arv29Q43vdbBEIGHWb9H3M
mAOGZk79/hpNTqm7MqDZVlcNL5BQ55CdGKdmsEjShVREGpqnScIFTFADKKgG
UC2svMyuiOB+uL3H7jEbKL41PQaoS/ewMLVGUqDg39qGC3OYqSUXe56Osv6j
JlOlCUuiFc948Q45wkBEJfh9ynxQzYT6eJzBs2yqbXxzn4pCowMSntUcaCdQ
UsciEjentX4q8OHYbjOi+x56Ei9x9R67AqhRCdZhOkASGy+gNmubLd2YS10s
+5yzS3TyT6RmgLkr0tsARlOu1UFuuRS6vL+9VsffxfwjThDXeVofwvP49dFR
bwyeSSOlVu4jmb1fxTK7oMv8d2waMVUw/veQ1IfSBCzmSbQAcaGh1ArMRMBK
tdyLeDPaHKE86vut7Sq1Yt/u1QEQ69vX3x/HWhBP73PqLHDXyUufRwltcB2s
6w4oQLb3UXWECBDBRORalCSckxmW6uBMtHpH2gpgSaiWhBgzSc7sicU6Fg3w
oGgGHi25gFa3YqWCGqsjDQIyfnt5PooO1i00NUbvex0UciuzdyynCA1yyNzl
oXpITQRMVdPIO09Mz1HLGSKIkQO0HAQ4Nk29EdZzYwcPPZmm8wRfoKT0DsFH
JHsor43F/+RnyxiPzCvDYWq19FnCGbJei14lcaCujX+kOgB4ShtjCRhGdTjH
kuw7glRgqJA+JfkcaVsWnirSIFBOte7GgwpTplPM+XFe5ZptQs1yxGIxdAW8
c9x+4K5KHQ0e0vMSEcKcRf/MRDtDTbc/H0jJ8RM9LY0UcQt5ilkt6VcLV+3q
sQpWuh3dkAXA1u9QBRXGNGzYkUDX5aPQJFu5MCiEiCzrSTOZQCW51q2hALCU
gI3XrGsSYkg+s+FSITEs/de0xyYmyES0n45SL8baPrVpefyae5uQ+x2Xsmwh
mStJwTinUMUnIIBk10rnj8myY6vTnHSiAuIsbBslbBzD9BXECxo0dE3jvPRU
ZQSy2r9MbEUBztUjBWM0utq7Tm0c88k9o1M8roEELSsHShB2p2KEc2oYreGe
swl96pV03kFwrWMBkwD4OwDwat+mJj3UATPJh/NbbomBmxo6TeNUoM4z8agN
lbSmDcGPJ3PH8Ru9L50uuJFIZjYFYv/mPiIWgFl6BzAy0oIEU0MVDtKLqd9R
Hyh2MtlOEYtjsqy5qVoAeftillxD7iW/edMCKp7gWyb5dw8Pt/eizaVXS9Hp
1MMZb4wQRp27dzDu6VfU+5BP+dZZEXRh7I5YfbzcFHiIBh1VAy+9LFLg3+/f
38zVf1xfzdWtx0AeMX0F18acPvvT+zvo7rWwx1yyhS4yLxdApLxN0cYOAhHE
Qp7gvXRB+sTsfDrHWIxWhYqPRJp0uFOHacCkJLZcIhXSRlPY6vFh1E2WIODF
DDWIeJl5LVpeujuxacuMrkvUNLay1A96cRsSUoShSDV2O1X6LHSTSdNO9XDk
uyj1Hk8Mm2XMH4BCClHRsVL4JV7Msh+kO1yLzAI0SZt4DIypa0ExPzpQSNT+
kvzjRKYedrmP1k2NkigIwU92U3PpApdFbog8lFYSrx6Y5WY5V3/7bzqoXEKS
c/N0GeUbnWn+7TD6Zhc1RBlP6j6RtpL5kdZmw/P1LJbm8WbDHTraH2ezp3fk
bK/Xy7Fz0sqRkDxGjRAL3pVpOz7BGyKHIJfDDWFAjRvAiRXV8rkRORP6XoAw
89BISd4h5NYbOeAkJcd9d4cwv7i7VWEPzq3g3rduBFmsh8zHnNhhDH2ohz4Z
FtVmLL84DRLikLj6AtJEoBHAOb25SK97W1DjIlmYnqTzjK5hi9aCXwjUgvER
MhYOpuojFUk/1+dKgS8MrbGk2On6lYqN2NC3ZCUKzcdGKtwUAn1TMRjUVHRC
mLql3Hvod9qLEPZbOrqci5DvS38OkkEXZG8FTdbU4ufqlZqH8bsQy+0MhLwp
xg2NX1ZQzlUqKEHVXy4kx51vFnpV1bWMbBRFXtpkfMA01BkIhbzEbdqYnM0L
Oj/vr6nciljBdi7TpxLjBt4vq1mpvrSgQFv19WZsKvd9i/KlipYSCFxUSe8D
avqJetkYJaSOSZjYmibm0mJlEkzi5sGkDLRyIFtSelIY5LFfyXUpNU9zOkiO
ndPkkPGRj7RFqQnTUEglUPLayjcIUxY9YUkk9DosCWCYCHsUGr0RaTqZX+96
fuED1pw14io2qIZ2+huWbrltwCEtAjxVUn2+c5VQzKUlNY65pqTkpFf6Z0f9
mtLVG2qvxMohrZ/WxGMxEaJCXtk6itvEnro3QV9sTwNfuCF9eUAyMe+4Tpl+
c/XF8+mf/eIE/2+TZpTDaP46IeV0rwUDi0Op0MgvaQ1A4HIfZCelWbd9Yyx9
37DgL24GYGGFbXbKrYg0ZBUn8aOJr3T1TRgVaXye0FGdClFMF6RhKKe7QpVy
kN53h/njjzGRj9vEmlLbSgolppU+ETZNhTqlHWG3JqRYMqv0qdKfhHRsvbO9
tyXEiJr9/99n6uDDb45ef3t0SIGLGBJteUWfc6iZlttHvz0+JANKc50Zb7Q2
hqqh1qRTiTgdbQ8hSKd1QeBXPvnhI/uBeT9xe4XKvEG9EV5oliDCidyCJLDi
A/HEP8g81ptxPsnOruYZC/IJYVOCmFH/GebWxNyX764O+z5smocEPdmgn2kt
Xf4oAZBXXU2VUs4gnRKlfpJtVvoxnr/3QkzXrt5XrgtJgEQQmHwsQV8G0qxE
gsB8ZqhJrcel0Xbc0osLGhoABwlH6BCJyzLS1xGgUklJzQXpbBxKenOxhtF3
iFssiJpkiVUkjvS0LUd0CenCaoTlMqENHeZxUyfo2LKegoQ0JdInj0zMo/OF
3lz7Zfahd1P88ichAqGpSOvBKLSBXJpUyY+FcsOjQ+E+XgA3mDvqBlhpJQ9z
0gGtY6+/KPgPXoB+zguGcukcgHngQYrHIZwpu+QbLCPfBi3cek09rnZHemBc
ciTwYM0EWsaM+6gLuQEZzzV2SOG+i6CLAnkmxcLl6c3pV6BXtIg8qdOZGn8z
RkFCg5zmj7XbAUk38gnkjyfSyTTFv874c9bZTwjPS7XTQc53mZrhEcdtT2+e
LGFoahjGiZfqYej5t/qRet1SYrPK7b9k+gddNh7WBSwAAA==

-->

</rfc>
