<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 4.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-vesper-use-cases-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="VESPER Use Cases">Verifiable STI Presentation and Evidence for RTU (VESPER) Use Cases and Requirements</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>

    <date year="2026" month="April" day="01"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>telephone number</keyword> <keyword>right-to-use</keyword>

    <abstract>


<?line 48?>

<t>This document describes use cases and requirements for VESPER (Verifiable STI Presentation and Evidence for RTU), an extension to the Secure Telephone Identity Revisited (STIR) framework. VESPER defines a delegate certificate profile that binds telephone number authority, entity identity, and originating provider authorization into a single verifiable trust artifact, grounded in Right-to-Use (RTU) validation and recorded in a public transparency log. The document identifies the trust gaps that motivate this work and describes requirements for verifiable origination authorization.</t>



    </abstract>



  </front>

  <middle>


<?line 52?>

<section anchor="introduction"><name>Introduction</name>

<t>The Secure Telephone Identity Revisited (STIR) framework (<xref target="RFC8224"/>, <xref target="RFC8225"/>, and <xref target="RFC8226"/>) enables cryptographic signing of calls using credentials constrained by TNAuthList <xref target="RFC8226"/>, grounded in explicit Right-to-Use (RTU) validation by recognized numbering authorities or responsible providers. STIR verifies that a signing credential is authorized for a specific telephone number, but does not establish what entity holds that right-to-use, how that entity can be identified, or whether communications from the originating provider carry valid RTU-backed authorization for the telephone number being presented.</t>

<t>VESPER proposes addressing these gaps through a delegate certificate <xref target="I-D.wendt-stir-vesper"/> that binds telephone number authority to the entity that holds the right-to-use. The certificate can additionally carry corroborating identity signals, such as a domain controlled by the entity. Domain credentials carry entity identity assurances through existing validation procedures that are closely analogous to the entity verification practices discussed in many identity and communications trust frameworks, without requiring standardization of those contextual processes. When both RTU validation and domain validation independently point to the same entity, the combined signal is substantially stronger than either provides alone: the two independent trust chains mutually corroborate the entity's identity, making the overall credential significantly more resistant to forgery or misrepresentation. The certificate can also identify which originating providers have been explicitly authorized by the RTU holder. Certificates issued in this framework are recorded in public transparency logs <xref target="I-D.ietf-stir-certificate-transparency"/> before use, supporting independent auditability without centralizing control.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>Right-to-Use (RTU):
A cryptographically verifiable authorization binding one or more telephone numbers to the entity that has been assigned and is accountable for their use, established through recognized numbering authorities or responsible providers.</t>

<t>Delegate Certificate:
A subordinate certificate issued to the entity that has been assigned a telephone number, as defined in <xref target="RFC9060"/>, carrying those numbers in a TNAuthList extension. The delegate certificate serves as the primary credential authenticating the assignee's association with their telephone numbers and their right-to-use.</t>

<t>TNAuthList:
A certificate extension defined in <xref target="RFC8226"/> that conveys the telephone numbers, number ranges, or service provider codes for which a certificate holder is authorized.</t>

<t>Service Provider Code (SPC):
An identifier assigned to an originating service provider, defined as a choice entry in the TNAuthList extension in <xref target="RFC8226"/>. In North America this is typically an Operating Company Number (OCN) or Service Provider Identifier (SPID).</t>

<t>Authority Token:
A signed JWT assertion issued by a recognized numbering authority or responsible provider to convey the right-to-use for specific telephone numbers or service provider codes, defined in <xref target="RFC9447"/> and <xref target="RFC9448"/>. A JWTClaimConstraints Authority Token <xref target="I-D.ietf-acme-authority-token-jwtclaimcon"/> may additionally authorize specific PASSporT claims the certificate holder is permitted to assert.</t>

<t>Signed Certificate Timestamp (SCT):
A cryptographic proof returned by a transparency log, as defined in <xref target="I-D.ietf-stir-certificate-transparency"/>, that a certificate has been submitted to and recorded in the log prior to use.</t>

</section>
<section anchor="use-cases"><name>Use Cases</name>

<t>The following scenarios illustrate the trust gaps that VESPER is designed to address. Each describes a real-world situation where the absence of verifiable telephone number authority creates meaningful risk, and what becomes possible when that authority can be cryptographically established. These scenarios span both business-to-consumer (B2C) and business-to-business (B2B) contexts, reflecting the range of trust relationships in which telephone number authority matters.</t>

<section anchor="trusted-caller-id-and-verified-messaging"><name>Trusted Caller ID and Verified Messaging</name>

<t>Consumers receive fraudulent calls and messages that spoof trusted telephone numbers, often accompanied by coordinated web or messaging interactions to reinforce the deception. Because there is no standard mechanism for a relying party to verify that the entity presenting a number is the same entity it was assigned to, attackers can credibly simulate legitimate communications across channels.</t>

<t>VESPER enables the RTU holder to cryptographically bind their numbers to delegate certificates that can be validated across SIP signaling, messaging, and web-based contexts. Relying parties can verify both telephone number authority and, where present, the associated domain-controlled context, before applying local trust decisions.</t>

</section>
<section anchor="preventing-impersonation-and-business-communication-fraud"><name>Preventing Impersonation and Business Communication Fraud</name>

<t>Fraudsters impersonate businesses by spoofing well-known telephone numbers and directing targets to fraudulent websites or callback numbers. Because recipients rely on number recognition as a proxy for legitimacy, this attack is effective across voice, messaging, and web channels simultaneously.</t>

<t>VESPER enables enterprises to maintain a consistent cryptographic binding between their assigned numbers and their domain-controlled identity, issued on the basis of RTU Authority Tokens. Communications referencing those numbers can be verified as authorized by the same accountable entity across any channel.</t>

</section>
<section anchor="preventing-financial-fraud-through-caller-impersonation"><name>Preventing Financial Fraud Through Caller Impersonation</name>

<t>Financial institutions are frequent targets of impersonation: adversaries spoof bank telephone numbers and reinforce the deception through fraudulent web portals or follow-up messages. Customers who recognize the number often extend that trust to the broader interaction even when the surrounding context is malicious.</t>

<t>VESPER enables financial institutions to cryptographically assert their authorized use of specific telephone numbers and bind those numbers to their domain-controlled context. Relying applications can validate this authorization before presenting trust indicators or proceeding with sensitive interactions.</t>

</section>
<section anchor="explicit-origination-eligibility-for-multi-provider-communications"><name>Explicit Origination Eligibility for Multi-Provider Communications</name>

<t>In enterprise deployments, telephone numbers are frequently originated across multiple providers, platforms, and calling applications. STIR authentication confirms that a call was signed by a credentialed provider but does not establish whether that provider was explicitly authorized by the enterprise holding the right-to-use for that number. An originating provider may sign calls without the RTU holder's knowledge or consent. Furthermore, an originating service provider's STIR/SHAKEN Attestation "A" claim, which represents a direct, authorized customer relationship, is today self-certified with no external validation.</t>

<t>VESPER addresses this by enabling RTU holders to include service provider codes (SPCs) alongside telephone number entries in the TNAuthList of their delegate certificate. When both are present, the certificate asserts the entity's right-to-use for the telephone numbers and identifies the originating providers it expects to attest calls from those numbers on the entity's behalf. A provider whose SPC appears in the RTU holder's TNAuthList has verifiable enterprise authorization behind its attestation; a provider whose SPC is absent does not. Terminating networks and relying parties can use this signal to distinguish authorized origination from technically valid but unauthorized traffic.</t>

</section>
<section anchor="authenticated-access-and-identity-assurance-for-digital-services"><name>Authenticated Access and Identity Assurance for Digital Services</name>

<t>Digital services increasingly use telephone numbers as account identifiers or recovery mechanisms, yet there is no standard way to verify that a number presented by a domain or application is legitimately associated with the entity operating that service.</t>

<t>Under VESPER, service operators authorized for a telephone number can present cryptographic proof of that authorization, optionally bound to a domain-controlled origin. Relying services can validate this before granting elevated access, enabling callbacks, or trusting embedded contact references, reducing abuse by attackers who reference well-known telephone numbers without authorization.</t>

</section>
<section anchor="public-sector-and-emergency-communications-integrity"><name>Public Sector and Emergency Communications Integrity</name>

<t>Public safety communications and official notifications are vulnerable to spoofing, particularly when attackers combine fraudulent calls, messages, and web content to simulate official communications with coordinated credibility.</t>

<t>VESPER enables authorized public entities to assert cryptographic control over designated telephone numbers and bind those numbers to official domain-controlled contexts. Receiving networks or applications can validate this authorization before elevating trust treatment in emergency or public safety communications.</t>

</section>
<section anchor="carrier-backed-consumer-identity"><name>Carrier-Backed Consumer Identity</name>

<t>Individual consumers do not directly hold the Right-to-Use for their telephone numbers; that authorization rests with the telephone service provider that assigned the number to them. When a consumer places a call, it is their carrier that backs the legitimacy of that number's use. Today there is no cryptographically verifiable way for the called party to confirm that the originating number is actively backed by a legitimate carrier assignment rather than a spoofed or fraudulently used number.</t>

<t>VESPER enables carriers to issue delegate certificates covering the telephone numbers assigned to their consumers, with the carrier's RTU authority forming the trust chain. The carrier's domain serves as the corroborating identity signal, providing the called party verifiable evidence that the number is legitimately assigned and actively backed by a responsible provider. This model applies equally in B2C contexts: a business receiving a call from a consumer can validate that the number is carrier-backed and legitimately assigned, and a consumer receiving a call from a business can benefit from the same verification in reverse. Connected identity extends this further, enabling each party's carrier to independently assert and verify the other's number authority, establishing mutual trust in the call.</t>

</section>
<section anchor="bidirectional-identity-verification"><name>Bidirectional Identity Verification</name>

<t>In many communication contexts, particularly B2B interactions such as a financial institution calling a business customer or two enterprises coordinating a transaction, a single direction of identity proof is insufficient. The called party has no cryptographic mechanism to verify that the entity calling them is the legitimate holder of the telephone number being presented, and the calling party has no way to confirm the called party is who they expect.</t>

<t>VESPER supports bidirectional identity verification through Connected Identity <xref target="I-D.ietf-stir-rfc4916-update"/>. Both parties can hold delegate certificates authorized for their respective telephone numbers. The called party can return a signed PASSporT asserting their number authority, and the calling party can validate it. The result is a mutually authenticated communication transaction where both parties' telephone number authority is cryptographically verified.</t>

</section>
<section anchor="credential-retrieval-across-communication-channels"><name>Credential Retrieval Across Communication Channels</name>

<t>In many communication environments a relying party cannot rely on the signaling path to carry VESPER credentials inline. This includes PSTN/TDM interconnects where SIP Identity headers are stripped, messaging platforms that have no equivalent header mechanism, web-based interactions where a telephone number is referenced but no call is in progress, and asynchronous contexts where verification happens after the communication event.</t>

<t>VESPER addresses this through two complementary mechanisms. A domain-hosted certificate repository provides a stable, publicly resolvable HTTPS location under the entity's domain where delegate certificates can be retrieved and validated independently of how the communication arrived. A portable RTU Token provides a signed JWT proof of right-to-use that can be conveyed in any channel, presented in a message, embedded in a web interaction, or delivered asynchronously, as verifiable evidence of telephone number authority outside of SIP signaling. Together these mechanisms decouple credential verification from any specific transport, making VESPER applicable wherever telephone numbers are used <xref target="I-D.wendt-stir-vesper-oob"/>.</t>

</section>
<section anchor="platform-and-multi-tenant-number-authorization"><name>Platform and Multi-Tenant Number Authorization</name>

<t>Communication platforms, CPaaS providers, and ISVs commonly control telephone number pools on behalf of multiple tenants, customers, or automated systems. In these deployments the platform holds RTU for the number pool but originates communications through many different downstream parties. Today there is no standard way for a terminating network or relying party to verify that a given tenant's use of a platform number was explicitly authorized by the RTU holder, or to distinguish authorized tenant traffic from misuse by unauthorized parties.</t>

<t>VESPER enables the platform RTU holder to declare, via SPC entries in the TNAuthList of their delegate certificate, which originating providers are authorized to place calls from those numbers on the platform's behalf. Individual tenants interact with the platform's calling infrastructure without needing to establish independent RTU or certificate relationships. The platform's delegate certificate serves as the auditable authorization record for the entire number pool, making the authorization chain verifiable end-to-end regardless of how many layers exist between the RTU holder and the originating call.</t>

</section>
</section>
<section anchor="requirements-for-origination-authorization"><name>Requirements for Origination Authorization</name>

<t>The use cases above motivate a standardized, verifiable mechanism allowing the responsible RTU holder to declare which signing identities are authorized to originate communications for a given telephone number. The following requirements capture the intended properties of such a mechanism:</t>

<t><list style="symbols">
  <t>Verifiable Enablement: It should be possible to verify that the RTU holder explicitly enabled a specific signing identity (e.g., a delegate certificate or SPC-authorized originator) to originate communications for the telephone number.</t>
  <t>Lifecycle Management: It should be possible to update and revoke origination eligibility declarations in a timely manner, consistent with RTU state and certificate lifecycles.</t>
  <t>Transparency and Auditability: Enablement and revocation events should be observable through transparency mechanisms, enabling independent audit without requiring centralized enforcement control.</t>
  <t>Cross-Channel Applicability: The mechanism should support both voice and messaging use cases and should accommodate scenarios where telephone numbers are referenced within domain-controlled contexts.</t>
  <t>Policy Separation: The mechanism defines verifiable authorization inputs but does not prescribe enforcement, blocking, presentation, or regulatory policy decisions, which remain local to relying parties.</t>
  <t>Attestation Grounding: Where the mechanism supports SPC-based origination authorization, it should be possible for a relying party to determine whether an originating provider's STIR/SHAKEN attestation is backed by an explicit RTU-holder declaration, providing an objective basis for evaluating attestation claims rather than relying on self-certification. This is particularly important in the common case where the originating provider is different from the responsible provider or organization that assigned the telephone number to the entity.</t>
</list></t>

</section>
<section anchor="roles-and-responsibilities"><name>Roles and Responsibilities</name>

<t>Deploying VESPER builds on existing STIR/SHAKEN operational roles and trust anchors. The following functional roles are relevant to VESPER deployment. Governance, policy, and regulatory considerations remain external to the protocol.</t>

<t>Telephone service providers, responsible organizations, and numbering authorities ground RTU validation in existing number assignment and delegation practices. Within the VESPER framework, these entities issue cryptographic RTU evidence (e.g., Authority Tokens) that enables STI Certification Authorities to issue TNAuthList-constrained delegate certificates, and manage revocation and lifecycle controls for those assertions.</t>

<t>Application-layer communications providers, including CPaaS and UCaaS platforms, integrate cryptographic identity assertions and delegate certificates into their voice, messaging, and API-based services. They provide token management capabilities for their enterprise customers and implement operational controls for token issuance, expiration, delegation, and revocation.</t>

<t>Business and enterprise entities are the RTU holders responsible for issuing and managing delegate credentials for their telephone numbers. They define which originating providers or internal systems are authorized to use those numbers, and are accountable for monitoring and revoking credentials in response to misuse.</t>

<t>Transparency log operators maintain independently operated, publicly accessible logs that record certificate and authorization artifacts in a tamper-evident, append-only manner <xref target="I-D.ietf-stir-certificate-transparency"/>. They issue Signed Certificate Timestamps (SCTs) proving log inclusion and support ecosystem-wide auditability without centralizing control. The effectiveness of this model is well established through the CA/Browser Forum's mandate for Certificate Transparency <xref target="CABF.CT"/> in the Web PKI ecosystem <xref target="RFC6962"/>.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This informational use-case document defers security considerations to the resulting technical specifications.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The author acknowledges the years of industry interactions and innovations that contributed to the technical approaches described here.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC6962">
  <front>
    <title>Certificate Transparency</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="A. Langley" initials="A." surname="Langley"/>
    <author fullname="E. Kasper" initials="E." surname="Kasper"/>
    <date month="June" year="2013"/>
    <abstract>
      <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
      <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6962"/>
  <seriesInfo name="DOI" value="10.17487/RFC6962"/>
</reference>
<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC9060">
  <front>
    <title>Secure Telephone Identity Revisited (STIR) Certificate Delegation</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2021"/>
    <abstract>
      <t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate. This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9060"/>
  <seriesInfo name="DOI" value="10.17487/RFC9060"/>
</reference>
<reference anchor="RFC9447">
  <front>
    <title>Automated Certificate Management Environment (ACME) Challenges Using an Authority Token</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates through consulting an external authority that issues a token according to a particular policy. This document specifies a generic Authority Token Challenge for ACME that supports subtype claims for different identifiers or namespaces that can be defined separately for specific applications.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9447"/>
  <seriesInfo name="DOI" value="10.17487/RFC9447"/>
</reference>
<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>

<reference anchor="I-D.wendt-stir-vesper">
   <front>
      <title>VESPER - Verifiable STI Presentation and Evidence for RTU</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Robert Śliwa" initials="R." surname="Śliwa">
         <organization>Somos, Inc.</organization>
      </author>
      <date day="31" month="March" year="2026"/>
      <abstract>
	 <t>   This document defines VESPER (Verifiable STI Presentation and
   Evidence for RTU), a framework that extends the STIR architecture to
   cryptographically bind telephone number authority, domain identity,
   and originating provider authorization in a single delegate
   certificate.  The delegate certificate is issued under the
   certificate policy defined under a STIR compliant eco-system and
   carries the assigned telephone numbers and authorized originating
   providers in a TNAuthList extension, the responsible entity&#x27;s domain
   in a SubjectAltName, and an embedded Signed Certificate Timestamp
   (SCT) proving the certificate was recorded in a public transparency
   log prior to use.  VESPER enables relying parties to verify that a
   telephone number was assigned to the entity whose domain is
   presented, and that calls from those numbers are originated by an
   authorized originating provider.

   The framework defines a certificate profile and issuance process
   grounded in existing STIR and ACME authority token mechanisms, a
   domain-hosted certificate repository with domain-controlled
   certificate discovery enabling cross-channel trust signals, a
   PASSporT usage profile for SIP signaling, and certificate
   transparency to support ecosystem auditability and detection of mis-
   issuance.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wendt-stir-vesper-07"/>
   
</reference>

<reference anchor="I-D.ietf-acme-authority-token-jwtclaimcon">
   <front>
      <title>JWTClaimConstraints profile of ACME Authority Token</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="David Hancock" initials="D." surname="Hancock">
         <organization>Somos Inc.</organization>
      </author>
      <date day="26" month="March" year="2026"/>
      <abstract>
	 <t>   This document defines an authority token profile for the validation
   of JWTClaimConstraints and EnhancedJWTClaimConstraints certificate
   extensions within the Automated Certificate Management Environment
   (ACME) protocol.  This profile is based on the Authority Token
   framework and establishes the specific ACME identifier type,
   challenge mechanism, and token format necessary to authorize a client
   to request a certificate containing these constraints.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-acme-authority-token-jwtclaimcon-01"/>
   
</reference>

<reference anchor="I-D.ietf-stir-certificate-transparency">
   <front>
      <title>STI Certificate Transparency</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Robert Śliwa" initials="R." surname="Śliwa">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Alec Fenichel" initials="A." surname="Fenichel">
         <organization>TransNexus</organization>
      </author>
      <author fullname="Vinit Anil Gaikwad" initials="V. A." surname="Gaikwad">
         <organization>Twilio</organization>
      </author>
      <date day="23" month="November" year="2025"/>
      <abstract>
	 <t>   This document describes a framework for the use of the Certificate
   Transparency (CT) protocol for publicly logging the existence of
   Secure Telephone Identity (STI) certificates as they are issued or
   observed.  This allows any interested party that is part of the STI
   eco-system to audit STI certification authority (CA) activity and
   audit both the issuance of suspect certificates and the certificate
   logs themselves.  The intent is for the establishment of a level of
   trust in the STI eco-system that depends on the verification of
   telephone numbers requiring and refusing to honor STI certificates
   that do not appear in a established log.  This effectively
   establishes the precedent that STI CAs must add all issued
   certificates to the logs and thus establishes unique association of
   STI certificates to an authorized provider or assignee of a telephone
   number resource.  The primary role of CT in the STI ecosystem is for
   verifiable trust in the avoidance of issuance of unauthorized
   duplicate telephone number level delegate certificates or provider
   level certificates.  This provides a robust auditable mechanism for
   the detection of unauthorized creation of certificate credentials for
   illegitimate spoofing of telephone numbers or service provider codes
   (SPC).

   The framework borrows the log structure and API model from RFC6962 to
   enable public auditing and verifiability of certificate issuance.
   While the foundational mechanisms for log operation, Merkle Tree
   construction, and Signed Certificate Timestamps (SCTs) are aligned
   with RFC6962, this document contextualizes their application in the
   STIR eco-system, focusing on verifiable control over telephone number
   or service provider code resources.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-certificate-transparency-01"/>
   
</reference>

<reference anchor="I-D.ietf-stir-rfc4916-update">
   <front>
      <title>Connected Identity for STIR</title>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>TransUnion</organization>
      </author>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   The Session Initiation Protocol (SIP) Identity header field conveys
   cryptographic identity information about the originators of SIP
   requests.  The Secure Telephone Identity Revisited (STIR) framework,
   however, provides no means for determining the identity of the called
   party in a traditional telephone-calling scenario.  This document
   updates prior guidance on the &quot;connected identity&quot; problem to reflect
   the changes to SIP Identity that accompanied STIR, and considers a
   revised problem space for connected identity as a means of detecting
   calls that have been retargeted to a party impersonating the intended
   destination, as well as the spoofing of mid-dialog or dialog-
   terminating events by intermediaries or third parties.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-rfc4916-update-07"/>
   
</reference>

<reference anchor="I-D.wendt-stir-vesper-oob">
   <front>
      <title>VESPER Out-of-Band OOB</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="Robert Śliwa" initials="R." surname="Śliwa">
         <organization>Somos Inc.</organization>
      </author>
      <date day="4" month="November" year="2025"/>
      <abstract>
	 <t>   This document describes a mechanism for delivering authenticated
   telephone call identity information using the VESPER framework in
   environments where SIP signaling is unavailable or unsuitable.  By
   supporting an out-of-band (OOB) transport model, this approach
   enables entities to publish and retrieve signed PASSporT assertions
   independent of end-to-end delivery within SIP-based VoIP networks.
   These PASSporTs are signed with delegate certificates that were
   authorized for issuance by corresponding authority tokens, which
   represent the trust and validation of telephone number control and
   related claim information.  Transparency features ensure that these
   authorizations are publicly auditable and cryptographically provable,
   supporting a higher standard of trust.  This document also introduces
   support for Connected Identity to the STIR OOB model, enabling the
   called party to respond with a signed PASSporT asserting its
   identity, thereby binding the identities of both parties to the
   transaction and enhancing end-to-end accountability.  The OOB
   mechanism serves as an alternative delivery path for PASSporTs in
   cases where end-to-end in-band SIP delivery is not possible, enabling
   verifiers to confirm the association between the originating
   telephone number and the identity asserting authority as part of the
   broader VESPER trust framework.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wendt-stir-vesper-oob-01"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="CABF.CT" target="https://cabforum.org/working-groups/server/baseline-requirements/documents/">
  <front>
    <title>Baseline Requirements for TLS Server Certificates</title>
    <author >
      <organization>CA/Browser Forum</organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="CABForum" value="CA-Browser-Forum TLS BR 2.1.6"/>
</reference>


    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

