<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dsmullen-ppd-architecture-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PPDArch">Privacy Preference Declaration for Home Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-architecture-05"/>
    <author fullname="Daniel Smullen">
      <organization>CableLabs</organization>
      <address>
        <email>d.smullen@cablelabs.com</email>
      </address>
    </author>
    <author fullname="Brian Scriber">
      <organization>CableLabs</organization>
      <address>
        <email>brian.scriber@computer.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="07"/>
    <keyword>privacy preferences</keyword>
    <keyword>home networks</keyword>
    <keyword>internet of things</keyword>
    <keyword>device transparency</keyword>
    <abstract>
      <?line 43?>

<t>This document describes an architecture for signaling household privacy preferences to devices in home networks through Privacy Preference Declarations (PPDs).  The architecture enables a PPD participant to discover a PPD service endpoint, establish trust in that endpoint through the applicable protocol and security profile, retrieve the applicable household policy instance, and acknowledge receipt of that policy instance.  The acknowledgment establishes that a specific policy instance was made available to the participant; it does not, by itself, assert anything about the participant's subsequent behavior.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drspangle.github.io/draft-dsmullen-ppd-architecture/draft-dsmullen-ppd-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dsmullen-ppd-architecture/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/drspangle/draft-dsmullen-ppd-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The rapid growth of Internet-connected devices in the home has introduced new and often overwhelming challenges to personal privacy.
While many of these devices collect sensitive data by design, the tools offered to users to understand or control that collection are fragmented, confusing, or entirely absent.
When privacy settings do exist, they are often buried in obscure menus, expressed in legal or technical jargon, and lack the contextual clarity needed to support meaningful decision-making.</t>
      <t>The result is a fragmented operational model.
Users must manage privacy through device-specific controls that vary widely in quality and semantics, while device vendors and service providers often implement isolated mechanisms with no common way to convey household privacy preferences across devices.
This lack of a shared signaling model makes it difficult for households to understand which devices have been presented with which privacy expectations, and it makes interoperable deployment harder for implementers.</t>
      <t><xref target="RFC7258"/> frames mass data collection as a technical threat, urging protocol designers to limit exposure through encryption and data minimization.
While this principle is crucial in adversarial, internet-scale contexts, the model proposed in this document takes a different approach: rather than hiding data flows, it seeks to govern them.
Privacy here is not achieved by making devices blind, but by making user-defined preferences visible to devices and associated services.</t>
      <t>This use of privacy is related to, but distinct from, the privacy guidance in <xref target="RFC6973"/>, which emphasizes reduced observability, linkability, and identifiability in protocol design.
Those properties remain important, but PPD focuses on a different home-network problem: a user needs a consistent way to express household privacy preferences and to know that those preferences were made available to participating devices or associated services.
This document is also aligned with the user-agency goals described in <xref target="RFC8280"/>, but it is narrower and more operational.
It describes an architecture for privacy-preference signaling and recordkeeping, not a general framework for human-rights analysis or for constraining device behavior.
Home networks are a significant and operationally important IoT environment.
They commonly place a local administrative boundary around large numbers of devices, many with limited or no end-user interface, making them a concrete target for a privacy-preference signaling architecture.
In this architecture, discovery identifies candidate participant-facing service endpoints.
Trust in a selected endpoint, and in the policy instances it presents, is established separately through the applicable protocol and security mechanisms rather than by discovery alone.
This also addresses an asymmetry common in current deployments: the household user is often required to acknowledge device- or vendor-defined terms, while the household has no comparable way to record that a participating device or associated service was presented with the household's privacy policy.
PPD introduces a reciprocal signaling path in which presentation and acknowledgment of a household policy instance can be recorded by the household domain.
The objective is to provide a coherent architectural basis for devices and associated services to retrieve, acknowledge, and keep current with household privacy preferences within that administrative domain.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The terms below define both protocol roles and core concepts used by this architecture.
The definitions of privacy, transparency, and user control are included here because they describe the conceptual scope of PPD rather than separate protocol mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl>
          <dt>Privacy:</dt>
          <dd>
            <t>In this document, the ability of users to understand and shape how data about them, their household, or their home environment is collected, used, retained, and shared by devices and associated services.</t>
          </dd>
          <dt>Transparency:</dt>
          <dd>
            <t>The property that data practices are made visible and understandable to the user, including what data is collected, how it is processed, where it is shared, and what policy preferences apply.</t>
          </dd>
          <dt>User control:</dt>
          <dd>
            <t>The ability of a user or household to define privacy preferences and make those preferences visible to devices or associated services in a consistent and actionable way.</t>
          </dd>
          <dt>Privacy Preference Declaration (PPD):</dt>
          <dd>
            <t>A structured expression of household privacy preferences that can be discovered, retrieved, and acknowledged by PPD participants.</t>
          </dd>
          <dt>PPD service endpoint:</dt>
          <dd>
            <t>A participant-facing service, and the baseline discovery target for participants, through which a PPD participant discovers, retrieves, and acknowledges applicable policy instances.</t>
          </dd>
          <dt>Policy authority:</dt>
          <dd>
            <t>The authoritative source of household policy state and of any inputs used to derive an effective policy for a participant.  The policy authority may be local or remote.  Participants are not required to discover or address the policy authority directly in the baseline architecture.</t>
          </dd>
          <dt>Household policy:</dt>
          <dd>
            <t>A policy selected or maintained for a home network that represents the household's privacy preferences.</t>
          </dd>
          <dt>Effective policy derivation:</dt>
          <dd>
            <t>The logical function, performed by or on behalf of the policy authority, that determines the effective policy instance for a participant.</t>
          </dd>
          <dt>Effective policy:</dt>
          <dd>
            <t>The policy instance that applies to a particular PPD participant at a particular time, after effective policy derivation has resolved household policy state and any applicable participant-specific inputs.</t>
          </dd>
          <dt>PPD participant:</dt>
          <dd>
            <t>A device, or a backend service acting on behalf of a device, that participates in PPD by retrieving and acknowledging an applicable policy instance.</t>
          </dd>
          <dt>Policy instance:</dt>
          <dd>
            <t>A specific version or representation of an effective policy that can be identified for acknowledgment and recordkeeping.</t>
          </dd>
          <dt>Association:</dt>
          <dd>
            <t>The state established when a PPD participant has retrieved the current applicable effective policy and acknowledged receipt of that specific policy instance.</t>
          </dd>
          <dt>Current association:</dt>
          <dd>
            <t>Association state that still corresponds to the latest applicable effective policy for the participant and remains fresh according to the renewal model enforced by the PPD service endpoint.</t>
          </dd>
          <dt>Association freshness:</dt>
          <dd>
            <t>The property that an association remains within the bounded interval, or before the renewal deadline, accepted by the PPD service endpoint for treating that association as current.</t>
          </dd>
          <dt>Stale association:</dt>
          <dd>
            <t>Association state that still refers to the latest applicable effective policy instance, but whose freshness can no longer be confirmed because renewal did not occur within the bounded interval accepted by the PPD service endpoint.</t>
          </dd>
          <dt>Needs reassociation:</dt>
          <dd>
            <t>A state in which current association cannot be confirmed because the applicable effective policy changed, participant state relevant to effective policy derivation changed, or enough state was lost that the existing association no longer applies reliably.</t>
          </dd>
          <dt>Reassociation:</dt>
          <dd>
            <t>The process by which a PPD participant recovers from stale association or a needs-reassociation state and re-establishes current association.</t>
          </dd>
          <dt>Broken association:</dt>
          <dd>
            <t>A state in which stored or reported information is contradictory or incomplete enough that current association cannot be determined reliably.</t>
          </dd>
          <dt>Policy acknowledgment:</dt>
          <dd>
            <t>A signal that a PPD participant has received a specific effective policy instance.  A policy acknowledgment is not a statement that the device is compatible with every policy term or that the device will behave in a particular way.</t>
          </dd>
          <dt>Network-observed device:</dt>
          <dd>
            <t>A device that is visible to the local network through ordinary network observation but that has not established association through PPD.</t>
          </dd>
          <dt>Unmanaged device:</dt>
          <dd>
            <t>A network-observed device that is not known to participate in PPD or is not currently manageable through PPD association.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="limitations-of-existing-mechanisms">
      <name>Limitations of Existing Mechanisms</name>
      <t>Current mechanisms for managing data privacy within the home environment exhibit limitations.</t>
      <section anchor="device-specific-configurations">
        <name>Device-specific Configurations</name>
        <t>Individual devices often employ unique privacy settings, thereby complicating user management of privacy across the entire network.
This complexity can inadvertently lead to unintended data sharing.</t>
      </section>
      <section anchor="ineffective-and-unusable-user-interfaces">
        <name>Ineffective and Unusable User Interfaces</name>
        <t>Navigating and configuring privacy settings on individual devices can be a time-consuming and frustrating experience for users.
These ineffective interfaces often lead users to habitually agree to relax their privacy preferences without fully understanding the implications of their decisions.
This fosters a general resignation towards privacy management, making it difficult for users to exert meaningful control over their personal data and ultimately compromising their privacy expectations.</t>
      </section>
      <section anchor="dnt-and-p3p">
        <name>DNT and P3P</name>
        <t>Protocols like Do Not Track (DNT) and Platform for Privacy Preferences Project (P3P) have not achieved widespread adoption and have proven inadequate for addressing nuanced privacy needs.
These protocols lack the granularity required to express fine-grained user preferences and may not effectively prevent unintended data collection or sharing.
For instance, consider a smart security camera within a home network.
While DNT or P3P can signal a user's general preference not to be tracked or share data, they do not enable users to specify detailed privacy settings, such as allowing the camera to record video but not audio, or restricting data sharing to only within the home network.
Users need more precise control options to manage their privacy effectively and communicate their preferences across different devices and contexts.
These limitations, coupled with the increasing complexity of the IoT ecosystem, hinder the effective exercise of user control over their data within the home environment and pose a significant threat to user privacy.</t>
      </section>
    </section>
    <section anchor="operational-scenarios">
      <name>Operational Scenarios</name>
      <t>This section describes representative operational cases for the architecture in home-network environments.
The scenarios focus on discovery, association, reassociation, and mixed-participant visibility rather than on user-interface details.</t>
      <section anchor="initial-discovery-and-association">
        <name>Initial Discovery and Association</name>
        <t>A PPD participant joins the home network and obtains one or more candidate PPD service endpoints through configuration or local network discovery.
In a common home deployment model, the PPD service endpoint is hosted by a residential gateway or equivalent home-network service.
Discovery identifies reachability, not authority.
The participant establishes a secure connection to a selected endpoint, confirms that endpoint through the applicable trust mechanism, retrieves the applicable effective policy instance, and acknowledges receipt of that policy instance.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
At the end of this process, the participant has established association if the current applicable effective policy has been delivered and acknowledged.
The PPD service endpoint also determines the initial freshness state of that association.</t>
      </section>
      <section anchor="policy-update-and-reassociation">
        <name>Policy Update and Reassociation</name>
        <t>The household policy, or the participant's effective policy, changes.
The PPD service endpoint immediately invalidates current association for the participant.
The participant enters a needs-reassociation state until it retrieves and acknowledges the updated effective policy instance.
This scenario illustrates that association state is tied to a specific policy instance and not to prior acknowledgments alone.
Reassociation re-establishes current association by confirming that the participant has seen the latest applicable policy instance.</t>
      </section>
      <section anchor="association-freshness-expiry-and-renewal">
        <name>Association Freshness Expiry and Renewal</name>
        <t>The applicable effective policy instance is unchanged, but the participant does
not renew within the bounded interval accepted by the PPD service endpoint.
The association becomes stale even though no policy change occurred.
The participant no longer has current association until it completes the
required renewal procedure.
This scenario distinguishes stale association from a needs-reassociation state
caused by a changed policy instance.</t>
      </section>
      <section anchor="participant-state-change">
        <name>Participant State Change</name>
        <t>A participant changes in a way that can affect the applicable effective policy instance, such as a declaration update, capability change, or other state change relevant to effective policy derivation.
The PPD service endpoint determines that current association can no longer be confirmed using existing state alone.
The participant then retrieves and acknowledges the newly applicable effective policy instance.
This scenario keeps the architecture focused on policy signaling and recordkeeping without assuming that every state change requires the same local handling or transport behavior.</t>
      </section>
      <section anchor="mixed-participant-network-visibility">
        <name>Mixed-Participant Network Visibility</name>
        <t>A home network contains both PPD participants and devices that do not participate in PPD.
The household can still use local management functions to distinguish associated participants, participants whose current association cannot be confirmed, and network-observed or unmanaged devices.
This scenario illustrates that non-participating devices are an expected operational reality.
Their presence can inform transparency and local management decisions, but it does not create association or change the baseline signaling role of PPD.</t>
      </section>
    </section>
    <section anchor="goals">
      <name>Goals</name>
      <section anchor="enhance-user-control">
        <name>Enhance User Control</name>
        <ul spacing="normal">
          <li>
            <t>Support a household's ability to define privacy preferences that can be made available consistently across participating devices and associated services.</t>
          </li>
          <li>
            <t>Provide an architectural basis for recording whether the current applicable policy was made available to a participant.</t>
          </li>
          <li>
            <t>Create a reciprocal acknowledgment model in which the household can retain a record that a participant or associated service was presented with, and acknowledged, a specific household policy instance.</t>
          </li>
        </ul>
      </section>
      <section anchor="promote-interoperability">
        <name>Promote Interoperability</name>
        <ul spacing="normal">
          <li>
            <t>Establish a standardized mechanism for devices from diverse manufacturers to discover PPD service endpoints, retrieve applicable privacy policies, and acknowledge policy instances.</t>
          </li>
          <li>
            <t>Support consistent association and reassociation behavior across heterogeneous participants.</t>
          </li>
        </ul>
      </section>
      <section anchor="enable-flexibility">
        <name>Enable Flexibility</name>
        <ul spacing="normal">
          <li>
            <t>Allow deployments to place policy storage and effective-policy derivation locally or remotely without changing the baseline participant-facing contract.</t>
          </li>
          <li>
            <t>Leave room for deployment-specific protocol profiles where constrained environments or different operational models require them.</t>
          </li>
        </ul>
      </section>
      <section anchor="facilitate-transparency">
        <name>Facilitate Transparency</name>
        <ul spacing="normal">
          <li>
            <t>Provide a basis for local management functions to distinguish currently associated participants, stale or reassociation-needed participants, and non-participating devices.</t>
          </li>
          <li>
            <t>Improve visibility into which participants have been presented with the current applicable policy instance, without implying enforcement of device behavior.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This document focuses on defining a high-level architectural framework for a Privacy Preference Declaration (PPD) protocol specifically designed for home network environments.
This document concentrates on the conceptual framework, key architectural components, and fundamental principles for enabling users to express privacy preferences and signal those preferences to devices within their home networks.</t>
      <t>This document does not delve into specific implementation details, such as message formats, data structures, security algorithms, or user interface design.
Furthermore, this document does not define mechanisms that modify device behavior, legal and regulatory considerations, or specific security protocols.
Where this document discusses recordkeeping, that recordkeeping is limited to signaling and recording that an applicable household policy was made available to and acknowledged by a PPD participant.
That recordkeeping can provide a basis for later accountability, audit, or dispute analysis, but this document does not define enforcement behavior or prove subsequent compliance.</t>
      <t>Specific implementation details and message formats are expected to be addressed in companion specifications.
This document aims to be complementary to existing and future standards related to home networking, IoT security, and data privacy.</t>
      <t>This document provides the foundation for subsequent work, including:</t>
      <ul spacing="normal">
        <li>
          <t>Privacy Preference Declaration Taxonomy: This document will define a taxonomy of privacy preference categories and attributes, including a mechanism for registration and management of these categories.</t>
        </li>
        <li>
          <t>Privacy Preference Declaration Protocol Specification: This document is expected to specify the message formats, data structures, and communication procedures for the PPD protocol, including mechanisms for PPD service endpoint discovery, policy retrieval, policy acknowledgment, participant resynchronization, and optional participant status reporting.</t>
        </li>
      </ul>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>This document makes the following assumptions:</t>
        <ul spacing="normal">
          <li>
            <t>User Control: It is assumed that users have a reasonable level of control over their home network infrastructure.
This includes the ability to configure routers, install software updates, and manage device access to the network.
This control is essential for users to effectively manage their privacy preferences and make them available to devices within their home network.</t>
          </li>
          <li>
            <t>Resource Constraints: It is assumed that the home network environment and devices operating therein have resource limitations, such as limited processing power and bandwidth.
We limit this assumption by considering that the PPD protocol and its associated mechanisms should be designed with these constraints in mind, minimizing overhead and ensuring efficient operation even on resource-constrained devices.</t>
          </li>
          <li>
            <t>Security Considerations: It is assumed that home networks in scope of this document are susceptible to typical security threats, including insider threats (or non-malicious misconfiguration) and vulnerability to local attacks.
We limit this assumption by considering specific security threats to protect user privacy and the integrity of the privacy policy.
This includes considerations for secure policy dissemination, device authentication, and protection against unauthorized access and modification of privacy preferences.</t>
          </li>
          <li>
            <t>Single User Policy: This document assumes that each device implementing the protocol is governed by a single, unified privacy policy defined by its primary user.
While other individuals within the same physical environment (e.g., household) may have different privacy preferences, the protocol is designed with the expectation that a device or associated service can receive the policy established by its primary user.
Future extensions could explore mechanisms for managing and reconciling multiple user-defined policies on a single device, particularly in shared or multi-user environments.</t>
          </li>
          <li>
            <t>Endpoint Discovery and Trust: It is assumed that configuration or local network mechanisms can identify one or more candidate PPD service endpoints for a participant.
Discovery alone does not establish that an endpoint is authoritative for household policy.
The applicable protocol profile needs a separate way to authenticate the selected endpoint and confirm that policy presented through that endpoint is authoritative for the participant's household context.</t>
          </li>
          <li>
            <t>Policy Signaling: It is assumed that PPD participants can retrieve the applicable household privacy policy through a PPD service endpoint and acknowledge receipt of that policy instance.
This acknowledgment forms the basis of association.
It is a receipt signal only; it does not assert that the participant is compatible with every policy term or that it will behave in a particular way.
Current association also depends on association freshness as determined by the PPD service endpoint.</t>
          </li>
          <li>
            <t>Association Freshness: It is assumed that current association expires unless the participant renews within a bounded interval accepted by the PPD service endpoint.
Participant-initiated exchanges provide the renewal or recovery path, but the PPD service endpoint remains the source of truth for whether association is current, stale, or in a needs-reassociation state.</t>
          </li>
          <li>
            <t>Local Recordkeeping: At a minimum, the architecture enables the household to know which PPD participants have acknowledged the current applicable policy.
Deployment-specific responses to participants that do not acknowledge policy, or to devices that do not participate in PPD, are local management decisions and are outside the baseline signaling function defined here.</t>
          </li>
        </ul>
      </section>
      <section anchor="association-state-and-freshness">
        <name>Association State and Freshness</name>
        <t>This architecture treats the PPD service endpoint as the source of truth for
participant association state.
A participant establishes association when it retrieves and acknowledges a
specific applicable effective policy instance.</t>
        <t>Current association exists only when both of the following are true:</t>
        <ul spacing="normal">
          <li>
            <t>the acknowledged policy instance still corresponds to the latest applicable
effective policy for that participant; and</t>
          </li>
          <li>
            <t>the association remains fresh according to the renewal model enforced by the
PPD service endpoint.</t>
          </li>
        </ul>
        <t>If the applicable effective policy instance is unchanged but the freshness
interval expires before renewal, the participant enters stale association.
If the applicable effective policy changes, if participant state relevant to
effective policy derivation changes, or if enough state is lost that the prior
association can no longer be trusted, the participant enters a
needs-reassociation state.
In either case, the participant no longer has current association.</t>
        <t>Participant-initiated exchanges provide the renewal or recovery path, but they
are not the source of truth for whether association is current.
The PPD service endpoint determines whether a participant is current, stale, or
in needs reassociation.</t>
      </section>
      <section anchor="discovery-and-policy-authority-boundary">
        <name>Discovery and Policy-Authority Boundary</name>
        <t>This architecture separates discovery of a participant-facing service endpoint
from trust establishment.
A participant may learn one or more candidate PPD service endpoints through
configuration or local network mechanisms, but discovery alone does not make
any candidate authoritative.
Before treating a policy instance as authoritative, the participant needs the
applicable protocol profile to authenticate the selected endpoint and confirm
that it is authorized to present policy for the household context.</t>
        <t>The participant-facing contract is the PPD service endpoint, not direct access
to the policy authority.
A deployment may place storage, policy combination, and effective policy
derivation behind that service.
When the PPD service endpoint and policy authority are distinct, the deployment
needs to preserve at least:</t>
        <ul spacing="normal">
          <li>
            <t>authenticity of the effective policy instance presented to the participant;</t>
          </li>
          <li>
            <t>integrity of policy-instance identifiers and association-freshness metadata;</t>
          </li>
          <li>
            <t>an unambiguous binding between the selected PPD service endpoint and the
policy authority on whose behalf it presents policy.</t>
          </li>
        </ul>
        <t>These are architectural invariants.
The specific transport, metadata confirmation, and cryptographic mechanisms are
left to future protocol specifications.</t>
      </section>
      <section anchor="key-components">
        <name>Key Components</name>
        <t>User Interface: A user-friendly interface (e.g., mobile app, web portal) for creating and managing privacy preferences.</t>
        <t>PPD Service Endpoint: A participant-facing service through which PPD participants discover, retrieve, and acknowledge applicable policy instances.
In a common home deployment model, this service is hosted by a residential gateway or equivalent home-network service.
A participant may learn candidate PPD service endpoints through configuration or local network discovery, but it treats a selected endpoint as authoritative only after the applicable trust mechanism succeeds.</t>
        <t>Policy Authority: The authoritative source of household policy state and any inputs used for effective policy derivation.
The policy authority may be local or remote.
A PPD service endpoint can obtain policy from a policy authority without exposing internal storage or computation topology to participants.
Participants are not required to discover or communicate with the policy authority directly in the baseline architecture.</t>
        <t>Effective Policy Derivation: The logical function, performed by or on behalf of the policy authority, that determines the applicable policy instance for a participant.</t>
        <t>Participant Declarations and Consent Requests: Optional participant inputs that can disclose data-handling declarations or request consent for uses not covered by baseline policy.
These inputs are distinct from the minimal path of policy retrieval and policy acknowledgment.</t>
        <t>Recordkeeping and Management Mechanisms: Deployment-specific mechanisms for presenting association state, participant status, effective policy views, and network-observed devices to the household.
Such mechanisms are not device-behavior requirements in the baseline PPD architecture.</t>
      </section>
      <section anchor="data-flows">
        <name>Data Flows</name>
        <t>This section outlines the high-level data interactions between users, PPD participants, the PPD service endpoint, and the policy authority in the Privacy Preference Declaration (PPD) framework.
It describes how privacy preferences are defined by users, made available to participants, and used as the basis for signaling and recordkeeping in a home network environment.</t>
        <t>The process begins when a user defines a set of privacy preferences that apply to their household.
These preferences may express rules such as which types of data may be collected, under what conditions data may be processed or shared, or which retention practices are acceptable.
The design of the user interface used to author these preferences, including its presentation, usability, or input modalities, is out of scope for this document, and will be addressed separately.
Likewise, the underlying vocabulary and structure of the privacy preferences, including data categories and associated constraints, is specified in (Privacy Preference Declaration Taxonomy).</t>
        <t>Once created, the user's preferences are maintained by a policy authority, which may reside locally on a networked controller or be accessible through other trusted infrastructure.
The policy authority may include storage, effective policy derivation, or both.
When a new device joins the home network, it initiates an onboarding process during which it obtains one or more candidate PPD service endpoints through configuration or local network mechanisms.
Discovery identifies reachable candidates, but does not by itself establish that any candidate is authoritative for household policy.
The participant then establishes a secure channel to a selected endpoint and authenticates that endpoint according to the applicable protocol profile before retrieving policy.
Following onboarding, the PPD participant performs association, which involves retrieving the household privacy policy and acknowledging receipt of the applicable policy instance.
In some deployments, the participant is a backend service associated with the device rather than the local device itself.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
The participant-facing contract ends at the PPD service endpoint; any split between that service and the policy authority is internal to the deployment.
Where those components are distinct, the deployment preserves the authenticity and integrity of the effective policy instance, policy-instance identifier, and freshness metadata presented through the service endpoint.
Devices may optionally report their data handling declarations to the PPD service endpoint at this stage.
The PPD service endpoint also determines a freshness interval or renewal deadline for the resulting association state.</t>
        <t>If a device seeks to perform actions not permitted under the baseline policy, for example, collecting or sharing data beyond what the user has authorized, it may initiate a consent request workflow.
However, the design and behavior of this consent mechanism is explicitly out of scope for this document.
Inappropriate or poorly designed consent flows, such as those that involve excessive prompting, ambiguous language, or misleading options, can inadvertently pressure users into accepting data practices that conflict with their preferences.
Even without malicious intent, these experiences may degrade trust and lead to outcomes inconsistent with user expectations.
Future specifications should describe consent interactions that are clear, proportionate, and respectful, helping users make informed decisions without friction or fatigue.</t>
        <t>Current association is not indefinite.
If the participant does not renew before the freshness interval expires, the PPD service endpoint treats the association as stale even if the applicable effective policy instance is unchanged.
Reassociation is required when current association can no longer be confirmed for a participant.
This can occur because the applicable effective policy changed, because participant state relevant to effective policy derivation changed, because the association became stale, or because enough state was lost that the prior association can no longer be trusted.
Reassociation re-establishes current association by retrieving and acknowledging the latest applicable effective policy instance, or by completing a renewal procedure defined by the applicable protocol profile when the policy instance is unchanged.
Devices are not expected to re-collect consent for data uses already covered by existing, valid consent.</t>
        <t>To support straightforward implementation and debugging, future protocol work should define a simple machine-readable representation for privacy policies, declarations, and acknowledgment state.
JSON is a practical baseline encoding for the architecture and for many constrained home-network deployments.
More compact encodings can be considered later if a specific deployment profile demonstrates a need for them.</t>
        <t>Future protocol specifications also need to define how association freshness is conveyed, including whether the protocol uses bounded renewal intervals, explicit renewal deadlines, or equivalent lease-style semantics.
Those specifications need to distinguish stale association from needs-reassociation states caused by policy or participant-state changes.</t>
        <t>It is important to note that the baseline requirement under this architecture is limited to discovery, retrieval, acknowledgment, and any renewal needed to maintain current association for the user's privacy policy.
These actions provide a signaling and recordkeeping mechanism for establishing that the current applicable policy was made available to the participant.
However, this document does not define how device behavior is changed by the policy, nor does it specify how to handle cases where a device cannot fully satisfy a given policy.
These aspects, including optional status reporting, conflict resolution, or auditing, may be addressed in future work.</t>
        <t>Finally, while this document defines the overall data flow and interaction sequence, it does not define message formats, communication protocol details, or consent interface specifications.
These elements will be specified in a companion document, (Privacy Preference Declaration Protocol Specification).</t>
      </section>
      <section anchor="non-ppd-and-network-observed-devices">
        <name>Non-PPD and Network-Observed Devices</name>
        <t>Home networks commonly include devices that do not implement PPD, cannot be updated to implement PPD, or are visible only through local network observation.
The architecture treats these devices as expected operational cases rather than exceptional failures.</t>
        <t>A local management function can classify such devices as network-observed or unmanaged based on information available within the home network.
That classification can improve household transparency by showing that a device is present even though it has not established association through PPD.
Network observation does not create association, does not imply that the device has received a household policy, and does not imply anything about the device's behavior.</t>
        <t>Any local response to unmanaged devices, such as notification, inventory display, or other network management action, is a deployment decision outside the baseline PPD signaling architecture.</t>
      </section>
    </section>
    <section anchor="policy-language">
      <name>Policy Language</name>
      <t>The specific details of the Privacy Policy Language, including its syntax, structure, and extensibility mechanisms, are considered out of scope for this document, which focuses on the overall framework.
The Privacy Policy Language, along with a taxonomy of privacy concepts and attributes, is expected to be defined in a separate document, the "Privacy Preference Declaration Taxonomy", allowing for more detailed exploration and development of this component of the PPD framework.</t>
      <section anchor="language-requirements">
        <name>Language Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Human-readable: Policies should be easily understandable by users.</t>
          </li>
          <li>
            <t>Machine-readable: Policies should be machine-processable for automated interpretation and signaling.</t>
          </li>
          <li>
            <t>Extensible: The language should be flexible enough to accommodate evolving privacy needs and technologies.</t>
          </li>
          <li>
            <t>Internationalization-compatible: Policies and identifiers used within them may need to support multilingual environments and non-ASCII characters.</t>
          </li>
        </ul>
        <t>To ensure consistent interpretation and comparison of string-based policy elements, such as device names, labels, or category identifier string handling practices should align with the guidelines defined in <xref target="RFC7564"/>.
This is particularly important when identifiers or user-facing labels are created, stored, or matched across vendors or systems that operate in different locales or character encodings.</t>
      </section>
      <section anchor="proposed-approach">
        <name>Proposed Approach</name>
        <t>Consider leveraging existing privacy policy languages (e.g., P3P) or drawing lessons from privacy labeling systems used in modern application ecosystems--such as Apple's App Privacy Labels and Google's Data Safety section for Android apps.
While these approaches are not protocols per se, they demonstrate how structured, declarative privacy metadata can be communicated to users and systems in a consistent way.</t>
        <t>Alternatively, a new, concise, and user-friendly privacy policy language may be developed specifically for the PPD framework.
One possibility is to define an intermediate representation--similar in spirit to the intermediate representation used in compilers such as LLVM--that captures the fundamental privacy constraints and regulatory considerations (e.g., from GDPR, CCPA) in a machine-readable form.
This representation would support automated interpretation while being straightforward to translate into human-readable language.</t>
        <t>Future specifications should also define guidance for how string identifiers--such as device roles, policy tags, or consent status labels--are formatted, compared, and stored, to avoid ambiguities across systems.
In contexts where internationalized strings are involved, alignment with <xref target="RFC7564"/> should be considered to ensure interoperability and consistency.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>This document defines an architectural framework for enabling users to express privacy preferences and signal those preferences within home network environments.
Several aspects critical to a fully operational implementation are intentionally left out of scope here and are expected to be addressed in future specifications or companion documents.</t>
      <section anchor="policy-taxonomy-and-semantics">
        <name>Policy Taxonomy and Semantics</name>
        <t>A separate document, tentatively titled "Privacy Preference Declaration Taxonomy", will define:</t>
        <ul spacing="normal">
          <li>
            <t>A common vocabulary and set of categories for expressing privacy preferences.</t>
          </li>
          <li>
            <t>Attributes and semantics for data types, sharing constraints, and processing conditions.</t>
          </li>
          <li>
            <t>An extensibility model for incorporating future data types and policy dimensions.</t>
          </li>
        </ul>
        <t>This taxonomy is foundational for consistent policy interpretation across heterogeneous devices and vendors.</t>
      </section>
      <section anchor="protocol-specification-and-message-formats">
        <name>Protocol Specification and Message Formats</name>
        <t>A companion document, "Privacy Preference Declaration Protocol Specification", is expected to define:</t>
        <ul spacing="normal">
          <li>
            <t>Message formats for device onboarding, policy retrieval, policy acknowledgment, participant resynchronization, and optional participant status reporting.</t>
          </li>
          <li>
            <t>Optional mechanisms for consent request flows.</t>
          </li>
          <li>
            <t>Discovery profiles, lightweight metadata confirmation, and trust-establishment bindings for PPD service endpoints.</t>
          </li>
          <li>
            <t>Transport-layer considerations, service authentication, and policy-authority trust expectations.</t>
          </li>
          <li>
            <t>Association freshness semantics, including how renewal intervals or deadlines are conveyed and how stale association is distinguished from needs-reassociation states.</t>
          </li>
          <li>
            <t>Baseline encoding expectations for structured data, with JSON as a practical starting point and more compact encodings reserved for deployment profiles that need them.</t>
          </li>
        </ul>
      </section>
      <section anchor="consent-request-workflow-design-specifications">
        <name>Consent Request Workflow Design Specifications</name>
        <t>The mechanism by which devices request additional user consent for data uses not covered by the baseline policy is out of scope.
However, future specifications should:</t>
        <ul spacing="normal">
          <li>
            <t>Define clear constraints to prevent manipulative or fatiguing consent flows (e.g., dark patterns).</t>
          </li>
          <li>
            <t>Describe consent interactions that are transparent, infrequent, proportionate, and user-respecting.</t>
          </li>
          <li>
            <t>Explore user interface standards or API affordances to preserve meaningful choice.</t>
          </li>
        </ul>
        <t>This is a particularly sensitive area and must balance user experience, privacy expectations, and implementation feasibility.</t>
      </section>
      <section anchor="recordkeeping-and-local-management">
        <name>Recordkeeping and Local Management</name>
        <t>This architecture does not define how devices act on privacy policies or how departures from policy are detected or remediated.
The baseline function is signaling: a participant can receive an applicable household policy and acknowledge that policy instance.
Future work may include:</t>
        <ul spacing="normal">
          <li>
            <t>Optional participant status reporting models and device-side implementation expectations.</t>
          </li>
          <li>
            <t>Recordkeeping mechanisms for correlating policy delivery and acknowledgment records.</t>
          </li>
          <li>
            <t>State models that distinguish current, stale, and needs-reassociation participant status.</t>
          </li>
          <li>
            <t>Deconfliction strategies for devices unable to meet all user-defined constraints.</t>
          </li>
          <li>
            <t>Deployment-local management options, such as notifications or inventory display.</t>
          </li>
        </ul>
      </section>
      <section anchor="user-interface-design-specifications">
        <name>User Interface Design Specifications</name>
        <t>The user-facing interface used to author, modify, and review privacy preferences is out of scope.
Future design guidance may address:</t>
        <ul spacing="normal">
          <li>
            <t>User experience design principles for presenting privacy concepts clearly and accessibly.</t>
          </li>
          <li>
            <t>Models for progressive disclosure of policy impact.</t>
          </li>
          <li>
            <t>Multi-user and household-role-specific control models (e.g., parental vs. administrative roles).</t>
          </li>
        </ul>
      </section>
      <section anchor="interoperability-testing-and-reference-implementations">
        <name>Interoperability Testing and Reference Implementations</name>
        <t>Future work may also include:</t>
        <ul spacing="normal">
          <li>
            <t>Development of reference implementations of the PPD protocol, PPD service endpoint, and policy-authority components.</t>
          </li>
          <li>
            <t>Interoperability testing across devices and vendors.</t>
          </li>
          <li>
            <t>Conformance guidelines and self-certification procedures.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="internationalization-considerations">
      <name>Internationalization Considerations</name>
      <t>In contexts where privacy preferences or taxonomy elements involve user-facing or vendor-defined string identifiers, additional work may be required to:</t>
      <ul spacing="normal">
        <li>
          <t>Define string normalization and comparison rules, particularly for internationalized text.</t>
        </li>
        <li>
          <t>Support identifier consistency across diverse vendors and locales.</t>
        </li>
        <li>
          <t>Consider alignment with <xref target="RFC7564"/> for handling Unicode-aware identifiers in a secure and interoperable way.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For a privacy framework to be effective, it needs to support the expression of user preferences and protect those preferences during transmission, retrieval, and acknowledgment.
This section outlines safeguards for confidentiality, authenticity, integrity, and metadata minimization during PPD operations.</t>
      <section anchor="secure-policy-dissemination">
        <name>Secure Policy Dissemination</name>
        <t>Communication between PPD participants and the PPD service endpoint needs protection against unauthorized access and tampering.
When the PPD service endpoint and policy authority are distinct, deployments also need to preserve policy authenticity and integrity across that boundary.
Discovery mechanisms can identify candidate PPD service endpoints, but discovery alone is not sufficient to establish that an endpoint is authorized to present household policy.
Future protocol specifications need to identify appropriate cryptographic mechanisms, such as encryption and mutual authentication, so that legitimate participants can retrieve privacy policies and detect modification.
Those specifications also need to protect the binding between the authenticated participant-facing service endpoint and the policy state it presents.</t>
      </section>
      <section anchor="anonymity-and-metadata-protection">
        <name>Anonymity and Metadata Protection</name>
        <t>Even when privacy policies themselves do not contain sensitive personal information, the act of retrieving or acknowledging a policy can reveal characteristics about the household, such as the types of devices in use, specific user preferences, or behavioral patterns over time.
<xref target="RFC7258"/> cautions against protocol designs that expose unnecessary metadata, treating the accumulation of such information as a legitimate technical threat.
This framework takes that warning seriously: metadata exposure during policy retrieval and device onboarding needs to be minimized to avoid turning privacy infrastructure into a new source of privacy leakage.
Concepts from <xref target="RFC9577"/> may help inform this effort. <xref target="RFC9577"/> introduces techniques for authorization without identification, enabling a client to prove it is authorized without revealing who it is.
While <xref target="RFC9577"/> is optimized for pseudonymous web authentication over the public internet and assumes a centralized token issuer model, its core ideas, particularly around unlinkable token presentation, could be adapted to the PPD protocol to reduce metadata correlation and minimize household identifiability during policy exchanges.
However, this needs careful analysis, as the assumptions of <xref target="RFC9577"/> do not fully align with the goals or context of a local, user-governed home network.</t>
      </section>
      <section anchor="policy-integrity">
        <name>Policy Integrity</name>
        <t>Devices need assurance that the policy retrieved is authentic and unaltered.
Integrity protections, such as digital signatures, are necessary to ensure that users' preferences cannot be tampered with in transit or at rest by other devices, malicious actors, or misconfigurations.
If policy is obtained through a participant-facing service from a distinct policy authority, integrity protections also need to cover the policy-instance identifier and any freshness metadata presented through that service.</t>
      </section>
      <section anchor="device-authentication">
        <name>Device Authentication</name>
        <t>Devices participating in the privacy framework need an authentication model before accessing the PPD service endpoint.
This limits policy dissemination to known, authorized participants and helps users maintain trust in the integrity of their home network's privacy relationships.
If the PPD service endpoint and policy authority are distinct, the deployment also needs a way to preserve the authenticity of policy state presented through the participant-facing service.
By aligning with the concerns raised in <xref target="RFC7258"/> and incorporating ideas from <xref target="RFC9577"/> where appropriate, this framework seeks to protect users not only from overt data collection, but also from silent inference and passive metadata surveillance.
At the same time, it avoids treating anonymity as an end in itself.
The goal is to support privacy with recordkeeping, where user-defined preferences are signaled consistently, devices are identifiable only as much as necessary for the exchange, and the user retains visibility into what occurs within their domain.</t>
      </section>
      <section anchor="policy-acknowledgment-and-recordkeeping">
        <name>Policy Acknowledgment and Recordkeeping</name>
        <t>PPD participants need a way to acknowledge receipt of the applicable privacy policy instance.
This acknowledgment should be recorded and verifiable so that the household can determine which participants have seen the current policy.
The record needs to bind the participant identity, the acknowledged policy instance, and the time or sequence context in which the acknowledgment was made.
For devices that rely on a backend service, the record also needs to distinguish between acknowledgment by the local device and acknowledgment by the backend service acting on behalf of that device.
This record is important because it creates a reciprocal acknowledgment path.
In many current deployments, the household user is asked to acknowledge device or vendor policy terms, but there is no comparably strong household-controlled record that the participant was presented with the household's own privacy policy.
An authenticated and integrity-protected acknowledgment record allows the household to show that presentation and acknowledgment occurred, which can support later accountability or review even when the architecture does not define automated enforcement.
Future protocol specifications need to define how acknowledgments are protected against forgery, replay, and stale-policy confusion while still being practical for constrained home-network devices.
At minimum, the selected mechanism needs to provide:</t>
        <ul spacing="normal">
          <li>
            <t>participant authentication sufficient to bind the acknowledgment to the device or backend service that made it;</t>
          </li>
          <li>
            <t>policy-instance integrity so that the acknowledged policy can be identified unambiguously;</t>
          </li>
          <li>
            <t>freshness or sequencing so that an old acknowledgment cannot be replayed as evidence of current association;</t>
          </li>
          <li>
            <t>verifiability sufficient for the acknowledgment record to function as a protected receipt of policy presentation and acknowledgment; and</t>
          </li>
          <li>
            <t>a way to retain or export the acknowledgment record without exposing more household metadata than necessary.</t>
          </li>
        </ul>
        <t>A policy acknowledgment is not, by itself, an assertion about subsequent device behavior.
Any local response to non-participation or other local observations is outside the baseline signaling mechanism defined by this architecture.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC8280">
          <front>
            <title>Research into Human Rights Protocol Considerations</title>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
            <author fullname="C. Cath" initials="C." surname="Cath"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973). The other parts of this document explain the background of the guidelines and how they were developed.</t>
              <t>This document is the first milestone in a longer-term research effort. It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8280"/>
          <seriesInfo name="DOI" value="10.17487/RFC8280"/>
        </reference>
        <reference anchor="RFC7564">
          <front>
            <title>PRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application Protocols</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Application protocols using Unicode characters in protocol strings need to properly handle such strings in order to enforce internationalization rules for strings placed in various protocol slots (such as addresses and identifiers) and to perform valid comparison operations (e.g., for purposes of authentication or authorization). This document defines a framework enabling application protocols to perform the preparation, enforcement, and comparison of internationalized strings ("PRECIS") in a way that depends on the properties of Unicode characters and thus is agile with respect to versions of Unicode. As a result, this framework provides a more sustainable approach to the handling of internationalized strings than the previous framework, known as Stringprep (RFC 3454). This document obsoletes RFC 3454.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7564"/>
          <seriesInfo name="DOI" value="10.17487/RFC7564"/>
        </reference>
        <reference anchor="RFC9577">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document defines an HTTP authentication scheme for Privacy Pass, a privacy-preserving authentication mechanism used for authorization. The authentication scheme specified in this document can be used by Clients to redeem Privacy Pass tokens with an Origin. It can also be used by Origins to challenge Clients to present Privacy Pass tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9577"/>
          <seriesInfo name="DOI" value="10.17487/RFC9577"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
