<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-skyfire-kyapayprofile-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title>KYAPay Profile</title>
    <seriesInfo name="Internet-Draft" value="draft-skyfire-kyapayprofile-01"/>
    <author initials="A." surname="Agarwal" fullname="Ankit Agarwal">
      <organization>Skyfire</organization>
      <address>
        <email>ankit@skyfire.xyz</email>
      </address>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Self-Issued Consulting</organization>
      <address>
        <email>michael_b_jones@hotmail.com</email>
        <uri>https://self-issued.info/</uri>
      </address>
    </author>
    <date year="2026" month="March" day="31"/>
    <keyword>agent</keyword>
    <abstract>
      <?line 68?>

<t>This document defines a profile for agent identity and payment tokens in
JSON web token (JWT) format. Authorization servers and resource servers from
different vendors can leverage this profile to consume identity and payment
tokens in an interoperable manner.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://skyfire-xyz.github.io/kyapay-ietf-draft/draft-skyfire-kyapayprofile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-skyfire-kyapayprofile/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/skyfire-xyz/kyapay-ietf-draft"/>.</t>
    </note>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>As software agents evolve from pre-orchestrated workflow automations to truly
autonomous or semi-autonomous assistants, they require the ability to identify
themselves -- and more importantly, identify their human principals -- to external
systems. Agents acting on behalf of users to discover services, create accounts,
or execute actions currently face significant operational barriers.</t>
      <t>The KYAPay token addresses these challenges by providing a standard envelope to
carry verified identity and payment information. By utilizing "kya" (Agent
Identity) and "pay" (Payment) tokens, agents can identify their human principals
to services, sites, bot managers, customer identity and access management (CIAM)
systems, and fraud detectors. This enables agents to bypass common blocking
mechanisms and access services that were previously restricted to manual human
interaction.</t>
      <t>KYAPay does not aim to define agentic identity in its entirety. Rather, it specifies
a standard and extensible JWT profile for a token that can be used to securely share human
principal and agent identity information with websites and APIs. KYAPay tokens
provide a strong signal of human presence behind agentic requests that are
otherwise indistinguishable from programmatic and potentially malicious bot requests.</t>
      <t>Note that, in the future,
the payment token functionality could be split into a separate specification,
if desired by a working group adopting the specification.
It is retained here at present for ease of reviewing.</t>
      <section anchor="use-cases-for-the-kyapay-token">
        <name>Use Cases for the KYAPay Token</name>
        <t>Enabling agents to access websites and APIs on behalf of
the human principals they represent is a design goal of KYAPay tokens.
Today’s internet is designed primarily for humans, meaning that automated systems
are often classified as malicious and blocked by web security infrastructure.
However, the rise of AI agents has introduced a new paradigm where
programmatic clients legitimately access websites and APIs
on behalf of human principals.
Because these agents can be hard to distinguish from traditional bots,
they are often inadvertently blocked,
creating a need for the web security ecosystem to distinguish between
legitimate agentic traffic and truly malicious activity.
KYAPay tokens are designed to address this challenge by enabling agents to convey
verified identity and payment credentials.
These tokens can provide web security systems and merchants with
a strong signal that the requests are authorized by a human,
allowing them to safely permit legitimate programmatic transactions
while aggressively blocking undesired traffic.</t>
        <t>Enabling agents to create accounts and/or log in to accounts
on behalf of their human principals is a related design goal.
To achieve this, systems can utilize a token exchange workflow <xref target="RFC8693"/>.
In this process, a Security Token Service (STS), Identity Provider (IdP),
or OAuth Authorization Server verifies incoming KYA tokens
and extracts claims associated with the human principal, such as email addresses.
The authorization server then performs a token exchange,
swapping the KYA token for a standard OAuth Access Token,
which the agent subsequently uses to interact with the target service.
Crucially, this architecture allows the service to know
that the agent is acting on behalf of the user,
making it possible to differentiate between
direct, human-present sessions and human-initiated, agentic sessions
for authorization, auditing, and security purposes.</t>
        <t>Enabling agents to have ubiquity of access across the Internet just like their
human principals is a related design goal.
Automation typically scales as it achieves higher reliability and lower
cost-to-entry. Unlike the structured logic required by cron jobs or
low-code / no-code platforms, agentic automation leverages LLMs to execute
tasks via natural language, effectively removing the software-skill barrier.
As model reasoning improves and infrastructure scales, these agents become
increasingly dependable and affordable for the human principal.
To maximize utility, agents require ubiquitous Internet access, a feat made
possible by KYAPay Token Issuers. By providing a client-side verification
framework analogous to the server-side role of Certificate Authorities (CAs),
KYAPay builds a standardized network of acceptance across the web security
ecosystem. This allows for the seamless attestation of both the agent’s and
the human principal’s identity, ensuring secure, cross-domain task execution
without the friction of fragmented authentication silos.</t>
        <t>Enabling the ecosystem of web security vendors to engage in finer-grained and
deliberate bad-actor mitigation is a related design goal.
KYA tokens provide a layered, verified, and extensible identity stack
specifically engineered for autonomous agents. This framework
allows the web security ecosystem to distinguish among individual agent
instances, the platforms they run on, and the human principals behind them.
By establishing this level of granular visibility, security systems can
transition from broad defensive measures to specific mitigation; rather than
being forced to block an entire platform, administrators can now isolate
and neutralize a single malicious human user or a malfunctioning software
instance without disrupting legitimate traffic.</t>
        <t>Note that the protocols using these tokens to achieve these goals
are not defined by this specification.
The interoperable use of them for these purposes will require further specification.</t>
        <t>Early production deployments of KYAPay tokens are described at https://kyapay.org.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The claims <tt>iss</tt>, <tt>iat</tt>, <tt>exp</tt>, <tt>aud</tt>, and <tt>jti</tt> are defined by <xref target="RFC7519"/>.
The header parameters <tt>alg</tt>, <tt>kid</tt>, and <tt>typ</tt> are defined by <xref target="RFC7515"/>.</t>
      <t>The <tt>alg</tt> value <tt>ES256</tt> is a digital signature algorithm defined in
<xref section="3.4" sectionFormat="of" target="RFC7518"/>.</t>
      <section anchor="roles">
        <name>Roles</name>
        <dl>
          <dt>Agent:</dt>
          <dd>
            <t>An application, service, or specific software process, executing on behalf
of a Principal.</t>
          </dd>
          <dt>Agent Identity:</dt>
          <dd>
            <t>A unique identifier and a set of claims describing an agent. Grouped into the
<tt>aid</tt> claim for convenience. Because an agent can be public or confidential
(as described in <xref section="2.1" sectionFormat="of" target="RFC6749"/>), the level of assurance for these
claims varies dramatically. Agents also vary in terms of longevity -- they can
have stable long-running identities (such as those of a server-side confidential
client), or they can be transient and ephemeral, and correspond to individual
API calls or compute workloads.</t>
          </dd>
          <dt>Agent Platform:</dt>
          <dd>
            <t>The service provider and runtime environment hosting the Agent, such as a
cloud compute provider or AI operator service. Assertions about the agent
platform are grouped into the <tt>apd</tt> claim, and are primarily used to identify
the Principal entity operating the platform, allowing consumers of the token to
apply reputation-based logic or offer platform-specific services.</t>
          </dd>
          <dt>Principal:</dt>
          <dd>
            <t>A legal entity (human or organization) on whose behalf / in whose authority
an agent or service is operating.</t>
          </dd>
        </dl>
        <section anchor="buy-side-roles">
          <name>Buy-Side Roles</name>
          <dl>
            <dt>Buyer Agent:</dt>
            <dd>
              <t>An Agent performing tasks on behalf of a Buyer Principal, that has its own
Agent Identity, grouped into the <tt>aid</tt> claim.</t>
            </dd>
            <dt>Buyer Agent Platform:</dt>
            <dd>
              <t>The Agent Platform hosting the Buyer Agent. Some use cases require the Platform
to have its own verified identity assertions, grouped into the <tt>apd</tt> claim.</t>
            </dd>
            <dt>Buyer Principal:</dt>
            <dd>
              <t>A legal entity (human or organization) behind the purchase / consumption of a
product or service. The Principal typically interacts with the seller via a
Buyer Agent. Many sellers are required to be able to determine the Buyer
Identity in order to comply with KYC/AML regulations, accounting standards,
and to maintain a direct customer relationships. The buyer principal's
identity is grouped into the <tt>hid</tt> claim.</t>
            </dd>
            <dt>Buyer Identity:</dt>
            <dd>
              <t>The aggregate verified identity assertions of the buy-side entities, typically
encompassing the Buyer Principal, the Buyer Agent Platform, and the Buyer Agent
itself. This composite identity is conveyed via the KYA token, allowing the
seller to verify the entire chain of responsibility behind a request.
The buyer identity utilizes the <tt>hid</tt>, <tt>apd</tt>, and <tt>aid</tt> claims.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sell-side-roles">
          <name>Sell-Side Roles</name>
          <dl>
            <dt>Seller Agent:</dt>
            <dd>
              <t>An Agent performing tasks on behalf of a Seller Principal, directly interacting
with Buyer Agents to facilitate discovery and purchase. Typically runs on
Internet-connected infrastructure, and discoverable via service directories.
Seller agent identity claims are also grouped into the <tt>aid</tt> claim
if KYA tokens are generated for the sellers.</t>
            </dd>
            <dt>Seller Agent Platform:</dt>
            <dd>
              <t>The Agent Platform that hosts Seller Agents. Some use cases require the Platform
to have its own verified identity assertions, grouped into the <tt>apd</tt> claim.</t>
            </dd>
            <dt>Seller Principal:</dt>
            <dd>
              <t>A human principal (individual or organization) that that owns the product,
service, API, website, or content being consumed or sold, and serves as the
ultimate beneficiary of a transaction.
The seller principal's identity is grouped into the <tt>hid</tt> claim.</t>
            </dd>
            <dt>Seller Identity:</dt>
            <dd>
              <t>The aggregate verified identity assertions of the sell-side entities, typically
encompassing the Seller Principal, the Seller Agent Platform, as well as the
Seller Agent Identity.
These various aspects of Seller Identity allow Buyers and Buyer Agents to
perform reputation-based logic, to verify that they are interacting with
the authorized (and expected) counter-party, and to fulfill KYC/AML regulation
requirements.
The seller identity utilizes the <tt>hid</tt>, <tt>apd</tt>, and <tt>aid</tt> claims.</t>
            </dd>
          </dl>
        </section>
        <section anchor="ecosystem-infrastructure-roles">
          <name>Ecosystem Infrastructure Roles</name>
          <dl>
            <dt>Identity Token Issuer:</dt>
            <dd>
              <t>A trusted neutral entity that conducts Know Your Customer (KYC) and Know Your
Business (KYB) (for organizations) verifications. It is responsible for issuing
cryptographically signed <tt>kya</tt> tokens that attest to the identity of the
Principal, Agent, and Agent Platform, for both Buyers and Sellers.</t>
            </dd>
            <dt>Payment Token Issuer:</dt>
            <dd>
              <t>A trusted entity responsible for facilitating the exchange of payments and
credentials between the Buyer and Seller. It issues signed <tt>pay</tt> tokens that
enable settlement via various schemes (Cards, Banks, Cryptocurrency), without
exposing raw credentials or secrets.</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="kyapay-token-schemas">
      <name>KYAPay Token Schemas</name>
      <section anchor="common-claims">
        <name>Common Token Claims</name>
        <t>The following are claims in common, used within the KYA (Know Your Agent),
PAY (Payment), and KYA-PAY (combined Know Your Agent and Payment) Tokens.</t>
        <dl>
          <dt><tt>iss</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - URL of the token's issuer. Used for discovering JWK Sets for token
signature verification, via the <tt>/.well-known/jwks.json</tt> suffix mechanism.</t>
          </dd>
          <dt><tt>sub</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Subject Identifier. Must be pairwise unique within
a given issuer.</t>
          </dd>
          <dt><tt>aud</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Audience (used for audience binding and replay attack mitigation),
uniquely identifying the seller agent.
A single string value.</t>
          </dd>
          <dt><tt>iat</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7519"/>.  Identifies the time
at which the JWT was issued.  This claim must have a value in the past and can
be used to determine the age of the JWT.</t>
          </dd>
          <dt><tt>jti</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Unique ID of this JWT as defined in <xref section="4.1.7" sectionFormat="of" target="RFC7519"/>.</t>
          </dd>
          <dt><tt>exp</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - as defined in <xref section="4.1.4" sectionFormat="of" target="RFC7519"/>.  Identifies the expiration
time on or after which the JWT <bcp14>MUST NOT</bcp14> be accepted for processing.</t>
          </dd>
          <dt><tt>sdm</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Seller domain, associated with the audience claim, the token is intended for.</t>
          </dd>
          <dt><tt>ori</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - URL of the token's originator.</t>
          </dd>
          <dt><tt>env</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Issuer environment (such as "production" or "sandbox").  Additional values
may be defined and used.</t>
          </dd>
          <dt><tt>ssi</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Seller Service ID that this token was created for.</t>
          </dd>
          <dt><tt>btg</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Buyer tag - an opaque reference ID internal to the buyer.</t>
          </dd>
        </dl>
        <t>Additional claims <bcp14>MAY</bcp14> be defined and used in these tokens.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized claims.</t>
      </section>
      <section anchor="kya-token">
        <name>KYA Token</name>
        <t>The following identity related claims are used within KYA and KYA-PAY tokens:</t>
        <dl>
          <dt><tt>hid</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> (Required for human identity use cases) - A map of human identity
claims (individual or organization).</t>
          </dd>
          <dt><tt>apd</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Agent Platform identity claims.</t>
          </dd>
          <dt><tt>aid</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Agent identity claims.</t>
          </dd>
          <dt><tt>scope</tt></dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - String with space-separated scope values, per <xref target="RFC8693"/></t>
          </dd>
        </dl>
        <t>The following informative example displays a decoded KYA type token.</t>
        <figure anchor="example-decoded-kya-token">
          <name>A KYA type token</name>
          <artwork align="left"><![CDATA[
{
  "kid": "YjFdJgFNWj9AkUmtoXILwoeb37PsBuGWVK6_QvFLwJw", // JWK Key ID
  "alg": "ES256",
  "typ": "kya+jwt"
}.{
  "iss": "https://example.com/issuer", // Issuer URL
  "iat": 1742245254,
  "exp": 1773867654,
  "jti": "b9821893-7699-4d24-af06-803a6a16476b",
  "sub": "bb713104-c14e-460f-9b7c-f8140fa9bea4", // Buyer Agent Account ID
  "aud": "7434230d-0861-46f2-9c2c-a6ee33d07f17", // Seller Agent Account ID

  "env": "production",
  "ssi": "bc3ff89f-069b-4383-82a9-8cfe53c55fc3", // Seller Service ID
  "btg": "4f6cbd39-215c-4516-bf33-cab22862ee60", // Buyer Tag (Internal Reference ID)

  "hid": {
    "email": "buyer@buyer.com"
  },
  "apd": {
    "id": "d3306fc0-602b-47e6-9fe2-3d55d028fbd2"
    "name": "Acme Shopping Agents", // Agent platform name
    "email": "platform@acme.com", // Email address for the agent platform
    "phone_number": "+12345677890", // Phone number for the agent platform
    "organization_name": "Acme Shopping Inc.", // Legal name of the agent platform
    "verifier": "https://www.verifier.com/", // URL of the Identity verifier
    "verified": true, // Outcome of the verifier's KYA verification
    "verification_id": "a23c1fe4-a4b7-442d-8bca-3c8fad5ec3a6" // Verifier's verification ID
  },
  "aid": {
    "name": "Acme Agent Extraordinaire",
    "creation_ip": "54.86.50.139", // IP Address where token was created
    "source_ips": ["54.86.50.139-54.86.50.141", "1.1.1.0/24",
      "2001:db8:abcd:0012::/64", "acme.com"]
      // IP addresses from which the buyer agent will make requests to the seller
  }
}
]]></artwork>
        </figure>
        <section anchor="hid-human-identity-sub-claims">
          <name><tt>hid</tt> - Human Identity Sub-Claims</name>
          <t>The Human Identity (<tt>hid</tt>) claim contains sub-claims identifying the human
principal (individual or organization) as follows.</t>
          <dl>
            <dt><tt>email</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - Email address associated with the human individual or organization</t>
            </dd>
            <dt><tt>given_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Given name(s) or first name(s) of the human principal if they
are an individual.</t>
            </dd>
            <dt><tt>middle_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Middle name(s) of the human principal if they are an individual.</t>
            </dd>
            <dt><tt>family_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Surname(s) or last name(s) of the human principal if they are an
individual.</t>
            </dd>
            <dt><tt>phone_number</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Phone number associated with the human individual or organization.</t>
            </dd>
            <dt><tt>organization_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Name of the organization.</t>
            </dd>
            <dt><tt>verifier</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - URL of the Identity Verifier</t>
            </dd>
            <dt><tt>verified</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Boolean Verification status.  True if verified, otherwise false.</t>
            </dd>
            <dt><tt>verification_id</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Verification identifier. Identifier for the verification performed,
such as a GUID.</t>
            </dd>
          </dl>
          <t>Additional sub-claims <bcp14>MAY</bcp14> be defined and used.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized sub-claims.</t>
        </section>
        <section anchor="agent-platform-identity-apd-sub-claims">
          <name>Agent Platform Identity <tt>apd</tt> Sub-Claims</name>
          <t>The <tt>apd</tt> claim is optional. If present, it contains the following sub-claims.</t>
          <dl>
            <dt><tt>id</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - Agent Platform identifier.</t>
            </dd>
            <dt><tt>name</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - Agent Platform name.</t>
            </dd>
            <dt><tt>email</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Email associated with agent platform.</t>
            </dd>
            <dt><tt>phone_number</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Phone number associated with agent platform.</t>
            </dd>
            <dt><tt>organization_name</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Legal name associated with agent platform.</t>
            </dd>
            <dt><tt>verifier</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - URL of the Identity Verifier</t>
            </dd>
            <dt><tt>verified</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Boolean Verification status.  True if verified, otherwise false.</t>
            </dd>
            <dt><tt>verification_id</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Verification identifier. Identifier for the verification performed, such as a GUID.</t>
            </dd>
          </dl>
          <t>Additional sub-claims <bcp14>MAY</bcp14> be defined and used.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized sub-claims.</t>
        </section>
        <section anchor="agent-identity-aid-sub-claims">
          <name>Agent Identity <tt>aid</tt> Sub-Claims</name>
          <t>The <tt>aid</tt> claim is optional. If present, it contains the following sub-claims.</t>
          <dl>
            <dt><tt>name</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - Agent name. The name should reflect the business purpose of the agent.</t>
            </dd>
            <dt><tt>creation_ip</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - The public IP address of the system / agent that requested the token.
Its value is a string containing the public IPv4 or IPv6 address from where the
token request originated. It <bcp14>MUST</bcp14> be captured directly from the token request.</t>
            </dd>
            <dt><tt>source_ips</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - Valid public IP address, or range of public IP addresses, from where
the system / agent's requests to merchants / services will originate. Array of
comma-separated IPv4 addresses or ranges, IPv6 addresses or ranges, or domain
names resolvable to an IP address via DNS. IPv4 and IPv6 addresses can be a
single IPv4 or IPv6 address or a range of IPv4 or IPv6 addresses in CIDR notation
or start-and-end IP pairs.</t>
            </dd>
          </dl>
          <t>Additional sub-claims <bcp14>MAY</bcp14> be defined and used.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized sub-claims.</t>
        </section>
      </section>
      <section anchor="pay-token">
        <name>PAY Token</name>
        <t>The following payment related claims are used within PAY and KYA-PAY type tokens:</t>
        <dl>
          <dt><tt>spr</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - JSON string representing seller service price in currency units.</t>
          </dd>
          <dt><tt>sps</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - Seller pricing scheme, which represents a way for the seller list
how it charges for its service or content. One of <tt>pay_per_use</tt>,
<tt>subscription</tt>, <tt>pay_per_mb</tt>, or <tt>custom</tt>.  Additional values may be defined
and used.</t>
          </dd>
          <dt><tt>amt</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - JSON string representing token amount in currency units.</t>
          </dd>
          <dt><tt>cur</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Currency unit, represented as an ISO 4217 three letter code, such as "EUR".</t>
          </dd>
          <dt><tt>val</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - JSON string representing token amount in settlement network's units.</t>
          </dd>
          <dt><tt>mnr</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - JSON number representing maximum number of requests when <tt>sps</tt> is <tt>pay_per_use</tt>.</t>
          </dd>
          <dt><tt>stp</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Settlement type (one of <tt>coin</tt> or <tt>card</tt>).  Additional values may be defined and used.</t>
          </dd>
          <dt><tt>sti</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - Meta information for payment settlement, depending on settlement.
type.</t>
          </dd>
        </dl>
        <section anchor="agent-identity-sti-sub-claims">
          <name>Agent Identity <tt>sti</tt> Sub-Claims</name>
          <t>The <tt>sti</tt> claim is optional. If present, it <bcp14>MAY</bcp14> contain the following sub-claims,
all of which are <bcp14>OPTIONAL</bcp14>.</t>
          <dl>
            <dt><tt>type</tt>:</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14> - "type" is dependent on the "stp" value; for "coin" - "usdc";
for "card" - "visa_vic" or "mastercard_scof".  Additional values may be defined and used.</t>
            </dd>
            <dt><tt>paymentToken</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - String containing Virtual Payment Card Number in ISO/IEC 7812 format. 12-19 characters.</t>
            </dd>
            <dt><tt>tokenExpirationMonth</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - String containing two-digit Expiration Month Number.</t>
            </dd>
            <dt><tt>tokenExpirationYear</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - String containing four-digit Expiration Year.</t>
            </dd>
            <dt><tt>tokenSecurityCode</tt>:</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14> - String containing 3 or 4 digit CVV code.</t>
            </dd>
          </dl>
          <t>Additional sub-claims <bcp14>MAY</bcp14> be defined and used.
The recipient <bcp14>MUST</bcp14> ignore any unrecognized sub-claims.</t>
        </section>
        <section anchor="pay">
          <name>PAY Token Example</name>
          <t>The following informative example displays a decoded PAY type token.</t>
          <figure anchor="example-decoded-pay-token">
            <name>A PAY type token</name>
            <artwork align="left"><![CDATA[
{
  "kid": "FgT4q8c5IqbBCCjcho5JdeGQvuK1keMDFc9IwCm8J7Y", // JWK Key ID
  "alg": "ES256",
  "typ": "pay+jwt"
}.{
  "iss": "https://example.net/pay_token_issuer", // Issuer URL
  "iat": 1742245254,
  "exp": 1773867654,
  "jti": "b9821893-7699-4d24-af06-803a6a16476b",
  "sub": "8b810549-7443-494f-b4ad-5bc65871e32b", // Buyer Agent Account ID
  "aud": "37888095-2721-48d9-a2df-bfe4075f223a", // Seller Agent Account ID

  "env": "sandbox",
  "ssi": "274efc47-024e-466f-b278-152d2ee73955", // Seller Service ID
  "btg": "16c135ce-a99a-453d-a7b5-4958fd91de5f", // Buyer Tag (Internal Reference ID)

  "spr": "0.01",
  "sps": "pay_per_use",
  "amt": "15",
  "cur": "USD",
  "val": "15000000",
  "mnr": 1600,
  "stp": "card",
  "sti": {
    "type": "visa_vic",
    "paymentToken": "1234567890123456",
    "tokenExpirationMonth": "03",
    "tokenExpirationYear": "2030",
    "tokenSecurityCode": "123",
    "verifier": "https://verifier.example.info", // URL of payment method verifier
    "verified": true, // Outcome of the verifier's payment method verification
    "verification_id": "3a6e1b76-8f78-4c24-b1bd-dc78a8cc3711" // Identifier for the verification performed, such as a GUID.
  }
}

]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="kya-pay-token">
        <name>KYA-PAY Token</name>
        <t>The following informative example displays a decoded KYA-PAY type token.</t>
        <figure anchor="example-decoded-kya-pay-token">
          <name>A KYA-PAY type token</name>
          <artwork align="left"><![CDATA[
{
  "kid": "YjFdJgFNWj9AkUmtoXILwoeb37PsBuGWVK6_QvFLwJw", // JWK Key ID
  "alg": "ES256",
  "typ": "kya-pay+jwt"
}.{
  "iss": "kya-pay.example.org", // Issuer URL
  "iat": 1742245254,
  "exp": 1773867654,
  "jti": "b9821893-7699-4d24-af06-803a6a16476b",
  "sub": "f24a431d-108c-46e6-9357-b428c528210e", // Buyer Agent Account ID
  "aud": "5e00177d-ff7f-424b-8c83-2756e15efbed", // Seller Agent Account ID

  "env": "production",
  "ssi": "3e6d33a1-438e-482e-bba5-6aa69544727d", // Seller Service ID
  "btg": "c52e0ef2-e27d-4e95-862e-475a904ae7b2", // Buyer Tag (Internal Reference ID)

  "hid": {
    "email": "maryjane@buyer.example.com",
    "given_name": "Mary",
    "middle_name": "Jane",
    "family_name": "Doe",
    "phone_number": "+1-425-555-1212",
    "verified": false
  },
  "apd": {
    "id": "4b087db2-b6e5-48b8-8737-1aa8ddf4c4fe", // Agent platform ID
    "name": "Acme Shopping Agents", // Agent platform name
    "email": "platform@acme.com", // Email address for the agent platform
    "phone_number": "+12345677890", // Phone number for the agent platform
    "organization_name": "Acme Shopping Inc.", // Legal name of the agent platform
    "verifier": "https://www.verifier.com/", // URL of the Identity verifier
    "verified": true, // Outcome of the verifier's KYA verification
    "verification_id": "a23c1fe4-a4b7-442d-8bca-3c8fad5ec3a6" // Verifier's verification ID
  },
  "aid": {
    "name": "Agentic Excellence Я Us",
    "creation_ip": "128.2.42.95", // IP Address where token was created
    "source_ips": ["54.86.50.139-54.86.50.141", "1.1.1.0/24",
      "2001:db8:abcd:0012::/64", "agentic-excellence.example.com"]
      // IP addresses from which the buyer agent will make requests to the seller
  },

  "spr": "0.01",
  "sps": "pay_per_use",
  "amt": "15",
  "cur": "USD",
  "val": "15000000",
  "mnr": 1600,
  "stp": "card",
  "sti": {
    "type": "visa_vic",
    "paymentToken": "1234567890123456",
    "tokenExpirationMonth": "03",
    "tokenExpirationYear": "2030",
    "tokenSecurityCode": "123"
  }
}

]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="token-validation">
      <name>Token Validation</name>
      <section anchor="validating-kya-and-pay-tokens">
        <name>Validating KYA and PAY Tokens</name>
        <section anchor="jwt-header-validation">
          <name>JWT Header Validation</name>
          <ol spacing="normal" type="1"><li>
              <t><tt>alg</tt> - JWTs <bcp14>MUST</bcp14> be signed using allowed JWA algorithms (currently, <tt>ES256</tt>).</t>
            </li>
            <li>
              <t><tt>kid</tt> - The <tt>kid</tt> claim <bcp14>MUST</bcp14> be present, and set to a valid Key ID discoverable
via the issuer's (payload <tt>iss</tt> claim) JWK Set.</t>
            </li>
            <li>
              <t><tt>typ</tt> - The <tt>typ</tt> header parameter value <bcp14>MUST</bcp14> be one of: <tt>kya+jwt</tt>, <tt>pay+jwt</tt>, or <tt>kya-pay+jwt</tt>.</t>
            </li>
          </ol>
        </section>
        <section anchor="jwt-payload-validation">
          <name>JWT Payload Validation</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Verify JWT Signature</strong> - Valid JWTs <bcp14>MUST</bcp14> be signed with a valid key belonging
  To the token's issuer (<tt>iss</tt> claim)</t>
            </li>
            <li>
              <t><strong>Validate <tt>iss</tt> Claim</strong> - Ensure that the token is signed by the expected
  valid issuer.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>exp</tt> Claim</strong> - The verifier <bcp14>MUST</bcp14> validate that the token has
  not expired, within the verifier's clock drift tolerance.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>iat</tt> Claim</strong> - The verifier <bcp14>MUST</bcp14> validate that the token was
  issued in the past, within the verifier's clock drift tolerance.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>jti</tt> Claim</strong> - Ensure that the <tt>jti</tt> claim is present, and is
  a UUID.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>aud</tt> Claim</strong> - Ensure that the <tt>aud</tt> identifies the recipient as the intended audience.</t>
            </li>
            <li>
              <t><strong>Validate the <tt>env</tt> Claim</strong> - Ensure that the Environment claim is set to
  an expected and use case appropriate value (such as <tt>production</tt> or <tt>sandbox</tt>)</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="validating-pay-tokens">
        <name>Validating PAY Tokens</name>
        <t>For tokens of type <tt>pay+jwt</tt> or <tt>kya-pay+jwt</tt>, perform the steps described in
the Validating KYA and PAY Tokens section.</t>
        <t>In addition, perform the following steps.</t>
        <ol spacing="normal" type="1"><li>
            <t>The <tt>val</tt> claim is greater than 0.</t>
          </li>
          <li>
            <t>The <tt>amt</tt> claim is greater than 0.</t>
          </li>
          <li>
            <t>The <tt>cur</tt> claim is set to a currency the seller supports (such as <tt>USD</tt>)</t>
          </li>
          <li>
            <t>The <tt>sps</tt> claim, if present, matches the pricing scheme that you configured in
  the seller's service</t>
          </li>
          <li>
            <t>The <tt>spr</tt> claim, if present, matches the price that you configured in the
  seller's service</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>When validating the JWTs described in this specification, implementers <bcp14>SHOULD</bcp14>
follow the best practices and guidelines described in <xref target="RFC8725"/>.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>KYAPay tokens are designed to convey the information that
an agent is acting on behalf of a principal - a person or organization.
To do this, they will necessarily contain information about that principal
that can be verified and utilized by participants in the system.
Participants should therefore only share these tokens with other legitimate
participants and not make their contents public or disclose them to
unknown or untrustworthy parties.</t>
      <t>Consent of the principal represented to participate in the interactions is vital.
If I authorize an agent to shop for a widget at given price,
it's legitimate for the agent to carry enough information about me
to the merchant to be able to do this for me.
Whereas, if an agent claims to be shopping for me but does not have my authorization
to do so, my privacy and possibly also my financial integrity are being violated.</t>
      <t>The principle of minimal disclosure should be employed.
Only the infomation needed to facilitate the intended interactions
should be placed in the tokens and conveyed to participants.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification registers the following Claims in
the IANA "JSON Web Token Claims" registry <xref target="IANA.JWT.Claims"/>
established by <xref target="RFC7519"/>.</t>
        <section anchor="sdm-claim">
          <name>"sdm" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: sdm</t>
            </li>
            <li>
              <t>Claim Description: Seller domain the token is intended for</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="ori-claim">
          <name>"ori" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: ori</t>
            </li>
            <li>
              <t>Claim Description: URL of the token's originator</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="env-claim">
          <name>"env" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: env</t>
            </li>
            <li>
              <t>Claim Description: Issuer environment (such as "production" or "sandbox")</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="btg-claim">
          <name>"btg" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: btg</t>
            </li>
            <li>
              <t>Claim Description: Buyer tag, an opaque reference ID internal to the buyer</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="hid-claim">
          <name>"hid" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: hid</t>
            </li>
            <li>
              <t>Claim Description: JSON structure containing human identity claims</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="apd-claim">
          <name>"apd" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: apd</t>
            </li>
            <li>
              <t>Claim Description: JSON structure containing agent platform identity claims</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="aid-claim">
          <name>"aid" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: aid</t>
            </li>
            <li>
              <t>Claim Description: JSON structure containing agent identity claims</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#common-claims) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="spr-claim">
          <name>"spr" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: spr</t>
            </li>
            <li>
              <t>Claim Description: JSON string representing seller service price in currency units</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="sps-claim">
          <name>"sps" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: sps</t>
            </li>
            <li>
              <t>Claim Description: Seller pricing scheme, which represents a way for the seller list how it charges for its service or content</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="amt-claim">
          <name>"amt" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: amt</t>
            </li>
            <li>
              <t>Claim Description: JSON string representing token amount in currency units</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="cur-claim">
          <name>"cur" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: cur</t>
            </li>
            <li>
              <t>Claim Description: Currency unit, represented as an ISO 4217 three letter code, such as "EUR"</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="val-claim">
          <name>"val" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: val</t>
            </li>
            <li>
              <t>Claim Description: JSON string representing token amount in settlement network's units</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="mnr-claim">
          <name>"mnr" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: mnr</t>
            </li>
            <li>
              <t>Claim Description: JSON number representing maximum number of requests</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="stp-claim">
          <name>"stp" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: stp</t>
            </li>
            <li>
              <t>Claim Description: Settlement type</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
        <section anchor="sti-claim">
          <name>"sti" Claim</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: sti</t>
            </li>
            <li>
              <t>Claim Description: Meta information for payment settlement, depending on settlement</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Reference: (#pay-token) of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="media-types-registration">
        <name>Media Types Registration</name>
        <t>This section registers the following media types <xref target="RFC2046"/>
in the IANA "Media Types" registry <xref target="IANA.MediaTypes"/>
in the manner described in <xref target="RFC6838"/>.</t>
        <section anchor="kya-jwt-media-type">
          <name>application/kya+jwt</name>
          <ul spacing="normal">
            <li>
              <t>Type name: <tt>application</tt></t>
            </li>
            <li>
              <t>Subtype name: <tt>kya+jwt</tt></t>
            </li>
            <li>
              <t>Required parameters: n/a</t>
            </li>
            <li>
              <t>Optional parameters: n/a</t>
            </li>
            <li>
              <t>Encoding considerations: Uses JWS Compact Serialization as defined in <xref target="RFC7515"/></t>
            </li>
            <li>
              <t>Security considerations: See Security Considerations in in <xref target="RFC7519"/></t>
            </li>
            <li>
              <t>Interoperability considerations: n/a</t>
            </li>
            <li>
              <t>Published specification: (#kya-token) of this specification</t>
            </li>
            <li>
              <t>Applications that use this media type: Applications using Know Your Agent tokens</t>
            </li>
            <li>
              <t>Additional information:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Magic number(s): n/a</t>
                </li>
                <li>
                  <t>File extension(s): n/a</t>
                </li>
                <li>
                  <t>Macintosh file type code(s): n/a</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Person &amp; email address to contact for further information: TBD</t>
            </li>
            <li>
              <t>Intended usage: COMMON</t>
            </li>
            <li>
              <t>Restrictions on usage: none</t>
            </li>
            <li>
              <t>Author: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
          </ul>
        </section>
        <section anchor="pay-jwt-media-type">
          <name>application/pay+jwt</name>
          <ul spacing="normal">
            <li>
              <t>Type name: <tt>application</tt></t>
            </li>
            <li>
              <t>Subtype name: <tt>pay+jwt</tt></t>
            </li>
            <li>
              <t>Required parameters: n/a</t>
            </li>
            <li>
              <t>Optional parameters: n/a</t>
            </li>
            <li>
              <t>Encoding considerations: Uses JWS Compact Serialization as defined in <xref target="RFC7515"/></t>
            </li>
            <li>
              <t>Security considerations: See Security Considerations in in <xref target="RFC7519"/></t>
            </li>
            <li>
              <t>Interoperability considerations: n/a</t>
            </li>
            <li>
              <t>Published specification: (#pay-token) of this specification</t>
            </li>
            <li>
              <t>Applications that use this media type: Applications using Pay tokens</t>
            </li>
            <li>
              <t>Additional information:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Magic number(s): n/a</t>
                </li>
                <li>
                  <t>File extension(s): n/a</t>
                </li>
                <li>
                  <t>Macintosh file type code(s): n/a</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Person &amp; email address to contact for further information: TBD</t>
            </li>
            <li>
              <t>Intended usage: COMMON</t>
            </li>
            <li>
              <t>Restrictions on usage: none</t>
            </li>
            <li>
              <t>Author: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
          </ul>
        </section>
        <section anchor="kya-pay-jwt-media-type">
          <name>application/kya-pay+jwt</name>
          <ul spacing="normal">
            <li>
              <t>Type name: <tt>application</tt></t>
            </li>
            <li>
              <t>Subtype name: <tt>kya-pay+jwt</tt></t>
            </li>
            <li>
              <t>Required parameters: n/a</t>
            </li>
            <li>
              <t>Optional parameters: n/a</t>
            </li>
            <li>
              <t>Encoding considerations: Uses JWS Compact Serialization as defined in <xref target="RFC7515"/></t>
            </li>
            <li>
              <t>Security considerations: See Security Considerations in in <xref target="RFC7519"/></t>
            </li>
            <li>
              <t>Interoperability considerations: n/a</t>
            </li>
            <li>
              <t>Published specification: (#kya-pay-token) of this specification</t>
            </li>
            <li>
              <t>Applications that use this media type: Applications using KYA-Pay tokens</t>
            </li>
            <li>
              <t>Additional information:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Magic number(s): n/a</t>
                </li>
                <li>
                  <t>File extension(s): n/a</t>
                </li>
                <li>
                  <t>Macintosh file type code(s): n/a</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Person &amp; email address to contact for further information: TBD</t>
            </li>
            <li>
              <t>Intended usage: COMMON</t>
            </li>
            <li>
              <t>Restrictions on usage: none</t>
            </li>
            <li>
              <t>Author: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
            <li>
              <t>Change Controller: Michael B. Jones - michael_b_jones@hotmail.com</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8693">
          <front>
            <title>OAuth 2.0 Token Exchange</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
            <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8693"/>
          <seriesInfo name="DOI" value="10.17487/RFC8693"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="IANA.JWT.Claims" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token Claims</title>
            <author initials="" surname="IANA" fullname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author initials="" surname="IANA" fullname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 915?>

<section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>[[ to be removed by the RFC Editor before publication as an RFC ]]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Removed "srl" (Seller Resource Locator) claim.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial Internet Draft.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="A." surname="Stitt" fullname="Andrew Stitt">
        <organization/>
        <address>
      </address>
      </contact>
      <contact initials="D." surname="Zagidulin" fullname="Dmitri Zagidulin">
        <organization/>
        <address>
      </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
