<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rehfeld-bot-service-index-03" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Bot Service Index">Bot Service Index (BSI): A Global Discovery Infrastructure for Autonomous Agent Services</title>
    <seriesInfo name="Internet-Draft" value="draft-rehfeld-bot-service-index-03"/>
    <author initials="C." surname="Rehfeld" fullname="Carsten Rehfeld">
      <organization/>
      <address>
        <email>carsten@botstandards.org</email>
      </address>
    </author>
    <date year="2026" month="April" day="24"/>
    <abstract>
      <?line 85?>

<t>The internet was designed for human actors. Its discovery infrastructure —
search engines, directories, and hyperlinked documents — assumes a human
reading and navigating. Autonomous agents (bots) operating on the internet
today face a structural gap: there is no machine-native, globally accessible
index of services they can consume.</t>
      <t>This document proposes the <strong>Bot Service Index (BSI)</strong>: a HATEOAS-based,
globally accessible, commercially sustainable service discovery infrastructure
designed for autonomous agents as its primary consumers. The BSI provides a
central, always-up-to-date, searchable index of machine-consumable API
services, together with a structured three-dimensional trust model that allows
consuming agents to apply their own trust policies against verifiable metadata.</t>
    </abstract>
  </front>
  <middle>
    <?line 100?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="the-bot-ecosystem-gap">
        <name>The Bot Ecosystem Gap</name>
        <t>The internet's foundational infrastructure — HTTP, HTML, DNS, and search
engines — was designed with human actors as the primary consumers. Web pages
render visual layouts for human eyes. CAPTCHA systems explicitly discriminate
against non-human access. Discovery mechanisms such as search engines index
content for human-readable navigation.</t>
        <t>Autonomous agents — software programs that independently execute tasks,
consume APIs, and interact with external services without per-action human
instruction — are not recognized as legitimate, first-class internet
participants in this architecture. They are systematically treated as threats
to be filtered, blocked, or rate-limited.</t>
        <t>This situation is changing. The rapid growth of large language model-based
agents, robotic process automation, and programmatic service consumers means
that non-human actors now represent a significant and growing proportion of
internet traffic. As this proportion increases, internet service providers
will increasingly need to serve autonomous agents as a recognized user class
alongside humans.</t>
        <t>The Bot Service Index is premised on this trajectory: bots are becoming
first-class internet participants, and the infrastructure to support them —
starting with service discovery — does not yet exist.</t>
        <section anchor="motivation-a-concrete-origin">
          <name>Motivation: A Concrete Origin</name>
          <t>The Bot Service Index was not conceived in the abstract. It emerged from a
concrete practical failure.</t>
          <t>A buying bot was built for a private use case: monitoring online shops for
a specific product and purchasing it automatically the moment it became
available. This is a straightforward task for an autonomous agent — exactly
the kind of task agents are well-suited for.</t>
          <t>The bot failed, not because the task was technically complex, but because
the internet's infrastructure is actively hostile to it:</t>
          <t><strong>HTML-only product pages.</strong> Product availability, price, and purchase state
were encoded in HTML rendered for a human eye. No machine-readable API
existed. The bot had to parse HTML — fragile, maintenance-intensive, and
broken by every redesign.</t>
          <t><strong>Cloudflare Bot Management and equivalent shields.</strong> The majority of
commercial web services now sit behind bot mitigation infrastructure. Cloudflare
Bot Management, and equivalent products from Akamai, Imperva, and others,
are deployed specifically to detect and block non-human request patterns.
Repeated automated requests — even at modest frequency — trigger rate
limiting, CAPTCHA challenges, or silent blocking. A buying bot that polls
a product page to detect availability is treated identically to a malicious
scraper or a DDoS participant.</t>
          <t><strong>CAPTCHA payment barriers.</strong> Even when product pages were reachable, payment
flows required solving CAPTCHAs that explicitly excluded non-human actors.
The purchasing step — the final, necessary action — was deliberately made
inaccessible to the bot.</t>
          <t><strong>Proxy network pollution.</strong> To work around rate limits and bot detection,
the bot required a rotating proxy network — different IP addresses on each
request to disguise its automated origin. This is not a solution: it
pollutes internet traffic with avoidable requests, raises the cost of
operation, and contributes directly to the adversarial dynamic between
bots and infrastructure operators. Every proxy request is a wasted roundtrip
that a machine-readable API endpoint would have made unnecessary.</t>
          <t><strong>Polling as the only state-change mechanism.</strong> Because the bot had no way
to subscribe to product availability events, it had to poll the product page
continuously. This is architecturally wasteful: the bot consumes server
resources and network bandwidth to repeatedly ask a question whose answer
has not changed. If the service had provided a notification registration
endpoint — a webhook, a server-sent event stream, or a WebSocket channel —
the bot could subscribe once and receive a push notification when the product
became available. No polling. No proxy network. No CAPTCHA exposure.</t>
          <t>These are not edge cases. They are the standard experience for any autonomous
agent attempting to consume a commercial internet service today. The buying
bot illustrates why the Bot Service Index is necessary: not as an academic
exercise, but as the infrastructure layer that makes autonomous agents
functional participants in the commercial internet.</t>
        </section>
        <section anchor="the-discovery-problem">
          <name>The Discovery Problem</name>
          <t>When an autonomous agent must fulfill a task that requires an external
service, it faces a fundamental discovery problem: how does it find services
that can fulfill its requirement?</t>
          <t>Current approaches are inadequate:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Hardcoded URLs</strong>: brittle, require human maintenance, do not adapt to
new or changed services.</t>
            </li>
            <li>
              <t><strong>LLM training data</strong>: stale, non-authoritative, not machine-verifiable.</t>
            </li>
            <li>
              <t><strong>Human-curated lists</strong>: do not scale, not machine-navigable, lack
structured metadata.</t>
            </li>
            <li>
              <t><strong>Web search</strong>: returns HTML documents designed for humans, not structured
service descriptions for agents.</t>
            </li>
          </ul>
          <t>What is needed is a machine-native equivalent of a search engine: a global,
always-current, structured index of services that autonomous agents can query
by capability, trust level, liveness, and other machine-relevant criteria.</t>
        </section>
        <section anchor="lessons-from-prior-art">
          <name>Lessons from Prior Art</name>
          <t>The BSI is not the first attempt at a global service registry. Prior efforts
must be understood explicitly so that their failure modes are not repeated.</t>
          <t><strong>UDDI (Universal Description, Discovery and Integration)</strong><br/>
UDDI was a SOAP-era standard for a global service registry with the same
conceptual goal as BSI, published as an OASIS Committee Draft in October
2004 (editors: Clement, Hately, von Riegen, Rogers). It failed for three
reasons: (1) extreme complexity of the XML-based data model; (2) no
automatic verification — all data was self-asserted with no crawling or
validation; (3) no adoption incentive — there was no commercial model to
sustain registration or discovery. BSI addresses all three directly: a
simple JSON manifest, automated spider verification, and a commercial tier
model.</t>
          <t><strong>robots.txt (Robots Exclusion Protocol)</strong><br/>
Machine-readable, but concerned with <em>exclusion</em> — telling crawlers what not
to access — not with <em>discovery</em> of capabilities. Per-domain only. Not a
registry.</t>
          <t><strong>MCP (Model Context Protocol)</strong><br/>
Defines tool and capability descriptions for LLM-based agents. Excellent
for consumption once a server URL is known. Does not address the discovery
problem: there is no index of MCP servers. BSI is complementary to MCP —
it can index MCP servers as one supported spec type.</t>
          <t><strong>Well-Known URIs (RFC 8615)</strong><br/>
Per-domain machine-readable metadata at <tt>/.well-known/</tt>. Useful for
per-service metadata but requires the consumer to already know the domain.
No cross-service search or global index.</t>
          <t><strong>DNS</strong><br/>
DNS resolves names to addresses but carries no capability semantics. It is
an architectural analogy for BSI's federation model, not a comparable system.</t>
        </section>
        <section anchor="related-ietf-and-w3c-work">
          <name>Related IETF and W3C Work</name>
          <t>As of April 2026, the number of Internet-Drafts working in adjacent areas
of agent/bot infrastructure has grown significantly. None addresses the same
problem as BSI. This section documents each and states the relationship
explicitly.</t>
          <t><strong>draft-pioli-agent-discovery (ARDP — Agent Registration and Discovery Protocol)</strong><br/>
Proposes a federated agent registration and discovery protocol. Agents
self-register capabilities (MCP, A2A, HTTP, gRPC) with federated resolvers.
Deliberately decentralised — no global registry mandate, no central query
URL. Relationship to BSI: complementary. ARDP addresses agent-to-agent
capability advertisement within a federation. BSI addresses global,
cross-organisation service discovery from a neutral central index. The BSM
<tt>spec.type</tt> vocabulary could reference ARDP-registered agents as a future
extension.</t>
          <t><strong>draft-narajala-courtney-ansv2 (ANS v2 — Agent Name Service v2)</strong><br/>
Full title: "Agent Name Service v2 (ANS): A Domain-Anchored Trust Layer
for Autonomous AI Agent Identity" (Courtney, Narajala, Huang, Habler,
Sheriff; last revised April 2026). Anchors autonomous agent identities to
DNS domain names, with Registration Authority verification via ACME, dual
certificates, and an append-only Transparency Log compliant with IETF SCITT
standards. Defines three verification tiers: Bronze (PKI), Silver (PKI +
DANE), and Gold (PKI + DANE + Transparency Log). Focused on agent identity
and trust anchoring, not service capability discovery — there is no global
index, no capability search, and no liveness model. Relationship to BSI:
complementary. ANS v2 could serve as an identity and trust anchoring layer
for service operators registered in the BSI, with BSI Organisation levels
potentially mapping to ANS verification tiers in a future alignment.
(Supersedes the expired draft-narajala-ans-00.)</t>
          <t><strong>draft-vandemeent-ains-discovery (AINS — AInternet Name Service)</strong><br/>
Agent discovery and trust resolution via signed, append-only replication
logs. Supports multi-registry federation. No central authority. No
commercial sustainability model. Relationship to BSI: different philosophy.
AINS prioritises decentralisation and cryptographic verifiability. BSI
prioritises a single authoritative global index with a governed trust model.
The two approaches represent a genuine design tension that this document's
Open Questions section (Section 12, item 8) invites community input on.</t>
          <t><strong>draft-aiendpoint-ai-discovery (AI Discovery Endpoint)</strong><br/>
Defines <tt>/.well-known/ai</tt> as a per-host machine-readable capability
document, analogous to <tt>robots.txt</tt> for agent consumers. Per-domain only;
not a global index. Relationship to BSI: directly complementary. The BSI
Spider SHOULD read <tt>/.well-known/ai</tt> when present on a registered service's
domain as an additional source of capability metadata. Service Owners
publishing <tt>/.well-known/ai</tt> documents reduce the Spider's verification
burden.</t>
          <t><strong>draft-batum-aidre (AIDRE — AI Discovery and Retrieval Endpoint)</strong><br/>
Defines <tt>/.well-known/ai-discovery</tt> as a per-origin discovery document
exposing collections, metadata, and optional vector-native query interfaces.
Decentralised by design — each origin publishes its own endpoint; no
central authority aggregates them. Relationship to BSI: complementary.
AIDRE and the AI Discovery Endpoint draft (above) both address per-origin
machine-readable capability publication. The BSI Spider SHOULD treat
<tt>/.well-known/ai-discovery</tt> as an additional metadata source when present
on a registered service's domain. BSI provides the global aggregation and
trust verification layer that per-origin endpoints cannot provide alone.</t>
          <t><strong>draft-cui-ai-agent-discovery-invocation (AI Agent Discovery and Invocation Protocol)</strong><br/>
(Cui, Chao, Du — Tsinghua University / Zhongguancun Laboratory, February
2026.) Specifies a metadata format for agent capabilities and a
registry-based discovery and invocation mechanism. Explicitly permits
multiple coexisting registries; no global authority is defined. No
trust model, no commercial sustainability layer, no liveness verification.
Relationship to BSI: partially overlapping problem space, different
architectural philosophy. Where this draft describes how agents register
with and query a registry, BSI specifies what a globally authoritative,
commercially sustainable, trust-verified registry looks like and how it
is governed. The two are not mutually exclusive; a BSI-registered service
could also self-register with local registries described by this protocol.</t>
          <t><strong>draft-am-layered-ai-discovery-architecture (A Layered Approach to AI Discovery)</strong><br/>
(Moussa, Akhavain — Huawei Canada, March 2026.) Proposes a two-layer
architecture separating the discovery transport mechanism from the metadata
format for the object being discovered. Delegates security and trust to
other groups. No global registry, no funding model. Relationship to BSI:
architectural framing only. BSI's HATEOAS model is consistent with this
layered framing — the Index API provides the transport layer, the BSM
provides the discovery object format.</t>
          <t><strong>draft-hood-agtp-discovery (AGTP Agent Discovery and Name Service)</strong><br/>
(Hood — Nomotic, March 2026.) A governance-focused, zone-constrained
discovery broker tied to a specific agent protocol (AGTP). Returns ranked
agent manifests within trust-gated zones. Multiple independent ANS instances
per organisation; optional federation between trusted peers. Relationship
to BSI: different scope. AGTP addresses intra-organisation, permission-aware
agent orchestration. BSI addresses cross-organisation, open, global
service discovery.</t>
          <t><strong>draft-mozley-aidiscovery (AI Agent Discovery Problem Statement)</strong><br/>
(Mozley, Williams — Infoblox; Sarikaya; Schott — Deutsche Telekom, April
2026.) A problem statement that explicitly argues against centralised
discovery directories, citing organisational autonomy requirements. Proposes
distributed discovery via well-known entry points per organisation.
Relationship to BSI: this draft articulates the strongest counter-position
to BSI's architecture. The argument from autonomy is valid for intra-
organisation agent discovery but does not address the cross-organisation
case: an autonomous agent that needs to discover payment, logistics, or
data services provided by unknown third parties cannot rely on a
decentralised model without a trust anchor. BSI is designed precisely for
that cross-boundary, zero-prior-relationship discovery scenario.</t>
          <t><strong>draft-mozleywilliams-dnsop-dnsaid (DNS for AI Discovery)</strong><br/>
(Mozley, Williams — Infoblox; Sarikaya; Schott — Deutsche Telekom, March
2026.) Proposes DNS-AID: using SVCB records under a leaf zone convention
(e.g. <tt>_agents.example.com</tt>) to publish agent service endpoints. Leverages
existing DNS infrastructure with DNSSEC for integrity. Supports four
discovery models: direct, index-based, multi-domain, and registry-based.
Relationship to BSI: complementary at the infrastructure layer. DNS
provides routing and namespace anchoring; BSI provides capability search,
trust metadata, and liveness verification. A consuming agent could use
DNS-AID to resolve a known domain's agent endpoints and use BSI to discover
unknown providers by capability.</t>
          <t><strong>draft-meunier-webbotauth-registry (Registry and Signature Agent card for Web bot auth)</strong><br/>
Authored by Maxime Guerreiro (Cloudflare), Ulas Kirazci (Amazon), and
Thibault Meunier (Cloudflare). Defines a JSON-based "Signature Agent Card"
format for entities originating or forwarding signed HTTP requests to
advertise metadata about themselves, and establishes an IANA registry for
Signature Agent Card parameters. Focused on bot authentication — how a bot
proves who it is to a service — not on service discovery. Related to the
active <strong>webbotauth IETF Working Group</strong> (chaired by David Schinazi and
Rifaat Shekh-Yusef, Area Director Mike Bishop), which is currently the
most active formal IETF effort in the bot/agent infrastructure space.
Relationship to BSI: orthogonal but complementary. webbotauth addresses
bot consumer identity; BSI addresses service provider discovery. A future
version of BSI may reference webbotauth identity cards as a mechanism for
consuming agents to authenticate to the Index API.</t>
          <t><strong>W3C AI Agent Protocol Community Group</strong><br/>
Proposed May 2025, targeting agent interoperability protocols. 216
participants as of April 2026. Pre-specification as of this writing.
Relationship to BSI: BSI will monitor this group's outputs and align the
BSM capability taxonomy with any vocabulary standardised by the W3C CG
where applicable.</t>
          <t><strong>Positioning</strong><br/>
The agent/bot infrastructure space has grown rapidly in early 2026, with
over a dozen active Internet-Drafts addressing adjacent problems. The
dominant architectural tendency across these drafts is decentralised and
federated — distributed registries, DNS-anchored discovery, per-origin
well-known endpoints, and zone-based governance.</t>
          <t>BSI takes a deliberate counter-position for a specific use case: global,
cross-organisation, zero-prior-relationship service discovery. This use
case cannot be solved by decentralised architectures alone, because
decentralisation requires that the discovering agent already knows where
to look. BSI provides the answer to "where to look" — a single stable
entry point, commercially operated by a neutral foundation, with verified
trust metadata and structured capability search.</t>
          <t>BSI remains the first and only proposed global, bot-native, commercially
sustainable service discovery index with a structured multi-dimensional
trust model, where the autonomous agent is the primary consumer. The
combination of: (1) a single globally queryable central index, (2)
capability-based search, (3) a three-dimensional verifiable trust model,
and (4) a commercial sustainability layer — does not appear in any other
current draft or standard.</t>
        </section>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        <t><strong>Agent / Bot</strong><br/>
An autonomous software program that independently executes tasks by consuming
external services, without per-action human instruction. The terms are used
interchangeably in this document.</t>
        <t><strong>Service</strong><br/>
A machine-consumable API offered by an organisation, registered in the BSI,
and described by a Bot Service Manifest.</t>
        <t><strong>Service Owner</strong><br/>
The organisation responsible for registering, maintaining, and operating a
Service in the BSI.</t>
        <t><strong>Bot Service Manifest (BSM)</strong><br/>
The structured metadata document that describes a Service to the BSI,
including its technical specification reference, capability taxonomy,
trust metadata, and commercial terms.</t>
        <t><strong>Bot Service Index (BSI)</strong><br/>
The global, centralised index of registered Services, operated by the Bot
Foundation, queryable by autonomous agents via the Index API.</t>
        <t><strong>Index API</strong><br/>
The HATEOAS-compliant HTTP API exposed by the BSI for agent discovery and
navigation.</t>
        <t><strong>Spider</strong><br/>
The automated crawler operated by the BSI that verifies registered Services
by reading their technical specifications and performing liveness checks.</t>
        <t><strong>Accredited Verifier</strong><br/>
A trusted third-party organisation, accredited by the Bot Standards Foundation, that
performs human-intensive trust verification at Organisation levels O-3 and
O-4.</t>
        <t><strong>Accredited Regional Representative</strong><br/>
An organisation accredited by the Bot Standards Foundation to operate commercial
onboarding, contracting, and customer relationships within a defined
geographic jurisdiction, under the Bot Standards Foundation's standard and governance.</t>
        <t><strong>Trust Policy</strong><br/>
A set of minimum trust requirements expressed by a consuming agent that a
Service must satisfy before the agent will use it.</t>
        <t><strong>Liveness</strong><br/>
The confirmed operational status and response availability of a Service,
as measured by the BSI Spider at a frequency determined by the Service's
commercial tier.</t>
        <t><strong>Tier</strong><br/>
A commercial subscription level that determines a Service's visibility in
the BSI, liveness check frequency, and API query rate allocation.</t>
      </section>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <section anchor="requirements-must">
          <name>Requirements (MUST)</name>
          <ul spacing="normal">
            <li>
              <t>The BSI MUST be queryable by autonomous agents via a stable, globally
accessible URL without prior knowledge of any specific service.</t>
            </li>
            <li>
              <t>The Index API MUST follow HATEOAS principles: agents MUST be able to
navigate the full index starting from a single entry-point URL.</t>
            </li>
            <li>
              <t>Every Service record MUST expose machine-readable trust metadata across
all three trust dimensions (Organisation, Service, Liveness).</t>
            </li>
            <li>
              <t>Service registration MUST involve a human-initiated B2B onboarding process
with a contractual relationship between the Service Owner and the Bot
Foundation or its Accredited Regional Representative.</t>
            </li>
            <li>
              <t>The BSI Spider MUST verify Service technical specifications automatically
after registration and on a schedule determined by the Service's tier.</t>
            </li>
            <li>
              <t>The BSI MUST expose trust metadata as verifiable facts, not as
recommendations. Trust decisions MUST remain with the consuming agent.</t>
            </li>
            <li>
              <t>The Bot Service Manifest (BSM) MUST be format-agnostic: it MUST support
referencing OpenAPI, MCP, AsyncAPI, and GraphQL specifications, with
additional spec types addable via extension.</t>
            </li>
            <li>
              <t>The BSI MUST be operated as a neutral, non-profit infrastructure under
the governance of the Bot Standards Foundation.</t>
            </li>
          </ul>
        </section>
        <section anchor="goals-should">
          <name>Goals (SHOULD)</name>
          <ul spacing="normal">
            <li>
              <t>The Index API SHOULD support full-text and structured search by capability,
category, organisation trust level, service verification level, liveness
freshness, and protocol type.</t>
            </li>
            <li>
              <t>The BSI SHOULD provide SDKs in common agent development languages to
lower the integration barrier for consuming agents.</t>
            </li>
            <li>
              <t>The BSI SHOULD support a federated accredited verifier model so that
Organisation trust levels O-3 and O-4 can be verified at scale without
centralising all human review in the Bot Standards Foundation.</t>
            </li>
            <li>
              <t>Accredited Regional Representatives SHOULD be established in major
jurisdictions to allow Service Owners to contract in their local language
and legal framework.</t>
            </li>
            <li>
              <t>The BSI SHOULD publish a public transparency report at least annually,
disclosing the number of registered services by tier and trust level,
spider coverage statistics, and verifier accreditation status.</t>
            </li>
          </ul>
        </section>
        <section anchor="out-of-scope">
          <name>Out of Scope</name>
          <t>The following are explicitly not addressed by this document.
Items marked MUST NOT are normative constraints on conforming
implementations; remaining items are editorial scope boundaries.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Bot identity and authentication</strong>: how a bot proves its own identity to
a service it consumes. This is a separate standards problem addressed by
complementary work such as draft-meunier-webbotauth-registry. This
document takes no position on bot identity mechanisms.</t>
            </li>
            <li>
              <t><strong>Bot rights and legal personhood</strong>: the political and legal recognition
of autonomous agents as rights-bearing entities. This is outside the
scope of a technical infrastructure standard.</t>
            </li>
            <li>
              <t><strong>Service execution</strong>: a conforming BSI implementation MUST NOT proxy,
mediate, or execute service calls on behalf of consuming agents. The BSI
is a discovery layer only; all service interactions occur directly between
the consuming agent and the Service Owner's infrastructure.</t>
            </li>
            <li>
              <t><strong>Content indexing</strong>: a conforming BSI implementation MUST NOT index
service response content. The BSI indexes service <em>metadata</em> — capability
declarations, trust levels, liveness signals — not the data that services
return when called.</t>
            </li>
            <li>
              <t><strong>Mandatory consumer registration</strong>: a conforming BSI implementation
MUST NOT require consuming agents to register or identify themselves as
a condition of performing discovery queries (see Section 8.3).</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="architecture-overview">
        <name>Architecture Overview</name>
        <section anchor="component-model">
          <name>Component Model</name>
          <artwork><![CDATA[
  +----------------------------------------------------------+
  |                   Bot Standards Foundation               |
  |             (Swiss Stiftung -- neutral, non-profit)      |
  |  Owns: BSI standard, Index infrastructure, BSM format    |
  |  Accredits: Regional Representatives, Verifiers          |
  +---------------------+------------------------------------+
                        |
        +--------------++--------------+
        |               |               |
  +-----+------+  +-----+------+  +-----+-----------+
  |   Index    |  |   Spider   |  |  Registration   |
  |   API      |  |  (Crawler) |  |    Portal       |
  | (HATEOAS)  |  |            |  |  (B2B / human)  |
  +-----+------+  +-----+------+  +-----+-----------+
        |               |               |
        |         +-----+------+        |
        |         |  Service   |        |
        +-------->|  Record    |<-------+
                  |  Store     |
                  +------------+
        ^                              ^
        |                              |
  +-----+------+              +--------+-----------+
  |  Consuming |              |   Service Owner    |
  |    Agent   |              |  (+ Accredited     |
  |    (Bot)   |              |  Regional Rep)     |
  +------------+              +--------------------+
]]></artwork>
          <t><strong>Flow:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>A Service Owner initiates registration via the Registration Portal,
providing company details, service metadata, and agreeing to a commercial
contract (directly with the Bot Standards Foundation or via an Accredited Regional
Representative).</t>
            </li>
            <li>
              <t>The Registration Portal creates a draft Service Record and triggers the
BSI Spider.</t>
            </li>
            <li>
              <t>The Spider crawls the registered service endpoint, reads and validates
the referenced technical specification, performs a liveness check, and
updates the Service Record with verified technical metadata.</t>
            </li>
            <li>
              <t>The Service Record becomes queryable via the Index API.</t>
            </li>
            <li>
              <t>A consuming agent queries the Index API from the single entry-point URL,
navigates by HATEOAS links, applies its Trust Policy, and selects
services that satisfy its requirements.</t>
            </li>
            <li>
              <t>The Spider continues to recheck services on the schedule defined by
each service's liveness monitoring configuration.</t>
            </li>
          </ol>
        </section>
        <section anchor="governance-model">
          <name>Governance Model</name>
          <t>The BSI MUST be operated by a <strong>neutral governing body</strong> that satisfies the
following normative requirements. These requirements apply to any
conforming BSI implementation; the specific legal form of the governing
body is an implementation choice.</t>
          <t><strong>Neutrality requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST have no commercial interest in preferring any
registrant's services over another in index results or liveness
scheduling.</t>
            </li>
            <li>
              <t>The governing body MUST NOT offer exclusive discovery advantages,
ranking preferences, or prioritised Spider treatment to any registrant
regardless of commercial relationship.</t>
            </li>
            <li>
              <t>Governance of the BSI standard and BSM specification MUST be separated
from operation of the commercial index. A single entity may not
simultaneously control standard evolution and derive commercial benefit
from preferential application of that standard.</t>
            </li>
          </ul>
          <t><strong>Operational requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST accredit Regional Representatives who may
handle service onboarding in specific jurisdictions. Regional
Representatives operate under licence from the governing body; the
index itself remains a single global store.</t>
            </li>
            <li>
              <t>The governing body MUST accredit Verifiers who perform Organisation
trust assessments at O-3 and O-4. Accredited Verifiers are
structurally analogous to Certificate Authorities in the TLS
ecosystem: trusted third parties whose assessments the index relies
upon without independently replicating.</t>
            </li>
            <li>
              <t>The governing body MUST maintain the capability taxonomy and publish
all versions of the BSM specification and Index API specification as
open standards under a permissive licence.</t>
            </li>
            <li>
              <t>The governing body MUST perform sanctions screening on service
registrants (see Section 7.3).</t>
            </li>
          </ul>
          <t><strong>Openness requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The full index MUST be made available as a freely downloadable bulk
dataset at regular intervals, under an open data licence. No entity,
including the governing body, may hold an exclusive lock on the index
data.</t>
            </li>
            <li>
              <t>Discovery queries to the Index API MUST be available without
authentication or payment (subject to rate limits; see Section 8.3).</t>
            </li>
          </ul>
          <section anchor="global-participation">
            <name>Global Participation</name>
            <t>A conforming BSI implementation SHOULD establish mechanisms to ensure
global representation in the capability taxonomy, including service
categories relevant to underrepresented regions. Where regional
institutional partners (intergovernmental bodies, standards
organisations, or civil society organisations) are willing to
co-sponsor regional participation, the governing body SHOULD establish
formal co-sponsorship relationships and associated governance
representation for those regions.</t>
            <t>Regional Spider nodes are RECOMMENDED in regions with significant
service registrant populations to eliminate intercontinental latency
in liveness verification.</t>
          </section>
        </section>
        <section anchor="standard-registries">
          <name>Standard Registries</name>
          <t>The BSI standard maintains normative registries of enumerated values.
Registries are authoritative lists of valid values for specific BSM and
Index API fields. Using values not present in the relevant registry is
a protocol violation.</t>
          <t><strong>Registry location:</strong> registries are published as live endpoints at the
canonical BSI domain and are updated independently of the RFC revision
cycle. The RFC defines the registry structure and lifecycle rules; the
live endpoints are the authoritative source of current valid values.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Registry</th>
                <th align="left">Live endpoint</th>
                <th align="left">Used in</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Protocol types</td>
                <td align="left">
                  <tt>api-index.org/registry/protocols</tt></td>
                <td align="left">BSM <tt>spec.type</tt></td>
              </tr>
              <tr>
                <td align="left">Capability taxonomy</td>
                <td align="left">
                  <tt>api-index.org/registry/capabilities</tt></td>
                <td align="left">BSM <tt>capabilities[]</tt></td>
              </tr>
              <tr>
                <td align="left">Notification channel types</td>
                <td align="left">
                  <tt>api-index.org/registry/notification-channels</tt></td>
                <td align="left">BSM <tt>notifications.channels[].type</tt></td>
              </tr>
            </tbody>
          </table>
          <t><strong>Registry entry lifecycle:</strong></t>
          <t>Each registry entry transitions through three phases. The public
<tt>standard_warnings</tt> flag in a Service Record does not appear until the
grace period has elapsed — service operators have a silent window to
update their BSM before any public signal is issued.</t>
          <t><tt>
active  →  deprecated (announced)
              │
              ├── [grace period: 90 days min]
              │     silent: operator notified, no public flag
              │
              ├── [warning period: remainder of deprecation window]
              │     standard_warnings visible in Service Record
              │
              └── sunset
                    new registrations rejected; existing use flagged non-compliant
</tt></t>
          <table>
            <thead>
              <tr>
                <th align="left">Phase</th>
                <th align="left">Registry status</th>
                <th align="left">standard_warnings visible</th>
                <th align="left">New registrations</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Normal use</td>
                <td align="left">
                  <tt>active</tt></td>
                <td align="left">No</td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Grace period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>No</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Warning period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>Yes</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Sunset</td>
                <td align="left">
                  <tt>sunset</tt></td>
                <td align="left">Yes (non-compliant)</td>
                <td align="left">
                  <strong>Rejected</strong></td>
              </tr>
            </tbody>
          </table>
          <t><strong>Deprecation rules:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST publish a <tt>deprecated_in_version</tt>, <tt>sunset_date</tt>,
<tt>grace_period_ends</tt>, and <tt>replacement</tt> value when deprecating any
registry entry.</t>
            </li>
            <li>
              <t>The minimum total deprecation window (announcement to sunset) is
<strong>12 months</strong>. The governing body MAY extend this window but MUST NOT
shorten it.</t>
            </li>
            <li>
              <t>The minimum grace period is <strong>90 days</strong> from the deprecation announcement.
During the grace period, <tt>standard_warnings</tt> MUST NOT be set on any
Service Record, regardless of whether the service uses the deprecated value.</t>
            </li>
            <li>
              <t>The governing body MUST notify all registered Service Owners whose
services use the deprecated value <strong>before</strong> the grace period begins.
Notification MUST include the <tt>grace_period_ends</tt> date, the <tt>sunset_date</tt>,
and the <tt>replacement</tt> value.</t>
            </li>
            <li>
              <t>After the grace period, the index operator MUST set <tt>standard_warnings</tt>
on Service Records that still use the deprecated value.</t>
            </li>
            <li>
              <t>At <tt>sunset</tt>, the index operator MUST reject new BSM submissions using
the sunsetted value and MUST escalate existing Service Records from
<tt>standard_warnings</tt> to a <tt>non_compliant</tt> status flag.</t>
            </li>
          </ul>
          <t><strong>Registry versioning:</strong> each registry is independently versioned.
The Index root resource (Section 9.2) exposes the current version of
each registry so consuming agents may detect changes.</t>
        </section>
      </section>
      <section anchor="the-bot-service-manifest-bsm">
        <name>The Bot Service Manifest (BSM)</name>
        <section anchor="purpose">
          <name>Purpose</name>
          <t>The Bot Service Manifest is the structured document that a Service Owner
provides at registration and that the BSI Spider validates and enriches.
It is the index-facing contract for a Service: format-agnostic, extensible,
and designed for machine consumption.</t>
        </section>
        <section anchor="required-fields">
          <name>Required Fields</name>
          <artwork><![CDATA[
{
  "bsm_version": "1.0",
  "service_id": "globally unique stable identifier -- UUID v4 or BSI-issued",
  "name": "human-readable service name",
  "description": "machine-parseable capability summary",
  "api_version": "semantic version string -- e.g. 2.1.0",
  "lifecycle_stage": "experimental | beta | stable | deprecated | sunset",
  "supersedes": "service_id of the version this entry supersedes -- OPTIONAL",
  "owner": {
    "organisation_name": "legal entity name",
    "jurisdiction": "ISO 3166-1 alpha-2 country code",
    "registration_number": "company registration number -- required for O-2+",
    "contacts": {
      "operations": "email -- receives incident and spec fetch failure notifications",
      "escalation": "email -- Cluster 3 escalation; OPTIONAL but RECOMMENDED"
    }
  },
  "spec": {
    "type": "value from api-index.org/registry/protocols",
    "url": "URL to the machine-readable specification document",
    "version": "spec version string"
  },
  "capabilities": [
    "term from api-index.org/registry/capabilities",
    "term from api-index.org/registry/capabilities"
  ],
  "entry_point": "base URL of the service",
  "trust": {
    "organisation_level": "O-0 through O-4 -- set by index, not service owner",
    "service_level": "S-0 through S-4 -- set by index, not service owner",
    "spec_consistency": "null | consistent | mismatch | unreachable -- set by Spider",
    "spec_fetch_consecutive_failures": 0,
    "next_spider_run_at": "ISO 8601 timestamp -- next scheduled Spider run",
    "liveness": {
      "last_ping_at": "ISO 8601 timestamp",
      "ping_interval_seconds": 300,
      "uptime_30d_percent": 99.9,
      "avg_response_ms": 142.0
    }
  },
  "notifications": {
    "supported": true,
    "channels": [
      {
        "type": "value from api-index.org/registry/notification-channels",
        "registration_url": "URL to register a subscription",
        "events": ["event-type"],
        "spec_url": "URL to event schema -- OPTIONAL"
      }
    ]
  },
  "legal": {
    "terms_of_service_url": "URL",
    "privacy_policy_url": "URL",
    "data_processing_agreement_url": "URL -- required for O-3+",
    "gdpr_applicable": true,
    "jurisdiction_flags": ["ISO 3166-1 alpha-2 country code"]
  },
  "standard_warnings": [
    {
      "field": "BSM field path",
      "value": "the deprecated value in use",
      "registry_status": "deprecated",
      "deprecated_in_bsi_version": "version string",
      "sunset_date": "ISO 8601 date",
      "replacement": "replacement value",
      "message": "human-readable warning"
    }
  ]
}
]]></artwork>
          <t><strong>Field notes:</strong></t>
          <t><tt>owner.contacts.operations</tt> MUST be provided. It is the primary notification
address for all automated Spider alerts: spec fetch failures at Cluster 2
entry, liveness degradation, and recovery confirmations. This address
SHOULD reach the team responsible for keeping the service registration
current.</t>
          <t><tt>owner.contacts.escalation</tt> is OPTIONAL but RECOMMENDED. It is the
escalation address sent to when failures reach Cluster 3 — indicating
a persistent problem that has not been resolved through the Cluster 1
and Cluster 2 retry windows and likely requires management attention or
a deliberate BSM configuration update. This address SHOULD reach a team
lead, service owner, or on-call manager. It MUST NOT be identical to
<tt>operations</tt> — if the same person handles both, the escalation path
provides no additional coverage.</t>
          <t><tt>api_version</tt> MUST follow semantic versioning (semver.org). It describes
the version of the service's own API, not the BSM format version.</t>
          <t>Each <tt>api_version</tt> value is bound to exactly one registered spec snapshot.
A Service Owner who modifies the live spec document at <tt>spec.url</tt> without
submitting a BSM update with a new <tt>api_version</tt> value WILL produce a
structural mismatch between the live document and the stored snapshot. The
Spider MUST record this as an S-2 consistency failure and MUST surface it
in the Service Record as a <tt>standard_warnings</tt> entry.</t>
          <t>This is intentional. The BSI enforces spec immutability per version as a
structural consequence of the snapshot model: a version string identifies
a contract, and that contract MUST NOT change after it has been registered.
Operators who need to change their API MUST register a new <tt>api_version</tt>.
This protects consuming agents from silent contract breakage.</t>
          <t><tt>lifecycle_stage</tt> MUST be one of the values defined in the BSI lifecycle
registry. Default if omitted is <tt>stable</tt>. Services at <tt>experimental</tt> or
<tt>beta</tt> are excluded from default search results (see Section 9.3).</t>
          <t><tt>supersedes</tt> is OPTIONAL. When set, the index MUST automatically set
<tt>superseded_by</tt> on the referenced entry. The referencing service MUST be
registered under the same organisation account.</t>
          <t><tt>trust</tt> fields are set exclusively by the index operator based on
verification outcomes. BSM submissions that include <tt>trust</tt> field values
MUST have those values overwritten by the index upon processing.</t>
          <t><tt>standard_warnings</tt> is set exclusively by the index operator. It is
populated only after the grace period for the relevant deprecation has
elapsed (see Section 4.3). During the grace period the field MUST be
empty even if the service uses a deprecated value. Service Owners MUST
NOT submit this field; submitted values MUST be ignored.</t>
          <t><tt>notifications</tt> is OPTIONAL for <tt>experimental</tt> and <tt>beta</tt> lifecycle stages
and RECOMMENDED for <tt>stable</tt>. If <tt>notifications.supported</tt> is <tt>true</tt>,
<tt>notifications.channels</tt> MUST contain at least one entry.</t>
          <t><tt>entry_point</tt> is the base HTTPS URL of the service, used by consuming agents
to construct API calls. The following normative requirements apply:</t>
          <ul spacing="normal">
            <li>
              <t><tt>entry_point</tt> MUST use the <tt>https</tt> scheme. HTTP entry points MUST be
rejected at registration.</t>
            </li>
            <li>
              <t><tt>entry_point</tt> MUST remain stable for the lifetime of the service
registration. A change to <tt>entry_point</tt> MUST be submitted as a BSM
update and MUST trigger immediate Spider re-verification.</t>
            </li>
            <li>
              <t>The Spider MUST NOT hit <tt>entry_point</tt> directly for liveness checks.
Instead, the Spider checks <tt>entry_point + /health</tt> (see Section 10.2).</t>
            </li>
            <li>
              <t>HTTP redirects from <tt>entry_point</tt> are permitted for consuming agents
but MUST NOT be present at <tt>entry_point/health</tt> (the health endpoint
MUST respond directly without redirect).</t>
            </li>
          </ul>
          <t><tt>entry_point/health</tt> is the mandatory liveness endpoint. Every registered
service MUST expose a health endpoint at the path <tt>/health</tt> relative to
<tt>entry_point</tt>. This endpoint:</t>
          <ul spacing="normal">
            <li>
              <t>MUST return HTTP 2xx when the service is operational.</t>
            </li>
            <li>
              <t>MUST return without requiring authentication.</t>
            </li>
            <li>
              <t>MUST respond within a reasonable timeout (RECOMMENDED: 5 seconds).</t>
            </li>
            <li>
              <t>SHOULD return a JSON body of the form <tt>{"status": "ok", "api_version":
"&lt;semver&gt;"}</tt>. If <tt>api_version</tt> is present, the Spider SHOULD cross-check
it against the BSM <tt>api_version</tt> field; a mismatch MUST be recorded as
a warning in the Service Record.</t>
            </li>
            <li>
              <t>MUST NOT be used by consuming agents for API calls — it is a
Spider-facing infrastructure endpoint only.</t>
            </li>
          </ul>
          <t><tt>spec.url</tt> is the URL to the machine-readable API specification document
(OpenAPI JSON/YAML, MCP manifest, AsyncAPI document, or GraphQL SDL).</t>
          <ul spacing="normal">
            <li>
              <t><tt>spec.url</tt> MUST use the <tt>https</tt> scheme.</t>
            </li>
            <li>
              <t><tt>spec.url</tt> MUST be publicly accessible without authentication. A spec
behind authentication cannot be fetched by the Spider and permanently
prevents the service from reaching S-2.</t>
            </li>
            <li>
              <t>On the initial Spider run following registration, the Spider fetches
the spec document and stores it as the <strong>registered spec snapshot</strong>.
All subsequent Spider runs compare the live document at <tt>spec.url</tt>
against this snapshot to detect breaking changes (S-3 assessment).
The snapshot is updated when the Service Owner submits a BSM update
that increments <tt>api_version</tt>.</t>
            </li>
            <li>
              <t>A BSM update that changes <tt>spec.url</tt> MUST trigger immediate Spider
re-verification and snapshot replacement (see Section 10.1).</t>
            </li>
          </ul>
          <t>The <tt>service_id</tt> MUST be stable across re-registrations and version updates.
It is the canonical identity of the service in the BSI and MUST be a UUID v4
or a BSI-issued deterministic identifier.</t>
        </section>
        <section anchor="protocol-type-registry-v10-starter-set">
          <name>Protocol Type Registry (v1.0 starter set)</name>
          <t>The <tt>spec.type</tt> field MUST contain a value from the Protocol Type Registry
at <tt>api-index.org/registry/protocols</tt>. The registry is the authoritative
and always-current list of valid values. The entries below are the v1.0
starter set; the governing body extends the registry as additional protocol
types reach sufficient adoption. Registry entries follow the lifecycle
defined in Section 4.3.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Registry value</th>
                <th align="left">Standard</th>
                <th align="left">Spider behaviour</th>
                <th align="left">Status</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>openapi</tt></td>
                <td align="left">OpenAPI 3.x</td>
                <td align="left">Parses paths, schemas, auth requirements</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>mcp</tt></td>
                <td align="left">Model Context Protocol</td>
                <td align="left">Parses tool definitions and capability list</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>asyncapi</tt></td>
                <td align="left">AsyncAPI 2.x / 3.x</td>
                <td align="left">Parses channels, message schemas</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>graphql</tt></td>
                <td align="left">GraphQL SDL</td>
                <td align="left">Introspects schema via introspection query</td>
                <td align="left">active</td>
              </tr>
            </tbody>
          </table>
          <t>Services whose specification type is not yet in the registry SHOULD request
addition via the governing body's registry extension process before
registering. Until the type is added, such services cannot achieve S-2 or
above, as the Spider has no parser for unregistered types.</t>
        </section>
        <section anchor="capability-taxonomy-registry-v10-starter-set">
          <name>Capability Taxonomy Registry (v1.0 starter set)</name>
          <t>The <tt>capabilities</tt> field MUST contain terms from the Capability Taxonomy
Registry at <tt>api-index.org/registry/capabilities</tt>. The registry is the
authoritative and always-current list of valid terms. Terms are
hierarchical, dot-separated (e.g., <tt>commerce.marketplace</tt>), and follow
the lifecycle defined in Section 4.3.</t>
          <t>The governing body extends the taxonomy based on observed service
registrations and regional input (including the Africa Regional Development
Track). Requests for new taxonomy terms are submitted via the governing
body's registry extension process.</t>
          <t>The following are the v1.0 starter set. The live registry is the
authoritative source; this list is illustrative only.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Term</th>
                <th align="left">Description</th>
                <th align="left">Status</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>commerce</tt></td>
                <td align="left">E-commerce and marketplace services</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>commerce.marketplace</tt></td>
                <td align="left">Multi-vendor marketplace</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>commerce.retail</tt></td>
                <td align="left">Single-vendor retail</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>payments</tt></td>
                <td align="left">Payment processing</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>payments.card</tt></td>
                <td align="left">Card payment processing</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>payments.crypto</tt></td>
                <td align="left">Cryptocurrency payments</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>data.financial</tt></td>
                <td align="left">Financial data and market information</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>data.legal</tt></td>
                <td align="left">Legal documents and information</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>nlp</tt></td>
                <td align="left">Natural language processing</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>nlp.translation</tt></td>
                <td align="left">Language translation</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>identity</tt></td>
                <td align="left">Authentication and identity verification</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>communication</tt></td>
                <td align="left">Messaging, email, and notification delivery</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>storage</tt></td>
                <td align="left">File and object storage</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>compute</tt></td>
                <td align="left">Code execution and computation</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>media</tt></td>
                <td align="left">Image, audio, video generation or processing</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>iot</tt></td>
                <td align="left">Sensor and device data</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>search</tt></td>
                <td align="left">Information retrieval</td>
                <td align="left">active</td>
              </tr>
            </tbody>
          </table>
          <t>A Service MUST declare at least one capability term. Declared capabilities
are validated by the Spider against the parsed specification where the spec
type supports it. Services using deprecated taxonomy terms receive a
<tt>standard_warnings</tt> entry in their Service Record.</t>
        </section>
      </section>
      <section anchor="trust-model">
        <name>Trust Model</name>
        <t>The BSI Trust Model has three independent dimensions. Each dimension produces
a machine-readable value in the Service Record. Consuming agents combine
these values according to their own Trust Policy.</t>
        <t>The BSI provides trust metadata. It does not make trust decisions.</t>
        <section anchor="dimension-1-organisation-trust-level">
          <name>Dimension 1 — Organisation Trust Level</name>
          <t>Describes the verified identity and compliance posture of the organisation
that owns the service.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
                <th align="left">Requirements</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">O-0</td>
                <td align="left">Unverified</td>
                <td align="left">Self-registered. No checks performed.</td>
              </tr>
              <tr>
                <td align="left">O-1</td>
                <td align="left">Identity Verified</td>
                <td align="left">Valid business email confirmed. Domain ownership verified via DNS TXT record.</td>
              </tr>
              <tr>
                <td align="left">O-2</td>
                <td align="left">Legal Entity Verified</td>
                <td align="left">Company registration number confirmed against official registry of declared jurisdiction.</td>
              </tr>
              <tr>
                <td align="left">O-3</td>
                <td align="left">Legally Compliant</td>
                <td align="left">Terms of Service, Privacy Policy, and Data Processing Agreement reviewed and confirmed present and accessible. GDPR applicability assessed. Verified by Accredited Verifier.</td>
              </tr>
              <tr>
                <td align="left">O-4</td>
                <td align="left">Audited</td>
                <td align="left">Third-party compliance audit completed (SOC 2 Type II, ISO 27001, or equivalent). Audit certificate on file with Bot Standards Foundation. Verified by Accredited Verifier.</td>
              </tr>
            </tbody>
          </table>
          <t>Organisation levels are assessed against the organisation as a whole, not
per service. An organisation that achieves O-3 applies that level to all
its registered services.</t>
        </section>
        <section anchor="dimension-2-service-verification-level">
          <name>Dimension 2 — Service Verification Level</name>
          <t>Describes what has been automatically verified about the service itself
by the BSI Spider.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
                <th align="left">How achieved</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">S-0</td>
                <td align="left">Unchecked</td>
                <td align="left">Registered. Spider has not yet run.</td>
              </tr>
              <tr>
                <td align="left">S-1</td>
                <td align="left">Reachable</td>
                <td align="left">Spider confirmed <tt>entry_point/health</tt> returns HTTP 2xx without authentication.</td>
              </tr>
              <tr>
                <td align="left">S-2</td>
                <td align="left">Spec Verified</td>
                <td align="left">Specification document at <tt>spec.url</tt> is publicly fetchable, parseable according to the declared <tt>spec.type</tt>, and structurally consistent with the BSM registration snapshot taken at initial registration.</td>
              </tr>
              <tr>
                <td align="left">S-3</td>
                <td align="left">Schema Stable</td>
                <td align="left">No breaking changes detected between the registered spec snapshot and the live spec document across at least three consecutive Spider runs.</td>
              </tr>
              <tr>
                <td align="left">S-4</td>
                <td align="left">Security Reviewed</td>
                <td align="left">Automated vulnerability scan completed with no critical findings, OR third-party penetration test certificate provided and validated by Accredited Verifier.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="dimension-3-liveness">
          <name>Dimension 3 — Liveness</name>
          <t>Describes the confirmed operational availability of the service, including
how recent and how frequent the availability data is. Liveness data is
expressed as a set of metrics, not a single level.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Metric</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>last_ping_at</tt></td>
                <td align="left">ISO 8601 timestamp</td>
                <td align="left">Time of the most recent successful Spider ping</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>ping_interval_seconds</tt></td>
                <td align="left">integer</td>
                <td align="left">Configured interval between Spider pings</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>uptime_30d_percent</tt></td>
                <td align="left">float</td>
                <td align="left">Percentage of pings successful over the last 30 days</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>avg_response_ms</tt></td>
                <td align="left">float</td>
                <td align="left">Mean response time in milliseconds over the last 30 days</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>consecutive_failures</tt></td>
                <td align="left">integer</td>
                <td align="left">Number of consecutive failed pings at last check</td>
              </tr>
            </tbody>
          </table>
          <t>The ping interval is determined by the service's liveness monitoring
configuration (see Section 8.2). A service configured at initial-only
frequency receives no recurring pings; its <tt>last_ping_at</tt> reflects
only the initial Spider verification run.</t>
        </section>
        <section anchor="bot-side-trust-policy-expression">
          <name>Bot-Side Trust Policy Expression</name>
          <t>A consuming agent expresses its Trust Policy as a set of minimum thresholds
across all three dimensions. Example policy expressed in pseudo-notation:</t>
          <t><tt>
require:
  organisation_level &gt;= O-2
  service_level &gt;= S-2
  last_ping_age &lt; 3600         # seconds since last_ping_at
  uptime_30d_percent &gt;= 99.0
  consecutive_failures == 0
</tt></t>
          <t>The Index API SHOULD support filtering by trust dimension thresholds so
that agents can retrieve only records that satisfy their policy without
downloading the full index.</t>
          <t>Trust Policies are defined and enforced by consuming agents. The BSI does
not validate or enforce Trust Policies.</t>
        </section>
        <section anchor="accredited-verifier-model">
          <name>Accredited Verifier Model</name>
          <t>Organisation levels O-3 and O-4 require human review that cannot be
automated at scale. The BSI uses a federated Accredited Verifier model,
analogous to the Certificate Authority model in TLS:</t>
          <ul spacing="normal">
            <li>
              <t>The Bot Standards Foundation defines the verification criteria for each level.</t>
            </li>
            <li>
              <t>Organisations apply to the Bot Standards Foundation for Verifier accreditation.</t>
            </li>
            <li>
              <t>Accredited Verifiers perform O-3 and O-4 assessments and sign
verification attestations.</t>
            </li>
            <li>
              <t>The Bot Standards Foundation maintains a public registry of Accredited Verifiers.</t>
            </li>
            <li>
              <t>A Service Record at O-3 or O-4 MUST include the identifier of the
Accredited Verifier that performed the assessment and the date of
assessment.</t>
            </li>
            <li>
              <t>Accreditation of Verifiers is reviewed annually by the Bot Standards Foundation.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="registration-and-onboarding">
        <name>Registration and Onboarding</name>
        <section anchor="push-registration-human-initiated">
          <name>Push Registration (Human-Initiated)</name>
          <t>Service registration is a human-initiated B2B process. Autonomous
self-registration without human involvement is explicitly not supported,
as the commercial contract and legal accountability require a human
counterparty.</t>
          <t>Registration MUST be scoped at the <strong>organisation level</strong>. An organisation
registers once and undergoes identity verification once; multiple services
may then be registered under that organisational identity. This requirement
ensures:</t>
          <ul spacing="normal">
            <li>
              <t>Identity verification and sanctions screening are performed once per
legal entity, not repeated per service.</t>
            </li>
            <li>
              <t>Organisation trust (O-level) established at registration propagates
to all services registered under that organisation without re-verification
of the organisation's identity.</t>
            </li>
          </ul>
          <t><strong>Definition:</strong> one service equals one Bot Service Manifest (BSM) document
with one distinct <tt>entry_point</tt>. Logical bundling of API paths under a
single entry point is the registrant's responsibility and is permitted.</t>
          <t>The registration process:</t>
          <ol spacing="normal" type="1"><li>
              <t>The Service Owner (or their Accredited Regional Representative) creates
an <strong>Organisation Account</strong> in the BSI Registration Portal. The index
operator MUST screen the Service Owner against applicable sanctions
lists before account activation. Entities subject to applicable
sanctions MUST be refused registration (see Section 7.3).</t>
            </li>
            <li>
              <t>The Service Owner provides organisation details sufficient for the target
Organisation trust level. This step is performed once per organisation.</t>
            </li>
            <li>
              <t>The Service Owner submits a Bot Service Manifest for each service to be
registered, including the spec URL and entry point. Each service is
associated with a liveness monitoring configuration that determines
Spider check frequency (see Section 8.2).</t>
            </li>
            <li>
              <t>For O-1: email and domain ownership verification is completed
automatically.</t>
            </li>
            <li>
              <t>For O-2: the index operator or Regional Representative verifies the
declared company registration number.</t>
            </li>
            <li>
              <t>For O-3 and O-4: the Service Owner engages an Accredited Verifier.</t>
            </li>
            <li>
              <t>Upon completion of applicable checks, the service is activated in the
index and the Spider is triggered.</t>
            </li>
          </ol>
        </section>
        <section anchor="spider-verification-automated">
          <name>Spider Verification (Automated)</name>
          <t>The BSI Spider is triggered automatically at two points:</t>
          <ul spacing="normal">
            <li>
              <t><strong>At registration</strong>: once a service is activated, the Spider performs
an initial verification run to establish the baseline Service
Verification Level.</t>
            </li>
            <li>
              <t><strong>On schedule</strong>: thereafter, the Spider rechecks the service at the
interval defined by the service's commercial tier (see Section 8).</t>
            </li>
          </ul>
          <t>During a Spider run, the Spider:</t>
          <ol spacing="normal" type="1"><li>
              <t>Performs an HTTPS request to <tt>{entry_point}/health</tt> and records the
response code, response time, and timestamp (Liveness: S-1).</t>
            </li>
            <li>
              <t>Fetches the spec document from <tt>spec.url</tt> (HTTPS, no authentication).</t>
            </li>
            <li>
              <t>Parses the fetched document and compares it structurally against the
registered spec snapshot (S-2 if fetchable and consistent; S-3 assessed
if no breaking changes detected across three or more consecutive runs).</t>
            </li>
            <li>
              <t>Updates all Liveness metrics in the Service Record.</t>
            </li>
            <li>
              <t>Records any failures and increments <tt>consecutive_failures</tt>.</t>
            </li>
          </ol>
          <t>The Spider MUST NOT call any API endpoint beyond <tt>{entry_point}/health</tt>
and <tt>spec.url</tt>. The Spider MUST NOT submit data to, create resources in,
or otherwise interact with the production API of a registered service.</t>
          <t>The Spider MUST respect HTTP rate limits declared by the service. Spider
requests MUST include a <tt>User-Agent</tt> header identifying the BSI Spider
and version.</t>
        </section>
        <section anchor="commercial-contract-and-sanctions-compliance">
          <name>Commercial Contract and Sanctions Compliance</name>
          <t>Every registered service MUST be covered by a commercial agreement between
the Service Owner and the index operator (or its Accredited Regional
Representative). The agreement MUST define:</t>
          <ul spacing="normal">
            <li>
              <t>The liveness monitoring configuration and its obligations.</t>
            </li>
            <li>
              <t>The index operator's obligations regarding Spider frequency and
Index API availability.</t>
            </li>
            <li>
              <t>Acceptable use terms.</t>
            </li>
            <li>
              <t>Data processing terms in accordance with applicable law.</t>
            </li>
          </ul>
          <t><strong>Sanctions compliance:</strong> the index operator MUST screen all service
registrants against applicable sanctions lists prior to account
activation. At minimum, screening MUST cover the UN Security Council
consolidated sanctions list. Operators subject to additional
jurisdictional sanctions regimes (e.g., EU, US OFAC, Swiss SECO)
MUST additionally screen against those lists as applicable to their
jurisdiction of incorporation. Entities subject to applicable
sanctions MUST be refused registration regardless of commercial tier.</t>
          <t>Registrants MUST represent and warrant in the commercial agreement
that they are not subject to applicable sanctions, and MUST notify
the index operator immediately of any change in that status.</t>
          <t>Unauthenticated discovery queries to the Index API are not subject
to registration screening and MUST remain available without
restriction, consistent with the BSI's mission as open global
infrastructure (see Section 8.3).</t>
        </section>
      </section>
      <section anchor="operational-model">
        <name>Operational Model</name>
        <section anchor="supply-side-funding-principle">
          <name>Supply-Side Funding Principle</name>
          <t>A conforming BSI implementation MUST be funded primarily by service
registration fees paid by Service Owners (supply side). Discovery
queries by consuming agents MUST NOT be the primary revenue mechanism.
This principle is normative: an implementation that charges consuming
agents for standard discovery queries is not conformant with the BSI
model, as doing so contradicts the open infrastructure mission and
undermines the network effect that makes the supply side valuable.</t>
          <t>The BSI model is structurally analogous to the DNS model: registrants
pay to be listed; queries are free.</t>
        </section>
        <section anchor="liveness-monitoring-configuration">
          <name>Liveness Monitoring Configuration</name>
          <t>Each registered service MUST have a liveness monitoring configuration
that determines Spider check frequency. This configuration:</t>
          <ul spacing="normal">
            <li>
              <t>Is set per service, not per organisation account. An organisation
MAY configure different check frequencies for different services
registered under the same account.</t>
            </li>
            <li>
              <t>MUST be agreed in the commercial contract between the Service Owner
and the index operator.</t>
            </li>
            <li>
              <t>Determines the maximum age of <tt>last_ping_at</tt> data available to
consuming agents for that service.</t>
            </li>
          </ul>
          <t>Implementations MUST support at minimum the following frequency
classes, identified by their normative <tt>spider_interval</tt> value in
the Service Record:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Frequency class</th>
                <th align="left">Maximum spider_interval</th>
                <th align="left">Normative label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Initial only</td>
                <td align="left">N/A (one run at activation)</td>
                <td align="left">
                  <tt>"initial"</tt></td>
              </tr>
              <tr>
                <td align="left">Daily</td>
                <td align="left">86,400 seconds</td>
                <td align="left">
                  <tt>"daily"</tt></td>
              </tr>
              <tr>
                <td align="left">Hourly</td>
                <td align="left">3,600 seconds</td>
                <td align="left">
                  <tt>"hourly"</tt></td>
              </tr>
              <tr>
                <td align="left">High-frequency</td>
                <td align="left">300 seconds</td>
                <td align="left">
                  <tt>"high"</tt></td>
              </tr>
            </tbody>
          </table>
          <t>Implementations MAY define additional frequency classes. The
<tt>spider_interval</tt> field in the Service Record MUST reflect the
actual configured interval in seconds.</t>
          <t><strong>Effect on trust signal quality:</strong> A consuming agent applying a
<tt>last_ping_age &lt; N</tt> filter will structurally exclude services whose
check frequency cannot produce sufficiently fresh liveness data.
Liveness monitoring configuration is therefore a market signal:
services requiring discovery by latency-sensitive agents must invest
in check frequency sufficient to satisfy those agents' trust policies.</t>
          <t>Services configured at initial-only frequency MUST be excluded from
standard discovery query results by default. Consuming agents MUST
explicitly opt in to include initial-only services in result sets.</t>
        </section>
        <section anchor="consumer-access-model">
          <name>Consumer Access Model</name>
          <t>Discovery queries to the Index API MUST be available without
authentication or payment. Rate limits MAY be applied to protect
infrastructure integrity but MUST NOT be set at levels that prevent
reasonable agent operation. Implementations MUST support at minimum
three consumer access layers:</t>
          <t><strong>Layer 1 — Unauthenticated access</strong></t>
          <t>Any agent MUST be able to query the Index API without authentication
or registration, subject to a per-IP rate limit. This layer is
sufficient for individual agents and proof-of-concept deployments.</t>
          <t><strong>Layer 2 — Authenticated access (free)</strong></t>
          <t>Any agent MAY register a consumer identity token at no cost. Token
registration requires a valid email address. Authenticated access
MUST provide a higher rate limit than unauthenticated access and
MAY additionally provide result caching hints and webhook
subscriptions for service record changes.</t>
          <t>Consumer tokens SHOULD be compatible with the webbotauth identity
model (draft-meunier-webbotauth-registry) to enable interoperability
with bot authentication infrastructure.</t>
          <t><strong>Layer 3 — High-volume access (paid, optional)</strong></t>
          <t>Implementations MAY offer a paid high-volume access tier for
platforms operating agents at scale that require guaranteed query
capacity and operational SLAs. This tier is supplementary; the
index's operational sustainability MUST NOT depend on it.</t>
          <t><strong>Public bulk download (REQUIRED)</strong></t>
          <t>Implementations MUST provide the full index as a freely downloadable
bulk dataset at intervals not exceeding 24 hours, without
authentication, under an open data licence. This requirement
implements the openness requirement of Section 4.2: no entity,
including the index operator, may hold an exclusive lock on the
index data.</t>
        </section>
      </section>
      <section anchor="index-api-specification">
        <name>Index API Specification</name>
        <section anchor="hateoas-navigation-model">
          <name>HATEOAS Navigation Model</name>
          <t>The Index API MUST follow Hypermedia as the Engine of Application State
(HATEOAS) principles. A consuming agent MUST be able to discover and
navigate the entire index starting from a single, stable entry-point URL,
without out-of-band knowledge of endpoint paths.</t>
          <t>Every response MUST include a <tt>_links</tt> object containing hypermedia
controls for navigation. Link relations MUST use IANA-registered relation
types where applicable, and BSI-specific relations where not.</t>
        </section>
        <section anchor="discovery-endpoint">
          <name>Discovery Endpoint</name>
          <t>The BSI exposes a single globally stable entry-point URL:</t>
          <t><tt>
https://api-index.org/
</tt></t>
          <t>A GET request to this URL returns the Index root resource, which includes:</t>
          <t><tt>json
{
  "bsi_version": "1.0",
  "total_services": 12483,
  "last_updated": "2026-04-24T00:00:00Z",
  "_links": {
    "self": {
      "href": "https://api-index.org/"
    },
    "search": {
      "href": "https://api-index.org/search{?q,capability,protocol,org_level_min,service_level_min,spec_consistency,max_ping_age,uptime_30d_min,lifecycle_stage,include_superseded,page,page_size}",
      "templated": true
    },
    "browse": {
      "href": "https://api-index.org/browse"
    },
    "capabilities": {
      "href": "https://api-index.org/capabilities"
    },
    "docs": {
      "href": "https://api-index.org/docs"
    }
  }
}
</tt></t>
        </section>
        <section anchor="search-and-filter-api">
          <name>Search and Filter API</name>
          <t>The search endpoint applies server-side filters to reduce result sets before
transmission. Only filters on indexed scalar values are server-side;
filters requiring deep metadata evaluation are applied client-side after
fetching the Level 2 Service Record (Section 9.5).</t>
          <t><strong>Example — buying bot querying for marketplace services:</strong></t>
          <t><tt>
GET /search?capability=commerce.marketplace
            &amp;protocol=mcp,openapi
            &amp;org_level_min=O-2
            &amp;service_level_min=S-2
            &amp;max_ping_age=3600
            &amp;uptime_30d_min=95.0
            &amp;lifecycle_stage=stable
            &amp;page=1
            &amp;page_size=20
</tt></t>
          <t><strong>Normative server-side filter parameters:</strong></t>
          <table>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Type</th>
                <th align="left">Default</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>q</tt></td>
                <td align="left">string</td>
                <td align="left">—</td>
                <td align="left">Free-text search across <tt>name</tt> and <tt>description</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>capability</tt></td>
                <td align="left">string</td>
                <td align="left">—</td>
                <td align="left">Capability taxonomy term (exact or prefix match). MUST be an <tt>active</tt> or <tt>deprecated</tt> registry value</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>protocol</tt></td>
                <td align="left">string</td>
                <td align="left">—</td>
                <td align="left">Comma-separated protocol type values. MUST be values from the Protocol Type Registry</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_level_min</tt></td>
                <td align="left">enum</td>
                <td align="left">
                  <tt>O-0</tt></td>
                <td align="left">Minimum Organisation trust level. Excludes services below threshold</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>service_level_min</tt></td>
                <td align="left">enum</td>
                <td align="left">
                  <tt>S-0</tt></td>
                <td align="left">Minimum Service verification level</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>max_ping_age</tt></td>
                <td align="left">integer</td>
                <td align="left">—</td>
                <td align="left">Maximum seconds since <tt>last_ping_at</tt>. Excludes services with older liveness data</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>uptime_30d_min</tt></td>
                <td align="left">float</td>
                <td align="left">—</td>
                <td align="left">Minimum 30-day uptime percentage</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>lifecycle_stage</tt></td>
                <td align="left">enum</td>
                <td align="left">
                  <tt>stable</tt></td>
                <td align="left">Filter by lifecycle stage. Default excludes <tt>experimental</tt>, <tt>beta</tt>, <tt>deprecated</tt>, and <tt>sunset</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>include_superseded</tt></td>
                <td align="left">boolean</td>
                <td align="left">
                  <tt>false</tt></td>
                <td align="left">When <tt>false</tt>, excludes services for which <tt>superseded_by</tt> is set. When <tt>true</tt>, all matching versions are returned</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>spec_consistency</tt></td>
                <td align="left">enum</td>
                <td align="left">—</td>
                <td align="left">Filter by spec consistency status. Values: <tt>consistent</tt>, <tt>mismatch</tt>, <tt>unreachable</tt>. <tt>null</tt> (Spider not yet run) is excluded when any value is specified. When absent, no constraint is applied. Agents performing consequential tasks SHOULD explicitly pass <tt>consistent</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>page</tt></td>
                <td align="left">integer</td>
                <td align="left">
                  <tt>1</tt></td>
                <td align="left">Result page number</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>page_size</tt></td>
                <td align="left">integer</td>
                <td align="left">
                  <tt>20</tt></td>
                <td align="left">Results per page. Maximum: 100</td>
              </tr>
            </tbody>
          </table>
          <t>All filter parameters are OPTIONAL. When absent, the parameter imposes no
constraint except <tt>lifecycle_stage</tt> (default <tt>stable</tt>) and
<tt>include_superseded</tt> (default <tt>false</tt>).</t>
          <t>Results are returned as paginated Level 1 Search Result records (Section 9.4)
with HATEOAS links to Level 2 Service Records. Pagination is REQUIRED.</t>
        </section>
        <section anchor="search-result-schema-level-1">
          <name>Search Result Schema (Level 1)</name>
          <t>Search results return lightweight summary records. These contain only the
fields needed to evaluate candidates and decide which detail pages to fetch.
Complex metadata (auth requirements, version history, notifications, legal,
<tt>standard_warnings</tt>) is available only at Level 2 and is evaluated
client-side after fetching the detail resource.</t>
          <t><tt>json
{
  "service_id": "svc-payment-stripe-v2",
  "name": "Stripe Payment API",
  "description": "Card and subscription payment processing",
  "api_version": "2.4.1",
  "lifecycle_stage": "stable",
  "capabilities": ["payments.card", "payments.subscription"],
  "protocol": "openapi",
  "trust": {
    "organisation_level": "O-3",
    "service_level": "S-2",
    "spec_consistency": "consistent",
    "spec_fetch_consecutive_failures": 0,
    "next_spider_run_at": "2026-04-20T14:55:00Z",
    "liveness": {
      "last_ping_at": "2026-04-20T13:55:00Z",
      "ping_interval_seconds": 3600,
      "uptime_30d_percent": 99.87,
      "consecutive_failures": 0
    }
  },
  "_links": {
    "self":          { "href": "https://api-index.org/services/svc-payment-stripe-v2" },
    "latest_stable": { "href": "https://api-index.org/services/svc-payment-stripe-v2" }
  }
}
</tt></t>
          <t>The <tt>latest_stable</tt> link points to the leaf version of the service's version
chain. When <tt>latest_stable</tt> differs from <tt>self</tt>, a newer stable version
exists and the agent SHOULD follow the link before proceeding.</t>
        </section>
        <section anchor="service-record-schema-level-2">
          <name>Service Record Schema (Level 2)</name>
          <t>The full Service Record is returned when a consuming agent fetches the
detail resource via the <tt>self</tt> link. It is the BSM plus Spider-enriched
trust metadata, versioning links, and any <tt>standard_warnings</tt>.</t>
          <t><tt>json
{
  "service_id": "svc-payment-stripe-v2",
  "bsm_version": "1.0",
  "name": "Stripe Payment API",
  "description": "Card and subscription payment processing",
  "api_version": "2.4.1",
  "lifecycle_stage": "stable",
  "supersedes": "svc-payment-stripe-v1",
  "superseded_by": null,
  "owner": { "...": "..." },
  "spec": {
    "type": "openapi",
    "url": "https://stripe.com/openapi.json",
    "version": "2.4.1"
  },
  "capabilities": ["payments.card", "payments.subscription"],
  "entry_point": "https://api.stripe.com/v2",
  "trust": {
    "organisation_level": "O-3",
    "organisation_verified_at": "2026-03-01T00:00:00Z",
    "organisation_verifier_id": "verifier-ch-001",
    "service_level": "S-2",
    "service_level_updated_at": "2026-04-19T08:00:00Z",
    "spec_consistency": "consistent",
    "spec_consistency_checked_at": "2026-04-20T13:55:00Z",
    "spec_fetch_consecutive_failures": 0,
    "next_spider_run_at": "2026-04-20T14:55:00Z",
    "liveness": {
      "last_ping_at": "2026-04-20T13:55:00Z",
      "ping_interval_seconds": 3600,
      "uptime_30d_percent": 99.87,
      "avg_response_ms": 142.3,
      "consecutive_failures": 0
    }
  },
  "notifications": { "...": "..." },
  "legal": { "...": "..." },
  "standard_warnings": [],
  "registered_at": "2026-01-15T00:00:00Z",
  "last_updated_at": "2026-04-20T13:00:00Z",
  "_links": {
    "self": { "href": "https://api-index.org/services/svc-payment-stripe-v2" },
    "owner": { "href": "https://api-index.org/organisations/org-stripe" },
    "spec": { "href": "https://stripe.com/openapi.json" },
    "previous_version": { "href": "https://api-index.org/services/svc-payment-stripe-v1" },
    "latest_stable": { "href": "https://api-index.org/services/svc-payment-stripe-v2" }
  }
}
</tt></t>
        </section>
        <section anchor="trust-metadata-schema">
          <name>Trust Metadata Schema</name>
          <t>Trust metadata is always included in full Service Records (Level 2) and
MUST NOT be omitted or summarised. Consuming agents rely on the full set
of trust fields to evaluate their Trust Policy. Partial trust metadata
MUST be represented with explicit <tt>null</tt> values, not omitted fields.</t>
          <t>Trust metadata is included in summary form (Level 1) for server-side
filter compatibility. The Level 1 trust object omits verification
timestamps and verifier IDs; these are available only at Level 2.</t>
        </section>
        <section anchor="transport-encoding">
          <name>Transport Encoding</name>
          <t>The Index API is consumed by autonomous agents at machine speed. Response
payloads are structured JSON with highly repetitive field names across
result arrays. Transport-layer compression achieves 70–85% size reduction
on typical search result payloads with no information loss and no
application-layer schema changes.</t>
          <t><strong>Compression support requirements:</strong></t>
          <t>The Index API MUST support the following <tt>Accept-Encoding</tt> values:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Encoding</th>
                <th align="left">Requirement</th>
                <th align="left">Notes</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>gzip</tt></td>
                <td align="left">MUST</td>
                <td align="left">Universally supported baseline</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>br</tt> (Brotli)</td>
                <td align="left">SHOULD</td>
                <td align="left">Higher ratio than gzip; suitable for large result sets</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>zstd</tt></td>
                <td align="left">SHOULD</td>
                <td align="left">Comparable ratio to Brotli; significantly faster decompression</td>
              </tr>
            </tbody>
          </table>
          <t>The Index API MUST perform content negotiation via the <tt>Accept-Encoding</tt>
request header. Responses MUST include a <tt>Content-Encoding</tt> header
identifying the applied encoding. If a client sends no <tt>Accept-Encoding</tt>
header, the server MAY respond uncompressed.</t>
          <t>Consuming agents SHOULD include <tt>Accept-Encoding: zstd, br, gzip</tt> in
all Index API requests.</t>
          <t><strong>Binary encoding (optional):</strong></t>
          <t>The Index API MAY additionally support CBOR (RFC 8949) as a binary
alternative to JSON. A client that prefers CBOR MUST signal this via
<tt>Accept: application/cbor</tt>. The server MAY respond with
<tt>Content-Type: application/cbor</tt>. CBOR responses carry identical
information to JSON responses; the encoding difference is transparent
to the data model.</t>
          <t>Clients MUST NOT assume CBOR support. JSON over compressed transport
is the normative interchange format.</t>
        </section>
      </section>
      <section anchor="spider-and-crawler-specification">
        <name>Spider and Crawler Specification</name>
        <section anchor="crawl-triggers">
          <name>Crawl Triggers</name>
          <t>The Spider is triggered by the following events:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Trigger</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Registration activation</td>
                <td align="left">Immediate first run when a service is activated</td>
              </tr>
              <tr>
                <td align="left">Scheduled interval</td>
                <td align="left">Recurring, per service liveness monitoring configuration (Section 8.2)</td>
              </tr>
              <tr>
                <td align="left">Manual re-trigger</td>
                <td align="left">Service Owner may request a manual re-trigger once per 24 hours</td>
              </tr>
              <tr>
                <td align="left">Spec URL change</td>
                <td align="left">A BSM update that changes the <tt>spec.url</tt> triggers an immediate run</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="automated-verification-scope">
          <name>Automated Verification Scope</name>
          <t>The Spider performs the following checks in sequence. Each check's result
is stored independently; a failure at one level does not prevent checks
at other levels from being recorded.</t>
          <t>The Spider MUST use HTTPS for all outbound requests. The Spider MUST NOT
send authentication credentials to any registered service. Spider requests
to <tt>entry_point/health</tt> or <tt>spec.url</tt> MUST NOT include Authorization headers,
API keys, cookies, or client certificates.</t>
          <t>If a request returns an HTTP redirect (3xx), the Spider MUST follow the
redirect only if the redirect target also uses HTTPS. The Spider MUST NOT
follow redirects from HTTPS to HTTP.</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Liveness check</strong>: HTTPS GET to <tt>{entry_point}/health</tt>. Record HTTP
status code, response time, and timestamp. A 2xx response without
authentication constitutes a successful liveness check (S-1). If the
response body is valid JSON containing an <tt>api_version</tt> field, the Spider
MUST cross-check this value against the <tt>api_version</tt> declared in the BSM.
A mismatch is recorded as a metadata warning, not a liveness failure.</t>
            </li>
            <li>
              <t><strong>Spec fetch</strong>: HTTPS GET to <tt>spec.url</tt>. The Spider MUST NOT send
authentication credentials. A successful fetch (2xx response, non-empty
body) is the prerequisite for steps 3 and 4. Record content type and
document size.</t>
            </li>
            <li>
              <t><strong>Spec parse and consistency check</strong>: Parse the fetched document
according to the declared <tt>spec.type</tt>. Compare it structurally against
the registered spec snapshot stored at initial registration time.
The Spider MUST set <tt>spec_consistency</tt> to one of three values after
every run:
              </t>
              <ul spacing="normal">
                <li>
                  <t><tt>consistent</tt> — document is fetchable, parseable, and structurally
matches the registered snapshot. Constitutes S-2 verification.</t>
                </li>
                <li>
                  <t><tt>mismatch</tt> — document is fetchable and parseable, but structurally
differs from the snapshot (paths removed, required fields changed,
response schemas changed). S-2 is revoked; <tt>standard_warnings</tt> is
updated. This indicates operator-caused contract breakage.</t>
                </li>
                <li>
                  <t><tt>unreachable</tt> — <tt>spec.url</tt> returned a non-2xx response, was not
reachable, or the document could not be parsed. S-2 is not achieved
or is suspended. This indicates an availability problem, not a
contract violation.
<tt>spec_consistency</tt> MUST be <tt>null</tt> only before the Spider's first run
on a newly registered service. Once any run completes, the field MUST
carry one of the three values above.
The Spider MUST NOT call any API endpoint declared in the spec. Spec
verification is document comparison only.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><strong>Breaking change detection</strong>: Compare the current parsed spec against
the registered spec snapshot. Flag removed paths, changed required
fields, or changed response schemas as breaking changes. Three or more
consecutive runs with no breaking changes detected are required for
S-3 verification.</t>
            </li>
            <li>
              <t><strong>Liveness metrics update</strong>: Update <tt>last_ping_at</tt>, <tt>uptime_30d_percent</tt>,
<tt>avg_response_ms</tt>, <tt>consecutive_failures</tt>, and <tt>next_spider_run_at</tt>.</t>
            </li>
          </ol>
        </section>
        <section anchor="failure-handling">
          <name>Failure Handling</name>
          <t><strong>Liveness failures (<tt>entry_point/health</tt> unreachable):</strong></t>
          <ul spacing="normal">
            <li>
              <t>A single failed ping increments <tt>consecutive_failures</tt> and updates
<tt>last_ping_at</tt> with the failure timestamp.</t>
            </li>
            <li>
              <t>After 3 consecutive failures, the Service Record is flagged as
<tt>status: degraded</tt> in the index.</t>
            </li>
            <li>
              <t>After 10 consecutive failures, the Service Record is flagged as
<tt>status: unreachable</tt> and is excluded from standard search results.</t>
            </li>
            <li>
              <t><tt>contacts.operations</tt> is notified at the 3-failure threshold (incident
warning). Both <tt>contacts.operations</tt> and <tt>contacts.escalation</tt> are
notified at the 10-failure threshold (service unreachable escalation).</t>
            </li>
            <li>
              <t>A service that recovers (next ping succeeds) has its status restored
and <tt>consecutive_failures</tt> reset to 0 automatically.</t>
            </li>
          </ul>
          <t><strong>Spec fetch failures (<tt>spec_consistency: unreachable</tt>):</strong></t>
          <t>Spec fetch failures have distinct probable causes depending on how long
the failure persists. The Spider MUST apply a three-cluster retry model
that targets the likely cause window at each stage. Cluster escalation
is triggered by <tt>spec_fetch_consecutive_failures</tt> crossing a threshold.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Cluster</th>
                <th align="left">Assumed cause</th>
                <th align="left">Failure count</th>
                <th align="left">Retry interval</th>
                <th align="left">Notification</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">1 — Infrastructure / network</td>
                <td align="left">Transient: brief network loss, host restart, CDN hiccup</td>
                <td align="left">1–3</td>
                <td align="left">5 min → 15 min → 30 min</td>
                <td align="left">None — transient, operator not yet disturbed</td>
              </tr>
              <tr>
                <td align="left">2 — Application</td>
                <td align="left">Software instability: crash loop, OOM, application startup failure</td>
                <td align="left">4–6</td>
                <td align="left">2 h → 4 h → 8 h</td>
                <td align="left">Email to <tt>contacts.operations</tt> on Cluster 2 entry (failure 4): incident warning</td>
              </tr>
              <tr>
                <td align="left">3 — Configuration</td>
                <td align="left">Persistent misconfiguration: wrong <tt>spec.url</tt>, auth gate added, URL moved</td>
                <td align="left">7+</td>
                <td align="left">24 h → 72 h (cap)</td>
                <td align="left">Email to <tt>contacts.operations</tt> AND <tt>contacts.escalation</tt> on Cluster 3 entry (failure 7): explicit action request — verify and update <tt>spec.url</tt></td>
              </tr>
            </tbody>
          </table>
          <ul spacing="normal">
            <li>
              <t><tt>spec_consistency</tt> is set to <tt>unreachable</tt> on the first failure and
remains <tt>unreachable</tt> until a successful fetch.</t>
            </li>
            <li>
              <t><tt>next_spider_run_at</tt> is set to the next retry timestamp after each
failed run so Service Owners can observe when the retry will occur.</t>
            </li>
            <li>
              <t>A successful spec fetch resets <tt>spec_fetch_consecutive_failures</tt> to 0
and sets <tt>spec_consistency</tt> to <tt>consistent</tt> or <tt>mismatch</tt> as
appropriate.</t>
            </li>
            <li>
              <t><tt>spec_fetch_consecutive_failures</tt> MUST be visible in the Service Record
so Service Owners can monitor retry cluster state without contacting
the Index operator.</t>
            </li>
          </ul>
          <t><strong>Manual re-trigger:</strong></t>
          <t>The Index operator SHOULD provide a mechanism for Service Owners to
request an immediate Spider re-run outside of the scheduled interval.
This is the primary recovery mechanism when a service has been repaired
and the operator does not want to wait for the next scheduled retry.</t>
          <t>When a manual re-trigger is requested:
- <tt>next_spider_run_at</tt> MUST be set to the current timestamp.
- <tt>spec_fetch_consecutive_failures</tt> MUST be reset to 0, returning the
  service to Cluster 1 retry behaviour for the next run.
- The Spider MUST execute the run as soon as scheduling permits.</t>
          <t>The Index MAY rate-limit manual re-triggers to at most once per hour
per service to prevent abuse.</t>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <section anchor="abuse-and-fake-listings">
          <name>Abuse and Fake Listings</name>
          <t>The mandatory B2B onboarding with contract requirement provides a first
barrier against malicious actors listing fake or harmful services. Service
Owners must provide verifiable identity information. However, O-0 and O-1
registration provides minimal verification.</t>
          <t>Consuming agents SHOULD apply Trust Policies that exclude O-0 services for
any task involving sensitive data or consequential actions.</t>
          <t>The Bot Standards Foundation MUST maintain an abuse reporting mechanism and MUST be
able to suspend or remove a Service Record within 24 hours of confirmed
abuse. Suspended service records MUST remain in the index with a
<tt>status: suspended</tt> flag and MUST NOT be silently deleted, to provide
transparency to agents that had cached the record.</t>
        </section>
        <section anchor="trust-level-spoofing">
          <name>Trust Level Spoofing</name>
          <t>Organisation and Service trust levels in the Service Record are set only
by the BSI itself, not by the Service Owner. BSM submissions that include
<tt>trust</tt> field values MUST have those values overwritten by the BSI upon
processing. The Index API MUST NOT expose self-asserted trust values.</t>
        </section>
        <section anchor="transport-security-requirements">
          <name>Transport Security Requirements</name>
          <t>All URLs submitted as <tt>entry_point</tt> or <tt>spec.url</tt> values in a BSM MUST use
the <tt>https</tt> scheme. The Index MUST reject BSM submissions that provide HTTP
(non-TLS) values for these fields.</t>
          <t>The <tt>{entry_point}/health</tt> endpoint MUST NOT require authentication of any
kind. Requiring authentication at <tt>/health</tt> defeats liveness verification and
MUST be treated as a registration defect. The Index MUST record a metadata
warning if the <tt>/health</tt> endpoint returns a 401 or 407 status.</t>
          <t>The <tt>spec.url</tt> endpoint MUST be publicly accessible without authentication.
A <tt>spec.url</tt> that requires authentication cannot be verified by the Spider and
MUST be treated as an S-2 failure until authentication is removed.</t>
          <t>The Spider MUST enforce HTTPS for all outbound requests and MUST NOT follow
redirects from HTTPS to HTTP.</t>
        </section>
        <section anchor="spider-targeted-attacks">
          <name>Spider-Targeted Attacks</name>
          <t>A service that knows when the Spider will visit could serve compliant
responses only to Spider requests, presenting a different interface to
consuming agents. Mitigations:</t>
          <ul spacing="normal">
            <li>
              <t>Spider visit timing MUST be randomised within the liveness monitoring
interval window.</t>
            </li>
            <li>
              <t>Spider <tt>User-Agent</tt> headers MUST be versioned but MUST NOT include
the specific visit schedule.</t>
            </li>
            <li>
              <t>The BSI operator SHOULD perform periodic unannounced spot-checks
from non-Spider infrastructure.</t>
            </li>
          </ul>
        </section>
        <section anchor="bot-consumer-risks">
          <name>Bot Consumer Risks</name>
          <t>The BSI provides discovery and trust metadata. It does not guarantee the
safety, correctness, or availability of listed services. Consuming agents
MUST NOT assume that a service listed in the BSI is safe to use without
applying their own Trust Policy.</t>
          <t>Consuming agents SHOULD treat Index API responses as untrusted input and
validate the structure of Service Records before acting on them.</t>
          <t>The Index API MUST be served exclusively over TLS. Certificate validity
MUST be verified by consuming agents. Agents MUST NOT bypass TLS
certificate verification when querying the Index API.</t>
        </section>
      </section>
      <section anchor="open-questions">
        <name>Open Questions</name>
        <t>The following questions are unresolved and explicitly invited for community
input:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Capability Taxonomy governance</strong>: Who contributes new taxonomy terms?
What is the process for deprecating terms? Should the taxonomy be versioned
independently of the BSM specification?</t>
          </li>
          <li>
            <t><strong>BSM spec type extensions</strong>: What is the formal process for registering
new <tt>spec.type</tt> values? Should this be an IANA registry?</t>
          </li>
          <li>
            <t><strong>Trust Policy standardisation</strong>: Should the BSI define a standard Trust
Policy expression language, or leave this entirely to consuming agents?
A standard language would enable Index API server-side filtering but risks
constraining agent-side policy flexibility.</t>
          </li>
          <li>
            <t><strong>Verifier accreditation criteria</strong>: What are the full requirements for
an organisation to become an Accredited Verifier? What ongoing obligations
apply? What is the revocation process?</t>
          </li>
          <li>
            <t><strong>Regional Representative model</strong>: How are jurisdictional boundaries
defined for Regional Representatives? What happens in jurisdictions with
no appointed Representative?</t>
          </li>
          <li>
            <t><strong>Free tier abuse</strong>: Is the current Free tier visibility restriction
sufficient to prevent abuse? Should Free tier require payment information
on file even if no charge is made?</t>
          </li>
          <li>
            <t><strong>Bot identity</strong>: This document explicitly excludes bot identity from
scope. Should a future version of the BSI include optional bot consumer
registration to enable personalised discovery, rate limit management, or
abuse tracking?</t>
          </li>
          <li>
            <t><strong>Centralised index vs. decentralised discovery</strong>: The BSI architecture
takes a deliberate position: a single authoritative global index, governed
by a neutral non-profit, with a commercial sustainability model. An
alternative approach — represented by proposals such as
draft-vandemeent-ains-discovery (AINS — AInternet Name Service), which
uses signed, append-only replication logs with no central authority — takes
the opposite position: cryptographic verifiability and censorship resistance
over governed accountability.  </t>
            <t>
The two approaches represent a genuine design tension. Arguments for the
BSI model:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Business adoption</strong>: Enterprise service providers, regulated industries,
and government bodies require a contractual counterparty, an accountable
governance structure, and an enforceable compliance audit trail. A
leaderless federated registry cannot provide these. The stakeholders with
the largest service catalogues and the greatest need for agent-consumable
APIs operate in environments where "no central authority" is not a feature
— it is a disqualification.</t>
              </li>
              <li>
                <t><strong>Institutional co-sponsorship as an adoption flywheel</strong>: The BSI's
regional co-sponsorship model is designed to recruit institutional
champions — such as regional telecommunications bodies and internet
governance organisations — who have reputational and financial incentives
to promote BSI registration in their region. A decentralised system
cannot offer institutional co-sponsorship because there is no accountable
entity to co-sponsor. The announcement credibility that comes from an
institution saying "we endorse this infrastructure" is only available to
a governed model.</t>
              </li>
              <li>
                <t><strong>Regional financial backflow as a registration incentive</strong>: Ten percent
of registration fees collected from a region are reinvested into that
region's bot ecosystem via the Regional Development Pool. This creates a
direct financial incentive for regional institutions to actively promote
service registration — more local registrations means more capital
returning to local infrastructure. A decentralised model with no
registration fees cannot replicate this structural alignment. The result
is that BSI's commercial model is not merely a sustainability mechanism;
it is an adoption flywheel whose velocity compounds with regional
institutional support.</t>
              </li>
              <li>
                <t><strong>Single entry point</strong>: A consuming agent needs zero prior knowledge of
any registry to begin discovery. Federated models require the agent to
either know a registry endpoint or solve the bootstrapping problem of
finding one. The simpler the agent-side integration, the faster adoption.</t>
              </li>
            </ul>
            <t>
Arguments for the decentralised model:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Censorship resistance</strong>: The BSI can delist a service. A signed
append-only log cannot. For agents and service owners in jurisdictions
with adversarial regulatory environments, a governed central index is a
liability.</t>
              </li>
              <li>
                <t><strong>No single point of failure or control</strong>: The BSF, however well governed,
is an organisational risk. A decentralised model survives the failure or
capture of any single operator.</t>
              </li>
              <li>
                <t><strong>Cryptographic verifiability</strong>: Trust in a governed index ultimately
depends on trusting the governor. Signed logs allow any party to verify
the full history of a service record independently.</t>
              </li>
            </ul>
            <t>
Community input is explicitly invited on whether the BSI and AINS-style
approaches are mutually exclusive or whether a future BSI version could
expose a verifiable, signed export of index records that enables
third-party verification without requiring a federated registry.</t>
          </li>
        </ol>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="OPENAPI" target="https://spec.openapis.org/oas/v3.1.0">
          <front>
            <title>OpenAPI Specification 3.1.0</title>
            <author>
              <organization>OpenAPI Initiative</organization>
            </author>
            <date year="2021" month="February" day="15"/>
          </front>
        </reference>
        <reference anchor="MCP" target="https://modelcontextprotocol.io">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization>Anthropic</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ASYNCAPI" target="https://www.asyncapi.com/docs/reference/specification/v3.0.0">
          <front>
            <title>AsyncAPI Specification 3.0.0</title>
            <author>
              <organization>AsyncAPI Initiative</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="UDDI" target="https://www.oasis-open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm">
          <front>
            <title>UDDI Version 3.0.2</title>
            <author initials="L." surname="Clement">
              <organization/>
            </author>
            <author initials="A." surname="Hately">
              <organization/>
            </author>
            <author initials="C." surname="von Riegen">
              <organization/>
            </author>
            <author initials="T." surname="Rogers">
              <organization/>
            </author>
            <date year="2004" month="October" day="19"/>
          </front>
          <seriesInfo name="OASIS Committee Draft" value="uddi-v3.0.2-20041019"/>
        </reference>
        <reference anchor="ROBOTS" target="https://www.robotstxt.org/">
          <front>
            <title>The Web Robots Pages</title>
            <author initials="M." surname="Koster">
              <organization/>
            </author>
            <date year="1994"/>
          </front>
        </reference>
        <reference anchor="I-D.pioli-agent-discovery">
          <front>
            <title>Agent Registration and Discovery Protocol (ARDP)</title>
            <author fullname="Roberto Pioli" initials="R." surname="Pioli">
              <organization>Independent</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies the Agent Registration and Discovery Protocol
   (ARDP), a lightweight protocol for registering, discovering, and
   reaching autonomous software agents in distributed and federated
   environments.  ARDP provides stable agent identities, dynamic
   endpoint resolution, capability advertisement (including protocol
   selection among MCP, A2A, HTTP, and gRPC), minimal presence
   signaling, and a security-first discovery control plane.  ARDP is
   transport-agnostic and complementary to existing agent interaction
   protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pioli-agent-discovery-01"/>
        </reference>
        <reference anchor="I-D.narajala-courtney-ansv2">
          <front>
            <title>Agent Name Service v2 (ANS): A Domain-Anchored Trust Layer for Autonomous AI Agent Identity</title>
            <author fullname="Scott Courtney" initials="S." surname="Courtney">
              <organization>GoDaddy</organization>
            </author>
            <author fullname="Vineeth Sai Narajala" initials="V. S." surname="Narajala">
              <organization>OWASP</organization>
            </author>
            <author fullname="Ken Huang" initials="K." surname="Huang">
              <organization>DistributedApps.ai</organization>
            </author>
            <author fullname="Idan Habler" initials="I." surname="Habler">
              <organization>OWASP</organization>
            </author>
            <author fullname="Akram Sheriff" initials="A." surname="Sheriff">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2026"/>
            <abstract>
              <t>   Autonomous AI agents execute transactions across organizational
   boundaries.  No single agent platform provides the trust
   infrastructure they need.  This document defines the Agent Name
   Service (ANS) v2 protocol, which anchors every agent identity to a
   DNS domain name.  A Registration Authority (RA) verifies domain
   ownership via ACME, issues dual certificates (a Server Certificate
   from a public CA and an Identity Certificate from a private CA
   binding a version-specific ANSName), and seals every lifecycle event
   into an append-only Transparency Log aligned with IETF SCITT.  Three
   verification tiers -- Bronze (PKI), Silver (PKI + DANE), and Gold
   (PKI + DANE + Transparency Log) -- let clients choose assurance
   levels appropriate to transaction risk.  The architecture decouples
   identity from discovery: the RA publishes sealed events; independent
   Discovery Services build competitive indexes.  A three-layer trust
   framework separates foundational identity (Layer 1, this protocol),
   operational maturity (Layer 2, third-party attestors), and behavioral
   reputation (Layer 3, real-time scoring).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narajala-courtney-ansv2-01"/>
        </reference>
        <reference anchor="I-D.vandemeent-ains-discovery">
          <front>
            <title>AINS: AInternet Name Service - Agent Discovery and Trust Resolution Protocol</title>
            <author fullname="Jasper van de Meent" initials="J." surname="van de Meent">
              <organization>Humotica</organization>
            </author>
            <author fullname="Root AI" initials="R." surname="AI">
              <organization>Humotica</organization>
            </author>
            <date day="29" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies AINS (AInternet Name Service), a protocol for
   discovery, identification, and trust resolution of autonomous agents
   (AI agents, devices, humans, and services) in heterogeneous networks.
   AINS defines a transport-independent logical namespace for agents, a
   structured record format combining identity, capabilities, and
   cryptographic trust metadata, and a resolution protocol based on
   HTTPS.  Unlike the Domain Name System (DNS), which maps names to
   network addresses, AINS maps agent identifiers to rich metadata
   objects that include capabilities, trust scores, endpoint
   information, and references to companion provenance protocols.  AINS
   federates through signed append-only replication logs, enabling
   multi-registry deployments without central authority while preserving
   auditability.  This specification is designed to complement TIBET
   [TIBET], JIS [JIS], UPIP [UPIP], and RVP [RVP].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vandemeent-ains-discovery-01"/>
        </reference>
        <reference anchor="I-D.aiendpoint-ai-discovery" target="https://datatracker.ietf.org/doc/draft-aiendpoint-ai-discovery/">
          <front>
            <title>The AI Discovery Endpoint: A Structured Mechanism for AI Agent Service Discovery and Capability Exposure</title>
            <author initials="Y." surname="Choi" fullname="Yeongjae Choi">
              <organization>AIEndpoint</organization>
            </author>
            <date year="2026" month="March"/>
          </front>
        </reference>
        <reference anchor="I-D.meunier-webbotauth-registry">
          <front>
            <title>Registry and Signature Agent card for Web bot auth</title>
            <author fullname="Maxime Guerreiro" initials="M." surname="Guerreiro">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Ulas Kirazci" initials="U." surname="Kirazci">
              <organization>Amazon</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document describes a JSON based format for clients using
   [DIRECTORY] to advertise information about themselves.

   This document describes a JSON-based "Signature Agent Card" format
   for signature agent using [DIRECTORY] to advertise metadata about
   themselve.  This includes identity, purpose, rate expectations, and
   cryptographic keys.  It also establishes an IANA registry for
   Signature Agent Card parameters, enabling extensible and
   interoperable discovery of agent information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-meunier-webbotauth-registry-01"/>
        </reference>
        <reference anchor="I-D.cui-ai-agent-discovery-invocation">
          <front>
            <title>AI Agent Discovery and Invocation Protocol</title>
            <author fullname="Yong Cui" initials="Y." surname="Cui">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Yihan Chao" initials="Y." surname="Chao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Chenguang Du" initials="C." surname="Du">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This document proposes a standardized protocol for discovery and
   invocation of AI agents.  It defines a common metadata format for
   describing AI agents (including capabilities, I/O specifications,
   supported languages, tags, authentication methods, etc.), a
   capability-based discovery mechanism, and a unified RESTful
   invocation interface.

   This revision additionally specifies an optional extension that
   enables intent-based agent selection prior to discovery and
   invocation, without changing existing discovery or invocation
   semantics.

   The goal is to enable cross-platform interoperability among AI agents
   by providing a discover-and-match mechanism and a unified invocation
   entry point.  Security considerations, including authentication and
   trust measures, are also discussed.  This specification aims to
   facilitate the formation of multi-agent systems by making it easy to
   find the right agent for a task and invoke it in a consistent manner
   across different vendors and platforms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cui-ai-agent-discovery-invocation-01"/>
        </reference>
        <reference anchor="I-D.am-layered-ai-discovery-architecture">
          <front>
            <title>A Layered Approach to AI discovery</title>
            <author fullname="Hesham Moussa" initials="H." surname="Moussa">
              <organization>Huawei Canada</organization>
            </author>
            <author fullname="Arashmid Akhavain" initials="A." surname="Akhavain">
              <organization>Huawei Canada</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>   This document proposes a layered approach to standardization of AI
   discovery in AI ecosystems within the IETF.  It recommends separating
   the standardization of general discovery vehicles from the AI objects
   to be discovered.  AI objects include agents, models, data, tasks,
   among others.  While the topic of discovery in the realm of AI has
   focused on discovering agents, the concept can be extended by the
   layered architecture proposed here, allowing for a clarified design
   scope, reduced charter ambiguity, and alignment with IETF layering
   principles.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-am-layered-ai-discovery-architecture-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-discovery">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="23" month="March" year="2026"/>
            <abstract>
              <t>   The Agent Transfer Protocol (AGTP) enables agents to communicate once
   they know each other's canonical identifiers.  It does not define how
   agents find each other.  This document specifies the AGTP Agent
   Discovery and Name Service (ANS): a protocol for dynamic agent
   discovery using the AGTP DISCOVER method and a governed Agent Name
   Service that returns ranked sets of Agent Manifest Documents matching
   a discovery query.  ANS servers act as Scope-Enforcement Points for
   discovery queries and enforce behavioral trust score thresholds,
   trust tier requirements, and governance zone constraints.  This
   document also defines the DISCOVER method, the Discovery Query
   language, and the Agent Name Service registration and lookup
   protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="I-D.mozleywilliams-dnsop-dnsaid">
          <front>
            <title>DNS for AI Discovery</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a method for utilizing the Domain Name System
   (DNS) to facilitate scalable and interoperable discovery between AI
   agents.  The proposed mechanism, referred to as "DNS AI agent
   Discovery (DNS-AID)", defines a structured DNS namespace and record
   usage model to support metadata exchange and capability
   advertisement.

   This will allow organisations to publish information about their AI
   agents on the Internet or internal networks using a well-known label
   within the organisation's own DNS namespace.  This document does not
   define how the published agent information is accessed or the exact
   structure of that information.  Instead, it specifies a mechanism for
   indicating which access protocol should be used and what format the
   agent information will be provided in.

   This document proposes no change to the structure of DNS messages,
   and no new operation codes, response codes, resource record types, or
   any other new DNS protocol values.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozleywilliams-dnsop-dnsaid-01"/>
        </reference>
        <reference anchor="I-D.batum-aidre">
          <front>
            <title>AI Discovery and Retrieval Endpoint (AIDRE)</title>
            <author fullname="Fatih Batum" initials="F." surname="Batum">
         </author>
            <date day="5" month="April" year="2026"/>
            <abstract>
              <t>   This document specifies the AI Discovery and Retrieval Endpoint
   (AIDRE), a protocol for publishing machine-oriented, canonical, and
   semantically retrievable content on the web. AIDRE defines a
   discovery document, collection metadata, retrieval interfaces,
   optional vector-native query support, and content representation
   rules for AI systems.

   AIDRE aims to reduce redundant crawling, parsing, tokenization, and
   embedding of the same origin content while improving freshness,
   provenance, and interoperability for AI systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-batum-aidre-00"/>
        </reference>
        <reference anchor="I-D.mozley-aidiscovery">
          <front>
            <title>AI Agent Discovery (AID) Problem Statement</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="16" month="April" year="2026"/>
            <abstract>
              <t>   With the proliferation of AI agents comes a need for mechanisms to
   support agent-to-agent discovery.  This document discusses the scope,
   requirements and considerations to support discovery processes so
   that these are not reliant on manually defined configurations and
   relationships.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozley-aidiscovery-01"/>
        </reference>
        <reference anchor="W3C-AGENTPROTOCOL" target="https://www.w3.org/community/agentprotocol/">
          <front>
            <title>W3C AI Agent Protocol Community Group</title>
            <author initials="G." surname="Chang">
              <organization/>
            </author>
            <author initials="S." surname="Xu">
              <organization/>
            </author>
            <date year="2025" month="May" day="08"/>
          </front>
        </reference>
        <reference anchor="WEBBOTAUTH-WG" target="https://datatracker.ietf.org/wg/webbotauth/">
          <front>
            <title>webbotauth IETF Working Group</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 1805?>

<section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <section anchor="references">
        <name>References</name>
        <section anchor="normative-references">
          <name>Normative References</name>
          <ul spacing="normal">
            <li>
              <t><strong>RFC 2119</strong> — Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.</t>
            </li>
            <li>
              <t><strong>RFC 8615</strong> — Nottingham, M., "Well-Known Uniform Resource Identifiers
(URIs)", RFC 8615, May 2019.</t>
            </li>
            <li>
              <t><strong>RFC 8446</strong> — Rescorla, E., "The Transport Layer Security (TLS)
Protocol Version 1.3", RFC 8446, August 2018.</t>
            </li>
            <li>
              <t><strong>RFC 9110</strong> — Fielding, R., Nottingham, M., Reschke, J. (Eds.),
"HTTP Semantics", RFC 9110, June 2022.</t>
            </li>
          </ul>
        </section>
        <section anchor="informative-references">
          <name>Informative References</name>
          <ul spacing="normal">
            <li>
              <t><strong>OpenAPI Specification 3.1</strong> — OpenAPI Initiative,
https://spec.openapis.org/oas/v3.1.0</t>
            </li>
            <li>
              <t><strong>Model Context Protocol</strong> — Anthropic, https://modelcontextprotocol.io</t>
            </li>
            <li>
              <t><strong>AsyncAPI Specification 3.0</strong> — AsyncAPI Initiative,
https://www.asyncapi.com/docs/reference/specification/v3.0.0</t>
            </li>
            <li>
              <t><strong>RFC 8949</strong> — Bormann, C., Hoffman, P., "Concise Binary Object
Representation (CBOR)", RFC 8949, December 2020.</t>
            </li>
            <li>
              <t><strong>Robots Exclusion Protocol</strong> — Koster, M., 1994.
https://www.robotstxt.org/</t>
            </li>
            <li>
              <t><strong>draft-cui-ai-agent-discovery-invocation-01</strong> — Cui, Y. (Tsinghua
University), Chao, Y., Du, C. (Zhongguancun Laboratory), "AI Agent
Discovery and Invocation Protocol", IETF Individual Submission,
February 2026. Expires August 2026.
https://datatracker.ietf.org/doc/draft-cui-ai-agent-discovery-invocation/</t>
            </li>
            <li>
              <t><strong>draft-am-layered-ai-discovery-architecture-00</strong> — Moussa, H.,
Akhavain, A. (Huawei Canada), "A Layered Approach to AI discovery",
IETF Individual Submission, March 2026. Expires September 2026.
https://datatracker.ietf.org/doc/draft-am-layered-ai-discovery-architecture/</t>
            </li>
            <li>
              <t><strong>draft-hood-agtp-discovery-00</strong> — Hood, C. (Nomotic, Inc.), "AGTP
Agent Discovery and Name Service", IETF Individual Submission, March
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Expires September 2026.
https://datatracker.ietf.org/doc/draft-hood-agtp-discovery/</t>
                </li>
              </ol>
            </li>
            <li>
              <t><strong>draft-mozleywilliams-dnsop-dnsaid-01</strong> — Mozley, J., Williams, N.
(Infoblox), Sarikaya, B. (Unaffiliated), Schott, R. (Deutsche Telekom),
"DNS for AI Discovery", IETF Individual Submission, March 2026.
Expires September 2026.
https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-dnsaid/</t>
            </li>
            <li>
              <t><strong>draft-batum-aidre-00</strong> — Batum, F. (Istanbul), "AI Discovery and
Retrieval Endpoint (AIDRE)", IETF Individual Submission, April 2026.
Expires October 2026.
https://datatracker.ietf.org/doc/draft-batum-aidre/</t>
            </li>
            <li>
              <t><strong>draft-mozley-aidiscovery-01</strong> — Mozley, J., Williams, N. (Infoblox),
Sarikaya, B. (Unaffiliated), Schott, R. (Deutsche Telekom), "AI Agent
Discovery (AID) Problem Statement", IETF Individual Submission, April
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Expires October 2026.
https://datatracker.ietf.org/doc/draft-mozley-aidiscovery/</t>
                </li>
              </ol>
            </li>
            <li>
              <t><strong>draft-pioli-agent-discovery-01</strong> — Pioli, R. (Independent),
"Agent Registration and Discovery Protocol (ARDP)",
IETF Individual Submission, February 2026. Expires August 2026.
https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/</t>
            </li>
            <li>
              <t><strong>draft-narajala-courtney-ansv2-01</strong> — Courtney, S., Narajala, V.S.,
Huang, K., Habler, I., Sheriff, A., "Agent Name Service v2 (ANS):
A Domain-Anchored Trust Layer for Autonomous AI Agent Identity",
IETF Individual Submission, April 2026. Expires October 2026.
Supersedes draft-narajala-ans-00.
https://datatracker.ietf.org/doc/draft-narajala-courtney-ansv2/</t>
            </li>
            <li>
              <t><strong>draft-vandemeent-ains-discovery-01</strong> — van de Meent, J., Root AI
(Humotica), "AINS: AInternet Name Service - Agent Discovery and Trust
Resolution Protocol", IETF Individual Submission, March 2026.
Expires September 2026.
https://datatracker.ietf.org/doc/draft-vandemeent-ains-discovery/</t>
            </li>
            <li>
              <t><strong>draft-aiendpoint-ai-discovery-00</strong> — Choi, Y. (AIEndpoint),
"The AI Discovery Endpoint: A Structured Mechanism for AI Agent Service
Discovery and Capability Exposure", IETF Individual Submission,
March 2026. Expires September 2026.
https://datatracker.ietf.org/doc/draft-aiendpoint-ai-discovery/</t>
            </li>
            <li>
              <t><strong>draft-meunier-webbotauth-registry-01</strong> — Guerreiro, M. (Cloudflare),
Kirazci, U. (Amazon), Meunier, T. (Cloudflare), "Registry and Signature
Agent card for Web bot auth", IETF Individual Submission, October 2025.
Expired April 2026; renewal expected.
https://datatracker.ietf.org/doc/draft-meunier-webbotauth-registry/</t>
            </li>
            <li>
              <t><strong>webbotauth IETF Working Group</strong> — Chairs: Schinazi, D.,
Shekh-Yusef, R. AD: Bishop, M. Active WG.
https://datatracker.ietf.org/wg/webbotauth/</t>
            </li>
            <li>
              <t><strong>W3C AI Agent Protocol Community Group</strong> — Chairs: Chang, G., Xu, S.
Established May 8, 2025. 216 participants as of April 2026.
https://www.w3.org/community/agentprotocol/</t>
            </li>
            <li>
              <t><strong>UDDI Version 3.0.2</strong> — Clement, L., Hately, A., von Riegen, C.,
Rogers, T. OASIS Committee Draft, October 19, 2004.
(Historical reference; see Section 1.3 for analysis of failure modes.)
https://www.oasis-open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="authors-address">
        <name>Author's Address</name>
        <t><tt>
Carsten Rehfeld
Email: carsten@botstandards.org
</tt></t>
        <t><em>This Internet-Draft expires 2026-10-23.</em></t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+S963Ic15Uu+D+fYgcdMwLoqiIAUrIEttsDgZSEY96aIK12
d/gQWVVZQJpVmeXMLICQ6Y6O+XEe4Jz+OU/nJ5n1rcu+ZGWBVLd7pidGYUsk
kLlz77XX/Toej7Ou7JbFsbv3bd2586K5LmeFO6vmxQe39+352f6xO3HfL+tp
vnRPynZWXxfNLf1+0eRt12xm3aYp3KJu3Mmmq6t6VW9ad3JZVH6t9l6WT6dN
cT30iXvZLO+Ky7q5PXZltaizeT2r8hVtZ97ki27cFFeLYjkfT+tu3MqL4xIv
jg8eZu1muirbtqyr7nZdYIF5sS7oX1WXzWnZY3d0cPTV+ODR+OhRRp9/mGX5
pruqm+PMuTE93h6704l7Ld+gnzkn3z7Nm7YrquQ3xSovl8duJr/6P2hDbZdX
87yZt5O6ucyyqm5WeVdeF1j99XenR4eH3+gfv3706Cv741eHX+ofvzk8PDjO
Mhw7ffPrbx7xmy9fPX1x8ursmL+vt/SSDkg/c+frYlYuSoIeHd89nBxODvix
cED8QxsLr5xVZVfyd/i3HkKH44Oj8eGX8pW8uSy6Y3fVdev2+MGDlj4zqWmB
fF3yOR/Uefvg2r73/PRVsrvn9bxYulO6kOJD5141dVfP6uWujZ1U3VVTr8vZ
4KdXWGsmS611pUlZ07Mn579/cdoHzEl7W82GIHOwGzL+nR5o+lu5ubmZ5HiW
oDCZ1asHhKXtg6ZYFE1RzQqGkv8koCPffPvkSbrHe/iJ+13RtLa1o3sDe1PU
fDZxp8tiBWxOfn4ycT/Q3S1v0x8TJl/Tqq/Lgqgv/dUbQvL6kj6bXDzRxeHB
+PAb/iERV1m0wEXbxb2XJ+dn53SZq1XZdUXhnoAi79EpNvN5OeZTHo2xzOHB
4Tf3dgKOEKZsx8Ahxp+Zrdc+4HUAO8CTgUiwezC0+uSqW4E2Xn778s15CtI3
V4X7sZjSAUGS7lV+CY6zDVQGxPOJ+21N9NtEgDj85ptHOzff8Krdh473To+d
jZ9M1mW9LMc5mNx4bizxWH9Z5U3+x3yZj2f1pumq4nacV+31kf36mngG3Sle
zWlL2+/nJXGwdV3yA+mv00OfnEX8+Km+A2Z9bmx57p4Xs6u8KtuVcOizlDNH
79OuiOut82m5LDta7sO6bmmFO7Dz94SdV3WpPzTO+fuiri7/mBfp74TYzmyT
Kfv5Cqx8CP70RN41+ex90UzKolvwFQBTRDTsAJRd0qrYVGXRjG+KKV0hjkDC
5LIkmeVBPduUeLV3kSRfrmshZX8nq/EyvyVinyefGufN7KrsCga2PXtV1/TU
ZbfevtpV/dOyuL0pl8syX9HVV229xr/zcm6PTPNus6KPzMOC8hZ+Fq/348PT
8cn3T1+8efX65ZuXpy+fpQhCvw7XbXyYaZmgQhf8fVNv1nfc7ve43by6TH96
PnH/uElv78vxAf3v650EdPPQUz1/+QFD2/g5LuvHp98SVZ+8ffPD+Mfv01OE
u3NnT998536sm/dldRnv/rOQ5ob+55d6kGXj8djl0xbPdVkGYiIsKpqq6NxN
3ro5McLLisgHRHO1WeWVowfrpp24M2Ix/h6gscRa0F//9d+ytgBSuKK6LKui
HdHDTYF3S/wFVHZFqkqzLKv3tD4h8wb8vcWrLm9b+lvrcvlm1hT5HKfFW1V+
XV4STlaXk1jRYmC2bg9Mat8Rj234GUdyoItOlXX1PL91i5xoPne2YVLoLvP1
MZ6kzZetq2q3ygmjq2JcsTAcuUtW/JbEIGakybXldFlkrH+5euFUIWuxwi1p
RpUjcY0zTABUWtDO5+i+iaHIk+7+/R2a5v37x7S9H07ePCXRM57mbTEfZQM7
GDmgU9HMSv5FuyFNrKxy+o1taecdZcnd5luQpNsv6T/rplzl9LKeBzcPLKFN
4ijX5RzXlM3oFYIi3evyJr9tx5v1uKvHII2REzzgPXl4GXBlVf4dKR+ZgXHk
OhLSuA13UxLKh5ui7ZKmVBTEUgicUB7o7uh3bedYS6Lf5h3tYlnftJmszogj
Z+pql6/XBChaumxcfVPpu2sSY7MSR7mELOocAYzUGN7Yquhy0NJEqGVVzud0
9dkvfkEX1jX1nPZF28APfiGgoSt9OqvbW5KuK/d9vk7p6ouWAL4hdbmTzW9T
jvvhzZtXI/r382cj9+TFuVCLgDFTcuLnEgplQMUkihsEkg3cILSENdQDoiy6
ksZdl+2G9kKsvd50bUTtxW1Bz5OK+eb0hxMnZ2pd8WENeHUESaAXfYCQrisy
g15VV2PbClB1EsnXlQniltCV+APtMuUUgiUZ67tEMH4vY3ABvhFjAXVFd7LN
AwCatl50N3mD09eXDckYQYzILqK9Fx+K2aYriHO279uRogtjonIovjOCpgCX
tG+6QQKTp3b8mADmiNuMc0YDZViAQiOIIQyNdlIRXhAHrC+r8ie6Lzr3kqRw
R5cDKlmUZE2NZ0tifYFZrfOmIzivcxyrBCcjVhKLWibGW15e7oagMmNW0BG0
OvkMCCbvWmJ9bkoGarnsIL9HbrqsSTjQHwjCxC2L8ZLukd4xntWW3UZMB/oL
Lu2SmS6QuSH1f+4um/qG4EL0vITsoX9Xlxu6BCFFYVuZXMrIsf5YznAhQAnm
OCteXmCtF8Un8MzL4yyhDSmPGV9ijF2M6FV9Q5BdN0ULhCFmQRTBRgj+Vsk+
wQWY9zZ8onqReUFHnGtBT5M4aQXC0XNlNSPgtWBJ/nnbnPI/siWgyNij9CEC
f1WAU9X8bDHMXfMYGzb0oOPbz/IlKY4tLSy41E6Ef2xLCt5pQXY/vV8rctBZ
/shS9vbYsRUA1JjSd8AGsyEkczGSyVWIwEzYEo6yWQMq+O1KBHyHNwmuTB3b
8gaIP6+LljH/lr5UfCClcyKc8jkhw7WolqSok51MwCNSfNmUhGW7TgyGh8UI
LWYFSeW5EEXhVRioJY6MCsJGkmtNvYJssrXXeALkQeK/XIJ6iHu46eYWZyBg
8fLTDdGHiERwTtpigcshmd6SHraqSXMjFYYVC1JdiOyu6jUzzIzwTo1fYAbE
guD1BtIPaEHy1GO9EukVaIX1AvodXRNZDll+TbsDnwOp0ZWC5CH/8vLyqqMP
EVubM8uSXVZb2MWALz7QYckwxidIU5yDSvklQ0C61JtiuRy3G9A81lJEAyQA
IHAGABvbAgSwEq8AMBH/uar0FIRc62XxgRjKxj+ddanI66ETzjSDXkWvX5EZ
Sl8DipXdcZbdvw/JNyb43npAsrCa3L8PBV4gK0BiG22Ei5oVoxjcdDEdJNIN
FLqimhFDYmTB0k6Enmk+QdJN3Iug93lpA8WEMZc4ozMAXeVM3kQ79CleFECn
M16W0MpWOc5e5RU76TpoKteywWza1O+Lyk1J/DCV0D5YhE9w8tNlvZkvlrgc
YP/zvKKDM37gbMWfNoSQS/y1vSqL5ZxBgi2t8j8SVpI1Q3wtaIR0wdMgrMAl
W0azK+ADTkHsXgVp74Lgb7GdZOlORv2t6B21Qm8n73M6/MidrUgoXufydA1V
jiQszkUCeFnfEvC9q4gpoaZfQKjx8yyZIj7f0OcKqGl5B4wilviaxLjINyEo
+pM+JPKfYEuEIUohvbjgX1YzYUodMZnLQoRexkKPqHPktRzCnyWd7BJMnxCk
LfmYvCexOmKewRKJ1MclMe4EXeMjRcjqmEnL3kvoIQEAOV0j1Coi5IyUqpwA
6BhBnzypz2M2Laiiu13nt4wg07wh06phlHiK099c0b8SAnJMDfRxUcdH9m62
gLrMACxBFm29vMb59BOqO0VKX/FhttyAovqieMIcJGJ5RDVrgfkVVI8KNkJV
QAGASpoHDUl02WU5heEGtrDK5zCwgq0DEHVCfgwAYgUfIGi7G7KF+Qo2rBKC
JGrHP8wbaNp8z47vuRX0onuTq4H2kemi4fwkmclA7lRliD7CEq1csLOzc2ev
XD6fk9YBc46OAbhmhqq4/bK93JB0Zjsq4GnNIi4wd/DYHDDfiDQsSe/jwxSR
kFYdRc2h67oU3mQ4T+pVXppVSbZHB0agRrApWFCom3LK64otLmjH8nNOvIiu
BExjflvlK/rUlA5dFFUmagRrwwkPl+XZF/CUOZnAygDAYotulUkT10AfX4sC
lw8yWWdOLLq7zXJOLPa6YCxwm8qjjNw8gYetOjkvSwpm92PWUotgYwAZvo3k
l7Fusu/JTs1Yq5nCgJkyeq0HpAuzEkC4DFyfvq+mVaAuNljKakPUu7yNRHfQ
1pnOGSKLzfLY70d13FZ0xYYwqK2JgAoBuqHelP5yU87p9mkDjXI/+AIg0h2D
HKR0Q9KUrrNqidSzK1OXGCokvc4W/FVT1XAcVWKB9PRoiBaoh5D/kvmbYVsG
YuWqrt+PgLa85zEr3gwoaCpFvhoJ5yJD8xxGhuyhIvscimM4Oe453AC0Oj40
ISfUO6hgm/Yq3RiztQj4mahNLlKbXsgVMbN+Uac0zD8x3lmoc1c0HwBO7bRi
fikqXxtZWAw6jXThVcQJsGNRw24jPUyMHgdptVozH6FLM/Myj3w220YF+6dU
z2ApA/pzZF9s+DbAxK9EcRw0CDyhHAtfaVlBnBEVEUmTGoPPtoWoako+PbJm
965w/FX+vmi3jZdssalm6r3YtlCLoeNNgnskeAKIgdN1rbLsR1zpkCK7gm+G
iGUB+yoX7ZN3pqyaT2dmuXmPmFLh4AMDWsDTAhkHxua/vJYvH5PueSMmCl4p
2csi2pIwKjjy7PNg4vpZrPebLDvdNCwH8jWtRwytEK2aZNacnoNbOMvGjtRZ
whdRQN++ftbCtTclXa2DANYFVQWNtMYRbUtucJ6vIU0yR3d7A6pSavZbnfBH
nj17DiFRVsA2uKvwHcJWfAVSWnzbZafeTCxtTDj4umSpH9jbMts0LK6WxAZ4
07qhdqZrdpGLFP4Y1iiW+ew9bTVy1wX3Gdb+kTVSMEUsSWbZhtQ5UaCDC3jb
69zKB8OymQsGZwH2sQZCiudKsHQCvMo7IYqC1f82kjzi1o31WDKQ8tQVBR+s
OF1JdRXH5kzufBSfcMgLnHcDRj/QiTh1c5tN4SRee/tFnJBLYqCkHi1pXxUR
caQ6R/KSHoJbg05MWF/mSljP6Hk+PlTwV02JEFejDn24alXNECWsaT1rciyN
5YweoBYcmuhKxYKgSmTP1DiFOIbTo6vreawTtrUcW1yramGL/h25v0RusRTn
CPDe26pk1WPpnoR7HPXicWdEFpcii/ZJoruM371hJ8r5y5NXY9JEAmsWq27H
oUSDYlYOY5s9CesOzs/Lmv5FSxK8SDPeTAnxr8SBRtc2GAEGw3tJei/prBni
s26vmMM9gBD0Uo0liU+PooD0SCPQ++ysEEub98yObcQ6cJXHbu9wH7wN7MZM
bLHwePf/SCYyO9iY2MXj9tjtHe0ToDPvZVA/topOlt7EyviNG3a8LhfjnPTX
pjMPMmlGZHrcsH5VNxnRRimualr8IRYnjlSvzTcG++W6MAUfLgVWOWIRoG75
OtPgRKJZgJ95tjxhVA0qdc5aFsHEq6tEkFlbAhTuv52/fEFkUZUL0nxGkXrd
rkv2aEcHF0pK5G5HplLGW2NclOD2pPvQuT0Nnz+FjcPZCRY0FNR73lNdRZYy
HjXeD3+/sLfvC3AK0VgZtHBn3ogjE/Eo9ZHzcyASWcBD5T5u3DOLEhrJK9K4
5jWkBeu+UGmIjDNPtzjR89NXbm84CUXO8aRYsLed6Hgp9kEIem+xVJIuim3K
XAGeAlYyGY+QSazbCFqIFqeaIUQeuM/7qr4hm+eJuQP1lhmV/VEzL5fjQJxn
rziSrNpOjKsJYbCAb9iawUPQMUuR3vJy9CbouYbfTryZ6odwSJtiuP0In9hv
sVva+llL6PDdqUOqkkAtAv2WDWOSDkz14sGEvWt87gcXE/e2hdbPjsI1K8zC
lvw7QCKv1YgWJa5v9gws8ZFbhqKAjLcwyV6AWuu29eup/KIrUf7HAOCTPXlx
Lhf/4tzBxlhe4y7yVSFxMU92jM7sTBBSDmjRFkRwxFU4+kvQz6CzxfYN4VG+
rC9vGWfohhDrItGrtM7kNlJ7FxeXNxKp5MiFSrLXxZLJmKPcQEvE7xHtzrKT
Flhwsm7KJWdLjBgU1WY1haNkwVICyuaYmXPLLgB2u9Iu53/MZ6yrgb1mEPXA
4wesW6f6L4wmBAyqOIwgRFYVEZi8CFGkVdGhll8rzoVIqYF3QAJ5HavxeL/B
YUFkV2QaB1nK1yWpHYMJNm7v5PUTRnNNa3gds1R8I1GyI6J/ZdHn3C7GSDpl
y1gjUZcl50w+12YsN+QFhC0i5kQ85/TVyJ0cnYw0jHn5+tXpvjC18EnFPziM
nsROn3mhkWQOaghHNEz2EnwFOd+xDur0cVWriNlMBIMUqMBsupTjlE/QOQC/
SNIwfLtaAJ1FKM+OkY52wz42nALYFGF1X2iZvihkWTeX8EMIULcjJBKhIP10
w4ewwwjNapz9eXbBqYfgUBcO+TjTzVLiubCefeodn8lfiufUEmlabDjkD1OJ
g+YRhu3I0iIcIz5B/w1Y9gJmtlmc10eCUd9tIKU1S2XwOV6Jc2efMNcan1Qz
MkVoh29Y7X0GgzPr581axs4Z+0i723tu71Q3OKIvyJ4JxzY5XLc/gJE0o+z8
CmJ/8ZjskBYofc14FFgG6Vzy9W2zVr2xjMSkrYBLKqNnHjkSFE4o7URtqttU
zbouc3dy+vwp2XCkV2YzIBD/0hJfwDbXCENLkONNQxAnZsj+6Wf1pSBrmSvC
CSs8Pz178yYLibbOy2/WkJINQLkhBfLbpq5+Ktzeq9+e7Y/ceQmC47+5X2ZP
Tl483ZfdfF8TGsmPHX5M/+nviMD2HTEyDTQm4LrNOGLIN5kzaNmXztaaBXEj
xSIJDsZSXuhGMmpGW3IHUkZ2S78xA0kEyjDBZ32CF2RWj5MEZVmxt2O4gWOI
L4RR087inZ4uojT1e7DhwDcGlvAyJn027dpsXSOlQXJ1VoQC6hnizW1doBNO
w5RLGgAJI5xmku2db2gTLcJG/FmSG+y17pEz3eD44GCyHyh9Z8IlUegZbYEp
3YRoQsVC6kKQ88QyE4gxO9945BfrfZQgOZl+Sz1eRioCIfC5aGB0jZtlV/qU
xIS3vggc3hwYLInjIJdPehJkuQMpIt/9+qpc1m29viJhy4dfw9QtO3aiR1Io
iMNZc7vukKJAr858fhB/k2VAFq8AGFSXy8IlbpdEJ7PMpksAE4ZDlMUkYZTu
po59S3GGA93EBtFn8ZQ45epmgEf5Zl+0GZLe3T+ogzhoJnvn+ofDI3jMSIH5
ep92dl1COfFJivSTNemDicTYkW4KLBrIw02tjVQvzssLkU9QiREH3laqAxvI
7EwjVTPBuulmL4LxdhH8P3G6U89eepyJCppoyLsQRuMkPXaifpXsXIzN8x9e
vn32BJG1+cAJNRAndwdsinmHMha6J92humzn81JdrBINSKzA2+BV84L25U2F
VBR1XICzbO8kaKP06c1MXNpyBlLVYxaUTTcNccbo1qN8XNz0k9dPlWH0fDWv
i45Mh2va+OdhQECgCBckRhbxGtt5xi57NqVrMj8Zg0mqGjjUZ7ZW0F1zKoz5
+lhHFJc0u4ehe8bq5vTW6IkjyDnbUbwP8wZJSiRsA6OAx3C3bLEoQsFLumPT
81efpZRmAlRLwBkkJmHybi+f0s/3EUS58qZ0gFt2BxXJWWbKX80/mOIxx6ez
T11UgqTejlVsjXE+24nzZsem6aQ4vdKmwVGZcCY8MpGVUbwiwhy7H3a6gtx1
dYfsqiJC609mvjNbE9HXd0r6R1Ija+90U46QNF6P3JMNI9MboOzVJnfq7sRF
PHD/dFVXl5ekwc42FanB05pVC9JvvyumzYZwIoPOOtm3Qh4WLB7SUisVc7zY
DmM907uEzFWYHCA6YwiYouDBXLoET8TMMxbQcLrNak6EAfnpyvSpx5GNFigA
Mogpfs7yOhJuo56DsCe/+T5HiZ4X3zdSPwZIieNQrFfhfEvVrcw0J12WQyom
/rPUaxEpA+5H1klFhjKtiS9sSiBFsEiNKkPmTIQ4AVOYS+6t1BHjdOsv7uYq
crUvb1PFYJTtSuPW2IDGaNhyVjVpWdfvW4LRewmZYnNll9G2TaEQ6mYlQt3v
qw0c3Za/gZSkx7Ql2ud4mzgzUZXzZVu71NznIy/rWTDJS9aZBEzMRi2LUrwG
kebwGdUjRG9iErLhJtoPK8kRP1Q6e04aQEs8/+T9FaK/wrfJIrwpSndKOsKc
fvec/WFKR5H7g+Aie8mSj7cFvFISso1dk4itkUmE/MdVqCSC+c45fEqTWUST
nJkwRTKmmxYclNO1cDNPiqWKB1LHNk1qf5D1KVGfSxR3tKwF93wgTB+IbWLh
u8ygFNEXTb7S3EVRWokFa5GB+unZpUrKZNuZv4MvM9Nr8ytYSo8EnpG9kbDv
AC0l5059GclTAboKKAFfhDADJUSEH9+/eTXIkbdNlr0fEKXCZl+Qqd+Vsx5C
nCi1cKLeQkzckfup1tIEDqgW8yx8nLP3Ghhoc0nZ8jmfwoMN6WWX+7gVCXES
QN5bNrSPW7TmURIiv2TfGL5Ol/7cmG6Us86WInLLsd82kwSxYGY+DppP5HbV
PB75Bq2/LlgpjtEl2zaQ6MDrguxmwDp4t0ooOolXayRSgmuPxzlS7vWMdQOr
pRv2km17x0YwrSsrs8m2fGURUmyXgQ3KaE0vcOfwt0LJ8lwDr4/cj1p9xuhx
Vi3o6frDY3eeN+X7/DanP82u6k5yXp4Um66l87g3RLjv69VIfEqZRyMvaexj
WzlzeXO5iQpMIsUzQq+kRmpWSgVTBCURsfBb3cbJCLBxlLVhMU3ziuU9zPKg
zTl8nOS7aEh9NNohYiOZyEkfm6X3Y9MXa+RLckoP9OsxlHS2I+TtLwbKFhgi
DCpxg9q56CscdWQuKgiXJX7UvOeHQMBiPhRY2sayTNK4h3JNpLSgKOat5u7x
6pYiOSKJB9ZbzjgpNBNd1+L9PomKZN+mEhATuJq56CWF10IbOLlxhCz1dAvz
tXKSPHFE+ViXT4sgvRpZPEuOs2imCh91yoVFEA8/FU09Zo/EOA4yRFBr6fuE
6vUWYQ1WZbo9OES1dHZbDv8tKIoZc9aX1PTZMRlGx27DVt/5706/5bqJhu6J
ExEIWssiXzDbhOxCEhpueq+YXE7cxTsNWBYfchhbqFm/2OckPrHp9PaN33i7
YeKeIT+bi6S80vuE2W8SLmIRST8/f3pqCFtcipvKO7gWZBNFRM6X3ZpzYSQO
CC3yU2eY2EUjTYaLdfgdxJnGQSUNYzCza4LNBjFMGkYXKitXBWvKwQP6OLXM
tn2yptgn9vew4k5csleQp+5YlAvoNUtyI8eG6F6FkAQWXxidBssOn0JiJ7YY
kWxmFOjrc1ySbhMj/O7KaLf32v6E75wT5eUMxRO1tTTRBAlNiCLiZXWTsmYv
zOB5/qEkneR7Mg6aomxqtxfy6vdH7u2SDOnflk3+06wkGbbKCYnFK48KrGlO
uOCeyx6TN4P3P+dECDXv7vV3eUq7vBcrpT7CIWaylsg2TstKOGNbeAyCdyGl
nlRSHwmL4txTcCs4OIgZXVt0g17IzV1CjPbs5MVJsFrAsIZ2CUZJ6NexahLF
Ggy0kijvs1jYFMMvGZPZvEL1CCfX185zZp9TMRR9m/hYsyRBZ1KR4u7fv7PY
mu54jwyAUm/4SU44BsZG0Pyp5Kt7XS5ygvf5VfH+avx7OsmC1IWmyIlvinR3
z2G1fVuidoiu++aqJI0Umrckl0lhULaCP1T3xFe4lN1IOpYFHWijDzQgk1I7
U/IObkHvX9WXrE5I8kri3IyO7zW2LMpUbnzQ5HFPretXxsXAPrEg5LU2/agX
/PYqv42CmNG3fWQGtKZxzFXcxWG4vjcgi68Y8EaKZHh8TkOAOFo+JzK+5Qr/
kRbZBw7G3kQOCpl7TRckND46/Cqt4Mx7CQzQ2opx0jJFn2Fd66ZhBXDHHQJ2
XHeoNWnyDpuMxCuJMNcb5ZEcO2KUIgss5uFd/kFULvVi3MbhZQs1mmsUgATo
Tr/PbthHgkpq2jWnjXJSvmh8tGMGHmt4u5IsRMyEVAuuJ13COetIrixvNb8D
+8pYDctJDPxUVEYP/VQPRUG+F0v1UJVcMrjhXScK5QyQ2CLu2LCaoRQFGhRO
SRxuLquWbS8hAdQdkhikGiRo28EbwmXb49zi3J4KRrGTNlHHVaYJB2X7U1h6
ME8JyCzoJCc7qpXZ0rk1AdJbpqF8cXdywm6NcYBvcoYLpDZWNdV2WnDdkPnR
E7BFqn8rHtiRLxTcCrZFWVCqx9inA9nFCVFg/oSPsDTgExtwJks5BCjnnqCu
PnpP6xk0Vsdyq8gi26jXXkGCv3LCkLURqvk1+mu+up5upMk/Pm14S5nSG27Q
X6tq42RdxDS0HFIYkl4kuL9vUBFvNftUJ4goABnnaovyGVorpH5bBd7VdkEz
C96BXgNCe7SzKSsbzPUls9VD3XtE2YMq0Yo4D2aEpNYoJUcJw3ICkJSaD/SE
iBo4xGfgbIW9R/tpNuiQCzotX0YoO284JE9skt1zmYprtYmRJKAsky4S7SHe
wDFS1UiIk0zs98UtktJImN17/vb8zb2R/Ne9eMl/fv30H96evX76BH8+/+Hk
2TP/B3kiuyfxGfkxR2r8m6cvnz9/+uKJvPz85Pf3hJPce/nqzdnLFyfP7ln7
AB9FlZIWbgnAQmyNGmlOdw6uXHrnz3/WBm5/+QuzeRGbD1B9ItpuYkr32y7c
0XWhlbYLrJubHM+2WiyMdvZYcFGPBXV1E7wl1xzao9T3S7EEocGt759gAODj
qLdQjrKjLQnh7KJQdS+vXMo2h9NAGM0Sl3ie1Os8VwdgvAeJ4HrZmbg8iB2u
4ZbFjsDd7auca8NlI1L5YfFP636TZ7Z42Bx/c2gzaD3zfN9vYKCGI7Sx4XsN
oZHcL6YqFwOhrFAmKpXvUcm4SzUer/yNhnSTYQszzuTGrW+dKemlowcyphmL
Jp9cHN3juce9mOFryVX2XcTuA8ua3g7Ue8Dptq1/+r/5jVmfn5D3xdYX10R+
EIZvGyD5EAJ+STgvS7qiEFZxSDeoYj5BXnPQtw8H7QLXqvKrHYIJKlesG5NU
euy4VlE96RMwXTiXypwCs6ti9l5u7GQ2a1AyQR/4nXy0UUo0ZzV70cbQom97
hJeHd6dRQZwlyLn4nnCsTPfSajcZX5bvBoLKBIWB/C33cvyQQf1y/Ki/f3gL
WPC8tjQdFsvGI1MH5mdvHeSk9xThfFZX01rM9ZGU9YIxGvWT7UxXjfL2SI1r
Q+6qhmWzy8JnM/1x05TtvJR6aHWr3bUtMjB8tQ03WIm11Pv3Ja/zFXoq3ep9
tgUXWBEmlKvNyqeNBQ82MJ2tSOWWfVeRlFR5dsa1SABnu7glEUYXq4rJpcSt
yC7acOU1b+iZ4p6nBlqdVKtV4XmlZNrQnW1adboxwy3SUmAuEdMtEI/nrjTt
pklpSHMpONwb+g6g3hyEEJ4995k/vboUgWGghURRmfrKDEFK48S6esSKkdFT
ksjQtgNV5nMUU1IMmxT8AduRaDajHXppWeid1ZonkiPzfZ0vW8vZj+5xDyrN
PiofLbmEdZxp8TncMlclPLRby1zU7oyrSbxCwMVpsACWXK6LyyHdzJs9qkJM
dCchUsn7WdToEeajn7RYNUO4rT22/di2RYfkAkzhsIJpi83SMvl8IxzN51bN
lg2JseTtIDOdNiKF8obE4seWDwmj385/69sQbLoBKL44Sp7wui/dwMuEURq+
OqOCfewk7CFKaOadIC1E/K/GKLkjLCHut0ffusB6rJMTbUYtCWNFG45URzak
D0EGtBdtx2c7QbK6mPHBlU6X8GkOO4kwTUmPj8H8PMB6t5iKO/IAsIuuaNxW
NQTnMCFgMd8si7uoWUm4h/56vf3bbGM7ZUGg00LXHFAFehDlK0Tgx5CbRvCH
t84ri7kYyhp7jNPvZKfC5xFd/MTj/LJCR54ZOlHI77RWirckuhqW12bKIycV
H9pAWHPKIVj+4VkP1urQcUl2o1VfsROH4QBGEFUqbDMSr7mwT1DtcClzJpxc
lFvuJpZo9F3OLPOyykopd0k5rUhiRuf2xOLyjC2wEzXFrD0W+MKY6+169r6W
ZqWlv7Qpa/s9SpWEpCbYTPg08y2tF6aliJO3V6F22CcjSHVbRCeyZcuJO3/y
W842B7qF+CpWr9es7Vtjt1b4IDFOVRDKUJhrDWhcqAcMntmBjxu8kkqkQO2q
hDYaGtXqYrQC3wEkr53Rfx9x7d+08K4YSGMuXDfpAbibGcDbJHZqvYauy+LG
20s7cWP8GbyptcPSVkJYhC1F7thEu4hVL3Fgs1xKs3q1fQQzV90Zad6Sg2V3
A7JC7K241ESfgttdDNy6BT41FVSTdbTaoynkVgDVnH1PFeeMAVNhbywl+zat
vNtOH2O7HpwwymsSfEXlvrBptl3QKQl6l8XW8bi/e8MHrZ9i9Uyp8uWGFcpz
pKmId0UkOl9mU8SZF1FaQJSeFtwAZ9zTcpU3aERrDhlNmtN29M5nA3Xc6gf6
o9g1WeljJ3yFj5Uhi9VbqENC6sJZg8OGnQbqUc0rPSKAZ0kpShr0QrMEH/Ny
GvOyXGT/HhNnCH6VobdM0kpOUtxCL5PWZ6/EUAKFJEFlbkNjLTs/GT+VLwJp
vMuAPdcVerOon1rje37/oTVoBJUGbe/aCLdR/FJXyAwDVNjrWCPpdZYvo6e0
tyKnAjjWDYd6MMri4ymxZlyYhUcDuNAOFSwS0ROnl8dWQNAn+qGN4ATEEYyQ
xeulV5lHCCTZHQkSBSTk1jUgGTJVSq55RBBX25aG+qrlkrFyWlzlywVXCvT5
r69YcIIEwXUgzk6ui2Au6LFHe58yX6pns00TqiGsNZQb0ji8TpfwsK0egAqf
U23zypo0x45+BnikU2xoBeKtNm0eGxLc+ckoQnnfdDCpz4+qTBwUrGXemMoS
i5jIdIINBL3AIswcp4BOx/aYbyPjtMeJJMTjpgrDjOdcxlpH3vJE6/wMQGDs
hIHCOskMxUR96m5todvFbRS2F22TvzVXwlzEnpuAK7DguMi3LXC94o39evJw
X03DkziV9uU1gFDcCL8+JV5SV7hpbkqQZf/yL/9CX/3l+N/9zy/p9Y9u+5+d
vpT0n49br++d35R0s+cEnm5D5x6Ph3TL/eR1wu1WYrFG9yNrxpRgO9LBn1vK
fnjdVAhaY5cKMfKusTbd/DDoPgugv8zcjn8++t/0Fvpl/+/+wf4dbP3d71WX
+OUn/p7crgBTlsXf1cSzvyf1uOFSoZe78Nbeqfg8920V94qUHIJ1fJd76gvY
99+Kj4RVYP8+EDVx/z9yrs+HW/83/fV3P0l/Mv4b/Xjgev+eociOCDzwd3eg
CNbs4GlLlwr/JDgSVvjv20/G//z3nSDpf38A4oOfH0CkU88Xex9hpEp8Ei5i
DhLu2toZsOGXsQGQvLRHLGh/8KWYyPd7ZxrffaYUtOCe2f3735HGe3z/fpYd
IsEmPYb5bdrUmWFBiYRyhBygaKhRKBV2qzU8anMSlSWEX79piVazXzZFoZXM
cVQVi3mjZc/rDt5RsZNP1434AqshCwurphyShM+RCPqBI7kZ91pllYfDtAYj
RXmxTrgdbKtKXuRJmmQPZWXlOhw6sdYdfZPHZ3GMOEIiKqv2T2JNQN/TaNd8
l0tq5HykIu+5aiU1kFbarOc++bp3oiQFIfpG6MP2SM+UvsdNwmnJ4KUdCF99
OZTFaVpBWg/ii2OGvaGMa+ZQZWvRXLGYCNKOJL1IrZw4oGDTEFD8yVBNu65Z
TKDXro8siq/Sq5RunYUqSOIJ90vp1JDI37dQZx++yKWhoYgx6kfgu4NzgOFy
06SOJO95Uh1op2OLQyD371uKifispOXwHCGV6KgK+SyYv8FqTUsE3nBuUxJ0
0WkYNTzn2Z265mMBiDnX1c1Aj5sXze8xwx7Zyqj6ivvsqi41RvRCjgazL94R
MzNxWaSHFhhxT9i0fJDtFG44ywWnRF2SJ1TdsvItHAGF8NHtckZZJUVWpTWJ
okU2S5jUTexSUxTgPLzd+4IGzlkCobQujs7O0bMP/jNgPSqBxH1urED6TIf+
AXNDUi7EFeOZryg6jxyOWOcSmMcmnwdJ7HvHrr/fdnlGCivTE7TTNCxvOGnu
gjn7F4mmfcTMFksug2vpTyKiZ8M+Zy8MwFkixyivCm6TK/KhXkZtVa+tkYRk
UDTifPEfmNK9kBJuezEYovbTEhLD1kAjwRq/f/9lFOv7GUhnXqjdXj5kH9MZ
aVdX9Lko5SqKlhCeeepJnH6TWLb1V7bgr8Rk6XjScdZ4a7rdxyrBBJ+JAxbL
hU8n6yVcEWTqprgLp/2xg/2Bc6pwSvywcARIxQrSgFvlLV3skZ24gWA/O8ei
dqFSGRs3dzgNzXN8ux2WCsKg3zw7p9cLm7ZznOYN+Oob7YocbU6c10L2EDMZ
ZGpd+eBimrLkm5fczQUsEUeoYiDPVgYUsPtVQ3iaDN0GwuzToZSam1TtJwvD
t4X+HsGXZ0UxVpZ3XRja3LV1u9U2r9Tl09JtFZWO0LKi4Jij9twAvxI3AFNZ
xeJwB4lFgVPjMdzl2zdw1pZV9Hl0BKtvqmWtwdDpZonuslBjkFDAjYAvka4s
UoCUrdbSF5CoBcCwT8YAgEpaYUkjJhNLT9ompRHzrCu0RuIWw8bUeTCBnykm
3ifrbvtky0/Szz8PMWV/1hCP6JU51L72jOC8kfpYqCqhl/1jN+CG+QVrGkLi
ryz5nGmUMwnucqtpfMAHKuJRTR0Ah1SHzFciB0bFvUB3If0ogrOvLZeQl+QY
aUdb+gLfnF9YM6qZQ0pVfmN8Eql/ZbdRVg4q5yjJHmOBXKT2fKa75HxsTx9J
KaEI3ll5XSLCNCuLXpZRuy9zUkrp3tmh79CYXYyag5f2wLZkoy0S60M203qO
sBqHydOEHbatWmyLVcIQt8x6sJdq87otPLyyzIsq1SQq34c3yhV12o0V5C4z
fELHwyz4VI3g3bpeb3SHjBBLnfsl1CcatYAddTXV7JYualcXB9aIzfwzyw2M
2CvFXicwttommq3vPECcs6jgPmUwEQ/YFDwgxD+AU6d9mLinNV6UQlN5h+Ho
RTQYMYytyKCRiSvuLQfA9B1pLSKtfZQGPEb7oqdSZ4NIMPa6rJchTc9XmVmW
DXHK+HScTBs3I15y2+pQBMeuZ6KoqhY7D6CzVkLAIIS/2Vqc94SaShz0N+VG
eVweeztbanUufj73PeaiBsoh1CG1fouC33INGUqtqCD9PYas8egSor5Gmkgd
3wYB56PzwPnIySthQsRH9FPlOOrH7ON4PPb/p5dexVHvlh69yNeljMrmEZh2
kAe+VOeCHsJ9x40WsdLpgAjfvVzcfsWvGP/wn/8gy76IxxnYXIRPbTaegTDW
l8Jn4t+2E/v1P//BHybGNClw8BfHovkpTNomfYLjwqWS+1VTby6vNOVofeVH
I2gQObswcn13kzPno80tlrl0X+37Gvpp9RviHDxRI7tsUBiE0Qr1nOuDiCWu
rRfodhM+tgdzG9FD1u8cDXLrTDBe4+SAkKYIwobSqLcEcByH+doNR2UuLi6s
CND99X/8T0SCUGrNtLOHKpcN/Db7PcfnX//t/9z6yf/113/7V/qf++f4PMfu
mwNSFm5bpEH+YXsV/q8c5difUYdfyDAu2zsA+3N2oVfi9yE2wVyC93bIktVf
QHDn3vpXLAmG3KOid8Wfsbt/0921m4qUucGIBCYexM5LqAtQhIr5Y+eLspHn
CYBc6jwin0XN9wmGwPPAIm6ieZ5EbANIa0ciOt36eo/ZKMN5IcJ8wx+5EAQC
ZZKy+RFWT7EGAuHJ72PspmcDfuH5+/df1MT8e+/8mNzd0Fu/L9rt184ZqnxG
/hMe/T1CdwmI9nmB1wpUrMKdoiOMYK7+CQM5ZJREe3tXVu/UurkY2S7egSwv
oHxfMGW8k1O9I8beXohn7wLGFv0KCtyFCAMJnno87Xt3lF+ZeeNzjGse+rGF
3YGUzbMie9t3nK9w//7hETx53RVBdTJ45pPfS37aXOs0ZVlU0pozCDbtFdqL
V5yCnG4s4XH0/v37yhcI/t6yj/cd73dCSz/ZNN5qidYaDeKz90+xL0caEDL0
UoId9dxJBHJ2j7HXT5/cWN/riC/yBd1lWTL/umVjd7uewPKb2EDPIl+uDWzq
f4mAJaycnaDp+emElyW0X5eKWM1q5ZFl/NIA7jnpKM2/7aOq5TMMYCangXHC
6PZlBBeD5+WSTUmXMHBRsOT7XNR82p3ls+8C/knn6Xz3h4V3MlNlN8Nmqn17
Wmmuoekcsk6AOI4vOazIoINY9ay3v1tgL2h7AA05OER6SvXOM58LY8Tg3qky
rIyDXoU6XCTKSdn2FFl9GCI8ZGY2dS19aVnJ9M1Ov5kc7WsyrvaIMd3TV6Vn
6efaejunAr4Bne0nBWatlfzdmWkrRs+rTYPPb8849Q+XvquO5Y6mdVd5Sj6h
m0c+0MbdV9FGCdI+KiUNG6qmRK8mZMLZt6UnySKfaTBDonhSWKwfP+4nDI8s
axcJ/FYBFwb5aGp7PCtiktQPzN13bGJJbsifCZHuTduVCZF7x+7e4eTgHijy
nvKJd+UcP/YlpJuq/NPGCnkt1QWJhOOxe/v27Im7fuRkMsFYlD5ZDY1PsE5v
zLSxPf41PxjNxcDzlqzPU0D7fTbpjCiFlRdJqY/PYYMUPNbB2JOME+5aczTx
J/Vq+rsWEQS8LaPH1MHxEclYOf1HD/0x5g8flZgVaL5vtOzBQGiWoG2GhZqY
AOEV7M0Xk/JyNXCPVvozq273Yr/JO4OohIk0CuDhSE/HHnA8eHb+0j08/Oqr
8SFJCjIvxkdS1s7ZUXP/Wozd7yT/FG9bpDpBfk1PpX37wY5Aw5fjo1/ackBs
JN37U+AcFiRgKEFRXsoaPJIOvGfGiCVhSGSvL4qOGIZNPEpMMf0QLavMU4/r
lz3FXDfa5UMXHnjsAc06RVzcy6v9hf79F7lR+ny4Adh6WFzYttSifMLyNUBs
miXeRHmN+iy3ClFSz7MxJFsgRm7AJEXse37HsT1MD/+z7rxoVnduOHlt9O95
id75A++AEfsduxGwW1STc1lRncxGFBTnaMIOFOeMQKzwcnzgzWOkntOtQsRP
b61+Pe6FL0SjJzAS9EudR0ud/7ylCOjvfOfG2S1Wq+Bo/xj3c/xIOmhLLJvQ
9SMxSz8JNvqQSIhkWcZvXpxTWK+Ld4rruMEDfbIi3v9OErvfNZvqXd4ZWX/9
1cGh64hfEYdarSWr7kPnY+s+2Elv2WfNZxjTJSY6vENX151LB2Ljxywk8I62
XZOORy89PDjwz2zWePHdw4M5FEEUA9AD33wz+cY/kV9fvrOM0ncrvH/46Ghy
0KPBlN49rvj5Qvc4KFUYx1HXjMd950/4syh40B3kAdDnlCl5+3TQPKknjN+W
mafYpPxxzDv7Q/QEY0a6rs7/pHtd5Ym40Lf+wv/9g4ccC4eIfaGQ+129eGdk
EVY3vOCB7DNQLzJBBh5AKOad1qUxqiA3CXwq3uq2RHjoJcLlfN28C51t0suL
hdY7KK0CoU/JrnDiLb3Yo4FHc/YyY6ecL4q/YOr1VcBtxg08MGgelRXshPC0
Icw7UbXxXngnPJaa7dM20VZ6vNy/FNlJCUHyD6IdeKMJT0V/lS2HJ1eYXHo5
pIkpuIL4+0P2F58CxzAielA3xQXzxYmJ9kmQ5xc+/Gb9GnWOVdK6JKaszLpJ
suK7XEZV9FbluywaZO9uKwKsjZt4P5KuMlH++Bx1U1afrjNvJXiotcm+6A/a
mO4jC4MGZpJE1xX5aqs7xPuiWJuDoB/G4WOp0TPZhlbQQi4AmF2KSAS4LLzi
m2+26lhhv42Hh+w6aDxw6RJr08B6xiFrk1RWkcLWi80xnqKGVNsDziOXdOEX
PWSzw0Mdyfc88hEOGq0hKd8XS59zBFPOBtvzTMxKY69Z0mGJ+2bFGV0aUklv
xyW3k/PdZEvC4VEqsznoCLYNjJLvNwzQ2FXjZ8PDnX0RIzGDTZUVNDyWehjN
PGl5JoD4AKKLAQsJZiIPcfQVmFaGBWyI7JSLpE66b7EAvfboh/RXCCaZZen7
gWSxOZEqVl9IzRJXilrdRJQary9NNCKRbkhZXCvlUyxyPuScVIren3FGJqix
rfJ1e4Vh8f3MWE7Xqeel5c5JTI1fCt1xOg0HkeC48FF69pl04oLkbWugQQug
4VoZ2vKPZ8+e6bzqAiMsfbpL0MfiEmneTtiJup84YWcejsWtleKKZy0nZ/NN
BjScsyjySqG3UbxLp93wKAzuHJ+WZ1t+LFIxhvw56nLNrFCK22kIRoWqmwLp
BnDnMWzL1WrT+T55MqOzlTSWFCisanJLAp+wZqeWclBUxvRMZ2/sI9ZqDotR
8IB4H4YnMp0VL/XepXAZ5TCGSJPspQ81AWnQHphrMeVVCS/5vI5Ir9pChIkA
CoYX8la3XUqs7Gkcy+91SqzkvZJmzxEQhBlw3yx4CUpbtmro+ROifWFKKHqI
codRYiY1j7Vlb/SFOBIu/GQZFmQXsdPhAgzyAn6HC621ZN/qXA4x12W13tnS
KpNkoW8kWeUi+BcSccMJH8g66mJvpmSlxeX6eCJaZP5uenth2TlRorXgKmNl
XMBuTFkBmUUMJLRAYRbb794C7Q7bZ/vwQjMDGBSwony2ECrlbofcsdLCjARx
Us9NDIZTsCdb7lntoiUe7OSreuVZyI6VTBDFBLB2tJFEICLZCie7BUWZ72Kb
yHmQ5WccyOaBaoJIoe3q8kHPuJ+O4BMl4lgHUWFmMd8EZR4BZXaFPqQjBwPE
bhPjrW/ZJvHSMg5j5Nt+9H5QAitl4BTC9YWx8kce649CwomnxvKyqhuJJieW
YapOAQQ9kuLYl9BUyKlgUm9ZqYnzdvh1T6dni34CgDc++atAGEQydmQJKCdh
FbCsQuU3+Ipx+YvIa3JhGjO7TtCp6nzAgTLiJmxJdzdldZkUswu/Z+7JBaxC
n5/KYpeM9WNEI9M98RksRHJx1XVrOhjbonSx3E6riHveG5Y4H1HuO88nw5/Q
dhvqbTVUxo3BndADQpQvyUuieEJFRz20OEJ0HrFY9GJmhpV7BLGtFSuQqFIX
7H0oxThNsxrHNQ9e9F2VXe/zvjxnEaW/+1ZdKMMjzphrVMtKKPi3yULul+7B
VZEvu6uLlHoPDyZH3HdG+0rL91TspVvhjCeePNSpgb6FQS4JtopFp6Px0oOF
zWDf8hefRZQ5u1KYT3OXlCjVPI9ZfrTfowC/qhLCylfyesjZNyba8ifIliwR
O9oXJu/vzVq4Q3F3F/6DkiF4zf2IEqipJWKvM4Ho4bj8mMF+9OGDmGQxNyzb
uAfWpPdeAAVokK8gSVONnhcg+jZjMsdeehgRZWCRvYiHHbsvnTrmpB+R2U78
WWlrLlFkJSlOT774873gyKjfo9llElqBk+XvxCz5+3t/Ud6YKOSshDGuJLis
n5fGuIzYSBDu/LgOM1PSxVQY5EGNNzIWXZypGBFk82C4QS3bA1GReRfnlPkL
xjDFEGQzPM+sMNZCdr2mBB6tePJPlkWmjeLwXa7/7cRzP45vT7sA8X09+P3J
82fcD8hPuAmNgVwY30insAZB50+e7XM9fLSju1j5wJNTy0GDxhFahflhGim+
ojaF3gcLKeiU/UYbUTdj9uZEDZ7U4SNdDel8HHzOUDAp3tKEqpivsSOA4+Tj
I+z8peWNl1yvEvzekdiL5UWCobKd1oL0qbHKnYbqhsvlIDjwyP37uyzi+/fB
0k+W0k+OLa0u2k2rw9mLIWM0NouB2Z4+oCuakYZpDBIeZwuGY8gSJ3d756gJ
8ZUY+9jJm9jAQ2tpzVf1vCo130VEtokFzmARJdk0hZ79Naabjyx2MQp1U32U
2iVfWZ4nElZAb3uPnZt98Xe4P5GQ/0WIvEZiX/QJ7ULeFOM08Uy74rTB9ZRE
60P2r++lkioisSnotQjUIVhYPOPIfgiM+w5n3JcnCqVryN4n2b65XRchs27v
+nByIP3wcFFFt29nDpm1kZrudU4XRTywz+HlM2DfJ5N5zdAL6SJbuceZtMW/
yW+J2WsCCHLC+ynhshTkLDxF0wKeMKMLnDSLTvp4KPFf0sR6CdR5G7vfbOOZ
ZACL87DdLAjDSqa4uQz1mgQo24bUN2cKqNj3kfEfmU5pOrVA+2PIv0//+WjM
AA1lrst607g7/uFlkMaj6ZHJP1s/+OQvPvE0chvhDiWSKy9sAyaEHk4+pDt7
hcyMlrUoFIFwaAq1xZgvkZgV/LTl/vI3VrP1RbwUl+w6blfzIZob4b/R1fVS
PC9loNkoH4Txq/eNHLLRH+RjkJVHdJAH/jj+G2ayYeAtx0rsSOmpk29wj9c/
LT2sIsmbvnWGUkzQaddaEA8V4KX/MVBJGoMm38i8n0jK7FJNAVgtI947d1tE
RRKKil7v40kzmRGGLz5PCeqLNrzpWwSaH0OTvL0fB34N99ZSy/1O6BPIpuZO
Vj7fUMU+5DVJc3acIgiAMbsjE6hKFBKNcJz0I93uEEn3kpbJWLlkVEDwxgoI
Ps0r00KCAXYpjc49sxz4Sua/cgfLTL4zyDWztGLjk1xTenFz43sp7SRoNjz9
YYYmOvO6G/tyYscDukZ0XKnuLSbcga1jCXohU5CUw2UJh3M7OdxACmrMgH0N
h7nfXD0FAoQWDtm21PVVXjIIfS8tGjxZNHS0UBj8JDRNzN40+ew9T4DUIUpA
FTiG/T5Cw/rIndTH++yTeD8Z6n9nIipGMLnjZVQ/teOiJWvysWh1fMXw8C8R
VmvkCbUjPvJdEzt4EjLjgkDYrs3xl4109Kdj+xtDOrr+QJee0SRvJ6gC3sxz
K0gLn3OeYVhnx+sNdzTBm+dcE22vys97b2kVJhfbvNKKzOA53fHwBEOL8IYO
t/rs15rbdVfzi/wnobPZrS3RhwjXni4w2Qbl8XjvO/uL80NHBCKwCWuNKw+t
wukYWOEZJ+2FWfEyK3rXu9VyzcUOucRurB3l7rPSCxMuLbI4M33RXop+3nvL
FFs8fpKabLw/03sT5Xz7+jeV/o7RhoUoN07nhDzhObGXlIPA7MBJl4KxxUEY
wHsp+KszbPVX298m9sEvnJIiEdoB2jgD+u3Qntn+wFtnK1oUmsu8rEcOcdza
XRaVb8XQ7AZ4WXP1x3nBZauSlysDYXLOHE0OxkEb/mB04wijk1zME9KIwqos
naRtXpE6kOOCYOIUCDrxU/NkWnmG9ywpecvijlwwLHTnPRUjjKVhy57lfGuz
F8suCmTJDMnI8d9jxZrk6fLBaIg4kH371b4PRxLAuQ1Cr71L9EPWHqSILp7r
G7p3TxwHvv0PLGyMsOaWY8bn/Az4lKKOV+o9kjE8BaRpiBAhmiUNKsT7QwdD
fD7uuDMJJwljlZJG1hL9t6K+Vf7edyW3XtWqED3xxzpk91XSzFe+ibGbBLsn
fraI5hJIP6OkR6pVEiAMVLfs6FKzN5n5yqY+HSrx0LDw4m8x/yHbbsCwed0z
Ef5L/xOsr1221c+zuf5f/wcMCcm1uIm3lUeB+MiE9NFoeiR0vagtLqEtLfDD
/yL/yIEOHVtbhsi/i8/10f2OFekpOBXHEThR3I+rIP4ppd2cSMRNAzxcoDli
QO2bf7RUkP/0g8uBjnjjojU87R3qIzf+3JWbH8ZwGJOv2e8RTbqXClWVGXEC
5n/K4eRAD8OBlrd8AJnKw0+odYPe0xbpfCVpqUmDsieQra+CSD6xTFRtMC7T
BCMI+AhWNY/c2BP3/ZNXr/2sRZGk4j4FNng4k8gc6K8z0QM94o2fbEKvwujI
iBz5GTsRS4WqYbNB2V47f3nqjsQjd3Y2csj3PPrVwcGhNCUmTkkihV268iU3
i3r3oE1FqV753U3VP30e6B1Dk3lY8VCwJBpDmroBp/HNVY0BI+hHtWa7SOSB
60/pkVIrcQhoc3ltSce/0ekr3LA9k25zW03Qt6TeEUs9k9S/i3XVLbl3Y6mP
nJSU5r2EvvY2gjfq+o22T9nWQJpPCLyP7gc4N+W4fRz5L/bP3ZLu/0tSjiu1
vYhjwRUB3zy2ItkS95M405rNfw4b/Hf8IycR2fba15X430ZtF5XfDQbUJfzb
RuHqHVG8//STHOmui1lfQp8PRkJ7CaMIM1tQkiN3MtUoVAr29e4g5KJYySiZ
IcKUH1XzhE6q589T8RoCcaSKc0qPxRzTdBQ5qoi7c3H5nnf+4riDwVYATwJ7
YNFRxuquSKNPXh3KsJVYlzcXxSqKyozikOSnblxOInLunN5vICdfm6Rll4Em
7l9vllUY19xiUEiQcQxS9JdsdKDAAgnqZP2N3MvXLh5GR5ZbYeDuULQbSzur
L0hawN4h1NKT9GSGJMrb8Ka+ZTQ8yaw/tSxJzPIuzAwjJRqev8s7xV91GJjI
lGQZ9haUdBO2FftJFka35TJgQma9wWkws4FG1n2QxSbLouf8+4GrFBWj/8PY
w/hz6Xk3//3sH34+P7+IK9Uu4iMMVMPRYaO0MR75rhfSblgJXGx8ogDXdKQo
fzFY6Qb3DU/mKZLAHXRxqWFg57m848k4+si2rcvf2q6Yu5BlF8tautrH33ol
j+QymU2Wjc7EPViZM4D2H2pjHP+tXu3dhV928FvPi9zPSJV0Ix6xg7ZtCpId
31Pf3HZl44XbBcMXfupNzKrwHpR4PiZYGr4iTYUDDNmNspb0HIV+2Q7MEruz
tXCWFqL0RjEc7XOGi00GCfcdZMAYvvssTCb0lc0VN0LeSP9cPsljbqPcQ+im
WEjvZc7xHUhoSVywUFGEo5HWPz7HLJXYt+SeCu8ofYPCpLW0cZbtNtApq7GW
L1cYgFWjh4BJFz8mL3GxfcjB8Z3UEUajJ9FDuC0283pMTEvasUlbKA0WI8Fs
uwrY/f2vYQaH/iXhx+f84wiARA5/5x5+dXDg8eIXlgcHFjkr4oc7zv3sUx3W
/eYbLkQdQl3361+7A+l99ObqrkFl5VKCpIx26RDBCJKurcWDZl7E3PuDJQyk
zoZe/21xJSqArXzGmnla+Cy0AoWPMdyuNb6zSJ90qeBaksHEuFBxAidkBoFj
UpdtU3nVpV9QtByQyOa/vWMELBvVNnMlGRwmiUWWRZaFikEbQRY2q4noYf7Z
0F783PKoKy5HfQc6497qtDRC4zfPzo/9EM5dnfbj/n4J1UL/ob/nHLPkjBSV
2+PEZRs1EO/u+g5W8QdKhnr15qiFxsC+zXAE76S7MBTj8hKth3uTe6GNaYr7
p84fOkv6YWix32loY5JI1q+SklbHXEv8aLvfUNSIRAR95gavmlHHuy1FA/NH
9qq0YPUCyXf+lzEYfQPsAMyyjb1OMtDtU6OHNaCRzFTgi/Atra2dTXuVPrX3
A1fvntnc0H2fIpJaKTyIamjGqMW1WWuXmV1ZGxy9jXXzEtPQpsHz1FKGVNn2
x7/5ggie2it6s+8p7sutwvQwrfEx1dcIXbeb8S+Lhi0BbbaazlBFRh9mhc0t
j/v+/XqLmaC9WM/p5HNXMIJA4+Jci3SJ4MpwkBMPPnZoq475tWH0FJoUwWiW
dOSt0ibERKIvR7mDmkse5Udl0vu3ZY5yNrgLpseB5tGaza8ozYdacyJl3BpG
bISmWBeMA7FbrsdxVFDtvRwzCPeTsYr99keER+v8UqdviKcuZBZ8GiRR8nuS
85m5oTDTF+F+JtJEz1LB0MIKsVA/J+RPm5wHtt05ldWnWLNNiofn3HVr1ivd
IHusvmRbdUrn4D7FYF0k7znrzdphZ/EYDqmCsdTIZEiCryVXV3PFRYG+HkNj
gX0wg1yPeQrNm6103T2pkUGl5CcHZu7bvBZU+hNV37+fXP6JkCXBM8pnHZj6
Ituw/tz9/muMmwN5xeY2Du0fAkZjGekabJ1EZSsSDld3ylMdH+iift1hMSwR
KCQUCiw43T+B6EBj9aMh0PpwbIK2Oq8nTiK1OqUuby6l1+auMapK/EQZa734
Hukm3woDcnZlaA8huFcqjCIITlyLFRFl3DbcJ7yjSEF0QY/EGi8P1SyMOaFt
tlZmf3JGi+vNUccycZ1TNMp92+TCSJ3vWPofHmvIjtMshmN1My/+vOOJNx17
+HnUjix5dDxUQkr/20FDFhzw84y8Z/GONlk8Hke+5/Wt4wEaKapLngOcDmfy
rqzsVxP3FqWlejLVRCKKkuDsqF+CpGTki5axbzmxnyYplwGeJdn5zIy4i7j8
Jomm7HmH337IXhhYohdXgbS+qbVI8FjmNJ6kUgVzGUU2D+4/qdmwQU7cRNKb
yX37mBsZ+Kb7nVZWLtEr79zXEW7Hiia8u5eV76Sk41CJgaLuNtmIDjhKa1S0
dbgL3ogw5qjnh4i0JR7qm5IAKhu0MDePnLbxDkQ4vPKDrSotHNW8X66H/HMk
1v7iQwLWG0UsTOUSfsznvBiljh8t+fcOtj3zVh4jPCGM9DsppRkopJFyxODG
3+NdcuvlNAKxz5zPUr+vQrVQUpOjdTRclZPOOAkRypTt9dznewhElIsQQrCg
scYAHrtQTiNchB6u7vLaq19EfCLIlqyb1OkOb7twtLc6ZAxqk/f5qld3VyHb
lxPfDBScJvTC4RzCUJsz6HNT5aJfrcp9UrAalBpfyTYtblFvOIw1XOAR7nEy
WAWrZd0ytbUeqerhm4bijCPUxfCcqJuyDTNxQ+hFsrNEOaHd8Wjg7UDwwMGA
tFARpB42DPUI3DolQov/ZY2lEydmZu4u3tKTY55XeIFqUuZ0OuzVhGhggllU
UTTxE1qNxk9ji+jc6yynPjkgy/plrf1uCtJWptBRZhH/8C25/BThAU1MeX5P
5kGTBIiGxgL2ZwLyjYdvaYYi2Jt3i3xaJ2CsxaQIYs2XqU8h3doXyTPaSpkr
/7R4zysPMsAvOOXiEIta8cVaYnBcAskZ9RguAyyNUjwlYbGsNJDIGRui6wRZ
u8xv2BQJNxjSO461gfJgh2LRkCNzKQs2QnunnqxKMs8yY/VX1OQsVpNJoKrD
dhQZilrhYG76ty9CHO8U3a/LJTzfbW3BtPSTExc6tcTat6+zyuLcIYy/8q/j
aBh8qPUIT9+O3Ntz9/K7k9OR04nAT09f7kuLjbAguo8onDwzR/mLACBvY/BY
amWyCTALIt+6WdfN5xkQn2k97JwL10n93uvoLpUXxclHN3nD015spM8A6WbW
VPiW7XvxsAzsOEB5FMoOpSF4NoB8vtxSppOA5Wu7hFL1cyn+pjO8rSJ5DLH7
6dlLvZ1mvhOiBc2Dz8K2qs0etqc1YeBgI9c42hGSP/sCcx5aa3DEw6ikUXHW
K87eNU07HlenHmlWdzfwuUoo5bsNh6eRgUYUQhr3p6c8Geos4BiYa9u7UvyB
Q2UwpHtwBV3JrLzXImWv5c24ljaD7ix2C5ndwlAVe1zqLjJUOu9xHfWmCGOn
fNMkPZzUkWlbkOOB+ZJW1NtA5fHfzaLqeT9UaBthtEhNoZf3bjMTPzyucl5z
96BaHYcgZ9EB+Y57l+tRgPg+u2JW3uNekfyrm/euWCyYcrB55E6rYhogy7na
wL8oE1sd/e0ds/OwChJCtWVWxMKzdX4rRjezK4zTMCiASjB6TZUCr/c9DzLy
NJaRyeiYbUVAB7R8UtRmPfN7h+2t3onkVXFKSqeiyHMoPsW+w8J3b9ryvDqe
6+AjpoQgCxkt2dtDqZOiwu+9x9UNORW1hZTvGjUOxddgp/MBPhv6f0UpNmnL
d7dDR2JVIUCRkwryDxwc1Uh8L5orRUKewXW1RhW3+k4I//X67FlCea21k5PQ
Yt5FIdm4Ms1fZEZKLqyWUQiOmMZbNlHvnwttKWwmqm8CmKqNYnMcI63kO69q
8SeQHaAA2F5LZ7fITDBOiRxKFrkrH2Tg6Qy1M2Lpc3hUsgYenJD6WrF55fLY
bYgRLBf31Ddw78IyIJ7kpbzrEw++/mr06ODAB4uT313cm+P5ez5PIkM+J5k+
t/FTD0dfDS/AK1zx87YEr1BeXo2D6ooVdryvK9DzfgvId9hCEqIwUcLjCvhF
emNadp9tX5eUwg43KlR5zakJUtFITDFfxikQIemiskOwevxU+K/3g+pkKHjp
SfuEorydmMBxT/5rdtGP7r+40Ng6Dw5MGbS2ygthCJl80ncxavzYWkYGTy7S
CRGZjxrJ8vTJZ5+0ZcTZ36j32moC5azHmd9PaPQTJCTRpQ70G7cFjwQDU9dR
GBsevXyN4u2y2vKVRj5oDNrxyQHc9IhX+EKhvg5heV+vtTt/JfqEsdOkC2G2
Q9Df+n6E01vrVDhQKsWt36IYYr0Wfbj2BneyGQ89HqjYSvfDzleB8+oFxz9E
lLIu9x8aF7pzWOjEvY6cCSA4vM+J69y6UjtQ9nVQTnViY6vfWUsHrWr6g4So
peNNFrV4EqrwKYgT95nyIQtZnwwiqXwgdLsl9fIY1PkMf9Rysb7WL0+j6/NJ
dat78DBTw0tuPYXrcFZxpkM9Q/ud2KiBKjE+i301qozwXhF46MVbkDl6Xc43
bDj5nAWCf70Y0/9mcCKvufnhstbq33BeKRQ4GTit24N6tt87NN1z1H7Ug9NH
jLtaE4F5eDrs5Tf4SdYzHLUpcq71/BrKkPbGk8HtiFmsgSgEyEkGwP3roQSU
qUgbGro51oqx98SstsWUkmbaROmqNBjeFNOrun6fxd3rVb33eQYsFMJwHk+D
DAjfqpn9VCtMbjXiYkyhD0zrjruEGARF/3d78yZfdONVsanImB6HBy034XZf
ZuXKBBpIHCYKcfBILHda9zGvZzREeCDJvyyIMRldFEnGAlhkIye9YfIl48OQ
uJWp9LkYcFfb67A7n0CXrYnFi3NeqThwQ8tcEuq3ZIjLTQ5jAios01iGit6Z
BY3jbOTzZyfWyJw/B6sF1o3stdG55azIfpF0o6PHWuTnWB6G50tSOQuRjfFq
BK1Xkr2DAdF+ZDT6zf3D27PXT58MQydG3DQbbecE6kw+EOZP+7nTbG2QCCJw
AHJHjxz0KdJvhzn23WOqt/IvvJ0bDM3+iG2pSLN2GEfHoHTNrsjSUGpqMXzG
pGu5GtU02DURJRXG1RAi7344efP05cm5e5Ffq0c0LojuSTftYfTDLVIM4P2x
bitPq8tSOhufrHX6Oi2EzhJFtqef2A++gXYyoKX1ZYHpAsx3Ktme3D0g1Rho
uGWGmCuYwKGp6yNr0sUBh7FEId6+fjbKTJzQ/8HZp8D/91V9syzmYnP5oAWn
ZEyC91wDV31X/rtlWb1vL6ylgPZ9YSbo4ZSxlVgvta+IhzXy86v3zs+SDu30
zk5enES1sv4R7TwlZfTBeScuO7QE80ORw6LycIXu6lquYMrMU+uu6V0VNm7N
1wD4eV3DANWUW278d/zgQdq9RhJbT9z3T9/EwUPuVIL0AKsgCgI/mQRH9HhV
zq4M2K1864+kxtjAsXJw4BgPk7TJJDwK5ujR1w9ljAnUf21Zh3eODo6+Gh88
Gh89enNwcMz/+ydZRK41mhFTLBfxiBtShRY8/WLw5Dr9ws8OQqOGz39bnv/z
b/40Ci0ZRtZ7bERPSM7yO6KeUZLFLD/pjRcarfIP3uQZRSnKeLjXqXyksH4X
+nSP1vg5/vWuLX8q/hJmgHTFar3Mw9ic5MzTpr5pi88/sz6frNEbQPWZK/VH
SYX15vXsZ6zDT4cBQtlfBJ3ZrSvt0kFz34n1SDxSiEg7qYfesFqHys2LmjG7
CMXibGW+DxuNkSFinbG4vYp6JCfuJdtR+h4rIbRNOPAwNqLxDSKaIv7Q48ze
iCzFolj7XhCuYG+lONuaYHvMltCMZbOcoJBxUNuEklSmHvXN+mhw45f7Yq1r
7j70ounmVjo9daKCMM/utQAympXhMARtcA4lh98EWvj1UG8hP+4I//zvRi2/
Xs3WI21Blz6RkNGvpSQg+vUWXf36vP9ITFe/RplA+uuU0n79zZeT3gM92vu1
cNjeOfCLw+2fMS3++khrBzCN2Hxj24iGSsZ8BUejAJZb1MkPrIDrox8w0GsP
NThE+eJPFzzEsJH+Nbhd9uUVY+63pySg2QsXGCWoLdOjmYwXWs/jL3VgyaGZ
7jxJbo9niUgjnWJRfnDc0Hd/EpSIKgx3Rv/1eAyzzxrXzopcmqXoMrQJwrU8
aoW2jkfW+96T9mElxE80x5SPJhiILxfVBv25Ll6OD7jlkbpld6f/PRU3Shuc
GtL30leEWKOgHi7HHztPP2Y0nSQ+SYmMNDmKkD6uXTNwmQM3rZNJHdlDG5fM
2SX07MRdtlXOptuX2jL/Vd39w4PxnDRkedytQ1mbFPv1x3IEKGiDfukRBcKA
Hy1t7R+GcBS2+3QswEhnAowSfNNJ2X6yN3d52pKy+PK0rpcojqMHFmSl8G54
tob+dRQ+7MEGDipaUn+0hsyD0OkcOlbAyRQjZeWqO4nYEF2sMIzp6RARqJTa
PZQ4CSoeXKNxX3RHIVI4lvwhibkCNNZ+G3+OxhoSUlxgCOIFiREJJ0WF8/tS
JqA+Q241jICznzGkSi8q7/m4+VSahlc2vSDXFGoVcGR/iLWsSX/qgdX2yhx+
z9v33vMQORfXCFPEJ7KecH1quDi84Op6luv4tfVR8c8zC++9dHQQ3uLd8asT
oypSZQ8OuJ3XcrnN3Pkee2NZDBKdNORSrk8mKmv5VZ1F8IFFvO4GyGTPxsQY
meyzUTaIxuFZQdp9TmKQ8yR4liNQTWYjM1XRKA5NsVKwWSphpFg82he/jNmt
rKVDkRrWSVrk/fFH1K1uXoZJosjp97Ssfk93w7UwyVwc7Xi/LC+vupsC/7bR
wbZXDodwtqO0/7S6y0znzmAqkTh3VfXihtDzaMIz2nCR6BailvRwRgI+Jath
k4yTu8hc8nrc3laX3JHvQU3WFuYdjNJptyMp6hgNdU9jcgt+bJkP03kQa52B
HWCebamLLlEX9RBm1k16Zlw6H7q9no3VPT6GJF4X4+ujdPTzOf/Y93ck1Xtw
4jN3c+RSl8j1ONDecXDq89Hk0eRw51RnIYN7g1Ny7yVtJTH1wP8gmeApE25N
m+AZCaKm/qxxtg/vmE97dNfA2cDC/lbzY70tffDm8NHxl196W/ozh8TG7z9M
379rTOxXnzEn9utf+Ud2HS0YeneZ//6fP3/ahhcJ/WAYob1NCgOa4KAYdfw3
WDg2VmGRXiSfuGCWaaN1NIpFasdi9wxA/UVGgrqsTKHoLSoZFjYjBtCCtoEW
ukVjriNbp/ggaXeaFCHuPxW1SZt02qdW8DC1srfWM+7E9Ew595HWEbCTuPdk
2QYRJIrElidyEVLOsx7v8i1/5Yi8x3gwKbq7rJcbS4kZF1VTItU8S3swjuLR
jIxpoiVCqRngx/9ujjltV4Mesv+anLQ3837gWIe9B6Hp0rPQG9Mx9+7eZDLB
KvjPnQPYY6Ybhqsb6cmHJ7N69UAfnOAaBiapyzGzXbPTf55UiNLke4xgEu3I
bvnniorkAetOljDhh+ODw55DdMd7jSKh/XU8uxofHBx+llRKrFJ1yvZkweE3
bw6+7m3jZ0iz6Kl32rDr08Lm/yeCcHhi+sOfKyi3RqoPkZ6fHj5Il0ODtoUO
QgAkAc3h+PDLvr8+9uwPwvFznPt/K6Ee8aG7F4xJqsXfdLWwlHGt7ZV28Sb/
KlI/ynrTRtz4P3bCw/+n1JZfhO7MZuGIhLfOI97wgaHCUw4sSsQ5ZwOCvw3K
gWQyRGkzNlEVSQlszpXcsHMr06jhZPcqBKAx0hTqEu9JLbzYtJMMyaQ/M3yv
4mFIDpKFKgHN77d6WHM+mHtEPIySMWsbl09PhqATg8VsVW7W4a1cn4yhXmMN
GvhkCyl34UIaM9Nl7xrxrDl7KSm69yV9fhqSNM04e9Jy/gASyppit4k5MRTI
q5aTkJ5Ws1raWKRh6dJSx7V4yfegiNIhtBM3nES41dfK85BXjVQBjZpYPsdc
ptkx6JGCwT1z1kUniXSS1Qj1qVX/dqahGxRi3ML8tz2PJdcIUNSmSaFB6a8O
/vqv/+vrL/83BxeQxIAkqYlnsHCDgGQir/N7taZ3cY//ZS3ZOXDn5CH+rhvQ
8TAhveb+/dNoT5bmFfsOOEowEP+3Z9M84QspgxrbHRmKcoav/TBt0M3JvHB4
DEyduPyp5CEF/EV02kRP/1ZC0NYZJBTd8ivT5sLtfUuW9LJEhq6aEpITK/lN
ZS2pTVgcA2HLMBJ0iQqEJADHa/7UduyU9Ytxb+SGX9MFayfffMyZmYz9kvSZ
c2rXvIjv/uMgRK1zDtxFgEtVXNZorlJGU3W24GtlhVo5GFB6u87wVNaN7kbe
yfrVhhb5K/RBnsaYayCQwAJXPqHd9l5kvVAjjppJTnCTEZObyoDAJeBbLFXB
6+cl99Y/driHkZvSFwQxyiqDEzvA0WosGbO/Lauch24p1u35nKshnO4nsxl+
n3778rXbe/3dqfv6m0ff7EuG0ZSXpo/T3Va5DvZkZsHZLAIoS7lkW5iXEcKR
LGVOfKBrzfSYxy4i1wezad1o9esAIEH4mb9PRJMG3+ZvNh4fyNjAGIS5JDNx
NZNnG7r78PRjza5R2FnRhBTNczgaBdIVV2N1VzqSglPtcLMMgKhgKG/BlmVD
CtiJfJCzegJa6NL0+0yt6FBSwHqu1pXJzjWpKZrweNrkN0uMBd3ObuJfEUvm
BgJtUtibNBbQ8t3A02RKJHMwfdv1//kPdLmMFvm5/S5/7j8fwyg5q6mxYgYe
VGIzExdl03KoxZwig/0ehk/AuhmaGkRp+wqi19ajcBSX+3xGNe9e3LODP/I8
Ry8s9Pfpkhv52KtHRoacMUikzvff8r1RLO3Pn8K6lii+hYvePYxSXEG+BYF+
o5VyN4MtoKqdYkNr26RHxDn6TyXoad0oenipnSG4KIJT6gvtqcK/kJZAJMcy
rjWrpZDCTy5Z3mL8rdpy0IxQ4yKhXT8PRNPF9UMY4sgV9ZZSzu69aSHDT2Vq
7kC9/MbPGoeABbuuN90U3coCtx6q8s8gZ7aGvNIpJCjHunXoiZIU7YfmGbJ+
1hva7VtU8DT2dIIouJUJIO3O95N8W4RbO8ogLt4Xty0KSOv3JfRvzLoWph91
E4YUOpO+AoKBluKmTTScjal2ew8/fNhP+n7EKZZwPfpHWTkuF9r/SX8o3YEI
uG0tvQkZ4MNg1UV7k7zlhghO+MOEe37cv+9rUxgB0KVEHkMizs6+H9ZHgp/l
1kkyU+zTLT8gOtE63D9jGbjObeEBApVlt+kkOzF0p00noKMNx+E+qy/9DiQ8
ZA4SmPPlWRRF2ZqcMrI1MDq+ISwmle9h8rTKdA5Ex6MM0qV8nwjfCus5ZunS
4f0wavZL+znU4FxmxKlbxHoz++MqIdPNHeHmmH2x12r71j7VXKOo5kMQD5TH
jWoDyPkzbi++OWyvGherdYc5ywzrffOKE1Nh86Itu0IrewsyDaV50SOPPaYE
c2KN9F4ILVpgKdFRH/qjcnv2tMUKirEMbbndy2C3Fz7p53R0n6jOX+xqCYOV
uqs7OqorD97R053JgPGgfylIWB/IwaC91pU2oEYljmX9cYYeLVNIpvKmQutb
N07zFJC34aFJFzPU6X67h714AxlFi3brsHpOcZUYcaINTuwNmOhmfOLH7q1I
1U3YDeqbtneTxJrY7vAteKSNHhmZpGPOR2bUmoNExfZcfZyeMdhgVv01cQ9u
5cONOOv3qLgeGjEm7cucTcDWSgBUErEk8En741nOfR9CpTAa/iCtQwETZ8Ew
bCIBFdIlmL5SiruR8RJ2mtzuUxvIeRDP6s2SZ+Xx/HUey+aPGE1SnctCtRZ9
tKw2bJ8rr9Je8+umpq+ulD/JGv6s12W9DFgwgNPm91LvFss6DfoFzkuKjVdQ
sQ70WMQWl8O6wEtpx8mk4Pu2aR+zMKIVC4l95Imq6BEWRsoOEujuVkd9Vs9X
ybol1uk3lYuuCJymbOvKxnU+Aqf7Nu0Npa2hSulsdhpNfrcZr9HQvc/lUhP3
3TK/NKKx+ctKC56EsIpQkag+/tc9GsIMnF5DK2BQ1MEqc0kvbJlib36tO5ph
cfKQ0XPNDA8NtVJWg6ZWkRZjHbCERgE0aZTVS0gcDTbMZzax1d1+tKMhlub5
bYeELtSb+Z0q3j/k0vqTC8d6wrx1e4Naa8QixJOBxsZaoRG1s/902y7pUivN
wuh4vQYDvqjOjISgqOGLnNrzcKuXPhYeDdV5g7UTal2ySoOviV54TJd62eSc
LqZUon3F7RuHB3+DjyRs1XKW4rrj0GAkcbZyC6cL1gxJV574Ejdm+ZpEFZoF
Pxx7WPmkWwweZp8LbUflBcmUb8mS2rEuY47/TcFJ/ZIknTO99D96eDD0VbOu
o4O7sNa+dMP2bTylPJALgQjrgLaCQqzmFfN2n6cXwbWv2jz66NTCCWy/A/iF
4AVX+Rz0m2RmsY4aI3xfKKRXJ/g+9Cb3K/GNdiGGpGtlzvaQmL3cYrfiaSnL
mmguRm4kEZSDtqh0Ss9FGoxRZdexbYnUbXZ4aVMltsFazVZ5j+gQf5zoqJpj
QlenrVMlffhU1wl3kvW9UBefiD1fiO0h3Rv91fOIFlsdk+klICJ7+egZjzTB
hVNGZqOqq4Z98dEc3u2Uf/UjSV33WVqM/sC3xvkosQ+YxMfEx8ti4X+FCMWI
LoENYq7YG7nTJy/cVTmbbTBY5fCv//q/HtJ/v0Stufvr//if7jD88eEB/xH7
rKSWpLMPjUJDKksXBkJsmqlmMmttdlSV+NGd14vuhtX6qrW24ccE2BytGup6
PXIvXz4fxd5VqTKknRrqfHSPaMdfOXzgijf5SP/7Nf33o3vKxdgwvQbpnVa0
6zrSBrl7tvSj/WNn/MO4Bx9FyouThj4yusUaWq1Q1xc323E3TY0AjVcnR2zi
Oa6kzOco7mKHlwj+j+5Xv8SB7CS/wtH2Zvl6/9MHOnnxZAcDi476sH/UX9FR
fXgzn/m6djhOcFYW7beRyIo1448QggMKpeS981YTCWBxW9YjvROMrUxpHdb2
XiBiQUH9lt3L4mFAzEdflo5RHzplGaHDqWTH4hv0WRXcUFLbut+tC6M7dOS9
uGRFhcNy3KmkJspplKWHDbaBTTIjbj+Do4BXK0+P3ugbnoktCSdaMOdY7BK1
NPW6gcNz4i/mrs/6ipmSh2cOt4qhhYdBo45jhYhxaEgq70Nyio9QtVxUYxra
L5FE2vIq9+JEnr1ooCo0T/Cdz9ij0dtiV/sgXeIK9l7KMW6dNsk505ZxueVG
16Zq3o1S+lRztvTDFnpOez+JsinWOWvvlmzpz+M9vje59Hu5ycvQe5yRN+yH
oUzwkpKCAae6lsAX6E92vIs+/LSFQCRmtiR65ufjTlA2Rmopazwzc0HRqT0D
OlR0mRakOpT1pknPy+OPxlvKgIx/FzOLO0JhzI40ClQI8Qwm7rrfTmLk4fgd
XftYmmtsgU0c2p2MEvNxCQQl4mmn0glG3PL5lES6hcBCy80KaKTMWAMNeFAK
VDHh+xlrSZcaAltB7UVNAE/wqP2QENH/ve0eNyzw3etz4aDZlCznMmrEv8rB
xjnzYsadPZfySeJy79n0u8qbFbMom7fqG2YrzXB3IqMvseqkMYf1RYmClxNM
QIW7a8RTp6UJ+mHaIcVvmdvX9Hp53xGLFuWvN+GI9T1rCIVPxhVYGbwAqBjS
ySasRvvmS+zErZtegZGIO8OXnVNvGANt9A27Xvhiia5raXsQeIDvhIlJRtpE
Qb04jjklxDyafqf2E+6clvbRMBmWJnMKM8E3d27OoF7TFt+TlFtvxrac9rfN
vDXm/UkXbK6F3VrronIpLbNIuy6kN3ttV5iF4POMeyHqhXUydXfObWd0CI9O
045zyCSp6Hxd1ws2u5N6Su6abIQWait3NM3WCmuJycRze2WSr/jA9MeJSJhw
CJG7WLdSdMeb17BTdsGftq5p6n4KTRmlB5f+GLz/pkHiV+WiHWzWZE+EXGwx
anrpJoC1dHhwPKMHHdw4n0ZOrsWs/eSraEZnyBGSGjTSHlvtzd1J4CKZd9KL
tukBgMgMDgsWslV2wXmDF+JIKuLtK45xstkgFI1pcPhpD37SN8/O930trvD4
tojS5PC94Rb23pHnAeYHCvXaeHHT2+w9oftEIcO8JH0Kk2b92vNiUeRdNCmw
P5XHZwF2jUzX4UhQwtWwxqwbAI+gZ0goNNNBA4cX2yf0sUn36OAQV/Xo4Feh
a++bNLSdwgV+ZBuZGwag75oAnJ0kQfKoMVG7FXOyYWxhbLaRk8/4GIRSxQ5t
0+tVd+81bvKRgYGYtc2d+0TcOuVbEljNPhFYDXMvxm/YY4DpcR2ppu9BRalH
Bq1o2qDw6w5Z44eibL58sQusQzj3ONaMHyk4rPvx8JHNrBfXQWiIyqrmImc1
I9ue1fecZJh2SuferTY2kvdCWpvvBg5tjGBTr5A7a0JFHCPbYzGjMRbiKpmE
pQd644ce2hpRBVbEre+MjTrvcucWOLJLU2P9hDlilltqvebhoZq7ntOrmwqI
uKlm7C2vu7EmRDi5YvAYSyTqtwPT+ZmhleDrsn3fhhY7Xi8J3Q5ZO09Sd7mo
yOvovn0X67ZtTrrxLVIRGmAdgMs++f4gYWkXHClcfY0nJEFrspbMjozSdNow
5UXEHHF7+joQbBNF632HTUl4rm+qNOl5t7LFJJxk8xki5xiHxUDhLaw33PE8
87Mi+aa9G4obaqX53n74U6dOQHpjNRlMw5xqyt089NRCpjfy1EiSTJL5jbwB
9IeLcNIzqm0COun30b7lEnJaNounUCeSgMnfN0np4v2GduOV+wdQtqj8b5Is
oT/ZL1hdgVOjxbw9nc0ZitlJW+XBDAvWTlerTYVzMayPNR8kasHxxlpwXAIw
FQYTIKDy45U21y6nHP6tMFcz7tbR/gZxlB9Z3TFDlrUUac2snRL8nITfuPMr
5nEcjrOFYtrHcklakxnQrBzEWYC/0dwI+4WkFpCtp9NlZf9hY2xfLJP9WdRM
2BafLkoRUB0j2nPZav8RdPDyvUZ+o5kLyVRcCz+oKorNREfnCanafzdEKngB
bORVMg6X08DzivjEpcR/l4XojYh5cLs0kQp9/PyNZKH45W0Nd8P70NaIgVq2
m8twTx/M3WMmp6E9bijgvyKP63jZxbL4YDUFGuQcnjbq55r6S7JYJ5dexPnq
Fg7M0zbh0jWdELvYMQLrN7JuXV1yl/hoKgivBqb2mwQ/kA8w89YlcOQ3GnHc
Nd+LowWckIN4AB2gN9qCtYscHWU520VnOi12TwxrdUdXtD00xyTmHC8pkVTG
VB7uAJWNR6/Ea9Cmv8Km0bJHujyynYdtnrWJXyY8wW46m7DpBypwslfSNjjx
VHi6COuYNm3Vo5FRr5F9wquCE3B1PpLMCMAVrEgZoL3/ikmaxKJ5BrBxdpT5
cHrE5HzPlGn0hvQdxuaReTmxbeaEWyxOerXQLPo0Q9Ayynk9a94qeWZxao/v
K4ooE55nvciL/FHcdXWVV0QoK4lnCCazlQ83DILhdOavmRnDYtGVxMq+Jgkz
5xn0Tf8LAhTZO6KbJeLoGwm/dzy5IIetXU55njGRZysDMEPrv1wnFQsmSyNA
+e5IZYDwYp4aVBUb7IE1I6KNRdmNbJ5f1C2/1yNUksfdCV99nFnP3mSEzhAG
iEuippxvQpvNeWgi2kwJ5XCr12tiYwRH8Bx4pcZBw9o7OXtxLrGgM6ieFdnw
L9DrX7WGfW02iLU4fIiUfXghmMzmYx2eHSJCy/oyZC3oBXiI3UqUClC27It6
zRCOAT1rbtddfdnk6ysoq+rxCrM8adW2lmGEdP4STFranLFiYjfQm39LTFXz
VTAcz+DIzcL94BhHXHkDwUJkQcd0Kg7pIprLjeeolj/pJ1gc89IOk+y+JR2J
lfp8LvQAbHvKc3ZRPOc1SNV10VuVyGOz1KmB8w04SNFasSlOK+eRYVOkgvv2
5oVU6LNLUprEh3m+I/aI2fl977SgoAQN0QrszdCTULEfsURXN4dFQ4ILCKkL
Ldn84Ok8YfC37x8WGr9bW9pW/RYtrv6Ku1kFhqyIwPVGrR/PQKt0mAOyKUJH
hEuZq9pxtxixRVmOCreJDkoi2fLMOIBSkELX1JVcobT9vDeEnvd85peDR0K5
Av0DtC2lUxI4CbfVj1ymdv1nmu0njHBWj1lpV1wVa9wQgwT+Le1EhKDyoy80
c45BObSEH5giCCoNc0hNbDbYXPxxXYhkxGrN4g8nUL4Qlu+KZaEKrlYqG47J
rDthCNvYk5Tn8tI3pO2yS47IadNZ62OsQpKb3imZRQLgkNV27ezJXNWdcON0
sHalRpNsFom2KUNvb0n9XNk5BeWkUXR51y2Q4sPh/46xgK97gFIK6zgeva7j
2NT8lew0aE7WiY/rH+qVdbnLK10r2g4ZiWy63LtBPdG8llRcziKMjWVGQyn9
TIeaME8IHM5qjAz9vGoUYD4lSblAkvu2x8xfB2MgqRWa36XfIRG/PUJpRraU
pJ1pW2G5HU1CkxEKEqfjwsIuwecvRNcgjJO785V8ft9P4GKu1wzbV3Vtg3x1
nrIlUTpN9R/ALG+ayDDwAHkJKXHnQ+nODqzT5YLvPjoukJrnSi7rWS8/Gelz
Of7NYyfzNWkCS39QH2yr9c2eH2QLj4WmVWJG8OoBXhDcJK2iTcgBJi2BGIIM
T3hzZXWbhoHqD5aBXpHa4fkJ1qYfFpzd01dGLJLy2JYTRjjAy2QSiMMlchN1
yBEo8qoR2MVsEwarQFILF9D5vOxP+wambnfIhjRo3U9FU+vMvrhvtZekt0FA
sf1zSRzG60GYp2pyjIESpGznW/F4EixKrv3BZwJR3QZXMDL54Vjgd6d13eEu
15xFpknBYWOL0pKxTEZyn/QmfFfMRBluoX3XJVtLBiXoHQjcthSVIWSL9JXT
IVUq1pCRUwBtuI38X1z0wOLHgBvpgiSyFVllFnM0NsLoTGZJb1loupgox3Mu
bm60NAAKUs0QDnJ8FHNCk+Si/ZeBVSzLRP/jQ7+oTZPX61p4/7iEI9GSPADh
O2RocVDV3RRkYdtHR4G6egY2Nk1m/y5abzcEh2ubueu/7EXZ2jx3QFrdaZSc
4e9ut5rMm29kqk0MJgEPMYZyxRMKjZ+yy6j104PMuybvQfKdi7bByn3ORVPY
G+uaoCZJSIqUOXZFaIM9GSjbm2qR+KnkUKfmaVOvJqelbvnkxA3I9GcWKHAL
Zsy47W5FgkfqPSTTagMN2WxengzA7UFlGW/cYi0zcDmcwLUjEhbMo8j7SLGf
f9d0MgOTu7T7Ec8IirOZq3ZO2czHAq3UoalxodCGOh9QqOHbHI/HLMtlcgFc
aP3shtTQv+ISCHkyhNTp3deFFi9rQkRokBz/hrWJ707d0eHhN/fvszD8tsnn
FRILzicjd++3xa274cOC0Wx4rrCjN1jOnmlNBJ09bm7A8eb23sh9e/rKHT4a
OfvCyD3nPOPDb7751SR8/OuvDr/Uj7+oO2AlabP0LL7/I1Hi+LcVPOpvq5Jj
FK+tF9mZTWNrAP29t6/P2v178jUsia/duqODw2/ibz169JV+i9aha1zmI/cU
XwITCDFfmWjiI797CKjSR3w7498p/hxOHtonaeWRO9lcghzpq19HX/3m8PBA
v/odYrBczvaavto/L/Z09Z4w779N3N7TeTvZ5349XDp5XmDQYzlr9YNYlB7c
kB17dHBkPUPOzJ80cNPwmm/NwXAPJ4e6N/u9jITDEvi677cDr6922mmle0/e
Prim1ycHsj5PzuCBzEgnMljp4idVd9XU63I28isym5zJ49YIclLWOsq+va1m
Q7s1SPoHhrd7c3MzyfEIGgOhSRD62T9oDCQPEkc5jnFgx7DGB0YQPGGTpPEp
XdAPZHrQ30buFXCGjjqDua9tF17KsFaXuBtRzI0mAB41aeURacBkWqAdLl3d
gWFKTWpzK72hGbl6EPxtDU1AEIVI6NGkd9qG3+8+dDJ8gtcUv9BsU45z+h+r
GV4ZGiNbR3ulHBgOnG7Kkfs9Yd8bSKSrDQSs9iAhQtgnKFzlNZ6gM2wAE7f3
T1d1dXm5IZViUxHhTGuWYHj23smZBIBokSdJtO/Mf9qfkuBz9vTNd8xVdBbV
uc90wM1+V0ybDeCMxlboob3mCLonOfphBBFEEdmBWDSTsugWNtPgwWeCJAFg
vpJuMsUcL4XHY8fi+MAw83m9aVviKz9MsO2T91cw7whnTghYP2zym6J0p3mV
z3MGkfAaxMTN6UeslQDnv8I9u+4AjXLVFCrnxbrzGPZzAPM5R01gc1XX9Ohl
t44e9qD4gX4pWPICphio/6yaTfjg33OxNONHDztiz+TdaCFnp2X+RqcfOExy
2FX907K4RT5Cma/a8ZzU6jX+nZfzQEPP+SEw8ZH7UR8lXo9t7IE/T5c1at/P
Se99n98SonxL8Hlb5YsFaXX/d2vX1pwmFITf/RVn+tKYERNx2umYl1JJDZPr
SFPbR6JYaFAcEDPJr+9+e+BwUCm5zfjgADK7n3t299tzWaQEuDkNKDYgSogD
28/WmMUn9h759/FCBgW0y0VQJlOxS1N5rqHQG94M1n/AqIB2562zBVnTTB8k
33CxI76Tfg74yF0W5R6jYgvsTVEsxWKJol8Pytn2+LTdoK5FNDHaUfd6uo5f
oaymxB6LwI3S+psMQTcDkuANhlDjYoFPG56VSSg3okJq9hy8dsbSK/HaxaUC
2yqMo133q5C7wW2ptFNSCGn40mNUT3Uhp1Fqr7K0A2ts37Qb/ee7Bpa9ilVU
p1zB++tFnkHkI1kvAdIy3ZhaDM6vyxz8Kn+8I352XY4oFEOQQJ4jHwH5oJzA
oe9uAM4xR5zpFCjpnlRsTELkym1je7wl7BirVg1rSQaG8JMvFuXEl/1KeZhc
YWN5yr1uDkna0Ks1JFeddyu2gCE8yFG8APQaSCuw106OlcBvuAoiLn2eisSo
HaMhl+XAc59lHMBk0CYaOqiZSiPSvi+mFSsXQF+i7AWZz3t77VocqhlPWJS5
qmmA8t/DIM4zRcsp/LIcn2BSFTde3EZRzy0PGrys7CBRNlYsi99OGbWlOKcg
6yigN6WM75sZ7YekGg3qm22WZjbK/CTxwyRGLk/sIIqz2Ry75hm/8zDxnqaE
7S2wXXhP8ZJM7lK+uCN+bP1CfFBddXgtN45ay2e0JJ44cJkRnvh3qp9ng8lp
Q/VTaXQzbVifCKJR/gP9Dj1gMFXwkthQj1KOptbVlOWcxAlvix8lcbZSFuiF
STpAhCT+9USI2eweyQ/eB8bvLPXnHEEse0AMLQ2ws5Hwtnh2QExGjQI/0EfJ
kQs26Q9LU1WBpqxp7RNwGLC/HpE/+ZXBqQNRPjqWpMJA8B7Fl44EW5i9z1xw
C6fhyuOSaiobS+q5jE77Hvqy7VshwhHHnoJP52Lf2rajihbgumYhY5QvvLjg
aIJqoQwgG3pwHPr0Lma+8FzxH57JJgu8tlzHZa2x8N0XNv7W0mxQ6jGPj5mh
HpxxeTCUsys5+z4Rqe+rFqC9bl/O8i696DENU71SixpB2m1v6Rx79JiBYoTS
nQVJj7LZLOQmkGxu/GXTl1eZ45sGBOuhKhSsF3I1oTz06iPFOdk9WPZeG3oJ
tvuRww7mfjRr8RbQAYYTLn9lrp3vWIEQ8uTe1iHX54rAYDAwGCLsevhE5t6x
Yfa7h61/f/qBZ8VlAQA=

-->

</rfc>
