<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.8 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-birkholz-rats-uccs-02" category="std">

  <front>
    <title abbrev="Unprotected CWT Claims Sets">A CBOR Tag for Unprotected CWT Claims Sets</title>

    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="J." surname="O'Donoghue" fullname="Jeremy O'Donoghue">
      <organization abbrev="Qualcomm Technologies Inc.">Qualcomm Technologies Inc.</organization>
      <address>
        <postal>
          <street>279 Farnborough Road</street>
          <city>Farnborough</city>
          <code>GU14 7LS</code>
          <country>United Kingdom</country>
        </postal>
        <email>jodonogh@qti.qualcomm.com</email>
      </address>
    </author>
    <author initials="N." surname="Cam-Winget" fullname="Nancy Cam-Winget">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>3550 Cisco Way</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95134</code>
          <country>USA</country>
        </postal>
        <email>ncamwing@cisco.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization abbrev="Universitaet Bremen TZI">Universitaet Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstrasse 1</street>
          <city>Bremen</city>
          <code>28369</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.de</email>
      </address>
    </author>

    <date year="2020" month="December" day="02"/>

    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
protection afforded by wrapping them into COSE, as is required for a true
CWT.  This specification defines a CBOR tag for such unprotected CWT
Claims Sets (UCCS) and discusses conditions for its proper use.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>A CBOR Web Token (CWT) as specified by <xref target="RFC8392"/> is always wrapped in a
CBOR Object Signing and Encryption (COSE, <xref target="RFC8152"/>) envelope.  COSE
provides – amongst other things – the integrity protection mandated by
RFC 8392 and optional encryption for CWTs.  Under the right circumstances,
though, a signature providing proof for authenticity and integrity can be
provided through the transfer protocol and thus omitted from the
information in a CWT without compromising the intended goal of authenticity
and integrity.  If a mutually Secured Channel is established between two
remote peers, and if that Secure Channel provides the required properties (as discussed below), it
is possible to omit the protection provided by COSE, creating a use case for
unprotected CWT Claims Sets.
Similarly, if there is one-way authentication, the party that did not
authenticate may be in a position to send authentication information through
this channel that allows the already authenticated party to authenticate the
other party.</t>

<t>This specification allocates a CBOR tag to mark Unprotected CWT Claims Sets
(UCCS) as such and discusses conditions for its proper use in the scope of
Remote ATtestation procedureS (RATS) and the conveyance of Evidence from an
Attester to a Verifier.</t>

<t>This specification does not change <xref target="RFC8392"/>: A true CWT does not make use of
the tag allocated here; the UCCS tag is an alternative to using COSE
protection and a CWT tag.  Consequently, in a well-defined scope, it might
be acceptable to use the contents of a CWT without its COSE container and tag it with a UCCS CBOR tag for further processing – or to use the contents of a UCCS CBOR tag for building a CWT to be signed by some entity that can vouch for those contents.</t>

<section anchor="terminology" title="Terminology">

<t>The term Claim is used as in <xref target="RFC8725"/>.</t>

<t>The terms Claim Key, Claim Value, and CWT Claims Set are used as in
<xref target="RFC8392"/>.</t>

<t>The terms Attester, Attesting Environment and Verifier are used as in <xref target="I-D.ietf-rats-architecture"/>.</t>

<t><list style="hanging">
  <t hangText='UCCS:'>
  Unprotected CWT Claims Set(s); CBOR map(s) of Claims as defined by the CWT
Claims Registry that are composed of pairs of Claim Keys and Claim Values.</t>
  <t hangText='Secure Channel:'>
  A protected communication channel between two peers that can ensure the same qualities
associated for UCCS conveyance as CWT conveyance without any additional protection.</t>
</list></t>

<t>All terms referenced or defined in this section are capitalized in the remainder of
this document.</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="motivation-and-requirements" title="Motivation and Requirements">

<t>Use cases involving the conveyance of Claims, in particular, remote attestation procedures (RATS, see
<xref target="I-D.ietf-rats-architecture"/>) require a standardized data definition and encoding format that can be transferred
and transported using different communication channels.  As these are Claims, <xref target="RFC8392"/> is
a suitable format. However, the way these Claims are secured depends on the deployment, the security
capabilities of the device, as well as their software stack.  For example, a Claim may be securely
stored and conveyed using a device’s Trusted Execution Environment (TEE, see <xref target="I-D.ietf-teep-architecture"/>) or especially in some
resource constrained environments, the same process that provides the secure communication
transport is also the delegate to compose the Claim to be conveyed.  Whether it is a transfer
or transport, a Secure Channel is presumed to be used for conveying such UCCS.  The following sections
further describe the RATS usage scenario and corresponding requirements for UCCS deployment.</t>

</section>
<section anchor="secchan" title="Characteristics of a Secure Channel">

<t>A Secure Channel for the conveyance of UCCS needs to provide the security
properties that would otherwise be provided by COSE for a CWT.
In this regard, UCCS is similar in security considerations to JWTs <xref target="RFC8725"/>
using the algorithm “none”.  RFC 8725 states: “if a JWT is cryptographically
protected end-to-end by a transport layer, such as TLS using
cryptographically current algorithms, there may be no need to apply another
layer of cryptographic protections to the JWT.  In such cases, the use of
the “none” algorithm can be perfectly acceptable.”.  Analogously, the
considerations discussed in Sections 2.1, 3.1, and 3.2 of RFC 8725 apply to
the use of UCCS as elaborated on in this document.</t>

<t>Secure Channels are often set up in a handshake protocol that mutually
derives a session key, where the handshake protocol establishes the
authenticity of one of both ends of the communication.  The session key can
then be used to provide confidentiality and integrity of the transfer of
information inside the Secure Channel.  A well-known example of a such a
Secure Channel setup protocol is the TLS <xref target="RFC8446"/> handshake; the
TLS record protocol can then be used for secure conveyance.</t>

<t>As UCCS were initially created for use in Remote ATtestation procedureS
(RATS) Secure Channels, the following subsection provides a discussion of
their use in these channels.  Where other environments are intended to be
used to convey UCCS, similar considerations need to be documented before
UCCS can be used.</t>

<section anchor="uccs-and-remote-attestation-procedures-rats" title="UCCS and Remote ATtestation procedureS (RATS)">

<t>For the purposes of this section, the Verifier is the receiver of the UCCS
and the Attester is the provider of the UCCS.</t>

<t>Secure Channels can be transient in nature. For the purposes of this
specification, the mechanisms used to establish a Secure Channel are out of
scope.</t>

<t>As a minimum requirement in the scope of RATS Claims, the Verifier MUST
authenticate the Attester as part of the establishment of the Secure Channel.
Furthermore, the channel MUST provide integrity of the communication from the
Attester to the Verifier.
If confidentiality is also required, the receiving side needs to be
be authenticated as well, i.e., the Verifier and the Attester SHOULD
mutually authenticate when establishing the Secure Channel.</t>

<t>The extent to which a Secure Channel can provide assurances that UCCS
originate from a trustworthy attesting environment depends on the
characteristics of both the cryptographic mechanisms used to establish the
channel and the characteristics of the attesting environment itself.</t>

<t>A Secure Channel established or maintained using weak cryptography
may not provide the assurance required by a relying party of the authenticity
and integrity of the UCCS.</t>

<t>Where the security assurance required of an attesting environment by a
relying party requires it, the attesting environment may be implemented
using techniques designed to provide enhanced protection from an attacker
wishing to tamper with or forge UCCS.  A possible approach might be to
implement the attesting environment in a hardened environment such as a
TEE <xref target="I-D.ietf-teep-architecture"/> or a TPM <xref target="TPM2"/>.</t>

<t>As with EATs nested in other EATs (Section 3.12.1.2 of <xref target="I-D.ietf-rats-eat"/>), the Secure
Channel does not endorse fully formed CWTs transferred through it.
Effectively, the COSE envelope of a CWT shields the CWT Claims Set from the
endorsement of the Secure Channel.  (Note that EAT might add a nested UCCS
Claim, and this statement does not apply to UCCS nested into UCCS, only to
fully formed CWTs)</t>

</section>
<section anchor="privacy-preserving-channels" title="Privacy Preserving Channels">

<t>A Secure Channel which preserves the privacy of the Attester may provide
security properties equivalent to COSE, but only inside the life-span of the
session established.  In general, a Verifier cannot correlate UCCS received
in different sessions from the same attesting environment based on the
cryptographic mechanisms used when a privacy preserving Secure Channel is
employed.</t>

<t>In the case of a Remote Attestation, the attester must consider whether any UCCS it returns over a privacy
preserving Secure Channel compromises the privacy in unacceptable ways.  As
an example, the use of the EAT UEID <xref target="I-D.ietf-rats-eat"/> Claim in UCCS over a privacy
preserving Secure Channel allows a verifier to correlate UCCS from a single
attesting environment across many Secure Channel sessions. This may be
acceptable in some use-cases (e.g. if the attesting environment is a
physical sensor in a factory) and unacceptable in others (e.g. if the
attesting environment is a device belonging to a child).</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>In the registry <xref target="IANA.cbor-tags"/>,
IANA is requested to allocate the tag in <xref target="tab-tag-values"/> from the
FCFS space, with the present document as the specification reference.</t>

<texttable title="Values for Tags" anchor="tab-tag-values">
      <ttcol align='right'>Tag</ttcol>
      <ttcol align='left'>Data Item</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c>TBD601</c>
      <c>map</c>
      <c>Unprotected CWT Claims Set [RFCthis]</c>
</texttable>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The security considerations of <xref target="RFC7049"/> and <xref target="RFC8392"/> apply.</t>

<t><xref target="secchan"/> discusses security considerations for Secure Channels, in which
UCCS might be used.  This documents provides the CBOR tag definition for UCCS and a discussion on security consideration for the use of UCCS in
Remote ATtestation procedureS (RATS).  Uses of UCCS outside the scope of
RATS are not covered by this document.  The UCCS specification - and the
use of the UCCS CBOR tag, correspondingly - is not intended for use in a
scope where a scope-specific security consideration discussion has not
been conducted, vetted and approved for that use.</t>

<section anchor="general-considerations" title="General Considerations">

<t>Implementations of Secure Channels are often separate from the application
logic that has security requirements on them.  Similar security
considerations to those described in <xref target="I-D.ietf-cose-rfc8152bis-struct"/> for obtaining the
required levels of assurance include:</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC7049" target='https://www.rfc-editor.org/info/rfc7049'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author initials='C.' surname='Bormann' fullname='C. Bormann'><organization /></author>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<date year='2013' month='October' />
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.  These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t></abstract>
</front>
<seriesInfo name='RFC' value='7049'/>
<seriesInfo name='DOI' value='10.17487/RFC7049'/>
</reference>



<reference  anchor="RFC8152" target='https://www.rfc-editor.org/info/rfc8152'>
<front>
<title>CBOR Object Signing and Encryption (COSE)</title>
<author initials='J.' surname='Schaad' fullname='J. Schaad'><organization /></author>
<date year='2017' month='July' />
<abstract><t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t></abstract>
</front>
<seriesInfo name='RFC' value='8152'/>
<seriesInfo name='DOI' value='10.17487/RFC8152'/>
</reference>



<reference  anchor="RFC8725" target='https://www.rfc-editor.org/info/rfc8725'>
<front>
<title>JSON Web Token Best Current Practices</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='D.' surname='Hardt' fullname='D. Hardt'><organization /></author>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<date year='2020' month='February' />
<abstract><t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas.  This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t></abstract>
</front>
<seriesInfo name='BCP' value='225'/>
<seriesInfo name='RFC' value='8725'/>
<seriesInfo name='DOI' value='10.17487/RFC8725'/>
</reference>



<reference  anchor="RFC8392" target='https://www.rfc-editor.org/info/rfc8392'>
<front>
<title>CBOR Web Token (CWT)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='E.' surname='Wahlstroem' fullname='E. Wahlstroem'><organization /></author>
<author initials='S.' surname='Erdtman' fullname='S. Erdtman'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2018' month='May' />
<abstract><t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8392'/>
<seriesInfo name='DOI' value='10.17487/RFC8392'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor="IANA.cbor-tags" target='http://www.iana.org/assignments/cbor-tags'>
<front>
<title>Concise Binary Object Representation (CBOR) Tags</title>
<author><organization>IANA</organization></author>
<date/>
</front>
</reference>


<reference anchor="TPM2" >
  <front>
    <title>Trusted Platform Module Library Specification, Family “2.0”, Level 00, Revision 01.59 ed., Trusted Computing Group</title>
    <author >
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.ietf-rats-architecture">
<front>
<title>Remote Attestation Procedures Architecture</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='N' surname='Smith' fullname='Ned Smith'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='October' day='16' year='2020' />

<abstract><t>In network protocol exchanges, it is often the case that one entity (a Relying Party) requires evidence about a remote peer to assess the peer's trustworthiness, and a way to appraise such evidence.  The evidence is typically a set of claims about its software and hardware platform.  This document describes an architecture for such remote attestation procedures (RATS).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-07' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-architecture-07.txt' />
</reference>



<reference anchor="I-D.ietf-teep-architecture">
<front>
<title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>

<author initials='M' surname='Pei' fullname='Mingliang Pei'>
    <organization />
</author>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='D' surname='Wheeler' fullname='David Wheeler'>
    <organization />
</author>

<date month='November' day='2' year='2020' />

<abstract><t>A Trusted Execution Environment (TEE) is an environment that enforces that any code within that environment cannot be tampered with, and that any data used by such code cannot be read or tampered with by any code outside that environment.  This architecture document motivates the design and standardization of a protocol for managing the lifecycle of trusted applications running inside such a TEE.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-teep-architecture-13' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-teep-architecture-13.txt' />
</reference>



<reference anchor="I-D.ietf-rats-eat">
<front>
<title>The Entity Attestation Token (EAT)</title>

<author initials='G' surname='Mandyam' fullname='Giridhar Mandyam'>
    <organization />
</author>

<author initials='L' surname='Lundblade' fullname='Laurence Lundblade'>
    <organization />
</author>

<author initials='M' surname='Ballesteros' fullname='Miguel Ballesteros'>
    <organization />
</author>

<author initials='J' surname='O&apos;Donoghue' fullname='Jeremy O&apos;Donoghue'>
    <organization />
</author>

<date month='December' day='1' year='2020' />

<abstract><t>An Entity Attestation Token (EAT) provides a signed (attested) set of claims that describe state and characteristics of an entity, typically a device like a phone or an IoT device.  These claims are used by a relying party to determine how much it wishes to trust the entity.  An EAT is either a CWT or JWT with some attestation-oriented claims. To a large degree, all this document does is extend CWT and JWT.  Contributing  TBD</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-05.txt' />
<format type='PDF'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-05.pdf' />
</reference>



<reference anchor="I-D.ietf-cose-rfc8152bis-struct">
<front>
<title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>

<author initials='J' surname='Schaad' fullname='Jim Schaad'>
    <organization />
</author>

<date month='September' day='24' year='2020' />

<abstract><t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.  This document along with [I-D.ietf-cose-rfc8152bis-algs] obsoletes RFC8152.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-cose-rfc8152bis-struct-14' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-cose-rfc8152bis-struct-14.txt' />
</reference>



<reference anchor="I-D.ietf-cose-rfc8152bis-algs">
<front>
<title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>

<author initials='J' surname='Schaad' fullname='Jim Schaad'>
    <organization />
</author>

<date month='September' day='24' year='2020' />

<abstract><t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. THis document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol RFC XXXX.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-cose-rfc8152bis-algs-12' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-cose-rfc8152bis-algs-12.txt' />
</reference>




    </references>


<section anchor="example" title="Example">

<t>The example CWT Claims Set from Appendix A.1 of <xref target="RFC8392"/> can be turned into
an UCCS by enclosing it with a tag number TBD601:</t>

<figure><artwork><![CDATA[
 <TBD601>(
   {
     / iss / 1: "coap://as.example.com",
     / sub / 2: "erikw",
     / aud / 3: "coap://light.example.com",
     / exp / 4: 1444064944,
     / nbf / 5: 1443944944,
     / iat / 6: 1443944944,
     / cti / 7: h'0b71'
   }
 )
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

