Digital Emblems C. Deccio
Internet-Draft Brigham Young University
Intended status: Informational R. A. Fainchtein
Expires: 19 July 2026 JHU/APL
F. Linker
J. Reid
RTFM llp
A. Rosenberg
Veridigo
A. Mankin
Packet Clearing House
15 January 2026
Digital Emblems - Use Cases and Requirements
draft-ietf-diem-requirements-01
Abstract
Digital emblems are a means for digital assets to signal that they
should be treated in a specific way by reference to some normative
framework. This document lists the requirements and use cases that
an architecture for digital emblems must accommodate.
About This Document
This note is to be removed before publishing as an RFC.
The latest revision of this draft can be found at https://ietf-wg-
diem.github.io/diem-requirements/draft-ietf-diem-requirements.html.
Status information for this document may be found at
https://datatracker.ietf.org/doc/draft-ietf-diem-requirements/.
Discussion of this document takes place on the Digital Emblems
Working Group mailing list (mailto:diem@ietf.org), which is archived
at https://mailarchive.ietf.org/arch/browse/diem. Subscribe at
https://www.ietf.org/mailman/listinfo/diem/.
Source for this draft and an issue tracker can be found at
https://github.com/ietf-wg-diem/diem-requirements.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Deccio, et al. Expires 19 July 2026 [Page 1]
Internet-Draft DIEM Use Cases and Requirements January 2026
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 19 July 2026.
Copyright Notice
Copyright (c) 2026 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Conventions and Definitions . . . . . . . . . . . . . . . . . 4
3. Requirements . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1. Digital Emblem Requirements . . . . . . . . . . . . . . . 5
3.1.1. Digital Emblem Format . . . . . . . . . . . . . . . . 5
3.1.2. Emblem Semantics . . . . . . . . . . . . . . . . . . 5
3.2. Discovery Requirements . . . . . . . . . . . . . . . . . 5
3.2.1. Discovery . . . . . . . . . . . . . . . . . . . . . . 5
3.2.2. Removable . . . . . . . . . . . . . . . . . . . . . . 6
3.2.3. Undetectable Validation . . . . . . . . . . . . . . . 6
3.3. Validation Requirements . . . . . . . . . . . . . . . . . 6
3.3.1. Validation . . . . . . . . . . . . . . . . . . . . . 6
3.3.2. Authorization . . . . . . . . . . . . . . . . . . . . 6
3.4. Other Requirements . . . . . . . . . . . . . . . . . . . 6
3.4.1. Extensibility . . . . . . . . . . . . . . . . . . . . 7
4. Extensions . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.1. Data Formats . . . . . . . . . . . . . . . . . . . . . . 7
4.2. Asset Identifier Discovery . . . . . . . . . . . . . . . 7
4.3. Implicit Discovery . . . . . . . . . . . . . . . . . . . 7
4.4. Confidentiality . . . . . . . . . . . . . . . . . . . . . 7
Deccio, et al. Expires 19 July 2026 [Page 2]
Internet-Draft DIEM Use Cases and Requirements January 2026
4.5. Proof of Presence . . . . . . . . . . . . . . . . . . . . 8
5. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5.1. Basel Convention . . . . . . . . . . . . . . . . . . . . 8
5.2. Ramsar Convention on the Wetlands . . . . . . . . . . . . 8
5.3. International Atomic Energy Agency (IAEA) . . . . . . . . 8
5.4. International Humanitarian Law . . . . . . . . . . . . . 9
5.4.1. Background . . . . . . . . . . . . . . . . . . . . . 9
5.4.2. Domain Model and Stakeholders . . . . . . . . . . . . 9
5.4.3. Requirements . . . . . . . . . . . . . . . . . . . . 10
5.5. Organization for the Prohibition of Chemical Weapons
(OPCW) . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.6. Press . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.7. United Nations Economic and Social Council (ECOSOC) . . . 11
5.8. United Nations Peacekeepers . . . . . . . . . . . . . . . 11
5.9. World Customs Organization (WCO) . . . . . . . . . . . . 11
5.10. World Health Organization (WHO) . . . . . . . . . . . . . 11
5.11. United Nations Food and Agriculture Organization (FAO) . 11
5.12. World Intellectual Property Organization (WIPO) . . . . . 11
5.13. International Civil Aviation Organization (ICAO) . . . . 12
6. Security Considerations . . . . . . . . . . . . . . . . . . . 12
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 12
8.1. Normative References . . . . . . . . . . . . . . . . . . 12
8.2. Informative References . . . . . . . . . . . . . . . . . 12
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14
1. Introduction
Digital emblems are a means for an asset to signal to validating
entities that it should be protected or treated in a specific way,
using some normative framework. The DIEM WG will define a set of
standards for an architecture that enables discovery and validation
of digital emblems. This document lists the requirements that the
architecture must accommodate. These requirements were identified
across different use cases. Not all use cases share all
requirements. We envision an architecture system comprising multiple
standards, which can be flexibly profiled for different use cases.
We use the terms "(digital) emblem," "bearer," and "validation" in
accordance with the DIEM charter as of this writing [CHARTER]. These
definitions have been reproduced in section Conventions and
Definitions.
Deccio, et al. Expires 19 July 2026 [Page 3]
Internet-Draft DIEM Use Cases and Requirements January 2026
2. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
The definitions for terms "(digital) emblem," "bearer," and
"validation" are reproduced from the charter [CHARTER] as of this
writing.
(Digital) Emblem: Emblems such as the Red Cross, Red Crescent, Red
Crystal, and Blue Shield can be symbols of protection governed by
International Humanitarian Law (IHL). Emblems can also be
identified by other laws, agreements, or standards. There is a
need to present emblems through digital communication channels.
Emblems presented in such ways are called digital emblems.
Digital emblems extend the range of identifying marks from the
physical (visual and tactile) to the digital realm.
Asset: A digital resource, system, or service - such as a server,
data repository, or networked device - that can display a digital
emblem. An asset represents the digital equivalent of an object,
installation, or service that would be designated by a physical
emblem.
Emblem issuer: The entity that operates or controls an asset that
bears a digital emblem. Depending on the applicable emblem, the
issuer may have received authorization to issue emblems, and in
such cases, emblem issuers are also called _authorized entities_.
For example, emblem issuers could be a medical or humanitarian
organization, a cultural institution, or an operator of
installations containing dangerous forces, among others.
Authorizing entity: An entity competent to grant authorization for
the use, by an authorized entity, of a digital emblem. The
authorizing entity ensures that such authorization is issued and
recorded in accordance with applicable legal requirements,
enabling technical and operational verification. In certain
specific cases, the authorizing entity is also the authorized
entity.
Validator: An entity that queries, inspects, or otherwise interacts
with assets to determine whether they are marked with a valid
digital emblem. Validators may include technical systems, network
operators, or other actors implementing protective or non-
interference measures consistent with the emblem's purpose.
Deccio, et al. Expires 19 July 2026 [Page 4]
Internet-Draft DIEM Use Cases and Requirements January 2026
Validation: "To validate an emblem" means to confirm the
authenticity or legitimacy of a particular symbol or design, often
by checking its details against a known standard or reference
point. Validation may include ensuring that the emblem has not
been forged, stolen, or tampered with.
3. Requirements
The DIEM architecture will allow validators to discover and validate
digital emblems that are associated with assets. This section
contains the requirements that this architecture will address. They
are based on use cases identified thus far (see Section Use Cases),
but note that not all use cases share all requirements. We
categorize these requirements into: requirements on digital emblems
and their format, on their discovery, on their validation, and other
requirements.
3.1. Digital Emblem Requirements
3.1.1. Digital Emblem Format
Digital emblems MUST identify the marked asset and their kind of
digital emblem. Beyond that, digital emblems MAY include other data,
for example, an issuer or a validity window. As of writing, the DIEM
charter requires that digital emblems MUST explicitly identify the
marked asset by a Fully Qualified Domain Name (FQDN).
3.1.2. Emblem Semantics
Individual use cases MUST specify the semantics of the emblem. It
must be clearly stated how discovery and validation of a digital
emblem should inform validator behavior.
3.2. Discovery Requirements
3.2.1. Discovery
Digital emblems MUST specify how validators can check for the
presence of a digital emblem. That is, given an asset a validator
must be able to determine whether it has an associated emblem. For
example, verifying whether a FQDN has an emblem associated with it
could be realized by fetching digital emblem-associated records for
said FQDN.
Deccio, et al. Expires 19 July 2026 [Page 5]
Internet-Draft DIEM Use Cases and Requirements January 2026
3.2.2. Removable
Digital emblems MAY require to be removable in that checking for the
presence of an asset's emblems results in no emblem. Note that
checking for emblem presence is independent of its validation. That
is, emblems do not count as removed when they become invalid.
3.2.3. Undetectable Validation
A digital emblem MAY require that its discovery and validation is
undetectable. This requirement is motivated by emblems that mark its
asset as protected and ask validators to not disrupt the marked
asset. If emblem discovery were detectable, malicious parties could
misuse the digital emblem as an intrusion detection system.
For specific use cases and designs, it may be acceptable that certain
parties can detect emblem discovery and validation, for example, when
the validator can hide in a sufficiently large anonymity set, or it
is acceptable that the given party could detect the discovery or
validation. Concrete designs MUST specify a threat model for
undetectable validation. This threat model must detail which parties
can detect emblem discovery and validation, under which conditions,
and to what extent.
3.3. Validation Requirements
3.3.1. Validation
Digital emblems MAY require validation. Validation MUST support
verification of all the emblem's data and its context. In
particular, validation MUST ensure that the emblem was issued for the
respective asset. Some use cases MAY use unverified digital emblems.
3.3.2. Authorization
Digital emblems MAY require authorization by third-parties. Any
authorization mechanism MUST account for the possibility of
compromise of cryptographic key material, for example, by specifying
revocation mechanisms or using short-lived credentials. Individual
profiles MUST standardize a trust model that describes how validators
can discover authorities and how the system selects authorities.
3.4. Other Requirements
Deccio, et al. Expires 19 July 2026 [Page 6]
Internet-Draft DIEM Use Cases and Requirements January 2026
3.4.1. Extensibility
The digital emblem architecture should be extensible. The initial
work should not preclude future extensions and individual standards
should be designed as general as possible.
4. Extensions
In this section, we sketch how the digital emblem architecture could
be extended by future standards to accommodate more use cases, but it
is not a comprehensive list.
4.1. Data Formats
Emblems for additional use cases may be defined via new profiles in
future standards, potentially including new types of atomic data
elements requiring additional specification.
4.2. Asset Identifier Discovery
It may be non-obvious for some use cases to learn the identifier
associated with an asset, and thus impossible to discover emblems
associated with that asset. To accommodate for such use cases, one
could specify means to discover identifiers for different types of
assets.
4.3. Implicit Discovery
An alternative approach to the above problem would be to bind emblems
implicitly to the marked asset. Implicit binding could identify the
marked asset by the emblem's location. For example, if emblems were
distributed via NFC, the marked asset could be the asset to which the
NFC chip was attached. As of this writing, the current charter scope
requires that digital emblems explicitly identify their asset, but
such discovery mechanisms could be investigated in future WG work.
4.4. Confidentiality
Some use cases may contain confidential or sensitive data, and may
require mechanisms to protect such data. For example, this could be
realized with encryption of the general emblem data format that will
be part of the architecture or by only serving emblems over channels
with access control mechanisms.
Deccio, et al. Expires 19 July 2026 [Page 7]
Internet-Draft DIEM Use Cases and Requirements January 2026
4.5. Proof of Presence
For some emblems, it may be relevant to track that an emblem has been
presented. This could be achieved, for example, by standardizing
different distributions mechanisms, e.g., using decentralized
authenticated data structures.
5. Use Cases
Different use cases have different requirements. The purpose of this
document is to list the requirements that will be addressed with the
initial architecture. The use cases overlap and would benefit from a
DIEM architecture developed to provide the requirements listed above,
though some may require additional extensions. We alphabetically
list use cases here so that relevant stakeholders can provide input
whether their use case would indeed benefit from a DIEM architecture,
and invite participants to provide use cases or details that we have
missed.
We provide auxiliary material under Informative References.
5.1. Basel Convention
Regulates the trans-boundary movement of hazardous wastes. Use cases
are functionally identical to OPCW and IAEA.
5.2. Ramsar Convention on the Wetlands
The Convention on Wetlands of International Importance especially as
Waterfowl Habitat "providees the single most global framework for
intergovernmental cooperation on wetland issues" and it features a
list of geographic areas designated by Member States. A digital
emblem for the geographic areas potentially requires
* Indication of location
* Access to presence or absence of Ramsar designation of a specified
location
* Textual description
* Ability to validate the presence or absence of Ramsar designation
5.3. International Atomic Energy Agency (IAEA)
IAEA administers several treaties, especially related to the
controlled shipment of atomic fuels and wastes across borders.
Similar use case as OPCW.
Deccio, et al. Expires 19 July 2026 [Page 8]
Internet-Draft DIEM Use Cases and Requirements January 2026
5.4. International Humanitarian Law
5.4.1. Background
The Geneva Conventions and their Additional Protocols constitute the
core of IHL. Some assets enjoy certain specific protections under
IHL, including that they must not be attacked, and IHL codifies four
types of protective emblems for armed conflict, which inform other
parties that marked assets benefit from one or several of these
specific protections:
* The emblems of the Red Cross, Red Crescent, and Red Crystal
* The Blue Shield emblem
* The emblem for the protection of civil defense marks
* The dangerous forces emblem
However, these emblems can currently only be used to mark physical
assets, and there is no way to mark digital, network-connected
infrastructure that enjoys the same protections. A digital emblem
using the DIEM architecture could address this gap, and we call such
emblems digital emblems for IHL.
5.4.2. Domain Model and Stakeholders
In context of emblems under IHL, emblems will mark assets that are
digital services and that solely serve protected purposes (for
example, a medical unit, a cultural site, or an installation
containing dangerous forces). Such emblems will be issued by the
party controlling the marked service, and they signal that these
assets must be respected and protected. Emblems must only be issued
by entities that have been authorized to bear a digital emblem or
other distinctive sign under international law. Such authorizations
must be issued by a state, other party to an armed conflict, or other
entity competent under international law.
For digital emblems under IHL, validators will typically be armed
forces under the command of either state or non-state actors. In
situations of armed conflict, all such actors are under an obligation
to check whether assets subject to military activities bear an
emblem. Similarly, other malicious ICT actors, whilst not
necessarily obligated under IHL, may choose to respect assets bearing
the emblem. Concretely, we can assume that they will typically first
identify an asset that they plan to engage with and then check
whether that asset bears an emblem.
Deccio, et al. Expires 19 July 2026 [Page 9]
Internet-Draft DIEM Use Cases and Requirements January 2026
5.4.3. Requirements
The purpose of a digital emblem is to prevent disruptions of assets
by informing verifiers that marked assets enjoy protection under IHL.
Digital emblems will only be able to do so when verifiers are willing
to pay attention to them. As verifiers intend to attack assets that
are not protected under IHL, this will only be the case they are
confident that their targets cannot fake protection and that they do
not alert their target about an imminent attack. Therefore, digital
emblems under IHL require validation for authenticity (Section 3.3.1)
that is undetectable (Section 3.2.3).
At the same time, digital emblems under IHL should fit well into the
existing framework of IHL and not put emblem issuers at increased
risk. First, IHL requires that, emblem issuers must seek
authorization from a competent authority prior to applying them (see
Section 3.3.2 and Section 5.4.2). The authorization must be
decentralized, i.e., there must be no central authorities that govern
the use or distribution of digital emblems. Second, bearing an
emblem can increase the risk for targeted attacks. We require that
emblem issuers must be able to individually assess that risk and
remove emblems whenever they see the risks to outweigh the benefits,
i.e., we require that digital emblems are removable (Section 3.2.2).
Beyond the DIEM architecture as described in this document, digital
emblems under IHL would benefit from other discovery mechanisms than
the DNS, as not all assets may have domain names associated with
them.
5.5. Organization for the Prohibition of Chemical Weapons (OPCW)
Requires protection of Schedule 1 chemicals in transit between
signatory countries for research, medical, pharmaceutical, or
protective purposes. Emblem would identify place, date, and volume
of production, and the emblem can contain confidential data.
5.6. Press
Journalists in conflict zones use protective markings that indicate
their status as a non-combatant. Digital assets belonging to the
press could be digitally marked, and protective markings in conflict
zones could be digitized.
Deccio, et al. Expires 19 July 2026 [Page 10]
Internet-Draft DIEM Use Cases and Requirements January 2026
5.7. United Nations Economic and Social Council (ECOSOC)
UN Model Regulations [UNMODELREGS] includes "Recommendations on the
Transport of Dangerous Goods." This includes labeling of items with
a four digit "UN Number" that indicates the comounds contained
within, such as chemicals, explosives, flammable liquids, etc. For
example, items containing lithium-based batteries are labeled with
3480 or 3481 and accompanied by a specific "battery mark" emblem.
5.8. United Nations Peacekeepers
UN Peacekeepers use protective markings in theater as well as
facilities associated with the mission.
5.9. World Customs Organization (WCO)
Specifies "Harmonized Systems" codes [HARMONIZED] that classify items
such as livestock, arms and ammunition, chemicals, plastics,
machinery, foodstuffs, etc. They also provide a system for labeling
origin of items and valuation of items, all enforced by numerous
international trade agreements between individual nations and groups
of nations.
5.10. World Health Organization (WHO)
Similar to the use case of the Red Cross, Red Crystal, and Red
Crescent.
5.11. United Nations Food and Agriculture Organization (FAO)
Among other things is responsible for the International Plant
Protection Convention (IPPC) and International Standards for
Phytosanitary Measures standards including ISPM 15 that requires wood
packaging materials (pallets, crates, dunnages) to be debarked, heat-
treated or fumigated with methyl-bromide, and stamped or branded with
a compliance mark known as a "wheat stamp."
5.12. World Intellectual Property Organization (WIPO)
WIPO administers 26+ treaties with different protections for
different things. Brands that are protected under international law
(e.g., Madrid Protocol) can mark their shipments with an emblem
allowing customs agents to positively identify legitimate products.
Deccio, et al. Expires 19 July 2026 [Page 11]
Internet-Draft DIEM Use Cases and Requirements January 2026
5.13. International Civil Aviation Organization (ICAO)
Requires protection of civil aviation flights and the ability to
assert that they are not dual-use (i.e., not carrying military
cargo). Digital emblem would carry a geographic description of the
flight plan, its current location, and an indicator of its identity
(i.e., tail number). Potential need for the emblem to reference a
limited or partially redacted flight manifest.
6. Security Considerations
Because this is a requirements document, it does not directly have
security considerations. However, multiple of the defined
requirements include security properties. The architecture and
standards developed need to detail the security properties of
validation and authorization especially. Use cases have threat
models and discussion of mitigating specific threats is needed. For
example, in a use case where removability (Section 3.2.2) is needed,
there are security considerations such as the potential for replay of
removed emblems.
7. IANA Considerations
This document has no IANA actions.
8. References
8.1. Normative References
[CHARTER] "Digital Emblems", 27 May 2025,
.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, .
8.2. Informative References
[BLUEHELMET]
Doctors Without Borders, "The Practical Guide to
Humanitarian Law", n.d., .
Deccio, et al. Expires 19 July 2026 [Page 12]
Internet-Draft DIEM Use Cases and Requirements January 2026
[BLUESHIELD]
United Nations Educational, Scientific and Cultural
Organization, "Enhanced Protection - Cultural Property of
Highest Importance to Humanity", n.d.,
.
[DIPLOMAT] Cornell Law School - Legal Information Institute,
"Personnel of Foreign Governments and International
Organizations and Special Treatment for Returning
Individuals", n.d.,
.
[HARMONIZED]
World Customs Organization, "Harmonized System", n.d.,
.
[ISPM15] International Plant Protection Convention, Food and
Agriculture Organization of the United Nations,
"International Standards for Phytosanitary Measures No.
15: Regulation of Wood Packaging Material in International
Trade", n.d.,
.
[PRESS] Reporters Without Borders, "RSF Resource for Journalists'
Safety", n.d., .
[RAMSAR] Convention on Wetlands Secretariat, "The Convention on
Wetlands", n.d., .
[REDCROSS] International Committee of the Red Cross, "The Protection
of the Red Cross / Red Crescent Emblems", n.d.,
.
[UNMODELREGS]
United Nations Economic and Social Council, "UN Model
Regulations on the Transport of Dangerous Goods", n.d.,
.
Deccio, et al. Expires 19 July 2026 [Page 13]
Internet-Draft DIEM Use Cases and Requirements January 2026
Acknowledgments
Authors' Addresses
Casey Deccio
Brigham Young University
Email: casey@byu.edu
Rahel A. Fainchtein
JHU/APL
Email: rahel.fainchtein@jhuapl.edu
Felix Linker
Email: linkerfelix@gmail.com
Jim Reid
RTFM llp
Email: jim@rfc1035.com
Alex Rosenberg
Veridigo
Email: alexr@veridigo.com
Allison Mankin
Packet Clearing House
Email: allison@pch.net
Deccio, et al. Expires 19 July 2026 [Page 14]