-Qualified Electronic Attestations of Attributes
-Provider |
+Qualified Electronic Attestations of Attributes |
An Electronic Attestation of Attributes, which is issued
by a Qualified Trust Service Provider and meets the requirements laid
down in Annex V. - eIDAS Regulation amendment
@@ -322,7 +323,7 @@ CAB. |
*\* Additional to definitions in Article 3 of the eIDAS Regulation or
its amendment proposal.*
-## 3. Use cases for the EUDI Wallet
+## 3 Use cases for the EUDI Wallet
The development of EUDI Wallet specifications is steered by use cases
that facilitate understanding of user experience while capturing the
@@ -395,7 +396,7 @@ without human oversight.
(Q)EAA issuance requirements, mDL attribute schema and Trust
Infrastructure details are further detailed in Chapter 6 and Annex 07.
-## 3.3. Other use cases
+## 3.3 Other use cases
In subsequent versions of this document, the following use cases will be
detailed as service blueprints:
@@ -431,12 +432,12 @@ benefit from more seamless travel.
This work may in future be extended to additional use cases.
-## 4. European Digital Identity Wallet Ecosystem
+## 4 European Digital Identity Wallet Ecosystem
This chapter describes the EUDI Wallet ecosystem as it is foreseen in
the Commission’s legislative proposal.
-### 4.1. Roles in the Ecosystem
+### 4.1 Roles in the Ecosystem
The roles of the EUDI Wallet ecosystem are described in Figure 1 and
detailed in the following sections.
@@ -476,7 +477,7 @@ detailed in the following sections.
14. *National Accreditation Bodies*
-#### 4.1.1. Users of EUDI Wallet
+#### 4.1.1 Users of EUDI Wallet
Users of EUDI Wallets use the EUDI Wallet to receive, store and present
attestations (PID, QEAA or EAA) about themselves, including to prove
@@ -488,7 +489,7 @@ an EUDI Wallet by citizens is not mandatory under the legislative
proposal. However, Member States are obliged to offer at least one EUDI
Wallet Solution to their citizens.
-#### 4.1.2. EUDI Wallet Provider
+#### 4.1.2 EUDI Wallet Provider
EUDI Wallet Provider are Member States or organisations either mandated
or recognized by Member States making the EUDI Wallet available for end
@@ -509,7 +510,7 @@ seal.
EUDI Wallet Providers are responsible for ensuring compliance with the
requirements for EUDI Wallets.
-#### 4.1.3. Person Identification Data (PID) Providers
+#### 4.1.3 Person Identification Data (PID) Providers
PID Providers are trusted entities responsible to:
@@ -529,7 +530,7 @@ official identity documents, electronic identity means, EUDI Wallet
Providers etc. EUDI Wallet Providers may or may not be the same
organisations as PID Providers.
-#### 4.1.4. Trusted List Providers
+#### 4.1.4 Trusted List Providers
The specific status of a role in the EUDI Wallet ecosystem shall be
verified in a trustworthy manner. Such roles are:
@@ -562,23 +563,23 @@ When used, Trusted List[^11] need to provide a registration service for
the relevant entities, maintain a registry and enable third party access
to the registry information. The terms and conditions of entities to
become registered are for each registrar to determine unless specified
-in e.g., sectoral rules.
+in e.g., EU law or sectoral rules.
-#### 4.1.5. Qualified Electronic Attestation of Attributes Providers
+#### 4.1.5 Qualified Electronic Attestation of Attributes Providers
-Qualified EAA are provided by QTSPs. The general Trust Framework for
+Qualified EAA are provided by QTSPs. The IDAS Regulation Trust Framework for
QTSPs apply also to QEAA, but specific rules for this Trust Service need
to be defined as well. QEAA Providers maintain an interface for
requesting and providing QEAAs, including a mutual authentication
interface with EUDI Wallets and potentially an interface towards
-Authentic Sources to verify attributes. QEAA Providers provide
+Authentic Sources to verify attributes. QEAAs provide
information or the location of the services that can be used to enquire
-about the validity status of the QEAAs, without having an ability to
-receive any information about the use of the attestations. The terms and
-conditions of these services are for each QTSP to determine, beyond what
-is specified in the eIDAS Regulation.
+about the validity status of the QEAAs, without having an ability for the
+QEAA Providers to receive any information about the use of the attestations.
+The terms and conditions of these services are for each QTSP to determine,
+beyond what is specified in the eIDAS Regulation.
-#### 4.1.6. Non-Qualified Electronic Attestation of Attributes Providers
+#### 4.1.6 Non-Qualified Electronic Attestation of Attributes Providers
Non-qualified EAA can be provided by any Trust Service Provider. While
they are supervised under eIDAS, it can be assumed that other legal or
@@ -586,15 +587,15 @@ contractual frameworks than eIDAS mostly govern the rules for provision,
use and recognition of EAA. Such other frameworks may cover policy areas
such as driving licences, educational credentials, digital payments,
although they may also rely on qualified Electronic Attestation of
-Attributes Providers. For EAA to be used, TSPs offer Users a way to
-request and obtain EAA, meaning they need to technically comply with
-EUDI Wallet interface specifications. Depending on the domain rules, EAA
-providers may provide validity information about EAA, without having an
-ability to receive any information about the use of the EAA. The terms
-and conditions of issuing EAAs and related services are subject to
+Attributes Providers. For EAA to be used in the context of the EUDI Wallet,
+TSPs offer Users a way to request and obtain EAA, meaning they need to
+technically comply with EUDI Wallet interface specifications. Depending on
+the domain rules, EAA providers may provide validity information about EAA,
+without having an ability to receive any information about the use of the EAA.
+The terms and conditions of issuing EAAs and related services are subject to
sectoral rules.
-#### 4.1.7. Qualified and Non-Qualified Certificates for Electronic Signature/Seal Providers
+#### 4.1.7 Qualified and Non-Qualified Certificates for Electronic Signature/Seal Providers
Article 6a(3) of COM(2021)281 final requires the EUDI Wallet to enable
the User to create qualified electronic signatures or seals. This goal
@@ -610,13 +611,13 @@ can be reached by several ways:
EUDI Wallet interfaces with QSCDs will be further expanded in future
versions of this document.
-#### 4.1.8. Providers of other Trust Services
+#### 4.1.8 Providers of other Trust Services
EUDI Wallet interaction with providers of other qualified or
non-qualified Trust Services such as timestamps may be further described
in future versions of the ARF.
-#### 4.1.9. Authentic Sources
+#### 4.1.9 Authentic Sources
Authentic Sources are the public or private repositories or systems
recognised or required by law containing attributes about a natural or
@@ -635,7 +636,7 @@ these services, but according to the minimum technical
specifications, standards, and procedures applicable to the verification
procedures for qualified electronic attestations of attributes.
-#### 4.1.10. Relying Parties
+#### 4.1.10 Relying Parties
Relying Parties are natural or legal persons that rely upon an
electronic identification or a Trust Service. In the context of EUDI
@@ -650,7 +651,7 @@ intention for doing so. Relying Parties need to maintain an interface
with the EUDI Wallet to request attestations with mutual authentication.
Relying Parties are responsible for authenticating PID and (Q)EAA.
-#### 4.1.11. Conformity Assessment Bodies (CAB)
+#### 4.1.11 Conformity Assessment Bodies (CAB)
The EUDI Wallets must be certified by accredited public or private
bodies designated by Member States[^12]. QTSPs need to be audited
@@ -662,13 +663,13 @@ status to a Trust Service Provider. The standards and schemes used by
CABs to fulfil their tasks to certify EUDI Wallets are specified further
in the Toolbox process.
-#### 4.1.12. Supervisory Bodies
+#### 4.1.12 Supervisory Bodies
The supervisory bodies are notified to the Commission by the Member
States, which supervise QTSPs and act, if necessary, in relation to
non-qualified Trust Service Providers.
-#### 4.1.13. Device Manufacturers and Related Entities
+#### 4.1.13 Device Manufacturers and Related Entities
EUDI Wallets will have several interfaces with the devices they are
based on, which may be for the following purposes:
@@ -696,7 +697,7 @@ issuing the EUDI Wallet. Likewise, the availability as well as terms and
conditions of device interface providers and related service providers
will set further constraints for EUDI Wallet Providers.
-#### 4.1.14. Qualified and Non-Qualified Electronic Attestation of Attributes Schema Providers
+#### 4.1.14 Qualified and Non-Qualified Electronic Attestation of Attributes Schema Providers
(Q)EAA Schema Providers publish schemas and vocabularies describing
(Q)EAA structure and semantics. It may enable other entities such as
@@ -705,7 +706,7 @@ the minimum technical specifications, standards, and procedures for this
purpose. Common schemas, including by sector- specific organisations are
critical for wide-spread adoption of (Q)EAAs.
-#### 4.1.15. National Accreditation Bodies
+#### 4.1.15 National Accreditation Bodies
National Accreditation Bodies (NAB) under Regulation (EC) No
765/2008[^13] are the bodies in Member States that performs
@@ -716,7 +717,7 @@ against normative document(s) establishing the requirements (e.g.,
legislations, specifications, protection profiles). NABs monitor the
CABs to which they have issued an accreditation certificate.
-### 4.2. Lifecycle of an EUDI Wallet
+### 4.2 Lifecycle of an EUDI Wallet
The legal text defines the EUDI Wallet on a high level of abstraction,
as well as for the EUDI Wallet Providers that carry the legal
@@ -740,7 +741,7 @@ consequently misunderstandings.
*The object model will be extended as required in future versions of the
ARF.*
-#### 4.2.1. Simplified EUDI Wallet Object Model
+#### 4.2.1 Simplified EUDI Wallet Object Model
Figure 2 below distinguishes the concepts of EUDI Wallet Solution and
EUDI Wallet Instance. An EUDI Wallet Solution is the entire product
@@ -758,7 +759,7 @@ the implementation a EUDI Wallet Instance may consist of a single mobile
app, or a set of local and remote components available to a specific
User.
-#### 4.2.2. PID and (Q)EAA Lifecycles
+#### 4.2.2 PID and (Q)EAA Lifecycles
The lifecycles of PID and (Q)EAA are essentially identical, however, for
the scope of this description we refer subsequently only to PID. The
@@ -781,7 +782,7 @@ that PID could be “pre-issued”.
*Figure 3: State-chart of PID*
-There are twothree possible transitions from a valid PID: eitherit is
+There are three possible transitions from a valid PID: it is
delete by the user, it automatically expires, by passage to the
‘validity end date’ or it is actively revoked by its Provider.
Expiration and revocation are essentially independent transitions. Once
@@ -789,7 +790,7 @@ PID is expired, deleted or revoked, it cannot transition back to valid.
Update of PID (i.e., because of a name change) always requires
re-issuing.
-#### 4.2.3. EUDI Wallet Solution Lifecycle
+#### 4.2.3 EUDI Wallet Solution Lifecycle
An EUDI Wallet Solution has a state of its own, as defined by Article
10a of the Regulation. The state of the Solution affects the state of
@@ -821,7 +822,7 @@ Solution and continue issuance, bringing the Solution back to the
**valid** state. Under paragraph 3, the EUDI Wallet Solution can be
completely withdrawn.
-#### 4.2.4. EUDI Wallet Instance Lifecycle
+#### 4.2.4 EUDI Wallet Instance Lifecycle
An EUDI Wallet Instance lifecycle begins when the User installs the
mobile app component of the EUDI Wallet solution provided by The EUDI
@@ -866,9 +867,9 @@ Please note that this is independent from the possibility of a PID or
(Q)EAA Provider to revoke their attestations.
-# 5. Trust Model
+## 5 Trust Model
-## 5.1 Overview and scope
+### 5.1 Overview and scope
The Trust Model describes, for all interactions in the lifecycle of a
EUDI Wallet Instance and an attestation, which trust relationships must
exist between the interacting parties to enable these interactions.
@@ -893,7 +894,7 @@ Please note:
the Type 1 configuration specified in section 7.5.
* User privacy is not specifically discussed in this document.
-### 5.1.1 Authentication and authorization
+#### 5.1.1 Authentication and authorization
Within the EUDI Wallet ecosystem, many interactions take place between
parties in which one party requests another party to release data or
@@ -909,7 +910,7 @@ generally requires the existence of the following two conditions:
2. The requestee is sure that the requester **has the right** to request
the data or task requested. This is referred to as *authorization*.
-### 5.1.2 Assumptions on trust
+#### 5.1.2 Assumptions on trust
This document makes the following assumptions regarding the need for
trust in the EUDI Wallet ecosystem:
@@ -924,7 +925,7 @@ trust in the EUDI Wallet ecosystem:
with.No authenticated party can be presumed trustworthy enough not to
ask for attributes beyond their rights.
-### 5.1.3 Other trust relations
+#### 5.1.3 Other trust relations
Besides the trust relationships described in this chapter, other trust
relations must exist as well. For instance, Users, Issuers and Relying
@@ -941,11 +942,11 @@ authorization of other parties in the ecosystem, parties must also be
able to trust that the communication with such parties is confidential.
Measures to ensure this are not explicitly discussed in this document.
-## 5.2 Trust throughout a EUDI Wallet Instance lifecycle
+### 5.2 Trust throughout a EUDI Wallet Instance lifecycle
-### 5.2.1 Wallet Instance installation
+#### 5.2.1 Wallet Instance installation
-#### 5.2.1.1 Required trust relationships
+##### 5.2.1.1 Required trust relationships
When a User decides to install an EUDI Wallet Instance on their device,
the following trust relationships must exist:
@@ -958,17 +959,17 @@ the following trust relationships must exist:
The next sections discuss these trust relationships.
-#### 5.2.1.2 User's trust in the EUDI Wallet Solution
+##### 5.2.1.2 User's trust in the EUDI Wallet Solution
To be done.
-#### 5.2.1.3 User's trust that the EUDI Wallet Solution is supporting the required attestations
+##### 5.2.1.3 User's trust that the EUDI Wallet Solution is supporting the required attestations
To be done.
-### 5.2.2 EUDI Wallet Instance activation
+#### 5.2.2 EUDI Wallet Instance activation
-#### 5.2.2.1 Required trust relationships[^14]
+##### 5.2.2.1 Required trust relationships[^14]
After its' installation, a new EUDI Wallet Instance will need to be
activated by the Wallet Provider. Activation has at least the following
@@ -1042,17 +1043,17 @@ relations need to exist:
The next sections discuss these trust relationships.
-#### 5.2.2.2 EUDI Wallet Instance trusts Wallet Provider
+##### 5.2.2.2 EUDI Wallet Instance trusts Wallet Provider
To be done.
-#### 5.2.2.3 EUDI Wallet Provider trusts Wallet Instance
+##### 5.2.2.3 EUDI Wallet Provider trusts Wallet Instance
To be done.
-### 5.2.3 EUDI Wallet Instance management
+#### 5.2.3 EUDI Wallet Instance management
-#### 5.2.3.1 Required trust relationships
+##### 5.2.3.1 Required trust relationships
Starting from EUDI Wallet Instance activation and throughout its
lifetime, a EUDI Wallet Instance must be managed by the EUDI Wallet
Provider. Management actions could be initiated by the following
@@ -1086,30 +1087,30 @@ For this, the following trust relations need to exist:
The next sections discuss these trust relationships.
-#### 5.2.3.2 EUDI Wallet Instance trust in the Wallet Provider
+##### 5.2.3.2 EUDI Wallet Instance trust in the Wallet Provider
Section 5.2.2.2. describeshow a EUDI Wallet Instance can trust a Wallet
Provider.
-#### 5.2.3.3 EUDI Wallet provider trust in the EUDI Wallet Instance
+##### 5.2.3.3 EUDI Wallet provider trust in the EUDI Wallet Instance
Section 5.2.2.3. describes how a EUDI Wallet Provider can trust a Wallet
Instance.
-#### 5.2.3.4 User trust in the EUDI Wallet Provider
+##### 5.2.3.4 User trust in the EUDI Wallet Provider
To be done.
-#### 5.2.3.5 EUDI Wallet Provider trust in the User
+##### 5.2.3.5 EUDI Wallet Provider trust in the User
To be done.
-## 5.3 Trust throughout an attestation lifecycle
+### 5.3 Trust throughout an attestation lifecycle
-### 5.3.1 Attestation issuance
+#### 5.3.1 Attestation issuance
-#### 5.3.1.1 Required trust relationships
+##### 5.3.1.1 Required trust relationships
When a User requests an Issuer to issue a PID or (Q)EAA to their EUDI
Wallet Instance, the following trust relationships must exist:
@@ -1133,21 +1134,21 @@ Wallet Instance, the following trust relationships must exist:
The next sections discuss these trust relationships.
-#### 5.3.1.2 User trust in the Issuer
+##### 5.3.1.2 User trust in the Issuer
To be done.
-#### 5.3.1.3 Issuer trust in the User
+##### 5.3.1.3 Issuer trust in the User
To be done.
-#### 5.3.1.4 Issuer trust in the EUDI Wallet Instance
+##### 5.3.1.4 Issuer trust in the EUDI Wallet Instance
To be done.
-### 5.3.2 Attestation releasing
+#### 5.3.2 Attestation releasing
-#### 5.3.2.1 Required trust relationships
+##### 5.3.2.1 Required trust relationships
When a Relying Party (RP) requests a User to release some attributes
from his/her EUDI Wallet Instance, the following trust relationships
@@ -1209,7 +1210,7 @@ well as the attestation.
in scope of the current version of this document.
-#### 5.3.2.2 Relying Party trusts Issuer
+##### 5.3.2.2 Relying Party trusts Issuer
An RP must be able to verify that the issuer is trusted to issue the
type of attestation in question. For instance, an Issuer may be trusted
to issue a diploma, but not a PID, or conversely.
@@ -1278,7 +1279,7 @@ verified that the Issuer of a PID or QEAA indeed can be trusted, they
must accept attestations issued by that Issuer.
-#### 5.3.2.3 Relying Party trusts the authenticity of the attestation
+##### 5.3.2.3 Relying Party trusts the authenticity of the attestation
The following steps are essential for ensuring that the Relying Party
can trust the attestation:
@@ -1319,7 +1320,7 @@ Regarding the technical implementation of these steps:
* Like ISO/IEC 18013-5, SD-JWT does not define a revocation mechanism.
-#### 5.3.2.4 Relying Party trusts device binding
+##### 5.3.2.4 Relying Party trusts device binding
The Relying Party must be able to trust that an attestation it receives
was not copied and replayed. In other words, the RP trusts that the
@@ -1367,7 +1368,7 @@ However, the RP must verify that the Issuer did not revoke the
attestation. In addition, the RP can verify that the EUDI Wallet
Provider did not revoke the EUDI Wallet Instance Attestation.
-#### 5.3.2.5 Relying Party trusts User binding
+##### 5.3.2.5 Relying Party trusts User binding
An RP must be able to trust User binding. This means that the person
presenting the attestation is the same one as the User, i.e., the person
to whom the attributes in the attestation apply.
@@ -1401,7 +1402,7 @@ The mechanism(s) for User binding depend on the type of use case:
User authentication mechanisms present on or connected to the device
which the EUDI Wallet Instance is installed on [^18].
-#### 5.3.2.6 User trusts the identity of the Relying Party
+##### 5.3.2.6 User trusts the identity of the Relying Party
To ensure that the User knows and trusts the identity of the Relying
Party, a mechanism for Relying Party authentication must be implemented.
@@ -1429,13 +1430,13 @@ to the User and/or to the Issuer of the attributes in question to decide
if an RP must be authenticated before attributes can be released to that
RP.
-#### 5.3.2.7 User trusts that the Relying Party does not over-ask
+##### 5.3.2.7 User trusts that the Relying Party does not over-ask
How to enable trust for the Relying Party to be sure that the RP will
not over-ask, will be further detailed in a future version of this
document.
-### 5.3.3 Attestation management
+#### 5.3.3 Attestation management
Throughout its lifetime, an attestation needs to be managed by the
Issuer. This means that for the purposes of this Trust Model,
attestation management has similarities to the part of EUDI Wallet
@@ -1443,9 +1444,9 @@ Instance management that involves the EUDI Wallet Provider as the issuer
of a EUDI Wallet Instance attestation, which was already discussed in
section 5.2.3..
-# 6. Requirements for Issuing PID and (Q)EAA
+## 6 Requirements for Issuing PID and (Q)EAA
-## 6.1 Attestation rulebook
+### 6.1 Attestation rulebook
Since version 1.2.0 of this document, the concept of an attestation
rulebook has been introduced. This is designed to compile a set of
@@ -1461,7 +1462,7 @@ to use cases are collated in the attestation's rulebooks. Two such
rulebooks, namely the PID and mDL rulebooks, have currently been
included as annexes to this document.
-## 6.2 Person Identification Data
+### 6.2 Person Identification Data
This chapter details the PID set as presented by the EUDI Wallet.
Further specifications regarding PID are detailed in the PID Rule Book,
@@ -1480,28 +1481,27 @@ In the following the data format as presented to the Relying Party will
be described, without any assumptions on how the EUDI Wallet retrieved
or generated this data beforehand.
-### 6.2.1 The Dataset
+#### 6.2.1 The Dataset
-#### 6.2.1.1. Principles for PID set revision
+##### 6.2.1.1 Principles for the PID set
-This chapter proposes a revision of the eIDAS optional datasets
-specified in eIDAS CIR 2015/1501[^19] and discusses further
-specification, data minimization and identifiers.
+This chapter proposes the definition of the PID set and discusses
+further specification, data minimization and identifiers.
-The revision of the eIDAS optional dataset proposed herein is
-constructed based on the following principles:
+The dataset proposed herein is constructed based on the following
+principles:
- No two persons should have the same PID set of mandatory attributes.
- The PID set should at least contain the minimum set of attributes
- specified in eIDAS CIR 2015/1501 as mandatory.
+ alligned with eIDAS CIR 2015/1501[21] (TODO: fix the reference) as mandatory.
- The mandatory data set is by nature limited to the (narrow)
intersection of what all Member States can provide for all natural and
legal persons and what is needed for electronic identification
purposes.
-#### 6.2.1.2 PID Attributes for Natural Persons
+##### 6.2.1.2 PID Attributes for Natural Persons
The below table provides an overview of and optional PID attributes for natural persons.
@@ -1510,7 +1510,7 @@ The below table provides an overview of and optional PID attributes for natural
| family_name | family_name_birth |
| given_name | given_name_birth |
| birth_date | birth_place |
-| unique_id | resident_address |
+| unique_id (as persistent as possible in time) | resident_address |
| | gender |
| | age_over_18 |
| | age_over_NN |
@@ -1535,7 +1535,7 @@ wider range of authentication options both online and offline as well as
addressing learning from the current eIDAS implementations. Metadata
associated with a PID set is further detailed in Annex 06.
-### 6.2.2 Issuing requirements for PID
+#### 6.2.2 Issuing requirements for PID
The following table defines the requirements applicable to PID regarding
what information is included in the attestation, such as for purposes of
@@ -1562,9 +1562,9 @@ may change as the specifications evolve.
*Table 3 - Issuing requirements for PID*
-## 6.3. Qualified and Non-Qualified Electronic Attestation of Attributes
+### 6.3 Qualified and Non-Qualified Electronic Attestation of Attributes
-### 6.3.1 Issuing requirements for (Q)EAA
+#### 6.3.1 Issuing requirements for (Q)EAA
The following table defines the requirements applicable to (Q)EAA-s
regarding what information is included in the attestation, such as for
@@ -1598,7 +1598,7 @@ Book in Annex 07.
*Table 4 - Issuing requirements for (Q)EAA*
-# 7. Reference Architecture and Flows
+## 7 Reference Architecture and Flows
The reference architecture represents a set of choices made during the
architecture design process for EUDI Wallet Solutions. These choices
@@ -1607,7 +1607,7 @@ scenarios where either the User or the Relying Party, or both, are
offline while providing flexibility for Member States to implement an
EUDI Wallet Solution in various configurations of components.
-## 7.1. Design considerations
+### 7.1 Design considerations
To limit complexity, the initial EUDI Wallet Solution specifications
will include only a minimum number of solution components that enable
@@ -1624,7 +1624,7 @@ The solution components proposed herein evidence the current expectation
of using the ISO/IEC 23220 standard series, once publicly available, for
future ARF versions.
-## 7.2. Architecture Components
+### 7.2 Architecture Components
The following components have been identified as the building blocks of
the EUDI Wallet architecture needed to implement an EUDI Wallet
@@ -1704,7 +1704,7 @@ Solution:
- **Validity status check**. Mechanism to publish and obtain information
about validity status of, inter alia, PID, (Q)EAA, certificate, etc.
-## 7.3. Logical architecture
+### 7.3 Logical architecture
Where an EUDI Wallet Solution has an application running on a mobile
device, there may be a need for additional trusted components which are
@@ -1783,7 +1783,7 @@ TLS).
EUDI Wallet Data Storage Components
-User unique and persistent unique identifier
+User unique identifier (as persistent as possible in time)
|