ࡱ> IKFGH[ nbjbj:E:E vX/\X/\e~&~&~&~&~&$&&&P&L>(&?Z )1( 2 2 2@3$: <$O~& =@3@3 = =~&~& 2 24AAA =F~& 2~& 2A =AA`ʴ 24f=r\0?ή#=#ʴʴ#~&j@ = =A = = = = =@x = = =? = = = =# = = = = = = = = => D%: MQTT Supplemental Publication Version 1.0 Part 1: NIST Cyber Security Framework Working Draft 01 08 October 2013 Technical Committee:  HYPERLINK "http://www.oasis-open.org/committees/mqtt/" OASIS Message Queuing Telemetry Transport (MQTT) TC Chairs: Raphael Cohn ( HYPERLINK "mailto:raphael.cohn@stormmq.com" raphael.cohn@stormmq.com), Individual Richard J Coppen ( HYPERLINK "mailto:coppen@uk.ibm.com" coppen@uk.ibm.com),  HYPERLINK "http://www.ibm.com/" IBM Editors: Geoff Brown ( HYPERLINK "mailto:geoff.brown@m2mi.com" geoff.brown@m2mi.com),  HYPERLINK "http://www.m2mi.com/" Machine-to-Machine Intelligence (M2MI) Corporation Richard J Coppen ( HYPERLINK "mailto:coppen@uk.ibm.com" coppen@uk.ibm.com),  HYPERLINK "http://www.ibm.com/" IBM Louis-Philippe Lamoureux ( HYPERLINK "mailto:louis.lamoureux@m2mi.com" louis.lamoureux@m2mi.com),  HYPERLINK "http://www.m2mi.com/" Machine-to-Machine Intelligence (M2MI) Corporation Related work: This specification is related to: Message Queuing Telemetry Transport Version 4.0. Latest version.  HYPERLINK "http://docs.oasis-open.org/mqtt/mqtt/v4.0/mqtt-v4.0.html" http://docs.oasis-open.org/mqtt/mqtt/v4.0/mqtt-v4.0.html. Abstract: Summary of the technical purpose of the document. Status: This  HYPERLINK "http://www.oasis-open.org/committees/process.php" \l "dWorkingDraft" Working Draft (WD) has been produced by one or more TC Members; it has not yet been voted on by the TC or  HYPERLINK "http://www.oasis-open.org/committees/process.php" \l "committeeDraft" approved as a Committee Draft (Committee Specification Draft or a Committee Note Draft). The OASIS document  HYPERLINK "http://www.oasis-open.org/committees/process.php" \l "standApprovProcess" Approval Process begins officially with a TC vote to approve a WD as a Committee Draft. A TC may approve a Working Draft, revise it, and re-approve it any number of times as a Committee Draft. Initial URI pattern: http://docs.oasis-open.org/mqtt/mqtt-security-sp/v1.0/csd01/part1-nist/mqtt-security-sp-v1.0-csd01-part1-nist.doc (Managed by OASIS TC Administration; please dont modify.) Copyright OASIS Open 2013. All Rights Reserved. All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full HYPERLINK "http://www.oasis-open.org/policies-guidelines/ipr"Policy may be found at the OASIS website. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Table of Contents  TOC \o "1-4" \h \z \u  HYPERLINK \l "_Toc370130289" 1 Introduction  PAGEREF _Toc370130289 \h 5  HYPERLINK \l "_Toc370130290" 1.1 Overview of the Framework  PAGEREF _Toc370130290 \h 5  HYPERLINK \l "_Toc370130291" 1.1.1 MQTT Framework Core  PAGEREF _Toc370130291 \h 5  HYPERLINK \l "_Toc370130292" 1.1.2 Framework Implementation Tiers  PAGEREF _Toc370130292 \h 5  HYPERLINK \l "_Toc370130293" 1.1.3 MQTT Framework Profile  PAGEREF _Toc370130293 \h 5  HYPERLINK \l "_Toc370130294" 1.2 Document Overview  PAGEREF _Toc370130294 \h 5  HYPERLINK \l "_Toc370130295" 2 MQTT Cybersecurity Management Functions  PAGEREF _Toc370130295 \h 7  HYPERLINK \l "_Toc370130296" 2.1 Identify  PAGEREF _Toc370130296 \h 7  HYPERLINK \l "_Toc370130297" 2.1.1 Asset Management  PAGEREF _Toc370130297 \h 7  HYPERLINK \l "_Toc370130298" 2.1.2 Risk Management  PAGEREF _Toc370130298 \h 7  HYPERLINK \l "_Toc370130299" 2.1.3 Compliance  PAGEREF _Toc370130299 \h 7  HYPERLINK \l "_Toc370130300" 2.1.4 Information Sharing and Communications  PAGEREF _Toc370130300 \h 7  HYPERLINK \l "_Toc370130301" 2.1.5 Environmental Awareness  PAGEREF _Toc370130301 \h 7  HYPERLINK \l "_Toc370130302" 2.1.6 Informative References  PAGEREF _Toc370130302 \h 8  HYPERLINK \l "_Toc370130303" 2.2 Prevent  PAGEREF _Toc370130303 \h 8  HYPERLINK \l "_Toc370130304" 2.2.1 Security Awareness  PAGEREF _Toc370130304 \h 8  HYPERLINK \l "_Toc370130305" 2.2.2 Identity, Credential and Access Management  PAGEREF _Toc370130305 \h 8  HYPERLINK \l "_Toc370130306" 2.2.3 Information Protection  PAGEREF _Toc370130306 \h 8  HYPERLINK \l "_Toc370130307" 2.2.4 Server-side Protection  PAGEREF _Toc370130307 \h 8  HYPERLINK \l "_Toc370130308" 2.2.5 Client-side Protection  PAGEREF _Toc370130308 \h 9  HYPERLINK \l "_Toc370130309" 2.2.6 Informative References  PAGEREF _Toc370130309 \h 9  HYPERLINK \l "_Toc370130310" 2.3 Detect  PAGEREF _Toc370130310 \h 9  HYPERLINK \l "_Toc370130311" 2.3.1 Network Monitoring  PAGEREF _Toc370130311 \h 9  HYPERLINK \l "_Toc370130312" 2.3.2 Physical Monitoring  PAGEREF _Toc370130312 \h 9  HYPERLINK \l "_Toc370130313" 2.3.3 Intrusion Detection  PAGEREF _Toc370130313 \h 9  HYPERLINK \l "_Toc370130314" 2.3.4 Informative References  PAGEREF _Toc370130314 \h 9  HYPERLINK \l "_Toc370130315" 2.4 Respond  PAGEREF _Toc370130315 \h 9  HYPERLINK \l "_Toc370130316" 2.4.1 Response Planning  PAGEREF _Toc370130316 \h 10  HYPERLINK \l "_Toc370130317" 2.4.2 Informative References  PAGEREF _Toc370130317 \h 10  HYPERLINK \l "_Toc370130318" 2.5 Recover  PAGEREF _Toc370130318 \h 10  HYPERLINK \l "_Toc370130319" 2.5.1 Recovering Planning  PAGEREF _Toc370130319 \h 10  HYPERLINK \l "_Toc370130320" 2.5.2 Informative References  PAGEREF _Toc370130320 \h 10  HYPERLINK \l "_Toc370130321" 3 MQTT Framework Implementation Tiers  PAGEREF _Toc370130321 \h 11  HYPERLINK \l "_Toc370130322" 3.1 Tier 0: Partial  PAGEREF _Toc370130322 \h 11  HYPERLINK \l "_Toc370130323" 3.2 Tier 1: Risk-Informed  PAGEREF _Toc370130323 \h 11  HYPERLINK \l "_Toc370130324" 3.3 Tier 2: Repeatable  PAGEREF _Toc370130324 \h 11  HYPERLINK \l "_Toc370130325" 3.4 Tier 3: Adaptive  PAGEREF _Toc370130325 \h 11  HYPERLINK \l "_Toc370130326" 3.5 Conclusion  PAGEREF _Toc370130326 \h 11  HYPERLINK \l "_Toc370130327" 4 MQTT Framework Profile  PAGEREF _Toc370130327 \h 12  HYPERLINK \l "_Toc370130328" 5 Example Implementation  PAGEREF _Toc370130328 \h 13  HYPERLINK \l "_Toc370130329" 5.1 Example Use Case 1: Aircraft Turnaround M2M Ecosystem  PAGEREF _Toc370130329 \h 13  HYPERLINK \l "_Toc370130330" 5.1.1 Know  PAGEREF _Toc370130330 \h 13  HYPERLINK \l "_Toc370130331" 5.1.2 Prevent  PAGEREF _Toc370130331 \h 13  HYPERLINK \l "_Toc370130332" 5.1.3 Detect  PAGEREF _Toc370130332 \h 14  HYPERLINK \l "_Toc370130333" 5.1.4 Respond  PAGEREF _Toc370130333 \h 14  HYPERLINK \l "_Toc370130334" 5.1.5 Recover  PAGEREF _Toc370130334 \h 14  HYPERLINK \l "_Toc370130335" 5.1.6 Security Level Profile Score  PAGEREF _Toc370130335 \h 14  HYPERLINK \l "_Toc370130336" 5.1.7 Conclusion  PAGEREF _Toc370130336 \h 14  HYPERLINK \l "_Toc370130337" 6 # Conformance  PAGEREF _Toc370130337 \h 16  HYPERLINK \l "_Toc370130338" Appendix A. Acknowledgments  PAGEREF _Toc370130338 \h 17  HYPERLINK \l "_Toc370130339" Appendix B. Example Title  PAGEREF _Toc370130339 \h 18  HYPERLINK \l "_Toc370130340" B.1 Subsidiary section  PAGEREF _Toc370130340 \h 18  HYPERLINK \l "_Toc370130341" B.1.1 Sub-subsidiary section  PAGEREF _Toc370130341 \h 18  HYPERLINK \l "_Toc370130342" Appendix C. Revision History  PAGEREF _Toc370130342 \h 19  Introduction The purpose of this supplemental publication is to introduce implementors and senior executives to the NIST Cyber Security Framework and its assimilation with the MQTT security recommendations. The Framework provides a common language and mechanism for organizations to: 1) describe current cybersecurity posture; 2) describe their target state for cybersecurity; 3) identify and prioritize opportunities for improvement within the context of risk management; 4) assess progress toward the target state; 5) foster communications among internal and external stakeholders. The Framework complements, and does not replace, an organizations existing business or cybersecurity risk management process and cybersecurity program. Rather, the organization can use its current processes and leverage the framework to identify opportunities to improve an organizations cybersecurity risk management. This supplemental document will focus solely on the MQTT protocols integration within the Framework. Keep in mind that a complete cybersecurity management framework can include a wide variety of topics that must be tailored for specific needs according to the organization's missions, environments of operation, and technologies used. Please refer to the NIST Cyber Security Framework for more information Overview of the Framework The Framework is composed of three components: the Framework Core, the Framework Implementation Tiers, and the Framework Profile. In the context of the MQTT protocol, each component has been reduced to solely reflect security considerations of the protocol and are renamed accordingly. MQTT Framework Core The MQTT Framework Core is a compilation of MQTT and M2M cybersecurity activities and references that are common across critical infrastructure sectors. The MQTT Framework Core consists of five Functions - Identify, Protect, Detect, Respond, Recover - which can provide a high-level, strategic view of an organizations management of MQTT and M2M related cybersecurity risk. The Framework then identifies underlying key Categories and Subcategories for each of these Functions, and matches them with Informative References such as existing standards, guidelines, and practices. Framework Implementation Tiers The MQTT Framework Implementation Tiers demonstrate the implementation of the MQTT Framework Core Functions and Categories and indicate how cybersecurity risk is managed. These Tiers range from Partial (Tier 0) to Adaptive (Tier 3), with each Tier building on the previous Tier. MQTT Framework Profile The MQTT Framework Profile conveys how an organization manages MQTT and M2M related cybersecurity risk in each of the MQTT Framework Core Functions and Categories by identifying the Subcategories that are implemented or planned for implementation. Profiles are also used to identify the appropriate goals for an organization or for a critical infrastructure sector and to assess progress against meeting those goals. Document Overview The remainder of this supplemental document contains the following sections: Section 2 describes the MQTT Framework Core along with the five Functions and their associated Categories, Subcategories, and informative references. Section 3 describes the 4 MQTT Framework Implementation Tiers. Section 4 describes the MQTT Framework Profile. Section 5 provides example implementations of how the Framework can be used. MQTT Cybersecurity Management Functions This section describes the 5 cybersecurity management functions and how they can be used to manage M2M/IoT centric organizations where the MQTT protocol is prevalent. The list of components associated to each function is non-exhaustive and serves as an onset for a cybersecurity management framework tailored to a specific organization. Identify The purpose of this function is to: develop the institutional understanding of which MQTT and M2M related organizational systems, assets, data, and capabilities need to be protected; determine priority in light of organizational mission; establish processes to achieve risk management goals. Asset Management List of hardware devices Software inventory Network mapping Lifecycle tracking Risk Management Defining Risk Tolerance Risk Identification Risk Assessment Analysis of Alternatives Compliance Business Requirements Legislative and Regulatory Contractual Requirements Technology Certification Information Sharing and Communications Understand Data Flows Internal Communications External Communications Cryptographic suites versioning and implementation how-to Environmental Awareness Location of (client-side) end-devices Location of end-to-end communication infrastructures Location of (server-side) brokers and vicinity Informative References ISO/IEC 27001 HITRUST COBIT FFIEC National Infrastructure Protection Plan HIPAA NIST SP 800-18 NIST SP 800-53 Rev. 4 Prevent The purpose of this function is to develop and implement the appropriate MQTT safeguards, prioritized through the organizations risk management process, to ensure delivery of critical M2M infrastructure services. Security Awareness User Awareness Training Formal Training Exercise and Evaluation Identity, Credential and Access Management Use of PKI (e.g. TLS, VPN) Choose a well-known Certificate Authority Authentication of Clients by the Server Authentication of the Server by the Clients Authorization of Clients by the Server Information Protection Use of cryptographic suites (e.g. TLS, VPN) Integrity of Application Messages and Control Packets Privacy of Application Messages and Control Packets Non-repudiation of message transmission Secure Random Number Generation for all involved devices Server-side Protection Compliance with MQTT specification Automatic Client disconnect mechanisms Suspicious behavior detection Dynamic Access Control Listing (e.g. IP address or Client ID) Rate limiting and/or blocking (e.g. IP address) Data-at-rest encryption Frequent session renegotiation to establish new cryptographic parameters (e.g. replace session keys or change cipher suites) Client-side Protection Tamper proof end-devices Proper storage of the client certificate (key management considerations) Two-factor authentication Informative References MQTT Specification ISO 29129 NIST Interagency Report 7628 NERC CIP Detect The purpose of this function is to develop and implement the appropriate activities to identify the occurrence of an MQTT related cybersecurity event. Network Monitoring Repeated connection attempts Abnormal termination of connections Physical Monitoring Client availability verification End-devices and their vicinity physical inspection Intrusion Detection Repeated authentication attempts Topic scanning (attempts to send or subscribe to many topics) Sending undeliverable messages (no subscribers to the topics) Clients that connect but do not send data Informative References SANS Top 20 Controls NIST 800-12 NIST SP 800-83 NIST SP 800-94 Respond The purpose of this function is to develop and implement the appropriate activities, prioritized through the organizations risk management process, to take action regarding a detected M2M cybersecurity event. Response Planning Revoke lost and/or compromised certificates Revoke lost and/or compromised Client or Server authentication credentials Disconnect suspicious or compromised end-devices Block compromised telemetry channels Increase Firewall policies Shutdown compromised brokers and servers Informative References NIST SP 800-53 Rev. 4 NIST SP 800-61 NIST SP 800-83 NIST 800-86 Recover The purpose of this function is to develop and implement the appropriate activities, prioritized through the organizations risk management process, to restore the appropriate M2M capabilities that were impaired through a cybersecurity event. Recovering Planning Perform information system recovery (e.g. restart broker, create new telemetry channels, etc.) Perform reconstitution activities Provide alternate work site to recover work activities Review Firewall policies Reissue certificates and authentication credentials Inspect end-devices Review Key Management and cryptographic deployments Backup systems Updated contingency plan Informative References NIST SP 800-34 NIST SP 800-53 Rev. 4 SANS Top 20 Controls MQTT Framework Implementation Tiers The MQTT Framework Implementation Tiers reflect how an organization implements the MQTT Framework Core functions and categories and manages its risk. The Tiers are progressive, ranging from Partial (Tier 0) to Adaptive (Tier 3), with each Tier building on the previous Tier. A Tier represents the stage of the implementation of the Framework Profile and the organizations cybersecurity risk management process. These characteristics are applied to the MQTT Framework Core to determine how a category is implemented. The Tier definitions follow: Tier 0: Partial The organization has not yet implemented a formal, threat-aware MQTT risk management process to determine a prioritized list of M2M related cybersecurity activities. The organization may implement some portions of the Framework on an irregular, case-by-case basis due to varied experience or information gained from outside sources. Tier 1: Risk-Informed The organization uses a formal, threat-aware MQTT risk management process to develop an MQTT Profile of the Framework. In addition, risk-informed, management approved processes and procedures are defined and implemented and staff has adequate resources to perform their M2M related cybersecurity duties. Tier 2: Repeatable The organization updates its Profile based on regular application of its MQTT risk management process to respond to a changing M2M cybersecurity landscape. Risk informed policies, processes, and procedures are defined, implemented as intended, and validated. The organization will also have consistent methods in place to provide updates when a risk change occurs. Tier 3: Adaptive The organization updates its Profile based on predictive indicators derived from previous and anticipated M2M related cybersecurity activities. These updates to the Profile enable the organization to actively adapt to a changing M2M cybersecurity landscape and emerging/evolving threats. Risk-informed policies, processes, and procedures are part of the organizational culture and evolve from previous activities (and from information shared by other sources) to predict and address potential cybersecurity events. Conclusion Organizations should determine the desired Tiers at the Category level, ensuring that the selected levels meet the organizational goals, reduce M2M related cybersecurity risk, and are feasible to implement. External guidance will be helpful, such as information that could be obtained from OASIS Security Assertion Markup Language (SAML), the Federal Information Processing Standards (FIPS), and Payment Card Industry Data Security Standard (PCI DSS). MQTT Framework Profile An MQTT Framework Profile enables organizations to establish a roadmap for reducing MQTT/M2M related cybersecurity risk that is well-aligned with organization and sector goals, considers legal/regulatory requirements, and reflects risk management priorities. An MQTT Framework Profile can be used to describe both the current state and the desired target state of specific MQTT/M2M cybersecurity activities, thus revealing gaps that should be addressed to meet MQTT/M2M cybersecurity risk management objectives. Figure 1 shows the two types of Profiles: Target and Current. The Target Profile indicates the MQTT/M2M cybersecurity goal state, and the Current Profile indicates the current state.  Figure  SEQ Figure \* ARABIC 1: Profile Comparison The Profile is the selection of the Functions, Categories, and Subcategories that are aligned with the business requirements, risk tolerance, and resources of the organization. The Target Profile should support business/mission requirements and aid in the communication of risk within and between organizations. Identifying the gaps between the Current Profile and the Target Profile allows the creation of a roadmap that organizations should implement to reduce MQTT and M2M related cybersecurity risk. Example Implementation This section attempts to illustrate the Cybersecurity Management Function and the Security Level Profile through a use case. Each use case contains its own list of threats and required standards and regulations. The 5 functions are applied to the use case and estimate how much the organization is compliant with the relevant guide lines and references contained in each function. Subsequently the qualitative metric is applied to the use case and returns a security level score. Example Use Case 1: Aircraft Turnaround M2M Ecosystem An airline company establishes an M2M infrastructure that gathers information in order to optimize aircraft turnaround at its home base airport. The information gathered originates from the companys and partners remote sensors. They include passenger buses and refueling trucks geo-location and real time fuel consumption sensors that use telemetry channels through MQTT. The objective is to optimize routes, locate key assets, forecast unavailability periods, and ultimately reduce turnaround time. However as the information is potentially shared between several organizations, the ability to secure and accurately apportion data to the authorized members is important. The Airline Company follows several recommendation publications such as NIST Special publication 800-26 (Security Self-Assessment Guide for Information Technology Systems" for advice on how to manage IT security and ISO 15408 (Evaluation criteria for IT security) to test the security of the infrastructure. The airline has also established a list of internal regulations that serve as guidelines for risk management, incident response planning, and recovery planning. Applying the NIST Cyber Security Framework to the MQTT component of the Airlines cybersecurity infrastructure is exposed below. Know The Airline has identified the following list of M2M related cyber security threats: Malfunctioning partner sensors Misconfigured partner authentication mechanisms Key management Questionable partner security perimeters Airport Networking Infrastructure Firewall policies The company follows a strict asset management policy based on ISO 27001. It has established a list of all company and partner sensors and established a list of all connecting MQTT clients. The Airline has also established network mapping and identified risky routing portions. However the Airline does not consider more specific hardware recommendations such as the SANS Top 20 controls for unauthorized and misconfigured devices. Prevent The Airline implements TLS 1.2 for authentication and encryption and subscribes to a leading Certificate Authority. It also follows recommendations from ISO 29129 that specifies cryptographic primitives suitable for end-devices operating in constrained environments. Because of the key-management complexity problem, Clients are not authenticated and are therefore authorized using single factor authentication (credential access) only. Detect The Airline monitors network activity (repeated connection attempts and abnormal connection terminations) and access control by using firewalls and white listing policies available on the Airlines broker as recommended in NIST 800-12 and NIST SP 800-83. It does not however possess a well-defined end-device monitoring plan such as specified in NIST SP 800-94. Respond The company has incident management guidelines that staff should follow in case of security breach detection. These guidelines were crafted internally based on the recommendations of NIST SP 800-61 (Computer Security Incident Handling Guide). The guidelines offer insight on how to mitigate: Denial of Service Malicious Code Inappropriate Usage Unauthorized access guidelines are not included. Recover To recover from a potential cyber-attack the company has established a contingency and disaster recovery plan based on guidelines specified in NIST SP 800-34. Security Level Profile Score FunctionsTargeted Standards and RegulationsEstimated ComplianceScoreKnowISO 27001 NIST SP 800-2670% 65%14/20PreventISO 29129 SANS Top 20 controls ISO 15408100% 20% 60%15/20DetectNIST 800-12 NIST SP 800-83 NIST SP 800-9480% 65% 15%11/20RespondNIST SP 800-61100%20/20RecoverNIST SP 800-3470%14/20TOTAL SCORE74/100Conclusion The qualitative metric ranks the Company at 74% secured corresponding to Level 2 Industry Secured. To increase its security level, the Company should make efforts to comply with the overlooked guidelines and publications or reconsider the list of targeted standards. # Conformance The last numbered section in the specification must be the Conformance section. Conformance Statements/Clauses go here. [Remove # marker] Acknowledgments The following individuals have participated in the creation of this specification and are gratefully acknowledged: Participants: MACROBUTTON  [Participant Name, Affiliation | Individual Member] [Participant Name, Affiliation | Individual Member] Example Title text Subsidiary section text Sub-subsidiary section text Revision History RevisionDateEditorChanges Made[Rev number][Rev Date][Modified By][Summary of Changes]     mqtt-security-sp-v1.0-wd01-part1-nist Working Draft 01 08 October 2013 Standards Track Draft Copyright OASIS Open 2013. All Rights Reserved. Page  PAGE 16 of  NUMPAGES 19 =OP^`akopq 8 : ; S T W a wplcZlMh$h0JB*phhhh0Jh$h0Jh he_hhe_h0Jjh0JU h0Jjh0JUhhCJaJhVCJaJh}CJaJhCJaJh8h)CJaJh8hGCJaJh8hCJaJhhICJaJhCJaJhhCJaJPaqb  "gdWgdW>gdWgdCT>gd:^sgd:^s=gd-H#gdekgdgdgdgdgd8gda b r t u     / 0 3 4 V W X   ޿价ުޔއjCh0JUjh0JUh|(h0Jhh0Jhekhhajh0JUhhh0Jh$h0J h0Jjh0JUh he_h h$h4    L M e f i j ! 3 4 @ [ _ ` d f g j n p s t z { ڼ鲥zvlf]f]f]f]f]f]flhe_hh0J hh0Jjhh0JUhhhhhh6 h|MLhhh_<h$pmH sH jh$p0JUh_<h$p0JmH sH jh$p0JUh_<hW0JmH sH !h_<hW0JB*mH phsH jhW0JB*Uph!h_<h$p0JB*mH phsH ha0J"{ Q R S ` a !\]^_uyĹȰĥȰĚȰז}yuhBh*9h)Cn hyW 0J h*<0JhZhW0JhWjh;Ujh;UhGhG0Jjh;UhGjhGU hGhGhCTh}h:^shh hh0Jjhh0JUh|(hh0J."]^_8 j-PPr $  $  $ ?gdGgd*9gd)Cn>gdCT>gdWyz45rstz{78|fR'hXhHCJOJQJaJmHnHu*jh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu$jh%>hH0JUmHnHuh~8jh~8U h.hGhGh*9h2 jh*9aJ h=h*9h)CnhGh)Cn0Jjh3dUh3djhGU h.h)CnhV    ()*+HIJdefghijklnX*j h%>hH0JUmHnHu#j8 hHUmHnHu*jh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHu#j>hHUmHnHujhHUmHnHuhHmHnHu"   '()*+,-./KLMNjklnX*j h%>hH0JUmHnHu#j, hHUmHnHu*j h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHujhHUmHnHu#j2 hHUmHnHuhHmHnHu!./0JmW*j h%>hH0JUmHnHu#j hHUmHnHu*j h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j& hHUmHnHu"JKLMNOPQRnopq}~mW*jh%>hH0JUmHnHu#jhHUmHnHu*jh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu ./0JKLMNOPQRnopqmW*jh%>hH0JUmHnHu#jhHUmHnHu*jh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu   0123PQRlmW*jyh%>hH0JUmHnHu#jhHUmHnHu*jh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu lmnopqrstmW*jmh%>hH0JUmHnHu#jhHUmHnHu*jsh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu  !=>?@XYZtuvwxyz{|mW*jah%>hH0JUmHnHu#jhHUmHnHu*jgh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu zL im( v 1!!!="""Z## $^$$%% $  $  $    *+,FGHIJKLMNjklmmW*jUh%>hH0JUmHnHu#jhHUmHnHu*j[h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu     ()*+GHIcmW*jIh%>hH0JUmHnHu#jhHUmHnHu*jOh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu cdefghijk mW*j=h%>hH0JUmHnHu#jhHUmHnHu*jCh%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu   /012KLMghijklmnomW*j1h%>hH0JUmHnHu#jhHUmHnHu*j7h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu    " # $ % & ' ( ) * F G H I T U V p mW*j%!h%>hH0JUmHnHu#j hHUmHnHu*j+ h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jhHUmHnHu p q r s t u v w x !!!*!mW*j#h%>hH0JUmHnHu#j"hHUmHnHu*j"h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j!hHUmHnHu *!+!,!.!/!0!1!2!3!O!P!Q!R!]!^!_!y!z!{!}!~!!!!!!!!!!!!!mW*j %h%>hH0JUmHnHu#j$hHUmHnHu*j$h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j#hHUmHnHu !!!!!!!!!!!!!"""6"7"8":";"<"=">"?"["\"]"^"_"`"""""mW*j'h%>hH0JUmHnHu#j&hHUmHnHu*j&h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j%hHUmHnHu""""""""""""""""""""""""""####7#8#9#S#mW*j(h%>hH0JUmHnHu#jx(hHUmHnHu*j'h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j~'hHUmHnHu S#T#U#W#X#Y#Z#[#\#x#y#z#{####################$mW*j*h%>hH0JUmHnHu#jl*hHUmHnHu*j)h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jr)hHUmHnHu $$$ $ $ $ $ $$*$+$,$-$;$<$=$W$X$Y$[$\$]$^$_$`$|$}$~$$$$$$$$mW*j,h%>hH0JUmHnHu#j`,hHUmHnHu*j+h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jf+hHUmHnHu"$$$$$$$$$$$$$$$$$$%%%%%%%%%4%5%6%7%p%q%r%%mW*j.h%>hH0JUmHnHu#jT.hHUmHnHu*j-h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jZ-hHUmHnHu"%%%%%%%%%%%%%%%%%%%%%%%%%%&&&&&&+&mW*j0h%>hH0JUmHnHu#jH0hHUmHnHu*j/h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jN/hHUmHnHu %%2&&&$'''1(((G))* * **R,-+/E/c0x0gdigdnkgdgdgd:v9gd>gdCT $  $  $  $ +&,&-&/&0&1&2&3&4&P&Q&R&S&_&`&a&{&|&}&&&&&&&&&&&&&&&mW*j2h%>hH0JUmHnHu#j<2hHUmHnHu*j1h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#jB1hHUmHnHu &&&&&&&&&&&&&''''''!'"'#'$'%'&'B'C'D'E'g'h'i''mW*j4h%>hH0JUmHnHu#j04hHUmHnHu*j3h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j63hHUmHnHu '''''''''''''''''''''''''''''(((((*(mW*j6h%>hH0JUmHnHu#j$6hHUmHnHu*j5h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j*5hHUmHnHu"*(+(,(.(/(0(1(2(3(O(P(Q(R(](^(m(n(o((((((((((((((((((mW*j8h%>hH0JUmHnHu#j8hHUmHnHu*j7h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j7hHUmHnHu"((((((((((( ) ) ))$)%)&)@)A)B)D)E)F)G)H)I)e)f)g)h)))))mW*j:h%>hH0JUmHnHu#j :hHUmHnHu*j9h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHu#j9hHUmHnHuhHmHnHujhHUmHnHu"))))))))))))))))))******** * ***mc_[WP h.hIh}h;h)Cnjh~8UaJ#j<hHUmHnHu*j;h%>hH0JUmHnHuhHmHnHuh%>hH0JmHnHu'hXhHCJOJQJaJmHnHu$jh%>hH0JUmHnHuhHmHnHujhHUmHnHu#j;hHUmHnHu**---.*/E/M/q/r/y///000J0N0b0c0h0w00000011111$1F1U1q1s1t1112+2\2x2222223)3.333 4%4I4^44455555 6 6I6K6X6j6u6x66666hy01hhshh2h^Jhi h^Jh^J hh hF"#hh:(hhnkMx0223 455 6667^7788999::/:B: & Fgdjgd~8 & Fgdh & FgdoAgd~8gd~8gd" & F+gdXgdgd^Jgdigdnk66677>7B7]7^7c777888899969K9U9b9x999999::::d:e:<<< ===:=_=d==========>>>'>(>?>@>j>+?A?QBhBʿʿҿʿƿƭƭƩƭ h5Xhqzh$o hhhhhqz h"hF"# h'h'hhhoAh~8h' h~8h~8 hF"#hF"#h1mhF"#h h2hz h:(hX@B:R:e:u:::::::;;8;_;u;;;;;<S<<<< & F gdj & F gdj & F gdj & F gdj & FgdjgdF"# & Fgdj<<<<<<<===>>(>@>k>>>>?+?B?n???@ & F"gdy` & F!gdy` & F gdy`gdqzgdhgdqz & F gdj@9@P@t@@@@)AAAAAA7BQBhB{BBBBBIC\CyC & F&gdy`gdqzgdqz & F%gdy`gd2 & F$gdy` & F#gdy`gdqz & F"gdy`hBBBBBBBB C3CGCHCIC[CCCDD E EEAE^EeEEEEEEEFF%FFF G G7GBGGGGHAHFHJHaHHHHHIIITIJ)JcJJJJJJJ#Lƾ·h7h$&hF"#h h?hqzh9hW h hh h>Mhqzh2 h%hqz hHJfhqzh$o h$oh$o h"hqzhqz@yCCCCDD:DxDDDD EE'E6EAEF%FQFFFFG & FgdW gdW gdqzgdqz & F)gdy`gd2 & F(gdy` & F'gdy`gdqz & F&gdy`G7GNGdGsGGGGHHHIUInIIIIIJ)J8JNJcJJgdqzE & Fgdjgd2 & FgdW gdqzgdqz & F*gdy`gdqz & FgdW #L$LLLQLLLLLL:MFMNNKNPNtNzN,O8OLOMONOaOOOOOPPPPIQUQQQRRRR4SPS}SSSSSTTyTTTTTTTTUUU.UgUUUUUU=VFVJVTVVVVǿ hDR*h5h5h3 hDR*hDR*hDR*h h h h-h-h-hM)h)hh7h$&h7HJLLNNNOaOPPRRTTWWWWYY[[^W`gd.gd.gdM!;gdGg $$a$gdGggdDR*gd.gdM)gd-gd)gd$&VVVVVVW(W1WWWWWWWWWWWWWWYYYYYY[[[^^^-_2_T_Z_c_e__``1a2acȼ渴|w h.>*h.h.0JF5CJ]aJ hNh. hLh.h. h.h.hqzh:( hM!hM!h5hM!hGghGgmHnHujhGghGgU hGghGgj}<hGgUh*^hGgh h:h:hDR* hDR*hDR*-W```2aQaaaaacccd\edecfffghh4hfhnh i+i E & F8^8gdj & Fgdjgd.gd.cc\ecefffhmhhh i*i+isitiyiiiiiiiiiiiiiiiiiiiiiiiijj"j#j%j)j*j2j@jAjEjLjMjUjcjdjgjnjoj~jjjkkkkk&lh h"h h.h. hNh. hLh. hn*h. hsh.hjh.5 hPh. h!h. h7ih.h. ha8h.B+i5iXimisitiyiiAkd$$Ifl\N<= t044 lap(ytj $IfgdjiiiiiiiiAkd؞$$Ifl\N<= t044 lap(ytj $IfgdjiiiiiiiiAkd$$Ifl\N<= t044 lap(ytj $Ifgdjiiijjjj#j)j $Ifgdj)j*j2jAjFjLjJAAAA $Ifgdjkdr$$Ifl\N<= t044 lap(ytjLjMjUjdjhjnjJAAAA $Ifgdjkd?$$Ifl\N<= t044 lap(ytjnjoj{j|j}jjJAAAA $Ifgdjkd $$Ifl\N<= t044 lap(ytjjjjkkkkJE@8@@ & Fgd.gd.gd.kd٢$$Ifl\N<= t044 lap(ytjkk9lIlllmBmCmQmVmimnmmmmmmmm $$Ifa$gd2gd_,gd_Bgd;\"gd;\"gd;\",gd gdlgd&gd&gd&,gd2gdgd"&l8l9l@lAlClIllllll mmAmBmCmPmQmmmmmmmmmmmmmmmmmnnnnnn!nFnTnWnXnüҸ{s{hGCJaJh7CJaJhCJaJmH sH hXjhXU h)1h)1 h h_ h8h8h2h_5h_ h;\"h;\"h;\"hxh hlhl hCqhCqjh&Uh&h Rhah^Mh hhh2-mmmmmmmUkd$$Ifl\@ $ pL t0644 layt2 $IfgdPmmmmmnnnnn^YTOOOOOOgd gd)1gd_kd?$$Ifl\@ $ pL t0644 layt2 nnnn n n n n nnnnnnnnnnnnnnnnn n!nhn* !H$gdagd Xnbncnfngnhnxn}n~nnnnnnnnnnnnnnnnnnnnź~sbUbFbUbUbFbhH0J+CJaJmHnHuh dQh70J+CJaJ!jh dQh70J+CJUaJh dQh7CJaJh.haCJaJh(haCJaJhaCJ^JaJhaCJaJh7CJaJhtCJaJmH sH h,haCJaJh_h7CJaJmH sH hVCJaJmH sH h_CJaJmH sH h_CJaJhCJaJmH sH hnnnnngd)1* !H$gd_nnnnn h)1h)1hXh7h_h7CJaJmH sH 90&P1h:p;/ =!"#$% 90&P1h:p~8/ =!"#$% DyK yK nhttp://www.oasis-open.org/committees/mqtt/yX;H,]ą'cDyK yK @http://www.ibm.com/yX;H,]ą'cDyK yK Bhttp://www.m2mi.com/yX;H,]ą'cDyK yK @http://www.ibm.com/yX;H,]ą'cDyK yK Bhttp://www.m2mi.com/yX;H,]ą'c DyK  yK zhttp://www.oasis-open.org/committees/process.phpyX;H,]ą'cdWorkingDraft DyK  yK zhttp://www.oasis-open.org/committees/process.phpyX;H,]ą'ccommitteeDraftDyK  yK zhttp://www.oasis-open.org/committees/process.phpyX;H,]ą'cstandApprovProcessDyK yK |http://www.oasis-open.org/policies-guidelines/ipryX;H,]ą'c}DyK _Toc370130289}DyK _Toc370130289}DyK _Toc370130290}DyK _Toc370130290}DyK _Toc370130291}DyK _Toc370130291}DyK _Toc370130292}DyK _Toc370130292}DyK _Toc370130293}DyK _Toc370130293}DyK _Toc370130294}DyK _Toc370130294}DyK _Toc370130295}DyK _Toc370130295}DyK _Toc370130296}DyK _Toc370130296}DyK _Toc370130297}DyK _Toc370130297}DyK _Toc370130298}DyK _Toc370130298}DyK _Toc370130299}DyK _Toc370130299}DyK _Toc370130300}DyK _Toc370130300}DyK _Toc370130301}DyK _Toc370130301}DyK _Toc370130302}DyK _Toc370130302}DyK _Toc370130303}DyK _Toc370130303}DyK _Toc370130304}DyK _Toc370130304}DyK _Toc370130305}DyK _Toc370130305}DyK _Toc370130306}DyK _Toc370130306}DyK _Toc370130307}DyK _Toc370130307}DyK _Toc370130308}DyK _Toc370130308}DyK _Toc370130309}DyK _Toc370130309}DyK _Toc370130310}DyK _Toc370130310}DyK _Toc370130311}DyK _Toc370130311}DyK _Toc370130312}DyK _Toc370130312}DyK _Toc370130313}DyK _Toc370130313}DyK _Toc370130314}DyK _Toc370130314}DyK _Toc370130315}DyK _Toc370130315}DyK _Toc370130316}DyK _Toc370130316}DyK _Toc370130317}DyK _Toc370130317}DyK _Toc370130318}DyK _Toc370130318}DyK _Toc370130319}DyK _Toc370130319}DyK _Toc370130320}DyK _Toc370130320}DyK _Toc370130321}DyK _Toc370130321}DyK _Toc370130322}DyK _Toc370130322}DyK _Toc370130323}DyK _Toc370130323}DyK _Toc370130324}DyK _Toc370130324}DyK _Toc370130325}DyK _Toc370130325}DyK _Toc370130326}DyK _Toc370130326}DyK _Toc370130327}DyK _Toc370130327}DyK _Toc370130328}DyK _Toc370130328}DyK _Toc370130329}DyK _Toc370130329}DyK _Toc370130330}DyK _Toc370130330}DyK _Toc370130331}DyK _Toc370130331}DyK _Toc370130332}DyK _Toc370130332}DyK _Toc370130333}DyK _Toc370130333}DyK _Toc370130334}DyK _Toc370130334}DyK _Toc370130335}DyK _Toc370130335}DyK _Toc370130336}DyK _Toc370130336}DyK _Toc370130337}DyK _Toc370130337}DyK _Toc370130338}DyK _Toc370130338}DyK _Toc370130339}DyK _Toc370130339}DyK _Toc370130340}DyK _Toc370130340}DyK _Toc370130341}DyK _Toc370130341}DyK _Toc370130342}DyK _Toc370130342aDd4 L  C (Aprofileb`<8`<n`<8PNG  IHDRP;e>sRGBgAMA a pHYs&?`LIDATx^y3I3d%- iS !!tҬ@N;LڦMZJ$%+h()]$ c qۘm0&?[l=}ґ%m}#훶}ttgI(~w~'9:Q_'v/_z7PZ:I3@IQC(3PZ,}Q?./)IQ|rqǍ֗/_>Sfzɼy+0ȴrꫯ&(3PZ:I3@۷/ EI_NBQfung[ dB\.C@/K/T2EovFB :2^YBzKQfP!Trw$eJ_'v={$(3PZ:I3Էޮ]j@vHB5Pj$Tr(3PZ:I3 Oz2(/*;EH3L,Ic/=P֭+EBSt;S@Ye v@(A(3PZ:I3@X" EIooKFB/I3R֧{EB/I3ԁZpam(JۗPzq!qY .""QFT LQB_>pȑ$%zsung*8xW~:iiYK Yhkt;SəE]d Oa+LHjIhEȉ(˼\sMnYmկ~UM}O3@_>N;MM^LkkL%7P/NBQfung*]sqmщF]*#ʵw+λrmP_+Ue^}饗̠{\.~2Yn>T΁e,Ae v=6g:u=9򸬆dKI'Pj]]'v& V.j]]'v& V.j]]'v& V.Y%/Au#( s・^ _]WDnHPNVTG(H)wm7eB@iʃT{icIIrկ j@icIIrկ j@g V+[ W }!,+\ܵ:}v=Uޅ]nR Zj?3|m9rvUoz]x2Pj[ON& Q?@iگ6PuRfuA ]M@Y4 fEg@0n]Mk5(_U3 +הkP~updCng@iگ6Pung@iڟjxܵZ"P"rEo|ԘעPv +uVB?}{oa (ԩ1?(̯<>ׄ]C,/U+ReVjlLbۍ N (WHY ޵*4LP骯1Mo7&Gރ>Jـ^ ݀*m݀ڴi:Q;h74 mkaRОvr'GNA:i<|~Fvօ T@mzMC=!r(סOΨ㆝2 ڵk9VnhBڦ4Ny8+JV,P ("VBXP˖-C'rA.*6EL i|%ΘcR|j4%KtPۖEr(L10eaΘoѢEc2]$T@kQ}qPbM=ŘP[ (gyĻʷFV=H^b%ԋ1WM@rk"e˲E9ddKst!_$Ym^Ρk4xuɱ0E@ɋN6܋1 (9|z .8|_v7>nMMbj9眣gBy>+sLCKogr'j魝6p矺(},m(_1S<8?~Vz<;7AG.[<83ݸFk'Iy'QbˉӈV †18(~uU}LZg2.{ 1stWjɔ~b:oFK/ucf@wϢ|}ԡ^IPu <x7΀~L:P'Au+n\/qwX'`dO (m[E6eί7+?U*(h W]uhu?O2!rNҶUjcvhy>H+C'J{CQY2 ˗\rhYqPrNҶUjc nYy4%D@i@䁏9aʱ (m[1ЉҞh AJV 2XMud]MkvT"k9_.`| P<܆k톆$vIŁį| ~En16x3j[h;A m-!P7(|iZ2 34 nO˵vCC Phn}A^@!͝?֍b(h;A m-!PY{F CҶ(@$m@' CҶ(1@$m@' r.(EoA^[GI2pڀOhhl2]V*҇hPm w 9&,#p<(rΌ:,56x;wt;t[逺QWJI (C/}q.(EoSԆ PWs$netf-o{RcOrLPP+v!w".O8'I*޵ ׎;Gy=OC}VJITH ^z׳\ҺR@Xm@m}-B'ڇ>}c҉… Vc҉` C-uwFƤ>UЇijҥv} G^@qQ}[)`fTlxL (OLuFsL8\7Kc}voa֬YEP"r;ytq)+'>oݺuS;h74  (7eQ(g ڵkZA (] /(ˁ&il֬Y3uvCC Pi۵=UjZ ի!H@iۊNԪU!H@iۊNT혠}Pڶb`c!H@iۊNԲeЉ\PP߂ (d:56xK.D(EoMaNbR@HK},{qERc1"ԷPrGAy{( t[oJI ( ,Akl-Z2L6D^@erm'f@}ڇ:/cJ@8,2~#bx@A 0'D ؇:oDkB$##FB mL*olLwL9-Gw6E?&餼q!8x`Rz1&i@5T+2D˹D+#i<-ؘkzQe$ɲo3F'5Z.VFTyZ3 )G/$Y6T ilgär'R/$t@_pΆ n+Eǃ _@b7c҉o3.25]㪫J=\5/[nEM}Wk5sLo8cK~H\#/7)/,H]I.C1?yƠ\F tܠZ .3 ?38ceoYcqe 4'6CaE\nXt܅/+9_!PO>d5Ot?_vi!͠}h wޙ|_w2OvM7|PcTCAkAyO<2++L AlCSP2׵~SA:t((dff&3wӴyeېyݻgܶdZb3(m.||pxbkuyee|qY M`E9n(~(Oky˗/#QdL Al3(-Ai` W_5Z 6 ͠}0bEo>b3(mAwK6!6 /(Nl#9f1(TЄn=8.+{饗؉͠ߴ>(B8LU2xG8uP˸'7n|w]tx/֣;S+?91SŠ`r$׹/6(!!Y#Q 2^pzpc'6~zj'9fL5AHfU,eiPMEx?֣;S+?913AuExe?֣;;瘉٠*3k@l3(g}h J#,fP4<FX̠hve@li 2gqz% j۶m7nݺ-8a ǐLkP,@)!tV aqoz?!~ʺ\ffܹAvb4aP>`$7n,jTqB[u1$ -!\3ZY_}tUN*3~iW1ѤA0"F'U)C2AiBo:hxmʸ 7Nh9}B c⴬[BrWMH^aH`>hx "2(:k8md %#ǒyNRHC;h}84E gL8md %# J" ?l4 `s:/WV CS4eP%0'L1bd'Ā CS6)'l4#6(5Z 6 QAi` 'P͠}0bEyfG7vb3(7w913AɁuO]+36m(Nln 3geuHkIɺU/NV_ <\h= Aqi=n 3atuR0)~ lF\>^V[~֣;S+?913AuaH7>E Lo k:h= Aqi=n 3TgPM(3Q@Q MtSiˠPfYh J#,fP4/<FX̠hVZe@l3(Uh J#,fP4'<FX1(Tx˖-sz%Loe?!֠Xv/ |c: ,2)3D@vbfP3-oa ǐT1(\EːįR0)6*ý8 eMb2x/vz%L[u1$U {r6E2٘Paar¬X(W˲?y <<z%L[u1$T <)1F3`1.*Z/9L&S4dI8=p@:*10iEqE `ZV,ZV ZNYd{ 81Ekheˢ+ꔅJc] ]xoy^ n' NYv|6%Z:nPjrztB}9![c0(a<F2oϞ=ZV,ZV ZNYd{T1Ekheˢ+ꔅۊX訔1W2] ~h mաLK_ >,^ ;vr駏OӮK͟c~I'6(y˲Xdv?S C+S{lݐ~0oj9/P`A#Lfm۶-??O>񏏥Q:nv59sԼ:)2F 'M'TfiqS'؞^7M5.0^ 2o͙CQ:9쳓[oUͫ_+4F $`eh82c7:X ' <. Kn&j^YgU{^xarꩧyu1[[8ar .M'8fT3/k"Dsk& v/d#<FXhP K=tՠ,N:` z/G\H2#8G\Dn>ǣkgq.@ [ FačӌfxWV?CfO,vߌMv fᱏA'SL&d2:!ClSwv-Njv~vĖ,N:AG;_h4)iq!dP:1 Jm@˓irY\rrYA&4>5𡧕űC,c4PW"̠K ^{-(+Wt[ZLeAlPXc:N =O>Qe Jۇ>#fXe%r2}8vA)R',6 Gn<,2ӹo:@ j:oPXadMq9Ư+$fPޡC233ݻwe-Ns+VUiΠ,Ar./_>c8xЦ_Sb3(m0:F0'KWv,@-#>/A>8fPʠ |LdY0,u e{A}vo5ԐA8ph J#2."5^|ydc&6~zj(:f*J:q\yc}x/J<1Aqi= }c3 WVH.~z̠:T8rcAHXX0e_~\E _0**5ydc&6~zj(:f.p!` rL,;ɠp6IfP *G91S֠$t{FPZ M tW똉ՠˠ|̠:Drc&VFjݻh J#1J+#'VA#a5( Rgqze-c2Mԃ>VXFd¾ce JYXfQM[}(#3фA=C֭[˚T6APcLp~rp1u2/@#C(|/5vp[d4d˖-eLjb Uwy N2&u6 wY 0)>p'@fPaJ6mTԤ̠2}ǰ 1(є,Ӂ760#T1{^n˘LydÆ ELjb Uwy ` X(㗓YRZ!l,Kj=SZ eL ڸqcnݺI&51N*G%ηuw;5|IW2&o&GI>k$O.@+q Qk{Ǔɣ>l߾=yᇓJVZib Uw(kP1 CmPWNV\T<M1xz'^n˘L fQ} '1#aA)bC,YDIA!A-]4Yx1IA=cF t͠h,Z&eq!̠A1QJIGA!A)0xڱc5(I0RO .87(4c]2(aNIX̌EtŠ-[/ob Ia\#ț߷ j20BZroNT*qRؠ䟅r|<ɸR h}X4A J3'hb c  HƳ+9eWXol-H֭brfP6("ۭpi=}+BI%ih ޅoíXp'6#ȐYvJ GyA냇Ǣ 2ioXd !'O_}ed` r_7o%Sa|8ؐ|ilzsE4mPUd !'S| ˾fC:*_Fjm۶A냇Ǣ 6MS8a|8)eP| g,3/\[AM@Fh42A(' *f >xx, oZOJ*q2\ vh& jJY'fPFjPF ޠph J#<7xh J#AF fP>1RQDPZ MQ :foP6mAiG7fb3(7T0 'Qu̔5(y7oTʠp3:ofPoZOmBXLPfUHq14◅uǝ5QG|<Ayow,eP6lAiG7fb3(76]rcA3(,@/C\o ! ^Q\ u+| a,ss9s QPZ M tW똙Ơ) l2,I_ۄ XfPr0(ƌT8rcfb+2kٱ2~:AIC*eP֭AiG7fb3(76]rcAA ʒ41㯀#c{Ր˰x]>]3J<1Aqi= }c3U 0'Q4y^JO1.%e78fP>ʱUѦ}7:ofPoZOmBX j͚5#(Ll(c3mThPFsjPF ޠV^m@l3(ePAEAZh J#Pn"<=3]f, pz[d+m͠ߴ]'a1lų]`TXFr6'5A49èanlzޢE^n˘Ll:M\Bqgs_#`0I{`/"pG #Ae=>?F1s6[.']d8i>`N'Yva'7qxHOx8i .~ |J"cN=00&|'9xcI;'&4'c;hqImN-h́QYt!'ܯ3#G-^?%-N:Đ SDZ[itM'".~.-f*] >1$›a?V;h2VZ2hm2ZhJ:em9Yhʠhˠ+l+.δkoֿ_yWBSMF+_]V TnL+ԕcEmԬZ V ZV,ZNd[78V+ ۈ7{AᶲAkʗEkW)l+6c0PWA![nP x{qze,:edeڕhu ۊ͠BAZ2hm2Z2hmh Apt۵k5(= ~-+Au~$5@XYO-PAc\AH橁O-ЀAx"ee-N:D JO2Bjر#M6O|B-W- {Z*~v?Z9a2ǁ|:+5~Tq~ru]j?p?^-W ɠ4!=נoߞ wyhŹ^Cτn\veɢ*Nhyҥcu~[I[6{KOşx5m۶Bf~ciuonB>'1-&2(m$T.wNc-.B)X Lq)> A]H x *7~9$vXZ۫<1dh\qj$6ABr8K.Q󪂾cl@Q,Uۼys.Tnl}Μ9ɭ:V'$d˓O<1?3 +6f'z >l5*/ ooTAr&Thwj^&GU:'rK2w\5 wqG~`?&mof͚\:cqwꗩM|xcEl탄%^x[>Se⦛n}_^2ʕ+'~3Db$xc"x9-şshq|(N"U N{@FxHOx8i .~{5 4cW;)xØsrv`qE'[L&d2L&d2Ln?~1>ñs7M/c Llr8|.g7:>WWdPnPزevbǼ*mxzoꪫfi%wyXyN_jXJ׹ղ_O+' f#|z馛feJi~RGٳǕ9䓓G}-ce׿>ޓy&R76KAп2H'4\gp2(?jmfgF~rvfzdL|{= _~饗*_4>5ib&PO ^͛,ʕ+|ekt9逿LdO+# m$ k7ϱaWJi1}Y!K.ĥK,W$Hr Y-OO3<;z`Ҥekh'\V 5#C&&Pfz9 TAh 2Gi%:෋2L{3TJޡCfŊ##zhCǧ:]w˟7o(?^;V5 ؞LIsv>NJ^) O }I_vygv=J?VLJmgyGԍ iO oww@d0?E<^k7ϱaWJ6*>/T{ZC TV<ߛ0boضOZy1*ucü*mx]v grko}tGCԿGy6m]ܞ._|Vm"Hg0BW^-q;u_a_O6<&O:mMx/arf8b*mx/,(ߨ m|mz=Se?2Fh/&Pɉpkb (l yZHC|iu|M$y,nvkU~1(u>F]6&3J6oޜlذT%?tixc/o&?d|lhoӯ.!j, ?gvp6 id(!5I(<9֯__u"e(Tc/oIMO2%D(>RF]o&4yr*9|pB&P M:h*ɓc߾} M@%4J^|ń&Q@%4Jڎf݋q>/DO0c&P M{,ITB&PLB&P M@%Ld MHUJw'>2%D(S a'P$*YbŤMLS{ aU`kOQ |,_dM* GC𽄰 T*mx0l MK&/޷`92?1 |/!l #l%K8^HF6\ fmC7=@dѢE… ? ax^B*r@ c(g T`Ace~bK@E.@F*w]w1'𽄰 T*=IPM&P '%M"WiÃAPM&PcU>02𽄰 Tlxg ?&oz6Z,[̟8* F/q^B*r6Mf@i&O@A'M4yɓ&P34q@i&O<9h4C4 M4 M4~A@rUtIJ iq^B4:bq'wkGR+ D:I}@n)6<|P1pM ƒ'V%?t8e\3J+ &/.&P^N5䡮&(֎Nh@AAycO6&TtEu&PAcX5KN!u<T8o^*mxBBycO6&4iaÆ'V%?t8e\3ȤV'O^@e* } M L8le8e\3$kR&S,\g|œ( Im>64{'&P-ZaEh* ;L{}ü a`WJ62M%>2yIT.\8嵎'è 3R'0 O|e< -X` kOQfzTO(82yIgx" 0^)F%4cY<}J>1D=`7Y'1󒞈 }o >M@_{ZF @|ّ8&`BL/['1/p1~;.8׉ p q1xF\"!>F Ļ_!oe~b J; ̒C_%>D p-i)6Ƈ<fLp6gU1M1DK,6=\N3CT |8`AmŌ/['yIĆkpq'̇۷o kOel_Ej_el_3=是J~B#3-ZMkZ;M,ZM˼;:a ^`*=0H$JU@q$8MNJc=V ^{mя~tW,#M+zk~ˏcLM=Xgb}jyb _ꔡæW? |<|1bs_O~QkO}eqž|Pt+W&W_}u/ލXcʗ^@ש45\GaÆ//wYH-c2e.>#~ӟd,aY/KM'>i?# y_55' Ye\:bOw'tҬz]@^vq@A`a8k~2tKT7D?۩4zᇧ;p}Nw5֮];)c"+_ۏ1aӫKըXJ,e~|FiE谗D*坂Y@I,mx>ٟ^|0gW?ec;?#K/T͏M>OG>)CMpv*K\GFqhy//\>ޗZ~wzYpZ`of_-W{iJ6-[L͗ex9?eb?Ǧ\r%Ɋ+:EU@]Ap.^EjO>D>C21{;&UMs'^bR oƍS''.>l5 yj~~ ]"\O;dҥj7~j"tJRn 'vPR~B8o7S }ʮ__ebc >^bR O ~^7|.}򓟜guVu SO=5YhZ&fO'pǿWLa<5<+Ck`|y?mhebk_?_w*u]1Q_Z>H?Z?};0^)F%4cY<i}J>1D=`7Y'1󒞈 >Mħ K#7gÈ1/8;gL`zxe"% fo'EG@:N6q>  Heading 8  & F@&6]8 8  Heading 9 & F@&DA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List `>@` ]ATitle$dN5B* CJ0KH\^JaJ0ph;o>J@> ]ASubtitleB* CJ$aJ$ph;oVO"V ]ATitle page info $5B* aJph;opOp E=Title page info description$P^m$ 5B*ph2O!22 U Contributor@!B@ Legal notice^0/Q0 DatatypeOJQJ6U`a6 0 Hyperlink >*B*ph.@. pTOC 1 <<6@6 pTOC 2<<^6@6 pTOC 3<<^~~ CodeP$$d&d-DM NP]^ CJOJQJNO!N ]AAppendixHeading2  & F B* ph;oFV F FollowedHyperlink >*B* ph2/2 Element CJOJQJ6/6 Attribute CJOJQJ&& KeywordR^R Normal (Web) dd[$\$OJPJQJ^J.X . Emphasis6]Ng !N HTML TypewriterCJOJPJQJ^JaJe2 HTML Preformatted?# 2( Px 4 #\'*.25@9OJPJQJ^JaJ4O4 Note Heading$<< Note%xx]^JrJ Definition term &@ ]@ 5PJ@b@ Definition'x^PJFF Ref(p((^p` B*\ph44 Header ) !@ @@ :Footer * ! mHsHtH.)@. Page NumberdOd ;\"AppendixHeading1, & Fdd[$\$B* KH$aJ$ph;o,/, Ref term5.(. Line Number66 TOC 7/x^^^ Example50$d&d-DM NP6/6 CODE temp CJOJQJF"F Code small2-DM CJ:2: Example small3CJ:0B: List Bullet 4 & F22 pTOC 4 5^CJ,/a, Variable6.Q. TOC 5 7^22 TOC 6 8^CJ8O8  Heading 1 WP9$:/: *:^s Footer Char OJQJaJD"@D GgCaption;$xxa$ CJ\aJ>6> List Bullet 2 < & FNO!N -H# Related Work= & F 88^80O!0 iAbstract>m$<O< ]ANotices?$ B* aJ$ph;o:: w Text Body @$^rr  p Table Grid7:VA0 APPNO1N ]AAppendixHeading3 B & F B* ph;oX2X D7 Balloon Text CCJOJQJaJmHsHtHN/AN C7Balloon Text CharCJOJQJ^JaJf@Rf F"# List ParagraphEd^m$OJPJQJ^JaJ\oa\ .Heading 4 Char'5B* CJKH OJQJ]^JaJph;oPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VvnB`2ǃ,!"E3p#9GQd; H xuv 0F[,F᚜K sO'3w #vfSVbsؠyX p5veuw 1z@ l,i!b I jZ2|9L$Z15xl.(zm${d:\@'23œln$^-@^i?D&|#td!6lġB"&63yy@t!HjpU*yeXry3~{s:FXI O5Y[Y!}S˪.7bd|n]671. tn/w/+[t6}PsںsL. J;̊iN $AI)t2 Lmx:(}\-i*xQCJuWl'QyI@ھ m2DBAR4 w¢naQ`ԲɁ W=0#xBdT/.3-F>bYL%׭˓KK 6HhfPQ=h)GBms]_Ԡ'CZѨys v@c])h7Jهic?FS.NP$ e&\Ӏ+I "'%QÕ@c![paAV.9Hd<ӮHVX*%A{Yr Aբ pxSL9":3U5U NC(p%u@;[d`4)]t#9M4W=P5*f̰lk<_X-C wT%Ժ}B% Y,] A̠&oʰŨ; \lc`|,bUvPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!R%theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] "f; $$$$$a  { yJlc p *!!"S#$$%+&&'*(()*6hB#LVc&lXnnn8:;<>?@ABCDEFHIJKLMNOPQRSTVWXYZ[\^begiswy"%x0B:<@yCGJW`+iiii)jLjnjjkmmnhnn9=GU]_`acdfhjklmnopqrtuvx :St/3WLei3zR`4 s z  *Ieghj (*+-Mk/KMNPp~/KMNPp 2Qmopr?Yuwxz +GIJLl *Hdfgi 1Lhjkm#%&(HUqstv+./1Q^z}~7:;=]8TWXZz   ,<X[\^~6q,/02R`|!"$Dh + . / 1 Q n !%!A!D!E!G!g!!!!!!!!""""OOOddfXXXXXXXXXXXXXXX X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%̕ 3!@ @H 0(  0(  B S  ?? _Toc85472892 _Hlt325638500 _Hlt325638501 _Toc287332006 _Toc370130289 _Toc370130290 _Toc370130291 _Toc370130292 _Toc370130293 _Toc370130294 _Toc370130295 _Toc370130296 _Toc370130297 _Toc370130298 _Toc370130299 _Toc370130300 _Toc370130301 _Toc370130302 _Toc370130303 _Toc370130304 _Toc370130305 _Toc370130306 _Toc370130307 _Toc370130308 _Toc370130309 _Toc370130310 _Toc370130311 _Toc370130312 _Toc370130313 _Toc370130314 _Toc370130315 _Toc370130316 _Toc370130317 _Toc370130318 _Toc370130319 _Toc370130320 _Toc370130321 _Toc370130322 _Toc370130323 _Toc370130324 _Toc370130325 _Toc370130326 _Toc370130327 _Toc370130328 _Toc370130329 _Toc370130330 _Toc370130331 _Toc370130332 _Toc370130333 _Toc370130334 _Toc370130335 _Toc370130336 _Toc287332011 _Toc370130337 _Toc85472897 _Toc287332012 _Toc370130338 _Toc370130339 _Toc370130340 _Toc370130341 _Toc85472898 _Toc287332014 _Toc370130342a " "+'c(*+-^/02e22833455@6+7989Q::I;;<<6=>7??@BcBDFNGHJLQSX[\]^f` abcc9d9d9dCeVeneeeef@@  !"#$%&'()*+,-./0123456789:;<=>"""D'v(*,-/02t22^33455j6A7O89g::[;;<<==$>M??@(BBDF`GHJLQSX[b]^m`)abccHdHdHdPeheeeeefeffffff f!fff11QeUeiemeeeeffffff f!fhffffff3333 ""+'E'c(x(**+ ,--..^//002333455k6+7B778988)9A9997::I;;<:<<A=>%>>?@@@AUAAABDDFFNGaGHHJJLLQQXX2YY[[\]d]^^_4`f`n` abcccIddeeffffff f!fffff`"CDh / P Q n ! !%!E!f!g!!!!!!"eefffffff f!fFfXfgfhf}f~ffff+pCX.G g'YhK Tc?Ɗ pd :. dpb^"P+%B~L0rV12Jr~97dдV DBm` Gf+HhUXL̽[=M"?M = bPȡXOU"d8o]YpY@_ohjW_z a*5q dfEb,Bb!e46ablfGm.sqXr@¤5+uBVJue(=;*{zD|ع,aX|1~"#^`QJo(  hh^h`OJQJo(h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h^`OJQJo(hHh ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^h`OJPJQJ^Jo(-8^8`OJQJ^Jo(o ^`OJQJo(  ^ `OJQJo( ^ `OJQJ^Jo(o x^x`OJQJo( H^H`OJQJo(^`OJQJ^Jo(o ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHP^`Po(@^@`o(.30^`0o(G-B* CJKH OJQJsH tH ph;o^JaJ_H..`^``o(... ^`o( .... ^`o( ..... ^`o( ...... `^``o(....... 00^0`o(........h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH h h^h`o(hH Appendix . @^@`o(hH. 0^`0o(hH.. `^``o(hH...  ^`o(hH .... ^`o(hH ..... ^`o(hH ......  `^``o(hH.......  00^0`o(hH........h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHhpp^p`OJQJ^Jo(hHoh@ @ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhPP^P`OJQJ^Jo(hHoh  ^ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH+W_BVJuq d5+uXL p= bPc?1~` GYhK;*{gGmsqXOUL.a"?M~L0f+HV DaX|YXro]Y^"blrV1+% :. b!e@_D|k[=M97lzgdq++                                                                                          n                                                                                                                                                                                                                                                                   V _Q0Vdo|TU]MVdCU]MVdY9 _Q0Vd mU]M`QU]MVdc~9#_Q0X;_Q0Vd n?':\DU]MVdfD_Q0Vdm NH_Q0Vd I_Q0Vd;SU]MVd ']U]MVdz|^Wa_Q0VdU Ms_Q0VdONsU]MVd1itU]MVd 2z  _:kCLn-n  yW G (6:W9~8/?^c2QR}GE_Cql~*9F7M!;\"F"#-H#e&>':(_(n(M)E\)DR*\*{+~+h,-)1y01#4>578:C:7;`;<*<a<E=i=K*AoA&BXB%I^JdK> K|ML^M 9O&Q?DQdIQ dQ R.RPR!TCT}TpgWY;)ZA^Z.]|X^y`G`aia=c3d jek~xl1m)Cnq#o$o|!qeqr:^s#$p.$R3DL}ZF_W $&Nq:<^{PeEl^(q]A%5xhi..A j CO\t7Xs-*^ X5_<&.I.$A*2ly&^2!dB $N<z 1Dcek!RuT|hFo)-^6'0Uo)Gg)OgGiM8H2<[nkj~ $836HX6hJ8u:V"\ee@f@Unknown g*Cx Times New RomanTimes New RomanCSymbolSymbol3. *Cx Arial7.@Calibri?= *Cx Courier NewI. ??Arial Unicode MS5. .[`)Tahoma;WingdingsA$BCambria Math"hKg'+-t8V48V424eeI$ 3qHP 0:v!xx ;C:\o\tcadmin\templatess\rcc\StandardsTrackTemplate-dot1.dotOMQTT Supplemental Publication Version 1.0 Part 1: NIST Cyber Security Framework3OASIS Message Queuing Telemetry Transport (MQTT) TCLouis-Philippe Lamoureux+                           ! " # $ % & ' ( ) * Oh+'08Dh     PMQTT Supplemental Publication Version 1.0 Part 1: NIST Cyber Security Framework4OASIS Message Queuing Telemetry Transport (MQTT) TCStandardsTrackTemplate-dot1Louis-Philippe Lamoureux45Microsoft Office Word@W@S@#@Av8V՜.+,D՜.+,|8 hp|  4e PMQTT Supplemental Publication Version 1.0 Part 1: NIST Cyber Security Framework Title h.6& : R j  _PID_HLINKSTC NameWP abbreviation TC Chair Editor #1 Editor #2 Editor #3 namespace #1 namespace #2 namespace #3Al3m_Toc3701303423g_Toc3701303413a_Toc3701303403[_Toc3701303393U_Toc3701303383O_Toc3701303373I_Toc3701303363C_Toc3701303353=_Toc37013033437_Toc37013033331_Toc3701303323+_Toc3701303313%_Toc3701303303_Toc3701303293_Toc3701303283_Toc3701303273 _Toc3701303263_Toc3701303253_Toc3701303243_Toc3701303233_Toc3701303223_Toc3701303213_Toc3701303203_Toc3701303193_Toc3701303183_Toc3701303173_Toc3701303163_Toc3701303153_Toc3701303143_Toc3701303133_Toc3701303123_Toc3701303113_Toc3701303103_Toc3701303093_Toc3701303083_Toc3701303073_Toc3701303063_Toc3701303053_Toc3701303043_Toc3701303033}_Toc3701303023w_Toc3701303013q_Toc3701303002k_Toc3701302992e_Toc3701302982__Toc3701302972Y_Toc3701302962S_Toc3701302952M_Toc3701302942G_Toc3701302932A_Toc3701302922;_Toc37013029125_Toc3701302902/_Toc370130289]*2http://www.oasis-open.org/policies-guidelines/ipr~9'1http://www.oasis-open.org/committees/process.phpstandApprovProcess|6$1http://www.oasis-open.org/committees/process.phpcommitteeDraftK!1http://www.oasis-open.org/committees/process.phpdWorkingDraft9http://docs.oasis-open.org/mqtt/mqtt/v4.0/mqtt-v4.0.htmlEhttp://www.m2mi.com/  mailto:louis.lamoureux@m2mi.coms!http://www.ibm.com/C5mailto:coppen@uk.ibm.comEhttp://www.m2mi.com/. mailto:geoff.brown@m2mi.coms! http://www.ibm.com/C5mailto:coppen@uk.ibm.comj  mailto:raphael.cohn@stormmq.com?k+http://www.oasis-open.org/committees/mqtt/TC Name(WP abbreviation, no version or stage TC Chair Editor #1 Editor #2 Editor #3namespace #1namespace #2namespace #3  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz|}~      !"#$%&'()*+,-./12345679:;<=>?@ABCDEJRoot Entry F@LData {ޤ1TableWordDocumentvSummaryInformation(0DocumentSummaryInformation88CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q