ÐÏࡱá>þÿ ^`þÿÿÿ[\]zvüqñÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿì¥ÁY ¿wMbjbjóWóW &==^) wÿÿÿÿÿÿ]999 9ò9îà>|?dà?à?à?à?°@4ÄAà?ÞÄvDNÄHp4I4IÀôJôJZdh^4ÌÎÎÎ'õLAL$¢ô±-9T`ÂôJôJ^b,c±>99ôJôJìC>>>"d¶9ôJ9ôJÌà?à?9999`Ì>þ><þÁó99ÌôJPCàJœLç)œà?à?Øuf Ž INTERNATIONAL TELECOMMUNICATION UNIONTELECOMMUNICATIONSTANDARDIZATION SECTOR STUDY PERIOD 1997 -2000COM 16- -E September 1997 Original: English
Question 14/16
STUDY GROUP 16 - CONTRIBUTION
SOURCE* : RAPPORTEUR FOR Q.14/16 (Gary THOM) TITLE: PROPOSED RECOMMENDATION H.235
__________
Summary
This contribution provides the text for draft Recommendation H.235 Security and encryption for H series (H.323 and other H.245 based) multimedia terminals which is an editorially refined version of the one determined at the SG16 meeting in March 1997.
This Recommendation describes enhancements within the framework of the ITU H.3(XX) specification series, to incorporate security services such as Authentication and Privacy (data encryption). The proposed scheme is applicable to both simple point-to-point and multi-point conferences for any terminals which utilize H.245 as a control protocol.
It is proposed that this draft be decided at the January-February 1998 meeting of SG16.
* Contact: Jim Toga Tel.: +1 (503) 264-8816 Intel Corporation Fax: +1 (503) 264-3485 Santa Clara, USA E-mail: jtoga@ibeam.intel.com
INTERNATIONAL TELECOMMUNICATION UNION
ITU-T H.235 TELECOMMUNICATION (January 1998)STANDARDIZATION SECTOR OF ITU
LINE TRANSMISSION OF NON-TELEPHONESIGNALS
Security and Encryption for H Series (H.323 and other H.245 based) multimedia terminals
DRAFT ITU-T Recommendation H.235
FOREWORD
The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the International Telecommunication Union. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis.
The World Telecommunication Standardization Conference (WTSC), which meets every four years, established the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics.
ITU-T Recommendation H.235 was prepared by the ITU-T Study Group 16 (199x-199x) and was approved by the WTSC (Place, Month xx-xx, 199x). ___________________
ãð ITU 199x All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the ITU. SUMMARY This Recommendation describes enhancements within the framework of the ITU H.3(XX) specification series, to incorporate security services such as Authentication and Privacy (data encryption). The proposed scheme is applicable to both simple point-to-point and multi-point conferences for any terminals which utilize H.245 as a control protocol. For example, H.323 systems operate over packet based networks which do not provide a guaranteed Quality of Service. For the same technical reasons that the base network does not provide QOS, the network does not provide a secure service. Secure real-time communication over insecure networks generally involves two major areas of concern authentication and privacy. This Recommendation describes the security infrastructure and specific privacy techniques to be employed by the H.3(XX) series of multimedia terminals. This document will cover areas of concern for interactive conferencing. These areas include, but are not strictly limited to authentication, privacy of all real-time media streams that are exchanged in the conference. This Recommendation provides the protocol and algorithms needed between the H.323 entities. H.235 utilizes the general facilities supported in H.245 and as such, any standard which operates in conjunction with this control protocol may use this security framework. It is expected that wherever possible other H.series terminals may interoperate and directly utilize the methods described in this document. This document will not initially provide for complete implementation in all areas, and will specifically highlight endpoint authentication and media privacy. This recommendation includes the ability to negotiate services and functionality in a generic manner, and to be selective concerning cryptographic techniques and capabilities utilized. The specific manner in which they are used, relates to systems capabilities, application requirements and specific security policy constraints. This recommendation supports varied cryptographic algorithms, with varied options appropriate for different purposes; e.g. key lengths. Certain cryptographic algorithms may be allocated to specific security services (e.g. one for fast media stream encryption and another for signalling encryption). It should also be noted that some of the available cryptographic algorithms or mechanisms may be reserved for export or other national issues (e.g. with restricted key lengths). The recommendation supports signalling of well-known algorithms in addition to signalling non-standardized or proprietary cryptographic algorithms. There are no specifically mandated algorithms, however it is strongly suggested that endpoints support as many of the applicable algorithms as possible in order to achieve interoperability. This parallels the concept that the support of H.245 does not guarantee the interoperability between two entities codecs. TOC * MERGEFORMAT 1. Scope PAGEREF _Toc410402794 \h 1 2. Normative references PAGEREF _Toc410402795 \h 1 3. Definitions PAGEREF _Toc410402796 \h 3 4. Symbols and abbreviations PAGEREF _Toc410402797 \h 4 5. Conventions PAGEREF _Toc410402798 \h 5 6. System Introduction PAGEREF _Toc410402799 \h 6 6.1 Summary PAGEREF _Toc410402800 \h 6 6.2 Authentication PAGEREF _Toc410402801 \h 6 6.2.1 Certificates PAGEREF _Toc410402802 \h 6 6.3 Call Establishment Security PAGEREF _Toc410402803 \h 7 6.4 Call Control (H.245) Security PAGEREF _Toc410402804 \h 7 6.5 Media Stream Privacy PAGEREF _Toc410402805 \h 7 6.6 Trusted Elements PAGEREF _Toc410402806 \h 8 6.6.1 Key Escrow PAGEREF _Toc410402807 \h 8 6.7 NonRepudiation PAGEREF _Toc410402808 \h 8 7. Connection Establishment Procedures PAGEREF _Toc410402809 \h 9 7.1 Introduction PAGEREF _Toc410402810 \h 9 8. H245 Signalling AND PROCEDURES PAGEREF _Toc410402811 \h 9 8.1 Secure H.245 Channel Operation PAGEREF _Toc410402812 \h 9 8.2 Unsecured H.245 Channel Operation PAGEREF _Toc410402813 \h 10 8.3 Capability Exchange PAGEREF _Toc410402814 \h 10 8.4 Master role PAGEREF _Toc410402815 \h 10 8.5 Logical Channel Signalling PAGEREF _Toc410402816 \h 10 9. Multipoint Procedures PAGEREF _Toc410402817 \h 11 9.1 Authentication PAGEREF _Toc410402818 \h 11 9.2 Privacy PAGEREF _Toc410402819 \h 11 10. Authentication Signalling AND PROCEDURES PAGEREF _Toc410402820 \h 11 10.1 Introduction PAGEREF _Toc410402821 \h 11 10.2 Diffie-Hellman with optional Authentication PAGEREF _Toc410402822 \h 11 10.3 Subscription Based Authentication PAGEREF _Toc410402823 \h 12 10.3.1 Introduction PAGEREF _Toc410402824 \h 12 10.3.2 Password with symmetric encryption PAGEREF _Toc410402825 \h 12 10.3.3 Password with hashing PAGEREF _Toc410402826 \h 13 10.3.4 Certificate based with signatures PAGEREF _Toc410402827 \h 13 11. Media Stream Encryption Procedures PAGEREF _Toc410402828 \h 14 11.1 Media Session Keys PAGEREF _Toc410402829 \h 14 12. Security Error Recovery PAGEREF _Toc410402830 \h 15 1. Scope
The primary purpose of this Recommendation is to provide for authentication, privacy, and integrity within the current H series protocol framework. The current text of this document (1998) provides details on implementation with H.323. This framework is expected to operate in conjunction with other H series protocols that utilize H.245 as their control protocol.
Additional goals in this recommendation include:
Security architecture should be developed as an extensible and flexible framework for implementing a security system for H series terminals. This should be provided through flexible and independent services and the functionality that they supply. This includes the ability to negotiate and be selective concerning cryptographic techniques utilized, and the manner in which they are used. Provide security for all communications occurring as a result of H.3xx protocol usage. This includes aspects of connection establishment, call control, and media exchange between all entities. This requirement includes the use of confidential communication (privacy), and may exploit functions for peer authentication as well as protection of the users environment from attacks. This recommendation should not preclude integration of other security functions in H.3xx entities which may protect them against attacks from the network. This recommendation should not limit the ability for any H.3xx series to scale as appropriate. This may include both the number of secured users and the levels of security provided. Where appropriate, all mechanisms and facilities should be provided independent of any underlying transport or topologies. Other means that are outside the scope of H.235 may be required to counter such threats. Provisions are made for operation in a mixed environment (secured and unsecured entities) This recommendation should provide facilities for distributing session keys associated with the cryptography utilized. (This does not imply that public-key based certificate management must be part of H.235).
The security architecture, described in this Recommendation, does not assume that the participants are familiar with each other. It does however assume that appropriate precautions have been taken to physically secure the H series endpoints. The principal security threat to communications, therefore, is assumed to be eavesdropping on the network or some other method of diverting media streams.
The 1996 H.323 standard provides the means to conduct an audio, video and data conference between two or more parties, but does not provide the mechanism to allow each participant to authenticate the identity of the other participants, nor provide the means to make the communications private. (i.e., encrypt the streams).
H.323, H.324, H.310, H.324M make use of the logical channel signalling procedures of Recommendation H.245, in which the content of each logical channel is described when the channel is opened. Procedures are provided for expression of receiver and transmitter capabilities, transmissions are limited to what receivers can decode, and receivers may request a particular desired mode from transmitters. The security capabilities of each endpoint are communicated in the same manner as any other communication capability.
Some H series (H.323) terminals may be used in multipoint configurations. The security mechanism described in this document will allow for secure operation in these environments including both centralized and decentralized MCU operation.
2. Normative references
The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; all users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published.
[1] ITU-T Recommendation H.323 (1998): Packet Based Multimedia Communications Systems [2] ITU-T Recommendation H.225.0 (1998): " Call Signaling Protocols and Media Stream Packetization for Packet Based Multimedia Communications Systems ". [3] ITU-T Recommendation H.245 (1998): "Control Protocol for Multimedia Communication ". [4] ITU-T Recommendation Q.931 (1993): "Digital Subscriber Signalling System No. 1 (DSS 1) - ISDN User-Network Interface Layer 3 Specification for Basic Call Control". [5] ITU-T Recommendation X.509: The directory-authentication framework [6] CCITT Recommendation X.800 (1991), Security Architecture for Open Systems Interconnection for CCITT applications. (ISO 74982:1989, Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture.) [7] ITU-T Recommendation X.803 (1994) | ISO/IEC 10745:1995, Information technology Open Systems Interconnection Upper layers security model. [8] ITU-T Recommendation X.810 (1995) | ISO/IEC 10181-1:1996, Information technology Open Systems Interconnection Security frameworks for open systems: Overview. [9] ITU-T Recommendation X.811 (1995) | ISO/IEC 10181-2:1996, Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework. [10] ISO/IEC 9798-2:1994, Information technology Security techniques Entity authentication. Mechanisms using symmetric encipherment algorithms [11] ISO/IEC 9798-3:1993, Information technology Security techniques Entity authentication using public key algorithm. [12] ISO/IEC 9798-4:1995, Information technology Security techniques Entity authentication. Mechanisms using a cryptographic check function [13] Internet Engineering Task Force, 1996 Security Architecture for the Internet Protocol, RFC 1825, RP. Atkinson Internet Engineering Task Force, 1997 Keyed-Hashing for Message Authentication, RFC 2104, H. Krawczyk, M. Bellare, and R. Canetti 3. Definitions For the purposes of this Recommendation the definitions given in section 3 of H.323, H.225.0, and H.245 apply along with those in this section. Some of the following terms are used as defined in CCITT Rec. X.800 | ISO 7498-2 and X.803, X.810 and X.811: access control: The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner (X.800). authentication: The provision of assurance of the claimed identity of an entity (X.811). authentication: The granting of permission on the basis of authenticated identification. attack: The activities undertaken to bypass or exploit deficiencies in a systems security mechanisms. By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed when they bypass the mechanism, or when they make the system use the mechanism incorrectly. certificate: A set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for the data (X.810). In this recommendation the term refers to public key certificates which are values that represent an owners public key (and other optional information) as verified and signed by a trusted authority in an unforgeable format. cCipher: A cryptographic algorithm, a mathematical transform. confidentiality: The property that prevents disclosure of information to unauthorized individuals, entities, or processes. cryptographic algorithm: Mathematical function that computes a result from one or several input values using a secret parameter (e.g. a key). encipherment : Encipherment (encryption) is the process of making data unreadable to unauthorized entities by applying a cryptographic algorithm (an encryption algorithm). Decipherment (decryption) is the reverse operation by which the ciphertext is transformed to the plaintext. integrity: The property that data has not been altered in an unauthorized manner. key management: The generation, storage, distribution, deletion, archiving and application of keys in accordance with a security policy (X.800). media stream: A media steam can be of type audio, video or data or a combination of any of them. Media stream data conveys user or application data (payload) but no control data. Nnonrepudiation: Protection from denial by one of the entities involved in a communication of having participated in all or part of the communication Pprivacy: A mode of communication in which only the explicitly enabled parties can interpret the communication. This is typically achieved by encryption and shared key(s) for the cipher. pPrivate channel: For this document, a private channel is one that is a result of prior negotiation on a secure channel. In this context it may be used to handle media streams. pPublic kKey cCryptography: An encryption system utilizing asymmetric keys (for encryption/decryption) in which the keys have a mathematical relationship to each other - which cannot be reasonably calculated. symmetric (secret-key based) cryptographic algorithm: An algorithm for performing encipherment or the corresponding algorithm for performing decipherment in which the same key is required for both encipherment and decipherment (X.810). threat: A potential violation of security (X.800).
4. Symbols and abbreviations
For the purposes of this Recommendation, the following symbols and abbreviations apply.
CBC: Cipher Block Chaining CFB: Cipher Feedback DSS: Digital Signature Standard ECB: Electronic Code Book IPSEC: Internet Protocol Security ISAKMP: Internet Security Association and Key Management Protocol OFB: Output Feedback QoOS: Quality of Service RSA: Rivest, Shamir and Adleman (public key algorithm) SDU: Service Data Unit TLS: Transport Level Security 5. Conventions
In this document the following conventions are used: "Shall" indicates a mandatory requirement. "Should" indicates a suggested but optional course of action. "May" indicates an optional course of action rather than a recommendation that something take place.
References to Sections, Paragraphs, Annexes, and Appendices refer to those items within this Recommendation unless another document is explicitly listed. For example, Section 1.4 refers to section 1.4 of this Recommendation; H.245 Section 6.4 refers to section 6.4 in H.245.
{ To be refined for this recommendation - This Recommendation describes the use of n different message types: H.245, RAS, Q.931, etc. To distinguish between the different message types the following convention is followed. H.245 message and parameter names consist of multiple concatenated words highlighted in bold typeface (maximumDelayJitter). RAS message names are represented by three letter abbreviations (ARQ). Q.931 message names consist of one or two words with the first letters capitalized (Call Proceeding).}
6. System Introduction 6.1 Summary The Call Signalling channel may be secured using TLS [TLS] or IPSEC [13/IPSEC] on a secure well-known port (H.225.0). Users may be authenticated either during the initial call connection, in the process of securing the H.245 channel and/or by exchanging certificates on the H.245 channel. The encryption capabilities of a media channel are determined by extensions to the existing capability negotiation mechanism. Initial Distribution of key material from the Master is via H.245 OpenLogicalChannel or OpenLogicalChannelAck messages. Re-keying may be accomplished by H.245 commands; EncryptionUpdateRequest and EncryptionUpdate. Key material distribution is protected either by operating the H.245 channel as a private channel or by specifically protecting the key material using the selected exchanged certificates. The security protocols presented either conform to ISO published standards or IETF proposed standards.
6.2 Authentication The process of authentication verifies that the respondents are, in fact, who they say they are. Authentication may be accomplished in conjunction with the exchange of public key based Certificates. Authentication may also be accomplished by an exchange which utilizes a shared secret between the entities involved. This may be a static password or some other a priori piece of information This Recommendation describes the protocol for exchanging the certificates, but does not specify the criteria by which they are mutually verified and accepted. In general, certificates give some assurance to the verifier that the presenter of the certificate is who he says he is. The intent behind the certificate exchange is to authenticate the user of the endpoint, not simply the physical endpoint. Using Digital Certificates, an authentication protocol proves that the respondents possess the private keys corresponding to the public keys contained in the certificates. This authentication protects against man-in-the-middle attacks, but does not automatically prove who the respondents are. To do this normally requires that there be some policy regarding the other contents of the certificates. For authorization certificates, for example, the certificate would normally contain the Service-Providers identification along with some form of user account identification prescribed by the Service Provider. The authentication framework in this document does not prescribe the contents of certificates (i.e., does not specify a certificate policy) beyond that required by the authentication protocol. However, an application using this framework may impose high-level policy requirements such as presenting the certificate to the user for approval. This higher level policy may either be automated within the application or require human interaction. For authentication which does not utilize digital certificates, this Recommendation provides the signalling to complete various challenge/response scenarios. This method of authentication requires prior coordination by the communicating entities so that a shared secret may be obtained. An example of this method would be a customer of a subscription based service. As a third option, the authentication may be completed within the context of a separate security protocol such as TLS [TLS] or IPSEC [13/IPSEC]. Both bi-directional and unidirectional authentication may be supported by peer entities. This authentication may occur on some or all of the communication channels. All of the specific authentication mechanisms described in this recommendation are identical to, or derived from ISO developed algorithms as specified in references [10-12] or based on IETF protocols 6.2.1 Certificates The standardization of certificates, including their generation, administration and distribution is outside the scope of this document. The Certificates used to establish secure channels (call signalling and/or call control) shall conform to those prescribed by whichever protocol has been negotiated to secure the channel. It should be noted that for authentication utilizing public key certificates, the endpoints are required to provide digital signatures using the associated private key value. The exchange of public key certificates alone does not protect against man in the middle attacks. The H.235 protocols conform to this requirement. 6.3 Call Establishment Security There are at least two reasons to motivate securing the call establishment channel (e.g. H.323 using Q.931). The first is for simple authentication, before accepting the call. The second reason is to allow for call authorization. If this functionality is desired in the H Series terminal, a secure mode of communication should be used (such as TLS/IPSEC for H.323) before the exchange of call connection messages. Alternatively, the authorization may be provided based upon a service specific authentication. The constraints of a service specific authorization policy are outside the scope of this document. 6.4 Call Control (H.245) Security The call control channel (H.245) should also be secured in some manner to provide for subsequent media privacy. The H.245 channel shall be secured using any negotiated privacy mechanism (this includes the option of none). H.245 messages are utilized to signal encryption algorithms and encryption keys used in the shared, private, media channels. The ability to do this, on a logical channel by logical channel basis, allows different media channels to be encrypted by different mechanisms. For example, in centralized multipoint conferences, different keys may be used for streams to each endpoint. This may allow media streams to be made private for each endpoint in the conference. In order to utilize the H.245 messages in a secure manner the entire H.245 channel (logical channel 0) should be opened in a negotiated secure manner. The mechanism by which H.245 is made secure is dependent on the H series terminals involved. The only requirement on all systems that utilize this security structure is that each shall have some manner in which to negotiate and/or signal that the H.245 channel is to be operated in a particular secured manner before it is actually initiated. For example, H.323 will utilize the H.225.0 connection signalling messages to accomplish this. 6.5 Media Stream Privacy This Recommendation describes media privacy for media streams carried on packet based transports. These channels may be uni-directional with respect to H.245 logical channel characterizations. The channels are not required to be uni-directional on a physical or transport level. A first step in attaining media privacy should be the provision of a private control channel on which to establish cryptographic keying material and/or set up the logical channels which will carry the encrypted media streams. For this purpose, when operating in a secure conference, any participating endpoints may utilize an encrypted H.245 channel. In this manner, cryptographic algorithm selection and encryption keys as passed in the H.245 OpenLogicalChannel command are protected. The H.245 secure channel may be operated with different characteristics than the private media channel(s) as long as it provides a mutually acceptable level of privacy. This allows for the security mechanisms protecting media streams and any control channels to operate in a completely independent manner, providing completely different levels of strength and complexity. If it is required that the H.245 channel be operated in a non-encrypted manner, the specific media encryption keys may be encrypted separately in the manner signaled and agreed to, by the participating parties. A logical channel of type h235Control may be utilized to provide the material to protect the media encryption keys. This logical channel may be operated in any appropriately negotiated mode. The privacy (encryption) of data carried in logical channels shall be in the form specified by the OpenLogicalChannel. Transport specific header information shall not be encrypted. The privacy of data is to be based upon end-to-end encryption. 6.6 Trusted Elements The basis for authentication (trust) and privacy is defined by the terminals of the communications channel. For a connection establishment channel, this may be between the caller and a hosting network component. For example, a telephone trusts that the network switch will connect it with the telephone whose number has been dialed. For this reason, any entity which terminates an encrypted H.245 control channel or any encryptedData type logical channels shall be considered a trusted element of the connection; this may include MC(U)s and Gateways. The result of trusting an element is the confidence to reveal the privacy mechanism (algorithm and key) to that element. Given the above, it is incumbent upon participants in the communications path to authenticate any and all trusted elements. This will normally be done by certificate exchange as would occur for the standard end to end authentication. This recommendation will not require any specific level of authentication, other than to suggest that it be acceptable to all entities using the trusted element. Details of a trust model and certificate policy are for further study. Privacy can be assured between the two endpoints only if connections between trusted elements are proven to be protected against man in the middle attacks. 6.6.1 Key Escrow Although not specifically required for operation, this recommendation contains provision for entities utilizing the H.235 protocol to support a key escrow, or key recovery technique within the signalling elements. The ability to recover lost media encryption keys should be supported in installations where this functionality is desired or required. 6.7 NonRepudiation FFS. 7. Connection Establishment Procedures 7.1 Introduction As stated in the REF _Ref379881422 * MERGEFORMAT 6. System Introduction section, both the call connection channel (H.225.0 for H.323 series) and call control (H.245) channel shall operate in the negotiated secured or unsecured mode starting with the first exchange. For the call connection channel, this is done a priori (for H.323 a TLS secured TSAP [port 1300] shall be utilized for the Q.931 messages). For the call control channel, security mode is determined by information passed in the initial connection setup protocol in use by the H series terminal. In the cases in which there are no overlapping security capabilities, the called terminal may refuse the connection. The error returned should convey no information about any security mis-match the calling terminal will have to determine the problem by some other means. In cases where the calling terminal receives a connect acknowledgment message without sufficient security capabilities, it should terminate the call. If the calling and called terminals have compatible security capabilities, it shall be assumed by both sides that the H.245 channel shall operate in the secure mode negotiated. Failure to set up the H.245 in the secure mode determined here should be considered a protocol error and the connection terminated. 8. H245 Signalling AND PROCEDURES In general, the privacy aspects of media channels are controlled in the same manner as any other encoding parameter; each terminal indicates its capabilities, the source of the data selects a format to use and the receiver acknowledges or denies the mode. All transport independent aspects of the mechanism such as algorithm selection are indicated in generic logical channel elements. Transport specifics such as key/encryption algorithm synchronization are passed in transport specific structures. 8.1 Secure H.245 Channel Operation Assuming that the connection procedures in the previous section ( REF _Ref379881553 * MERGEFORMAT 7. Connection Establishment Procedures) indicate a secure mode of operation, the negotiated handshake and authentication shall occur for the H.245 logical channel before any other H.245 messages are exchanged. If negotiated, any exchange of certificates shall occur using any mechanism appropriate for the H series terminal(s). After completing the securing of the H.245 channel, the terminals use the H.245 protocol in the same manner that they would in an insecure mode. 8.2 Unsecured H.245 Channel Operation Alternatively, the H.245 channel may operate in an unsecured manner and the two entities open a secure logical channel with which to perform authentication and/or shared-secret derivation. For example TLS or IPSEC may be utilized by opening a logical channel with the datatype containing a value for encryptionData. This channel could then be used to derive a shared secret which protects any media session keys or to transport the EncryptionSync.
8.3 Capability Exchange Following the procedures in H.245 Section 8.3 - Capability Exchange Procedures, and the appropriate H series System Recommendation, endpoints exchange capabilities using H.245 messages. These capability sets may now contain definitions which indicated security and encryption parameters. For example, an endpoint might provide capabilities to send and receive H.261 video. It may also signal the ability to send and receive encrypted H.261 video. Each encryption algorithm that is utilized in conjunction with a particular media codec, implies a new capability definition. As with any other capability, endpoints may supply both independent and dependent encrypted codecs in their exchange. This will allow endpoints to scale their security capabilities based upon overhead and resources available. After capability exchange has been completed, endpoints may open secure logical channels for media in the same manner that they would in an insecure manner. 8.4 Master role The H.245 master-slave is used to establish the master entity for the purpose of bi-directional channel operation and other conflict resolution. This role of master is also utilized in the security methods. Although the security mode(s) of a media stream is set by the source (in deference to the capabilities of the receiver), the master is the endpoint which generates the encryption key. This generation of the encryption key is done, regardless of whether the master is the receiver or the source of the encrypted media. In order to allow for multicast channel operation with shared keys, the MC (also the master) should generate the keys. 8.5 Logical Channel Signalling Endpoints open secure media logical channels in the same manner that they open unsecured media logical channels. Each channel may operate in a completely independent manner from other channels - in particular where this pertains to security. The particular mode shall be defined in the OpenLogicalChannel dataType field. The initial encryption key shall be passed in either the OpenLogicalChannel or OpenLogicalChannalAck depending on the master/slave relationship of the originator of the OpenLogicalChannel. The OpenLogicalChannelAck shall act as confirmation of the encryption mode. If the openLogicalChannel is unacceptable to the recipient either dataTypeNotSupported or dataTypeNotAvailable (transient condition) shall be returned in the cause field of the OpenLogicalChannelReject. During the protocol exchange that establishes the logical channel, the encryption key shall be passed from the Master to the slave (regardless of who initiated the OpenLogicalChannel). For media channels opened by an endpoint (other than the Master), the Master shall return the initial encryption key and the initial synchronization point in the OpenLogicalChannelAck (in the encryptionSync field). For Media Channels opened by the Master the OpenLogicalChannel shall include the initial encryption key and the synchronization point in the encryptionSync field. 9. Multipoint Procedures 9.1 Authentication Authentication shall occur between an endpoint and the MC(U) in the same manner that it would in a point to point conference. The MC(U) shall set the policy concerning level and stringency of authentication. As stated in section REF _Ref379881675 \n 0 the MC(U) is trusted; existing endpoints in a conference may be limited by the authentication level employed by the MC(U). New ConferenceRequest/ConferenceResponse commands, allow endpoints to obtain the certificates of other participants in the conference from the MC(U). As outlined in H.245 procedures, endpoints in a multipoint conference may request other endpoint certificates via the MC, but may not be able perform direct cryptographic authentication within the H.245 channel. 9.2 Privacy MC(U) shall win all master/slave exchanges and as such shall supply encryption key(s) to participants in a multipoint conference. Privacy for individual sources within a common session (assuming multicast) may be achieved with individual or common keys. These two modes may be arbitrarily chosen by the MC(U) and shall not be controllable from any particular endpoint except in modes allowed by MC(U) policy. In other words, a common key may be used across multiple logical channels as opened from different sources.
10. Authentication Signalling AND PROCEDURES 10.1 Introduction There are two types of authentication that may be utilized. The first type is symmetric encryption based that requires no prior contact between the communicating entities. The second type is based on the ability to have some prior shared secret (further referenced as subscription based). Two forms of subscription-based authentication are provided; password and certificate. 10.2 Diffie-Hellman with optional Authentication The intent is not to provide absolute, user-level authentication. This method provides signalling to generate a shared secret between two entities which may lead to keying material for private communications.
At the end of this exchange both the entities will possess a shared secret key along with a chosen algorithm with which to utilize this key. This shared secret key may now be used on any subsequent request/response exchanges. It should be noted, that in rare cases the Diffie-Hellman exchange may generate known weak keys for particular algorithms. When this is the case, either entity should disconnect and reconnect to establish a new key set.
The first phase of the figure below, demonstrates the data exchanged during the Diffie-Hellman. The second phase allows for application or protocol specific request messages to be authenticated by the responder. Note that a new random value may be returned with each response.
Note: An optional signature element may also be provided. Tthese are illustrated in italics below.
EMBED Word.Picture.8 Figure A [ ] indicates a sequence of tokens () indicates a particular token, which may contain multiple elements {}EDH-Secret indicates the contained values are encrypted utilizing the Diffie-Hellman secret
EPB knows which shared secret key to use to decipher the generalIDb identifier by associating it with the generalIDa, which should also be passed in the message. Note that the encrypted value in phase 2 is passed in the generalID field of a clearToken to simplify encoding. 10.3 Subscription Based Authentication 10.3.1 Introduction Although the procedures outlined here (and the ISO algorithms from which they are derived) are bi-directional in nature, they may be utilized in only one direction if authentication is only needed in that direction. These exchanges assume that each end possesses some well known identifier (such as a text identifier) which uniquely identifies it. A further assumption is made that there is a mutually acceptable reference to time (from which to derive timestamps). The amount of time skew that is acceptable is a local implementation matter. There are three different variations that may be implemented depending on requirements: password based with symmetric encryption password based with hashing Certificate based with signatures
In all cases the token will contain the information as described in the following sections depending on the variation chosen. Note that in all cases, the generalID may be known through configuration or directory lookup rather than in band protocol exchange. 10.3.2 Password with symmetric encryption Shown below is the token format and the message exchange required to perform this type of authentication. This protocol is based on ISO 9798-2, (5.2.1), it is assumed that an identifier and associated password are exchanged during subscription. The encryption key is length N octets (as indicated by the AlgorithmID), and is formed as follows: - If password length = N, Key = password - if password length < N, the key is padded with zeros - if password length > N, the first N octets are assigned to the key, then the N+Mth octet of the password is XORd to the Mmod(N)th octet (for all octets beyond N). (i.e. all extra password octets are repeatedly folded back on the key by XORing)
EMBED Word.Picture.8
Note1: that the return token from EPB is optional; if omitted, only one-way authentication is achieved. Note2: Ek-pw indicates values that are encrypted using the key k derived from the password pw. 10.3.3 Password with hashing Shown below is the token format and the message exchange required to perform this type of authentication. This protocol is based on ISO 9798-4, (5.2.1), it is assumed that an identifier and associated password are exchanged during subscription. EMBED Word.Picture.8 Note1: that the return token from EPB is optional; if omitted, only one-way authentication is achieved Note2: Hash indicates a hashing function that operates on the contained values 10.3.4 Certificate based with signatures Shown below is the token format and the message exchange required to perform this type of authentication. This protocol is based on ISO 9798-3, (5.2.1), it is assumed that an identifier and associated certificate are assigned/exchanged during subscription. Note: An optional certificate element may also be provided these are illustrated in italics below. EMBED Word.Picture.8 Note1: The return token from EPB is optional; if omitted, only one-way authentication is achieved. Note2: A payment type certificate may be optionally included by the EPA originator. Note3: Sign indicates a signing function (from associated certificate) performed on the contained values. 11. Media Stream Encryption Procedures Media streams shall be encoded using the algorithm and key as presented in the H.245 channel. The following figures show the general flow. Note that the transport header is attached to the transport SDU after the SDU has been encrypted. The opaque segments indicate privacy. As new keys are received by the transmitter and used in the encryption, the SDU header shall indicate in some manner to the receiver that the new key is now in use. For example, in H.323 the RTP header (SDU) will change its payload type to indicate the switch to the new key. EMBED PowerPoint.Slide.8 Encryption of Media EMBED PowerPoint.Slide.8 Decryption of Media 11.1 Media Session Keys Included in the encryptionUpdate is the h235Key. The h235Key is ASN.1 encoded within the context of the H.235 ASN.1 tree and passed as an opaque octet string with respect to H.245. The key may be protected by utilizing one of the three possible mechanisms as they are passed between two endpoints. If the H.245 channel is secure, no additional protection is applied to the key material. The key is passed in the clear with respect to this field; the ASN.1 choice of secureChannel is utilized. If a secret key and algorithm has been established outside the H.245 channel as a whole (i.e. outside H.323 or on a h235Control logical channel), the shared secret is used to encrypt the key material, the resultant enciphered key is included here. In this case the ASN.1 choice of sharedSecret is used. Certificates may be used when the H.245 channel is not secure, but may also be used in addition to the secure H.245 channel. When certificates are utilized the key material is enciphered using the certificates public key and the ASN.1 construct certProtectedKey.
At any point in a conference, a receiver (or transmitter) may request a new key (encryptionUpdateRequest). One reason it might do this is if it suspects that it has lost synchronization of one of the logical channels. The Master receiving this request shall generate new key(s) in response to this command. The Master may also decide asynchronously to distribute new key(s), if so it shall use the encryptionUpdate message. After receiving an encryptionUpdateRequest, a Master shall send out encryptionUpdate. If the conference is a multipoint one, the MC (also the master) should distribute the new key to all receivers before it gives this key to the transmitter. The transmitter of the data on the logical channel shall utilize the new key at the earliest possible time after receiving the message. A transmitter (assuming it is not the master) may also request a new key. If the transmitter is part of a multipoint conference the procedure shall be as follows: the transmitter shall send the encryptionUpateRequest to the MC (master) the MC should generate a new key(s) and send an encryptionUpdate message to all conference participants except the transmitter. After distributing the new keys to all other participants the MC shall send the encryptionUpdate to the transmitter. The transmitter shall then utilize the new key.
12. Security Error Recovery This document does not specify or recommend any methods by which endpoints may monitor their absolute privacy. It does however recommend actions to be taken when privacy loss is detected. If either endpoint detects a breach in the security of the call connection channel (e.g. H.225.0 for H.323), it should immediately close the connection following the protocol procedures appropriate to the particular endpoint [for H.323 section 8.5 with the exception of step 5]. If either endpoint detects a breach in the security of the H.245 channel or the secured data (h235Control) logical channel, it should immediately close the connection following the protocol procedures appropriate to the particular endpoint [for H.323 section 8.5 with the exception of step 5]. If any endpoint detects a loss of privacy on one of the logical channels it should immediately request a new key (encryptionUpdateRequest) and/or close the logical channel. At the discretion of the MC(U), a loss of privacy on one logical channel may cause all other logical channels to be closed and/or re-keyed at the discretion of the MC(U). MC(U) shall forward encryptionUpdateRequest, encryptionUpdate to any and all endpoints affected. At the discretion of the MC(U), a security error on an individual channel may cause the connections to be closed on all of the conference endpoints - thus ending the conference. ANNEX a: H.235 ASN.1
H235-SECURITY-MESSAGES DEFINITIONS AUTOMATIC TAGS ::= BEGIN
-- EXPORTS All
ChallengeString ::= OCTET STRING (SIZE(8..128)) TimeStamp ::= INTEGER(1..4294967295) -- seconds since 00:00 1/1/1970 UTC RandomVal ::= INTEGER Password ::= BMPString (SIZE (1..128)) Identifier ::= BMPString (SIZE (1..128)) KeyMaterial ::= BIT STRING(SIZE(1..2048))
NonStandardParameter ::= SEQUENCE { nonStandardIdentifier OBJECT IDENTIFIER, data OCTET STRING }
-- if local octet representations of these bit strings are used they shall -- utilize standard Network Octet ordering (e.g. Big Endian) DHset ::= SEQUENCE { halfkey BIT STRING (SIZE(0..2048)), -- = g^x mod n modSize BIT STRING (SIZE(0..2048)), -- n generator BIT STRING (SIZE(0..2048)), -- g ... }
TypedCertificate ::= SEQUENCE { type OBJECT IDENTIFIER, certificate OCTET STRING, ... }
AuthenticationMechanism ::=CHOICE { dhExch NULL, -- Diffe-Hellman pwdSymEnc NULL, -- password with symmetric encryption pwdHash NULL, -- password with hashing certSign NULL, -- Certificate with signature ipsec NULL, -- IPSEC based connection tls NULL, nonStandard NonStandardParameter, -- something else. ... }
ClearToken ::= SEQUENCE -- a `token' may contain multiple value types. { timeStamp TimeStamp OPTIONAL, password Password OPTIONAL, dhkey DHset OPTIONAL, challenge ChallengeString OPTIONAL, random RandomVal OPTIONAL, certificate TypedCertificate OPTIONAL, generalID Identifier OPTIONAL, nonStandard NonStandardParameter OPTIONAL, ... } ALGORITHM-IDENTIFIER ::= TYPE-IDENTIFIER
-- -- Start all the cryptographic parameterized types here.... --
SIGNED { ToBeSigned } ::= SEQUENCE { toBeSigned ToBeSigned, algorithmOID OBJECT IDENTIFIER, paramS Params, -- any 'runtime' parameters signature BIT STRING } ( CONSTRAINED BY { -- Verify or Sign Certificate -- } )
ENCRYPTED { ToBeEncrypted } ::= SEQUENCE { algorithmOID OBJECT IDENTIFIER, paramS Params, -- any 'runtime' parameters encryptedData OCTET STRING } ( CONSTRAINED BY { -- Encrypt or Decrypt -- ToBeEncrypted } )
HASHED { ToBeHashed } ::= SEQUENCE { algorithmOID OBJECT IDENTIFIER, paramS Params, -- any 'runtime' parameters hash BIT STRING } ( CONSTRAINED BY { -- Hash -- ToBeHashed } )
IV8 ::= OCTET STRING (SIZE(8))
-- signing algorithm used must select one of these types of parameters -- needed by receiving end of signature.
Params ::= SEQUENCE { null NULL, -- no value needed ranInt INTEGER OPTIONAL, -- some integer value iv8 IV8 OPTIONAL, -- 8 octet initialization vector ... }
EncodedGeneralToken ::= TYPE-IDENTIFIER.&Type (ClearToken -- general usage token PwdCertToken ::= ClearToken (WITH COMPONENTS {..., timeStamp, generalID }) EncodedPwdCertToken ::= TYPE-IDENTIFIER.&Type (PwdCertToken)
CryptoToken::= CHOICE {
cryptoEncryptedToken SEQUENCE General purpose/application specific token { tokenOID OBJECT IDENTIFIER, token ENCRYPTED { EncodedGeneralToken } }, cryptoSignedToken SEQUENCE -- General purpose/application specific token { tokenOID OBJECT IDENTIFIER, token SIGNED { EncodedGeneralToken } }, cryptoHashedToken SEQUENCE -- General purpose/application specific token { tokenOID OBJECT IDENTIFIER, hashedVals ClearToken, token HASHED { EncodedGeneralToken } }, cryptoPwdEncr ENCRYPTED { EncodedPwdCertToken }, ... }
-- These allow the passing of session keys within the H.245 OLC structure. -- They are encoded as standalone ASN.1 and based as an OCTET STRING within H.245 H235Key ::=CHOICE -- this is used with the H.245 h235Key field { secureChannel KeyMaterial, sharedSecret ENCRYPTED {EncodedKeySyncMaterial}, certProtectedKey SIGNED { EncodedKeySignedMaterial }, ... }
KeySignedMaterial ::= SEQUENCE { generalId Identifier, -- slave's alias mrandom RandomVal, -- master's random value srandom RandomVal OPTIONAL, -- slave's random value timeStamp TimeStamp OPTIONAL, -- masters timestamp for unsolicted EU encrptval ENCRYPTED {EncodedKeySyncMaterial } } EncodedKeySignedMaterial ::= TYPE-IDENTIFIER.&Type (KeySignedMaterial)
KeySyncMaterial ::=SEQUENCE { generalID Identifier, keyMaterial KeyMaterial, } EncodedKeySyncMaterial ::=TYPE-INDENTIFIER.&Type (KeySyncMaterial)
H235CertificateSignature ::=SEQUENCE { certificate TypedCertificate, responseRandom RandomVal, requesterRandom RandomVal OPTIONAL, signature SIGNED { EncodedReturnSig }, }
ReturnSig ::= SEQUENCE { generalId Identifier, -- slave's alias responseRandom RandomVal, requestRandom RandomVal OPTIONAL, certificate TypedCertificate OPTIONAL - requested certificate }
EncodedReturnSig ::= TYPE-IDENTIFIER.&Type (ReturnSig)
END -- End of H235-SECURITY-MESSAGES DEFINITIONS ANNEX B: H.323 Specific Topics
1. Background Shown below is a diagram giving an overview of the H.235 scope within the H.323 recommendation.
EMBED Word.Picture.8
For H.323 the signalling of usage of TLS, IPSEC or a proprietary mechanism on the H.245 control channel shall occur on the secured or unsecured H.225.0 channel during the initial Q.931 message exchange. 2. Signalling and Procedures The procedures outlined in H.323, Section 8 - Call Signalling Procedures, shall be followed. The H.323 endpoints shall have the ability to encode and recognize the presence (or absence) of security requirements (for the H.245 channel) signaled in the H.225.0 messages. In the case where the H.225.0 channel itself is to be secured, the same procedures in H.323, Section 8 shall be followed. The difference in operation is that the communications shall only occur after connecting to the secure TSAP identifier and using the predetermined security modes (e.g. TLS). Due to the fact that the H.225.0 messages are the first exchanged when establishing H.323 communications, there can be no security negotiations in band for H.225.0. In other words, both parties must know a priori that they are using a particular security mode. For H.323 on IP, an alternative Well Known Port (1300) is utilized for TLS secured communications. One purpose of H.225.0 exchanges as they relate to H.323 security, is to provide a mechanism to set up the secure H.245 channel. Optionally, authentication may occur during the exchange of H.225.0 messages. This authentication may be certificate or password based, utilizing encryption and/or hashing (i.e. signing). The specifics of these modes of operation are described in sections ( REF _Ref394290868 \n 0- REF _Ref394290904 \n 0). An H.323 endpoint that receives a Setup message with the h245SecurityCapability set shall respond with the corresponding, acceptable h245SecurityMode in the Connect message. In the cases in which there are no overlapping capabilities, the called terminal may refuse the connection by sending a Release Complete with the reason code set to SecurityDenied. This error is intended to convey no information about any security mis-match and the calling terminal will have to determine the problem by some other means. In cases where the calling terminal receives a Connect message without sufficient or an acceptable security mode, it may terminate the call with a Release Complete with SecurityDenied. In cases where the calling terminal receives a Connect message without any security capabilities, it may terminate the call with a Release Complete with undefinedReason. If the calling terminal receives an acceptable h245Security mode, it shall open and operate the H.245 channel in the indicated secure mode. Failure to set up the H.245 in the secure mode determined here should be considered a protocol error and the connection terminated. 2.1 Revision 1 Compatibility A security capable endpoint shall not return any security related fields, indications or status to the non-security capable endpoint. If a callee receives a Setup message that does not contain the H245Security capabilities and/or authentication token, it may return a ReleaseComplete to refuse the connection; but it shall use the reason code of UndefinedReason in this case. In a corresponding manner, if a caller receives a Connect message without an H245SecurityMode and/or authentication token having sent a Setup message with H245Security and/or authentication token it may also terminate the connection by issuing a ReleaseComplete with a reason code of UndefinedReason. 3. RTP/RTCP Issues The use of encryption on the RTP streamitem A (initialization vector, sentence will follow the general methodology recommended in the document referenced in [RTP]. The encryption of the media shall occur in an independent, packet by packet basis. The RTP header (including the payload header) shall not be encrypted. Synchronization of new keys and encrypted text is based upon dynamic payload type. Initial encryption key is presented by the master in conjunction with the dynamic payload number (via EncryptionSync in H.245). The receiver(s) of the media stream shall start initial use of the key upon receipt of this payload number in the RTP header. New key(s) may be distributed at any time by the master endpoint. The synchronization of the newer key with the media stream shall be indicated by the changing of the payload type to a new dynamic value. Note that the specific values dont matter, as long as they change for every new key that is distributed. It is assumed that encryption is applied just to the payload in each RTP packet; the RTP headers remaining in the clear. It is assumed that all RTP packets must be a multiple of whole octets. How the RTP packets are encapsulated at the transport or network layer is not relevant to this Recommendation. All modes must allow for lost (or out-of-sequence) packets, in addition to padding packets to an appropriate multiple of octets. Deciphering the stream must be stateless due to the fact that packets may be lost; each packet decipherable on its own merits. Two requirements of Block algorithm mode shall operate as follows: A. Initialization vectors Most block modes involve some chaining; each encryption cycle depends in some way on the output of the previous cycle. Therefore, at the beginning of a packet, some initial block value (usually called an Initialization Vector - IV) must be provided in order to start the encryption process. Independent of how many stream octets are processed on each encryption cycle, the length of the IV is always equal to the length of a block. All modes except Electronic Code Book (ECB) mode require an IV. In all cases, an IV shall be constructed from the first B (where B is the block size) octets of: (Seq# + Timestamp). This pattern should be repeated until enough octets have been generated. It should be noted that the IV generated in this manner may produce a key pattern that is considered weak for a particular algorithm.
B. Padding ECB and CBC modes always process the input stream a block at a time, and, while CFB and OFB can process the input in any number of octets, N (<=B), it is recommended that N=B.
Two methods are available to handle packets whose payload is not a multiple of blocks. 1. Ciphertext Stealing for ECB and CBC; Zero pad for CFB and OFB 2. Padding in the manner prescribed by [RTP] (section 5.1)
[RTP] section 5.1 describes a method of padding in which the payload is padded to a multiple of blocks, the last octet set with the number of padding octets (including the last), and the P bit set in the RTP header. The value of the pad should be determined by the normal convention of the cipher algorithm..
All H.235 implementations shall support both schemes. The scheme in use can be deduced as follows: If the P bit is set in the RTP header, then the packet is padded; if the packet is not a multiple of B and the P bit is not set, then Ciphertext Stealing applies, else the packet is a multiple of B, and padding does not apply.
Integrity and replay protection of the RTP stream is for further study.
Application of cryptographic techniques to RTCP elements is for further study.
4. RAS Signalling/Procedures for Authentication 4.1 Introduction This annex will not explicitly provide any form of message privacy between gatekeepers and endpoints. There are two types of authentication that may be utilized. The first type is symmetric encryption based that requires no prior contact between the endpoint and Gatekeeper. The second type is subscription based and will have two forms, password or certificate. All of these forms are derived from the procedures shown in sections REF _Ref394290868 \n 0, REF _Ref399040981 \n 0, REF _Ref399041035 \n 0 and REF _Ref394290904 \n 0. In this annex, the generic labels (EPA and EPB) shown in the aforementioned sections will represent the Endpoint and Gatekeeper respectively. 4.2 Endpoint-Gatekeeper Authentication (Non-Subscription Based) This mechanism may provide the Gatekeeper with a cryptographic link that a particular endpoint which previously registered, is the same one that issues subsequent RAS messages. It should be noted that this may not provide any authentication of the Gatekeeper to the endpoint, unless the optional signature element is included. The establishment of the identity relationship occurs when the terminal issues the GRQ as outlined in H.323 section 7.2.1. The Diffie-Hellman exchange shall occur in conjunction with the GRQ and GCF messages as shown in the first phase of section REF _Ref394290868 \n 0. This shared secret key shall now be used on any subsequent RRQ/URQ from the terminal to the gatekeeper. If a Gatekeeper operates in this mode and receives a GRQ without a token containing the DHset or an acceptable algorithm value, it shall return a securityDenial reason code in the DRJ. The Diffie-Hellman shared secret key as created during the GRQ/GCF exchange may be used for authentication on subsequent xRQ messages. The following procedures shall be used to complete this mode of authentication. Terminal (xRQ): The terminal shall provide all of the information in the message as described in the appropriate H.225.0 sections. The terminal shall encrypt the GatekeeperIdentifier (as returned in the GCF) using the shared secret key that was negotiated. This shall be passed in a cryptoToken as the generalID.
The 16 bits of the random and then the requestSeqNum shall be XORd with each 16 bits of the GatekeeperIdentifier. If the GatekeeperIdentifier does not end on an even 16 boundary, the last 8 bits of the GatekeeperIdentifier shall be XORd with the least significant octet of the random value and then requestSeqNum. The GatekeeperIdentifier shall be encrypted using the selected algorithm in the GCF (integrity) and utilizing the entire shared secret.
In order to cryptographically link this and subsequent messages with the original registrant (the endpoint that issued the RRQ) the most recent random value returned shall be utilized (this value may be one newer than the value returned in the RCF - from a later xCF message).
Gatekeeper (xCF/xRJ) Gatekeeper shall encrypt its GatekeeperIdentifier (following the above procedure) with the shared secret key associated with the endpoint alias and compare this to the value in the xRQ Gatekeeper shall return xRJ if the two encrypted values do not match. If GatekeeperIdentifier matches Gatekeeper shall apply any local logic and respond with xCF or xRJ. If an xCF is sent by the Gatekeeper, it should contain an assigned EndpointIdentifier and a new random value in the random field of a clearToken.
Refer to the second phase of the figure contained in section REF _Ref394290868 \n 0 for a graphical representation of this exchange. The gatekeeper knows which shared secret key to use to decipher the Gatekeeper identifier by the Alias name in the message. 4.3 Endpoint-Gatekeeper Authentication(Subscription Based) All RAS messages other than GRQ/GCF should contain the authentication tokens required by the specific mode of operation. There are three different variations that may be implemented depending on requirements and environment: password based with symmetric encryption password based with hashing Certificate based with signatures
In all cases the token will contain the information as described in the following sections depending on the variation chosen. If a Gatekeeper operates in a secure mode and receives a RAS message without an acceptable token value, it shall return a securityDenial reason code in the reject message. In all cases the return token from GK is optional; if omitted, only one-way authentication is achieved] 4.3.1 Password with symmetric encryption EMBED Word.Picture.8 4.3.2 Password with hashing It is assumed that an Alias and associated password are exchanged out of band to this particular message exchange. EMBED Word.Picture.8 4.3.3 Certificate based with signatures EMBED Word.Picture.8 5. Non-terminal Interactions 5.1 Gateway As stated in section REF _Ref379882131 \n 0, an H.323 Gateway should be considered a trusted element. This includes protocol gateways (H.323-H.320 etc. ) and security gateways (proxy/firewalls). The media privacy can be assured between the communicating endpoint and the gateway device; but what occurs on the far side of the gateway should be considered insecure by default. ANNEX C: H.324 Specific Topics FFS Appendix I: H.323 Implementation Details 1. Ciphertext padding methods There is a description of Ciphertext Stealing in [Schneier], p191, p196. The diagrams that follow illustrate the technique.
2. New Keys The procedures outlined in H.323 section 8.5 are completed by an MC to eject a participant from a conference. The Master may generate new encryption keys for the logical channels (and not distribute them to the ejected party); this may be used to keep the ejected party from monitoring the media streams. 3. H.323 Trusted Elements In general MC(U)s, Gateways and Gatekeepers (if implementing the gatekeeper-routed model) are trusted with respect to the privacy of the control channel. If the connections establishment channel (H.225.0) is secured and routed through the Gatekeeper, it must also be trusted. If any of these H.323 components must operate on the media streams (i.e. mixing, transcoding) then by definition, they shall also be trusted for the media privacy. Firewall Proxies (though not H.323-specific elements) may also be trusted, since they terminate connections, and may well have to manipulate the messages and media streams. 4. Implementation Examples These next sections describe example implementations that might be developed within the H.235 framework. These are not intended to constrain the many other possibilities available within this recommendation; rather to give more concrete examples of usage within H.323. 4.1 Tokens This section will describe an example usage of security tokens to obscure or hide destination addressing information. The example scenario is an endpoint which wishes to make a call to another endpoint utilizing its well known alias. More specifically this involves an H.323 endpoint, Gatekeeper, POTS-Gateway, and telephone as illustrated below. EMBED Word.Picture.8 Currently, H.323 may operate in a manner similar to a telephone network with caller-ID. This scenario will illustrate a situation in which the callee does not want to expose its physical address, while still allowing the call to complete. This may be important in POTS-H.323 gateways, where the target phone number may need to stay private. Assume that EPA is trying to call POTSB, and POTSB does not want to expose its E.164 phone number to EPA. (How this policy is established is beyond the scope of this example). EPA will send an ARQ to its Gatekeeper to resolve the address of the POTS telephone as represented by its alias/GW. The Gatekeeper would recognize this as a private alias, knowing that in order to complete the connection it must return the POTS-gateway address. (Similar to returning the address of an H.320 Gateway if an H.320 endpoint is called by an H.323 endpoint). In the returned ACF, the Gatekeeper returns the POTS-Gateways address as expected. The addressing information that is required to dial to the end telephone (i.e. the telephone number) is returned in an encrypted token included in the ACF. This encrypted token contains the actual E.164 (phone number) of the telephone which cannot be deciphered nor understood by the caller. (i.e. EPA) The endpoint issues the SETUP message to the Gateway device (whose call signalling address was returned in the ACF) including the opaque token(s) that it received with the ACF. The Gateway upon receiving the SETUP, issues its ARQ to its Gatekeeper including any token(s) that were received in the SETUP. The Gatekeeper is able to decipher the token(s) and return the phone number in the ACF.
Partial ASN.1 of an example token structure is shown below, with the field contents described. Assume we utilize the cryptoEncodedGeneralToken to contain the encrypted telephone number. An implementation might choose a tokenOID denoting this token as containing the E.164 phone number. The particular method that is used to encrypt this phone number (for example 56bit DES) would be included in the ENCRYPT definition algorithmOID.
CryptoToken::= CHOICE { cryptoEncodedGeneralToken SEQUENCE -- General purpose/application specific token { tokenOID OBJECT IDENTIFIER, ENCRYPTED { EncodedGeneralToken } }, . . . [abbreviated text] .
}
The CryptoToken would be passed in the SETUP (from EPA to GW) and the ARQ (from the GW to the Gatekeeper) messages as outlined above. After the Gatekeeper decrypted the token (the telephone number) it would pass the clear version of this in the clearToken 4.2 Password In this example, it is assumed that the user is a subscriber to the Gatekeeper (i.e. the user will be in its zone) and has an associated subscription ID and password. The user would register with the Gatekeeper using the subscription ID (as passed in an alias - H323ID) and encrypting a challenge string presented by the Gatekeeper. This assumes that the Gatekeeper also knows the password associated with the subscription ID. The Gatekeeper will authenticate the user by verifying that the challenge string was correctly encrypted. The example registration procedure with Gatekeeper authentication is as follows: If the endpoint uses GRQ to discover a Gatekeeper, one of the aliases in the message would be the subscription ID (as an H323ID). The authenticationcapability would contain an AuthenticationMechanism of pwdSymEnc and the algorithmOIDs would be set to indicate the entire set of encryption algorithms supported by the endpoint. (For example one of these would be 56 bit DES in EBC mode.) The Gatekeeper would respond with GCF (assuming it recognizes the alias) carrying a tokens element containing one ClearToken. This ClearToken would contain both a challenge and a timeStamp element. The challenge would contain 16 octets (To prevent replay attacks, the ClearToken should contain a timeStamp.) The authenticationmode should be set to pwdSymEnc and the algorithmOID should be set to indicate the encryption algorithm required by the Gatekeeper (for example, 56 bit DES in EBC mode) If the Gatekeeper does not support any of the algorithmOIDs indicated in the GRQ, then it would respond with a GRJ containing a GatekeeperRejectReason of resourceUnavailable. The endpoint application should then attempt to register with (one of) the GK(s) that responded with a GCF by sending an RRQ containing a cryptoEPPwdEncr in the cryptoTokens. The cryptoEPPwdEncr would have the algorithmOID of the encryption algorithm agreed to in the GRQ/GCF exchange, and the encrypted challenge. The encryption key is constructed from the users password using the procedure described in section 13.3.3.34 of H.235. The resulting octet string is then used as the DES key to encrypt the challenge. When the Gatekeeper receives the encrypted challenge in the RRQ, it would compare it to an identically generated encrypted challenge to authenticate the registering user. If the two encrypted strings do not match, the Gatekeeper should respond with an RRJ with the RegistrationRejectReason set to securityDenial. If they match, the Gatekeeper sends an RCF to the endpoint. If the Gatekeeper receives an RRQ which does not contain an acceptable cryptoTokens element then it should respond with an RRJ with a GatekeeperRejectReason of discoveryRequired. The endpoint, upon receiving such an RRJ may perform discovery which will allow the Gatekeeper/endpoint to exchange a new challenge. Note that the GRQ message may be unicast to the Gatekeeper. 4.3 IPSEC In general, IPSec [13/IPSEC] can be used to provide Authentication and, optionally Confidentiality (i.e., encryption) at the IP layer transparent to whatever (application) protocol runs above. The application protocol does not have to be updated to allow this; only security policy at each end. For example, to make maximum use of IPSec for a simple point-to-point call, the following scenario could be followed: The calling endpoint and its gatekeeper would set policy to require the use of IPSec (Authentication and, optionally Confidentiality) on the RAS protocol. Thus, before the first RAS message is sent from the end point to the gatekeeper, the ISAKMP/Oakley daemon on the endpoint will negotiate security services to be used on packets to and from the RAS channel's well-known port. Once negotiation is complete the secured RAS channel will operate exactly as if it were not secured. Using this secure channel the gatekeeper will inform the end point of the address and port number of the call signalling channel in the called endpoint. After obtaining the address and port number of the call signalling channel, the calling endpoint would dynamically update its security policy to require the desired IPSec security on that address and protocol/port pair. Now, when the calling endpoint attempts to contact this address/port the packets would be queued while an ISAKMP/Oakley negotiation is performed between the end points. Upon completion of this negotiation, an IPSec Security Association (SA) for the address/port will exist and the Q.931 signalling can proceed. On the Q.931 Setup and Connect exchange, the endpoints can negotiate the use of IPSec for the H.245 channel. This will allow the endpoints to again dynamically update their IPSec policy databases to force the use of IPSec on that connection. As with the call signalling channel, a transparent ISAKMP/Oakley negotiation will take place before any H.245 packets are transmitted. The authentication performed by this ISAKMP/Oakley exchange will be the initial attempt at user-to-user authentication, and will set up a (probably) secure channel between the two users on which to negotiate the characteristics of the audio channel. If, after some person-to-person Q&A, either user is not satisfied with the authentication, different certificates can be chosen and the ISAKMP/Oakley exchange repeated. After each H.245 ISAKMP/Oakley authentication, new keying material is exchanged for the RTP Audio channel. This keying material is distributed by the Master on the secure H.245 channel. Because the H.245 protocol is defined for the master to distribute the media keying material on the H.245 channel (to allow for multipoint communication), it is not recommended that IPSec be used for the RTP channel.
An encrypted H.245 channel is a potential problem for Proxy or NAT Firewall, since the dynamically-assigned port numbers are carried in the H.245 protocol. Such Firewalls would have to decipher, modify and re-encipher the protocol to operate correctly. For this reason, the Security Logical Channel was introduced into H.245. If this channel is used, the H.245 channel can remain unsecured; authentication and key-generation would be done with the Security Logical Channel. Logical Channel signalling would allow this channel to be protected with IPSec, and the secret key used on the Security Logical Channel would be used to protect the EncryptionSync distributed by the master on the H.245 channel. Appendix II: H.324 Implementation Details
FFS
Appendix III: Other H series Implementation Details
FFS
APPENDIX IV: BIBLIOGRAPHY
[Daemon] J. Daemon, Cipher and Hash function design, Ph.D. Thesis, Katholieke Universiteit Leuven, Mar 95. [IPSEC] Internet Engineering Task Force, 1997 The OAKLEY Key Determination Protocol draft-ietf-ipsec-oakley-02.txt, H. K. Orman Internet Engineering Task Force, 1997 Internet Security Association and Key Management Protocol (ISAKMP) draft-ietf-ipsec-isakmp-08.text, D. Maughan, M. Schertler, M. Schneider and J. Turner Internet Engineering Task Force, 1997 IP Authentication Header draft-ietf-ipsec-auth-header-01.txt, S. Kent, and R. Atkinson Internet Engineering Task Force, 1997 The resolution of ISAKMP with Oakley draft-ietf-ipsec-isakmp-oakley-04.txt, D. Harkins, D. Carrel [RTP] Internet Engineering Task Force, 1996 RTP: A Transport Protocol for Real-Time Applications, RFC 1889, H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson [Schneier] Applied Cryptography, Second Edition Protocols, Algorithms, and Source Code in C, Bruce Schneier: John Wiley & Sones, Inc., 1996 [TLS] Internet Engineering Task Force, 1997 The TLS Protocol Version 1.0 draft-ietf-tls-protocol-03.txt, T. Dieks, C. Allen
It should be noted that if RTP packet size is larger than MTU size, partial loss (of fragment) will cause the whole RTP packet to be indecipherable.
White Paper - H.235 Version 1, 9/97
White Paper - H.235 Version 1, 9/97
PAGE 30 H.235 SAVEDATE * MERGEFORMAT 25.01.98 22:01
PAGE v SAVEDATE * MERGEFORMAT 25.01.98 22:01 H.235
H.235 SAVEDATE * MERGEFORMAT 25.01.98 22:01 PAGE29
PAGE # "'Page: '#''" IPSEC provides network security. Since IPSEC is one of the proposed ways of achieving authentication/confidentiality in this Recommendation, we should probably also add that The Recommendation also has provisions for incorporating any available security provided by the network (such as IPSEC). PAGE # "'Page: '#''" It might be useful to utilize an authoritative source to define the general terminology. The capitalization of terms changes from term to term. PAGE # "'Page: '#''" In other words, the certificate means a certified public key. Would it be useful to refer to public keys instead of certificate, then? PAGE # "'Page: '#''" confidentiality is usually used as synonym of privacy PAGE # "'Page: '#''" The definition here does not include the hash functions (MD5, SHA). PAGE # "'Page: '#''" Use information unreadable or data unintelligible PAGE # "'Page: '#''" Integrity also includes detecting any unauthorized alteration PAGE # "'Page: '#''" This is usually used as a synonym of confidentiality. PAGE # "'Page: '#''" It might be useful to spell out that a private channel uses encryption and optional authentication procedures agreed on the secure channel. PAGE # "'Page: '#''" using proper public-key authentication method PAGE # "'Page: '#''" Again, see previous comment concerning term certificatePPe3. PAGE # "'Page: '#''" This implies that exchange of certificates is not based on a shared secret. In Section 10.1, certificates are included under subscription based which is defined as having a prior shared secret. They are inconsistent statements. It seems to me that the former is right, while the latter is not. See comment in section 10.1. PAGE # "'Page: '#''" In order to authenticate claimant (the presenter of a certified public key), the claimant must sign something provided by the verifier or the generalID of the verifier. The definition of verifier should be added to the list of definitions. PAGE # "'Page: '#''" This should probably be digital signatures. PAGE # "'Page: '#''" This sounds strange. I would say that we would be protected against man-in-the-middle attack only if we know who the correspondent is. PAGE # "'Page: '#''" Add subsection 6.2.2 for shared secret schemes, and subsection 6.2.3 for Other security protocols. In 6.2.2, we need to state that the Recommendation does not specify how the shared secret is established and managed. PAGE # "'Page: '#''" Isnt distribution done by the claimant by sending the certificate along with the digital signature to the verifier? PAGE # "'Page: '#''" does not provide any security at all. PAGE # "'Page: '#''" security (???) PAGE # "'Page: '#''" encryption parameters, including keys, PAGE # "'Page: '#''" Does this include the RTP headers, too? PAGE # "'Page: '#''" The first method is asymmetric Diffie-Hellman key exchange. It includes an optional public key based authentication, and it requires no prior direct contact between entities. PAGE # "'Page: '#''" There is an important difference between password and certificate based schemes as described here. In the password based scheme, EPB needs to know the password that EPA uses by means other than from EPA. However, in certificate based schemes, EPB could find the public-key of EPA directly from EPA by receiving the public key certificate from EPA. Hence, password based schemes (as described here) requires prior contact between EPA and EPB, but certificate based schemes do not. This difference should be highlighted Moreover, there seems to be an inconsistency in the description of subscription based in this section and in section 6.2. See comment there. PAGE # "'Page: '#''" Things that I dont understand: what we are trying to establish in addition to the plain Diffie-Hellman handshake? It should be made clear that the procedure here is not authentication but a key-exchange (unless optional authentication is included). Why we are including the random number randomb and the timea etc (certainly, it does not protect against a man in the middle). Is this a standard ISO or IETF protocol? The first generalIDa should probably be generalIDb. The modulus and base should be defined for the Diffie-Hellman. How the optional authentication procedure differs from the authentication presented in the subsection 10.3.4? PAGE # "'Page: '#''" The meaning of the generalID should be defined somewhere. PAGE # "'Page: '#''" It might be more useful reuse password bytes instead of padding. PAGE # "'Page: '#''" The first exchange of the generalIDs is not part of the authentication mechanism (presented in ISO 9798-2). It should be noted that each endpoint generates their own timeStamp. PAGE # "'Page: '#''" The first exchange of the generalIDs is not part of the authentication mechanism (presented in ISO 9798-2). It should be noted that each endpoint generates their own timeStamp. The generalID and timestamp values should be included in the ClearToken, but not the password. ( Annex A suggests that all information in the cryptoHashedToken is included in clear text as hashedVals ClearToken. We suggest that the CryptoToken is written as CryptoToken[ timeStampa, generalIDb, (,timeStampa, generalIDb, password)Hash ] where (foo)Hash means only the hash value of foo. Another possibility is to use notation CryptoToken[ (,timeStampa, generalIDb)Hashpassword ] where (foo)Hash implicitly includes the cleartext foo in the CryptoToken. PAGE # "'Page: '#''" Instead of using a hash function (such as MD5 or SHA-1) on (timeStamp, generalID, password), a better approach is to use HMAC which is defined in RFC2104. The former approach, generally referred to as keyed-xxx (where xxx is a hash function), is somewhat inferior to HMAC-xxx. The IETF also favors HMAC-xxx. PAGE # "'Page: '#''" The first exchange of the generalIDs is not part of the authentication mechanism (presented in ISO 9798-3). It should be noted that each endpoint generates their own timeStamp. PAGE # "'Page: '#''" It should be noted what kind of transfer encoding is to be used, e.g., within h235Key. The usage of the ASN.1 types should be specified somewhere in a very detailed way. How a type is signed? How it is encrypted? How a hash is generated? How we can generate a keyed hash? PAGE # "'Page: '#''" An important difference between TLS and IPSEC should probably be pointed out. TLS is usually application coupled (i.e., built into the application), while IPSEC is usually network coupled (i.e., built into the operating system). This could possibly be pointed out by incorporating a subsection for TLS in the Implementation Examples section, as has been done for IPSEC. PAGE # "'Page: '#''" What? A Q.931channel, probably? PAGE # "'Page: '#''" Will not follow? PAGE # "'Page: '#''" This footnote is indecipherable. The RTP uses underlying IP packet delivery, a UDP packet with missing fragments is never presented to the application (i.e. the RTP protocol). PAGE # "'Page: '#''" This does not seem to make sense. The IV is not a key, or a key pattern. Are there really weak initialization vectors? I think that here should be stated that the initial timestamp and sequence number should be generated by a cryptographically strong random number generator. PAGE # "'Page: '#''" Delete braces
)+Vn¡¢¶ÖÜÝ6>mó;ÐÞãêûüö÷ø }©®³Ž¹ºÌÚÛüòëæÞØÒæÒæÞæÌæÅæÌææÃÃÃæÅæÒæÀ²®©À¥©CJOJQJ56CJ(OJQJ5CJ05@(CJ<OJQJ5@(CJH5CJOJQJ5CJjê<HhÐ!&HUCJ60JKOJQJ5OJQJ>*OJQJ:OJQJ5:OJQJOJQJEHOJQJjHhÐ!&HU/)*+,-Vn¡¢òòòòãµØ $$l4Ö ÿìè<&@dŽ€x$E&/µ.µ&@€ª€x$E&/µ.µ-$$l4ÖHÿìèÀ<&@€ª$E&/µ.µ&@$E&/µ.µ )*+,-Vn¡¢£€¥Žµ¶ÔÕÖ)*56>?=>ðñòóôõö"L|}~ª«¬®ºüýþÿ 0 2 3 4 Ž · ž ¹ º » Œ Å Æ ÿ ×ØÂêìîðòô `iÂýýýýýûýýýýýýûùùùùùùùùù÷ýýýûõõóóñïíëèæÓÔ ÏÎÍ̪ Õ [¢£€¥Žµ¶ÔÕÖ)*56>?=>ðñòòòêêêêáááßßßÜßßßßßÙßßÌÌŠZù Æ£+$$ Õ$ª ÆYÕª ÆYÕ&d/µ.µ ÆYòóôõö"L|}~ª«¬®ºüòéééßßÕÏÍÊÊÅ·ÍÍͯ€ Ðdÿ Æ&Ð Æ& $$l4Öÿüá$€$$ Æ: ®Rù Æ: ŠZù Æ+ Æ£+ŠZù Æ£+üýþÿ 0 2 3 4 Ž · ž ¹ º » Œ Å ÷÷÷÷÷÷óóãßÛÛß×ÓÅ¿œœœ»Ï ÆŽ Ð&d(d Ƨ%ÎÐÍÐÐÌÐЀ9&d(d Ƨ%ªÐРƧ%üý 2 3 4 ¬ · ž ôö`aû &'¯°&)1ÕÖëìõö-.HIJKL\]wùöòêòçäßòÚØÖÖÖÅÖÖ···€······$jTzHhÐ!&HCJU$jÔyHhÐ!&HCJUjHhÐ!&HU!jHhÚ²!H0JË<U65OJQJOJQJCJ CJ5CJ$OJQJ5CJ$CJCJOJQJ2Å Æ ÿ ×ØÂêìîðòô `iÂ3ÛRÓÔÕM|¹ýûûûûûøûûûûûøûóññññññûïïïïïÃÓÔ &F$Â3ÛRÓÔÕM|¹èK~±ñ4m¢ÓMÁKµõ/cÞ c « à +!i!³!û!4"q"s"t"}"~"ï#ð#!$"$Š%#'Ÿ'u(I)£)u*v*w*,,ýýýýýûùùùùùùù÷÷õ÷÷÷÷õ÷ù÷ù÷÷÷÷÷ù÷÷ù÷÷÷õõõõù÷ùûòïìéæãÝÕÍÅœµª§€¡nöÿÿý÷ÿÿþ÷ÿÿÿ÷ÿÿÑøÿÿ +ùÿÿ ÿùÿÿ ¶úÿÿ Qûÿÿ Îüÿÿ Rþÿÿ Sþÿÿþÿÿ þÿÿöÿÿÿ÷ÿÿÿÄ×à Ó?wxyz{Žµ¶·žÈÉãäåæçÿ+,FGHIJ^_yz{|}¬®¯íßßßÌßßß¹ßßߊßßßßßßßßßsß jÔ}HhÐ!&HU jT}HhÐ!&HU jÔ|HhÐ!&HU$jT|HhÐ!&HCJU$jÔ{HhÐ!&HCJU$jT{HhÐ!&HCJUjHhÐ!&HU$jÔzHhÐ!&HCJU-¹èK~±ñ4m¢ÓMÁKµõ/cÞ c « à +!i!ýýûûùûûûûùûýûýûûûûûýûûýûûûùùùÄ×ï°ÑÒìíîïð/0123MNhijkl ¡³ŽÎÏÐÑÒæç-.HIòòáòòòÐòòò¿òòò®òòòòòòòòòy$jTHhÐ!&HCJU jÔHhÐ!&HU jTHhÐ!&HU jÔHhÐ!&HU jTHhÐ!&HU jÔ~HhÐ!&HU jT~HhÐ!&HUjHhÐ!&HU/IJKL_`z{|}~¡¢ŒœŸ¿Àäåÿ*+EFGIJcd~¯°±³ŽÔÕïòòòáòòòÎòòòœòòò¬òòòòòòòòò jTHhÐ!&HU jÔHhÐ!&HU jTHhÐ!&HU jÔHhÐ!&HU$jTHhÐ!&HCJU jÔHhÐ!&HUjHhÐ!&HU0ïðñóô)*+-.BC]^_abopœŸØÙÚÜÝðñ B C ] ^ _ a b ïáááÎáááœááá¬áááááááááwáá jÔHhÐ!&HU jTHhÐ!&HU$jÔHhÐ!&HCJU jTHhÐ!&HU jÔ HhÐ!&HU$jT HhÐ!&HCJUjHhÐ!&HU jÔHhÐ!&HU.b ¥ Š § © ª ¿ À Ú Û Ü Þ ß !!%!&!'!)!*!H!I!c!d!e!g!h!!!!®!¯!±!²!Ú!Û!õ!ö!÷!ù!ú!""."/"0"òáòòòÐòòò¿òòò®òòòòòòòòòyò jTHhÐ!&HU$jÔHhÐ!&HCJU jTHhÐ!&HU jÔHhÐ!&HU jTHhÐ!&HU jÔHhÐ!&HU jTHhÐ!&HUjHhÐ!&HU/i!³!û!4"q"s"t"}"~"ï#ð#!$"$Š%ýûùû÷÷õ÷÷÷òò«F &FEÆ;Ð!&.$×ÃÄ 0"2"3"P"Q"k"l"m"o"p"q"r"ð#"$;5Å5Œ9œ9Ÿ9`:ñ:];^;_;o;ò;<K<Y<€<ª<>>ü>þ>??à?á?â?ã?ä?ë?@ @/@0@òòßòòòÝÚÑËȱ«Š€€«Š€€Ë€€«wj0JË<U5cHgHHhj<!fH5!jHhm<!fH0JË<U5OJQJ5OJQJ-jHhk<!fH0JË<OJQJUmH mH cHgHHhß²!HCJB*$jÔHhÐ!&HCJUjHhÐ!&HU.Š%#'Ÿ'u(žq*F &FEÆ;Ð!&.F &FEÆ;Ð!&.F &FEÆ;Ð!&.u(I)£)u*v*žq*(F &FEÆ;Ð!&.F &FEÆ;Ð!&.F &FEÆ;Ð!&.v*w*,,J-K-U/V/D0E0F0^0_022á2z3Ó3|4Å4;5Å5V6ü6²7G8Â8T9ýúúýýýýýýýøýýýòòòòòòîòòòòòòÐÐ0ý$,J-K-U/V/D0E0F0^0_022á2z3Ó3|4Å4;5Å5V6ü6²7G8Â8T9É9O:Q:`:_;ò;K<€<>â? @@+ADBB(CÛCüùöóðíêçäáÞÛØÕÒÏÌÉÆÃÀœº·Ž±®ç©€|wrmÓ)÷ÿÿÓº÷ÿÿÓ øÿÿÓ&ùÿÿÓµùÿÿÓ1úÿÿÓoúÿÿÓ@üÿÿÓýÿÿÓþÿÿÓ_þÿÿÓòþÿÿÐñÿÿÿ÷õÿÿ}öÿÿòöÿÿ÷ÿÿÿ÷ÿÿøÿÿJùÿÿðùÿÿúÿÿûÿÿûÿÿÊûÿÿsüÿÿÌüÿÿeýÿÿœýÿÿŸýÿÿçÿÿÿèÿÿÿ/òÿÿ0òÿÿóÿÿóÿÿ)õÿÿ*õÿÿmöÿÿ)T9É9O:Q:`:_;ò;K<€<>â? @@+ADBB(CÛCrD0EäEµF¡GÔGÕGòGóGKHLHùù÷õóñññññññññññññóóóññ÷õ÷÷÷ÓÐÐ0ý0@@³@(A)A+A7A}A~ADBMBBBB¥B(C4CÛCÜCÝCìCqDrDsDtD|D.E/E0E1E2E@EâEãEäEûõûäûõûÓûõûÂûõûõû¶§õûõr[-jHhg£!FH0JË<OJQJUmH -jHhe£!FH0JË<OJQJUmH mH 5mH HhÏÍ!H5mH 5cHgHmH HhÏÍ!H5OJQJ5OJQJcHgH!jHh£!FH0JË<U!jHh{£!FH0JË<U!jHhc£!FH0JË<U5OJQJOJQJ"ÛCrD0EäEµF¡GÔGÕGòGóGKHLHgH|HH¶HÙHI0IJIII¹I»IÊIËIJ+JiJÎJÏJãKäKðMñMòMôMNNN;O¹OûöñìçâßÜÙÖÓÐÍÊÇÄÁŸ»žµ²¯Ü¬©Š£ Ü woÐþÿÿ }ÿÿÿ ôÿÿÿ éÿÿÿÉûÿÿÊûÿÿËûÿÿ×ýÿÿØýÿÿìþÿÿíþÿÿRÿÿÿÿÿÿ»ÿÿÿðÿÿÿñÿÿÿþÿÿ<þÿÿTþÿÿþÿÿ¥þÿÿºþÿÿüþÿÿÿÿÿ9ÿÿÿYÿÿÿnÿÿÿÿÿÿÿÿÿâÿÿÿãÿÿÿ}òÿÿÓ°òÿÿÓóÿÿÐmôÿÿÐ!õÿÿÐßõÿÿÓvöÿÿ)äEåEæEìEíEîEñEòEóEFDFEFµFéF¡G§GÔGLHQHfHlH{H|HHHH HµH¶HŸHØHÙHàHIII/I1I2I3I6IIINIIIII,M>MMMÝMìMñMòMXNõíëõíëõíëâÜ×Ü×ÌÃÌÃÌ뺯ºëŠŠÃÌÃëíëëëëëëëëHhå²!H5Hhò²!H5Hhò²!HHhâ²!H5Hhâ²!HHhã²!HHhã²!H5OJQJ5OJQJHhn£!FH55cHgHHhÏÍ!H57LHgH|HH¶HÙHI0IJIII¹I»IÊIËIJ+JiJÎJÏJãKäKðMñMòMôMNNýýýýýýýýýýýýûýý÷÷÷÷ýýýýýýñïhþÐXNYN#O$OûO PP'PbPyP~PPJQKQ%S&SkTlT¯T³TUU VV\\ï\ð\ê^ë^5böáßßßßʹšŠp_N!jHhx£!FH0JË<U!jHh³!H0JË<U'jHh÷²!H0JË56<U!jHhp<!fH0JË<U!jHht£!FH0JË<U6!jHhn£!FH0JË<U!jHhɲ!H0JË<U)jHhk£!FH0JË<OJQJU5)jHhi£!FH0JË<OJQJUHhi£!FHNN;O¹OŽiJ &FeþEÆ;Ð!&.J &FeþEÆ;Ð!&.J &FeþEÆ;Ð!&.¹O1PPMQŽQµQÈQRSJWYxZ[³[{\\×]_>_€aÇaeÓfìfhóihkúlôm n°pr+s÷ïçßÜÖÑÌÇÂœž³š£}xsnic^YTÓiûÿÿÓDýÿÿÓëÿÿÿ àÿÿÓÙùÿÿÓkûÿÿÓàüÿÿÓËþÿÿÓçÿÿÿ !çÿÿÓüÿÿÓÝÿÿÿ PìÿÿÓàÿÿÿ ÖîÿÿÓ€þÿÿÓìÿÿÿ :õÿÿÓöÿÿÓªöÿÿÓ=÷ÿÿÓ¯øÿÿÓkúÿÿÓcþÿÿÓíÿÿÿ ?üÿÿWüÿÿŸüÿÿ {ýÿÿ Úýÿÿ Rþÿÿ ¹O1PPMQŽiJ &FeþEÆ;Ð!&.J &FeþEÆ;Ð!&.J &FeþEÆ;Ð!&.MQŽQµQÈQRSJWYxZ[³[{\\×]_>_€aÇaeÓfìfhŽ²°®®®®®®®¬®®°®°®®°®ÓJ &FeþEÆ;Ð!&.5b6bùbúbeeÈiÚiUl`l^mpm°m±m³oÀouu#u$u:u;uÎxÏx| |§|š|Ï|Ð|Úè^l 24<ªïXj§«¿ÀÒw©Øê:Hde{|}~ÿ#fîîìêêêÙêËËËêËËËêêêêêêêêêêêêêêêêêËËËêêjHhÐ!&HU!jHh<!fH0JË<U56!jHhy£!FH0JË<UJhóihkúlôm n°pr+s<stt¯tŽt¶tÝtït(wÏxz'z|B| ~«~noIýýýýûýýýùýýû÷÷õûýýýõ÷û÷û÷÷ûýÓ+s<stt¯tŽt¶tÝtït(wÏxz'z|B| ~«~noI¬IYâPi|fr{|©»:úõðêçäáÛÖÑÌáÉÃÀº·Ž®©€áytnkháb_îÿÿÿ Óÿÿÿëýÿÿôÿÿÿ êüÿÿÓíÿÿÿ çÿÿÿÓÆüÿÿÓÞýÿÿÓáÿÿÿ #óÿÿÓðÿÿÿ ŒõÿÿÓÃüÿÿÓ&þÿÿÓèÿÿÿ ùÿÿþÿÿÚÿÿÿ ûÿÿÝÿÿÿ æýÿÿÞÿÿÿÓüÿÿÓµýÿÿÓîÿÿÿ Ùÿÿÿèÿÿÿíÿÿÿ XÙÿÿÓÿÿÿÓïÿÿÿ Éúÿÿ%I¬IYâPi|fr{|©»:k>?~¡ýýûýûýýýùûýû÷÷ùû÷û÷÷÷÷÷÷÷÷÷ô$Ófg78y}QRSTUmt¡ŠÆÈhi®¯ßá êÕÓÊÁ»·©©ob``H*j0JË<OJQJU)jHhãB!H0JË<OJQJU5H*5jTHhÐ!&HU jUv8HhÐ!&H UVjHhÐ!&HU56cHgHHhÔ£!FHHhÓ£!FH6)jHh€!FH0JË<OJQJU)jHh£!FH0JË<OJQJU!:k>?~¡ÆjkŠºÜ4]yÉ!M ¡k¡¡~¢ú÷ôñîëèåâßÜÙÖÓÐÍÇÁŒ·±©¡ |wrmgbÓãÿÿÿ øÿÿÓüÿÿÓÿüÿÿýÿÿýÿÿýÿÿýÿÿþÿÿRþÿÿ~þÿÿÓÖÿÿÿ àûÿÿÓ ýÿÿýÿÿ-ýÿÿ Iýÿÿ rýÿÿ ÓÊýÿÿÓìÿÿÿ Ùÿÿÿ ý÷ÿÿÏúÿÿÐúÿÿ/ûÿÿtûÿÿûÿÿ¢ûÿÿ»ûÿÿŒûÿÿ!üÿÿ"üÿÿ9ýÿÿ:ýÿÿûþÿÿüþÿÿÏÿÿÿ Bþÿÿ&¡ÆjkŠºÜ4]yýýýýýûù÷÷°iF &FEÆ;Ð!&.F &FEÆ;Ð!&.ÓyÉ!M ¡k¡¡~¢¢£ž¶Ž²Ž¬¬¬¶¶©ŽŽ²Ž©Ž €€ Æñà%$ 0ýÓF &FEÆ;Ð!&. ¡¡¡~¢¢¢¢¢¢¢££O£P£Ñ€Ø€â€ã€êܘܚÜsÜ^MIÜ56!jHh0€!FH0JË<U)jHh£!FH0JË<OJQJUjHhÐ!&HU jUv8HhÐ!&H UV 5CJH*5OJQJHh£!FH)jHh£!FH0JË<OJQJUjHhÐ!&HU jUv8HhÐ!&H UVjHhÐ!&HU)jHh£!FH0JË<OJQJU~¢¢£Q£z£}€â€ü€a¥·¥!Š#ŠJŠwššššÅšÙšòšªæª¬ !Ì®H°í°6±¶±]²^²z²7³ü÷òìçâßÚÕÐÍÊÅÂœºµ¯ª£}vnf^[ÊVÓäÿÿÿ|öÿÿ#÷ÿÿ £÷ÿÿ ì÷ÿÿ Óøÿÿ Ó úÿÿ Óžûÿÿ ¹ûÿÿÚÁüÿÿ Úóýÿÿ Ú»þÿÿ Óçÿÿÿ JýÿÿH^ýÿÿ{ýÿÿHýÿÿ¬ýÿÿÓÙÿÿÿ0ýÿÿÓýÿÿÓðýÿÿÓUþÿÿoþÿÿÓÔþÿÿÓ×ÿÿÿ .öÿÿÓkþÿÿÓÓþÿÿíþÿÿ £Q£z£}€â€ü€a¥·¥!Š#ŠJŠwššššÅšÙšòšªæªýûýýùýýýù÷ýòðòðîý§FÚ &FEÆ;Ð!&·ðH$€ðÓã€÷€ø€ù€ú€û€ü€Ÿ¥Â¥wšxššššššš©šÁšÂšÃšÄš©©©!©'©.©ÉªÖªZ«e«¬¬r²®Â®ß®÷®¯ ¯±"±f±v±ïáÓŸ·µÓ€ÓÓ wÓµµµµµµµµµµµµµjº§HhÐ!&HU jUv8HhÐ!&H UVjØ¡HhÐ!&HU jUv8HhÐ!&H UV5CJOJQJ)jHh¡£!FH0JË<OJQJUjHhÐ!&HUj@HhÐ!&HU jUv8HhÐ!&H UV.檬 !Ì®H°í°žqlgggÓ &F &FFÚ &FEÆ;Ð!&·ðFÚ &FEÆ;Ð!&·ðí°6±¶±]²¶m$H &F8EÆ;Ð!&·ðH &F8EÆ;Ð!&·ðH &F8EÆ;Ð!&·ðv±²²°Ž»Žíµ¶ì¶·žžÚÈÊZË[ËoËpËqËrˊ˧ËÍÍÓÏÙÏÑѥъѧњѩѪÑÀÑÁÑÂÑÃÑÒÒMÒ]ÒïÒÿÒÓ*Ó^ÔnÔtÔÔÕÕÕ,Õ.Õ]ÕýýýýçÞп±Ð ýÐÐÐÐÐÐýýýýýý56!jHh4C!H0JË<U!jHhµ²!H0JË<Uj»HhÐ!&HU j Uv8HhÐ!&H UVjHhÐ!&HUHh%ÒŠH*jHhïC!H0JË5;<>*U56]²^²z²7³RŽ|µ9·ë·ì·žž9ž?ž@žOžPžžËžãž ¹8¹d¹e¹¹¹³¹È¹Ê¹Ë¹ýûùùùùùôôýòòòòòòòòòòòòòòòòòòÔ &FÓ7³RŽ|µ9·ë·ì·žž9ž?ž@žOžPžžËžãž ¹8¹d¹e¹¹¹³¹È¹Ê¹Ë¹ºTºiºkº ºÌºøºýºûöñìæàÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[f÷ÿÿ÷ÿÿŸ÷ÿÿó÷ÿÿõ÷ÿÿ øÿÿGøÿÿøÿÿøÿÿøÿÿ«øÿÿÕøÿÿ×øÿÿùøÿÿúøÿÿ&ùÿÿQùÿÿ{ùÿÿùÿÿÞùÿÿúÿÿúÿÿúÿÿúÿÿ%úÿÿ[úÿÿ\úÿÿ Ôrúÿÿ Ôsúÿÿ Ó%ûÿÿÓâüÿÿÓþÿÿÓ'ÿÿÿ!˹ºTºiºkº ºÌºøºýºÿº»» »;»V»[»]»^»»»š»ß»Œ7Œ_ŒlŒ£ŒšŒªŒ«Œýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýºÿº»» »;»V»[»]»^»»»š»ß»Œ7Œ_ŒlŒ£ŒšŒªŒ«ŒôŒ÷Œœ6œOœuœœŒœÝœŸŸŸûöñìçâÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[NôÿÿSôÿÿôÿÿ¢ôÿÿËôÿÿéôÿÿõÿÿ(õÿÿGõÿÿgõÿÿjõÿÿ³õÿÿŽõÿÿ¶õÿÿ»õÿÿòõÿÿÿõÿÿ'öÿÿVöÿÿöÿÿ¶öÿÿÚöÿÿÜöÿÿ÷ÿÿ÷ÿÿ÷ÿÿ÷ÿÿ#÷ÿÿ>÷ÿÿ@÷ÿÿ^÷ÿÿ_÷ÿÿa÷ÿÿ!«ŒôŒ÷Œœ6œOœuœœŒœÝœŸŸŸ;Ÿ<Ÿ?Ÿ{Ÿ~ŸŸŸ¥ŸÁŸæŸ¿1¿k¿l¿m¿¿Ÿ¿ýýýýýýýýýýýýýýýýýýýýýýýýýýýýýŸ;Ÿ<Ÿ?Ÿ{Ÿ~ŸŸŸ¥ŸÁŸæŸ¿1¿k¿l¿m¿¿Ÿ¿ï¿ÀOÀPÀuÀÀÌÀâÀÁÁ1Á2ÁzÁ£Á€ÁºÁûöñìçâÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[ºðÿÿ»ðÿÿäðÿÿ,ñÿÿ-ñÿÿLñÿÿMñÿÿ|ñÿÿñÿÿÃñÿÿéñÿÿòÿÿòÿÿOòÿÿoòÿÿ òÿÿÆòÿÿñòÿÿòòÿÿóòÿÿ-óÿÿHóÿÿxóÿÿóÿÿ¹óÿÿÞóÿÿßóÿÿàóÿÿãóÿÿôÿÿ"ôÿÿ#ôÿÿLôÿÿ!Ÿ¿ï¿ÀOÀPÀuÀÀÌÀâÀÁÁ1Á2ÁzÁ£Á€ÁºÁÚÁ Â?ÂDÂFÂGÂÂãÂ!Ã"Ã8Ã:Ã;ÃýýýýýýýýýýýýýýýýýýýýýýýýýýýýýºÁÚÁ Â?ÂDÂFÂGÂÂãÂ!Ã"Ã8Ã:Ã;ÃÃëÃ×ÃÛÃ&Ä)ÄIÄrÄvÄÀÄÃÄåÄÿÄ&Å*Å]ÅbÅdÅeÅûöñìçâÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[úìÿÿüìÿÿíÿÿ4íÿÿ8íÿÿ_íÿÿyíÿÿíÿÿíÿÿèíÿÿìíÿÿîÿÿ5îÿÿ8îÿÿîÿÿîÿÿ³îÿÿÔîÿÿ×îÿÿ#ïÿÿ$ïÿÿ&ïÿÿ<ïÿÿ=ïÿÿ{ïÿÿÆïÿÿðÿÿðÿÿðÿÿðÿÿTðÿÿðÿÿ€ðÿÿ!;ÃÃëÃ×ÃÛÃ&Ä)ÄIÄrÄvÄÀÄÃÄåÄÿÄ&Å*Å]ÅbÅdÅeÅ°ÅÆDÆFÆbÆÆÌÆÑÆÓÆýýýýýýýýýýýýýýýýýýýýýýýýýýýýýeÅ°ÅÆDÆFÆbÆÆÌÆÑÆÓÆÔÆõÆÇKÇÇÇÇöÇøÇ?È@È\È^ÈvÈÈÈÈÙÈÚÈÿÈÉ"É>ÉcÉÉûöñìçâÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[ûèÿÿ éÿÿ<éÿÿ]éÿÿ_éÿÿéÿÿ éÿÿÈéÿÿÊéÿÿÍéÿÿèéÿÿêÿÿêÿÿêÿÿêÿÿfêÿÿhêÿÿêÿÿÞêÿÿëÿÿ@ëÿÿiëÿÿëÿÿëÿÿëÿÿëÿÿÉëÿÿüëÿÿìÿÿìÿÿ\ìÿÿ®ìÿÿùìÿÿ!ÓÆÔÆõÆÇKÇÇÇÇöÇøÇ?È@È\È^ÈvÈÈÈÈÙÈÚÈÿÈÉ"É>ÉcÉÉÉÉɬÉÖÉýýýýýýýýýýýýýýýýýýýýýýýýýýýýýÉÉÉɬÉÖÉóÉÊ\Ê^Ê_ÊÊÊÊÊÊËÊêÊëÊùÊYËZËsËtËuËBÌ_ÌmÍÐÆÑ.Õ@Ö`ÖÙÙ±ÚûöñìçâÝØÓÎÉÄ¿ºŽ®©£}xsnhc]XÓDÙÿÿ ØWÙÿÿ ÓþÛÿÿ ØÜÿÿ Ó0ÝÿÿÓàÿÿÓXâÿÿÓñäÿÿÓÿåÿÿ Øæÿÿ ÓéæÿÿêæÿÿëæÿÿçÿÿçÿÿÓeçÿÿ Øsçÿÿ Òtçÿÿ Ôçÿÿ Ôçÿÿ ÆçÿÿÇçÿÿÈçÿÿÿçÿÿèÿÿèÿÿEèÿÿkèÿÿèÿÿ²èÿÿËèÿÿÌèÿÿÎèÿÿÑèÿÿ"ÖÉóÉÊ\Ê^Ê_ÊÊÊÊÊÊËÊêÊëÊùÊYËZËsËtËuËBÌ_ÌmÍÐÆÑ.Õ@Ö`ÖÙýýýýýýýýýøøöñïíêêíïñïïïïïñï$ÓØ &FÒÔ &F]ÕjÕ&×2×m×|×»×Ê×'Ø7ØuØØÐØßØöØÙAÙiÙvÙwÙÚÚÚÛ%Û±â²âSéTéjékéléméoépééééééé¢é£é€é¥é«é¬éÂéÃéÄéÅéöé÷é2ì5ììì€ìýýýùýýý÷îÝÖÅý°¢¢¢¢¢¢¢¢¢¢¢¢ýý!jHhÄ£!FH0JË<UjHhÐ!&HU)jHhEC!H0JË<OJQJU!jHh;C!H0JË<U j0JKU!jHh9C!H0JË<UHhAÐ!&H65659ÙÙ±ÚëÜÞ_ßyߎâµâÀâqãrãÉã äEäFäGä|å}åÄæÅæ çç]ç^çççúøøøøòòìòòòòììêææòòêêêêêúú p0ý 0ýÓØ &F±ÚëÜÞ_ßyߎâµâÀâqãrãÉã äEäFäGä|å}åÄæÅæ çç]ç^çççVêêîóîïvï,ð-ðöñ÷ñóó%óÞó$ôûöñîëèåâßÜÙÖÓÐÍÊÇÄÁŸ»ž²¬§¡}zwtnfŸÿÿ 9¿ÿÿ N¿ÿÿO¿ÿÿgÀÿÿhÀÿÿ1Âÿÿ2ÂÿÿèÂÿÿ [Ãÿÿ kÃÿÿÓGÄÿÿÓÈÇÿÿ ØÈÿÿ Ó¿Êÿÿ ØÐÊÿÿ ØËÿÿ ËÿÿPËÿÿQËÿÿËÿÿËÿÿáÌÿÿâÌÿÿÎÿÿÎÿÿÎÿÿTÎÿÿÎÿÿìÎÿÿíÎÿÿÏÿÿ©ÏÿÿªÏÿÿåÒÿÿÿÒÿÿÓÂÓÿÿÓsÕÿÿÓ×ÿÿ'çVêêîóîïvï,ð-ðöñ÷ñóýøýýö¯höccc$ÐF &FEÆ;Ð!&) F &FEÆ;Ð!&) Ø &FÓ€ì§ìØìÙìïìðìñìòì0í3í4í7ííí¶í»íðíþíîîSîVîWîZîîîýîïï©ïŸïÁïðð!ð*ð@ðFðTðaððð©ðœðúðñ\ñkñpññŒñ¿ñsòvòòòíòðòóóóó ó#óBóVóÚóÝóöóùó'ô;ô|ôôôôôôÌôÞôýôõõõYõZõpõqõrõsõ¡ø¯ø;ùdùeùýïïïýýýíýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýïïïýíï6jHhÐ!&HU5^óó%óÞó$ôûù²kF &FEÆ;Ð!&)F &FEÆ;Ð!&)Ð$ôôõõ!ö\ö>÷g÷÷¥÷Š÷;ùdù}ùùú'úOúhú úúü/ü3ü^ü|üøüúüûüüüþüÿüýý÷ïìçáÜÖÎÆßž³š£~xrmjgda^[X^µÿÿ_µÿÿ`µÿÿbµÿÿcµÿÿdµÿÿfµÿÿÓâµÿÿ ضÿÿ Ô+¶ÿÿ /¶ÿÿ ÔO¶ÿÿ ÓÍ·ÿÿ ØÙ·ÿÿ Øö·ÿÿ Óžÿÿ Ø7žÿÿ ÓPžÿÿÓÅžÿÿ Øážÿÿ Óúžÿÿ Ø#¹ÿÿ Óžºÿÿ¹ºÿÿÛºÿÿ ÷ºÿÿ »ÿÿ ÓŒÿÿ Ø=Œÿÿ ÓBœÿÿCœÿÿÖœÿÿ :Ÿÿÿ !$ôôõõ!ö\ö>÷žqomhmØ &FÓF &FEÆ;Ð!&)F &FEÆ;Ð!&)>÷g÷÷¥÷Š÷žq*(F &FEÆ;Ð!&.F &FEÆ;Ð!&.F &FEÆ;Ð!&.Š÷;ùdù}ùùú'úOúhú úúü/ü3ü^ü|üøüúüûüüüþüÿüýýýýýýýýøýøýýøýøøýóñóøýññññññññññññÔ &FØ &FÓeùyùzù{ù|ù}ùùúú#ú$ú%ú&ú'úOúPúdúeúfúgúŠú§úœúŸú¿úÀúü·üøüùüüüýüýýýïáÓÑÓÀ²ÓÑÓ¡ÓÓÓÓugjYHhÐ!&HUjSHhÐ!&HUjæHhÐ!&HU5jÓÚHhÐ!&HU jUv8HhÐ!&H UVjÎHhÐ!&HU j Uv8HhÐ!&H UV6jHhÐ!&HUjÿÂHhÐ!&HU jUv8HhÐ!&H UV"ýýýýýý ýýKþeþ¹gøh ÇF ] VWXnpÄÆæüùöóðíçâÜ×ÒÌÇÁŒ·²¥ }xurolifc`]V£ÿÿx£ÿÿ£ÿÿ£ÿÿî£ÿÿð£ÿÿ€ÿÿ€ÿÿ€ÿÿÓ¥ÿÿÓŸ¥ÿÿ¿¥ÿÿŠÿÿ
Šÿÿ H§ÿÿ Кÿÿ Eªÿÿ ÓöªÿÿÓM¬ÿÿÓf¬ÿÿÓÂÿÿ ØÍÿÿ ÓÜ®ÿÿ Ø÷®ÿÿ Ó¥¯ÿÿÓù³ÿÿ ØŽÿÿ ÓGµÿÿ ØTµÿÿ VµÿÿWµÿÿXµÿÿZµÿÿ[µÿÿ\µÿÿ#ýýý ýØÛøù ¡§ 0 ~ HTV*/:qt"-¶¹ '?Qhlv~FIx~ §±ÇÐî÷LU\nAN`c ©ÀòäâÔõÔâ³³³¯³³³³³³³³³³³³³³³³³³³³³³³³5CJ5jÔHhÐ!&HU jUv8HhÐ!&H UVjHhÐ!&HU6jKÅHhÐ!&HUjHhÐ!&HUEý ýýKþeþ¹gøh ýøöøööøöøöööö¯F &FEÆ;Ð!&·ðÓØ &F ÇFžq*F &FEÆ;Ð!& ·ðF &FEÆ;Ð!& ·ðF &FEÆ;Ð!&·ðF ] VWXnpÄÆæ%'(*ž¶ŽŽ¶¶¶¶¶°¶ª¶¶¶¶¶¶¶ÐÐÐÓF &FEÆ;Ð!&·ð%'(*+-;P¡$ÂýÊ@Ž¿æ\Öé!Û" %&&a)))üùöóðíêåßÚÕÎÄŸŽ®€zpf\YVPMÑÿÿ Ôýÿÿ ÁÿÿÂÿÿÖUÿÿ Öÿÿ Öuÿÿ Öÿÿ Öÿÿ ÓxÿÿÓÿÿتÿÿÖÿÿ Öÿÿ ÖaÿÿÖÿÿ ÖKÿÿÖ:ÿÿ Öœÿÿ Ó ÿÿÓ#¢ÿÿ Ø1¢ÿÿ Ó3£ÿÿ4£ÿÿ6£ÿÿ7£ÿÿ9£ÿÿN£ÿÿP£ÿÿR£ÿÿ*+-;P¡$Âýûöûû¯h_ Ö &FhþFÖ &FEÆ;Ð!&.FÖ &FEÆ;Ð!&.Ø &FÓÀ),;>L[covÎÑÒÕstuv¿ÈÉÊ ÆÉÓëó*.^a»ŸÆÜàñÑÛø")0)é)ò)W*_*€,ª,Q--Ý-â-^._.@/A/G/H/J/K/L/S/ýýýýýýýùôýùýýýýýýýýýýýýýëýýýýýýäÍÃÍ·ÍÃ0J B*CJOJQJmH0J B*CJOJQJ-jHhÐ!&H0J B*CJOJQJU j0JKUHh²!H 56>*565HÂýÊ@ž¯hFÖ &FEÆ;Ð!&. Ö &FhþFÖ &FEÆ;Ð!&.@Ž¿æ\Öž³±±jFÖ &F EÆ;Ð!&.ÓØ &FFÖ &FEÆ;Ð!&.Öé!Û" %žq*FÖ &F EÆ;Ð!&.FÖ &F EÆ;Ð!&.FÖ &F EÆ;Ð!&. %&&a)))))È)É)Í)Î)è)é)ó)ž¶°«¶¶¶«¶¶¶«¶¶Ô &F ÆZFÖ &F EÆ;Ð!&.)))È)É)Í)Î)è)é)ó)W*_*Ù*+,€,¯,Q--Ý-ã-].^.õ.ö.//?/@/L////Ÿ/¿/ý/þ/ÿ/²0³0AKDKKKLKDLLLuMvMwMüùóðíêäáÞÖÑÉÁ¹±¬€J {ÿÿ ÿÿ ÿÿ ÿÿ ¯ ÿÿ º ÿÿ Dÿÿ Ãÿÿ ÿÿ
ÿÿÿ ÿÿ kÿÿ uÿÿvÿÿ Ôÿÿ ÿÿÿÿÿÿ ÔËÿÿ ÌÿÿÐÿÿ0ó)W*_*Ù*¶dH &F8EÆ;Ð!& ·ð &FÐ0ýH &F8EÆ;Ð!&·ðÙ*+,€,¶m$H &F8EÆ;Ð!&·ðH &F8EÆ;Ð!&·ðH &F8EÆ;Ð!&·ð€,¯,Q--Ý-ã-öš_öH &F8EÆ;Ð!&·ð &FH &F8EÆ;Ð!&·ð &FÐ0ýã-].^.õ.ö.//?/@/L////Ÿ/¿/ý/þ/¶Ž²Ž®Ž©Ž¢Ž¢ŽŽJ$ J$e ÆJ$hh ÆJ&`ðÿ$hhMH &F8EÆ;Ð!&·ðS/T/n/o/}/~/////////Š/§/µ/¶/Å/Æ/à/á/ï/ð/ò/ó/÷/ø/ú/û/ÿ/00000²0³0É0B1C1D1E1[1òòïòØÎØÂØÎòòïòòòïòòòïòò¹®ò¹¹òzHhk<!fHHhݲ!HHhܲ!HHhMÐ!&HjHhÚ²!H0JËUHhÚ²!H0JËHhÚ²!H0J B*CJOJQJmH0J B*CJOJQJ-jHhÐ!&H0J B*CJOJQJUmHjHhÐ!&HU+þ/ÿ/D1ð12æ2F33ö3H4ð4>55ø68N8ñ8ê9{:Ÿ:é:.;r;=<_>î>AåACBCýûûûûûûûûûûûûûûûûûûûûûûûûûûûûÑ[1]1^1_1}1~1111€1·1¹1ï1ð1ñ12 2 2222 2+222j2u2}2222222«22®2¯2æ2ç2ôæÖÍÄÍÄÍÄ»ÄÍæ»°æ »»»xmxæjæcæ j0JËU0JËHho<!fH6Hho<!fHHhn<!fH6Hhm<!fH6Hhn<!fHjHhm<!fH0JËUHhm<!fH0JËHhm<!fHHhl<!fHHhk<!fHjHhk<!fH0JËUjHhÐ!&HUHhk<!fH0JË&ç2ý2ÿ233'3E3F3G3]3_3`3a3333°3²3³3Ž3Ÿ3ô3õ3ö3÷3 44444öëÝÍöÄÝ»°Ý »ÝÝ|sÝj_ÝOjjHhe£!FH0JËUHhe£!FH0JËHhe£!FHHh£!FHjHh£!FH0JËUHh£!FH0JËHh£!FHjHh{£!FH0JËUHh{£!FH0JËHh{£!FHHhd£!FHjHhc£!FH0JËUjHhÐ!&HUHhc£!FH0JËHhc£!FH4*4G4H4I4_4a4b4c44ï4ð4ñ45 5 55 55;5=5>5?5U5W5X5Y5e555öíßÖË߻ֲߩߩ © ß|qßa|XOHháÍ!HHhàÍ!HjHhk£!FH0JËUHhk£!FH0JËHhk£!FHHhj£!FHjHhi£!FH0JËUHhi£!FH0JËHhi£!FHHhh£!FHjHhg£!FH0JËUHhg£!FH0JËHhg£!FHjHhÐ!&HUHhe£!FHHhf£!FH55555°5²5³5Ž5 6 66w66÷6ø6ù67777 7-777^7_7e7m777³7»7Œ7888ñèÚÑÆÚ¶ÑÑ€ÚÚwnenenene\eneÚHhr£!FHHhs£!FHHhp£!FHHho£!FHjHhn£!FH0JËUHhn£!FH0JËHhn£!FHHhͲ!HHhʲ!HjHhɲ!H0JËUHhɲ!H0JËHhɲ!HjHhÐ!&HUHhl£!FHHhk£!FHcHgH#88888M8N8O8e8g8h8i8}888×8Û8ì8ï8ð8ñ8ò89 999!9&9'9<9=9X9Y9öëÝÍöÝÄ¹Ý©Ä Ý zÝj aXaXaXHhú²!HHhù²!HjHh÷²!H0JËUHh÷²!H0JËHh÷²!HHhr<!fHHhs<!fHHhq<!fHjHhp<!fH0JËUHhp<!fH0JËHhp<!fHjHht£!FH0JËUjHhÐ!&HUHht£!FH0JËHht£!FH Y9é9ê9ë9::::z:{:|:::::œ:Ÿ:¿:Õ:×:Ø:Ù:è:é:ê:;;;;;;;-;.;/;E;G;H;öèßÔèÄßè»°è »èè|èè|ssèj_èHh<!fH0JËHh<!fHHhz£!FHjHhy£!FH0JËUHhy£!FH0JËHhy£!FHjHhx£!FH0JËUHhx£!FH0JËHhx£!FHjHh³!H0JËUHh³!H0JËHh³!HjHhÐ!&HUHhû²!H%H;I;J;q;r;s;;;;;;¡;¢;;É;Ê;<<#<<<=<><T<V<W<X<š<º<¿<Ã<Ñ<Ø<Ú<ðçÞÐnjЬǣÇÇ££Ð}Ðmd[[Hh€!FHHh€!FHjHh€!FH0JËUHh€!FH0JËHh€!FHHh £!FHHh£!FHHh£!FHjHh£!FH0JËUHh£!FH0JËHh£!FHjHhÐ!&HUHh<!fHHh<!fHjHh<!fH0JËU Ú<=#=V=q====Ž=^>¢>£>µ>¶>Û>ì>í>î>ï>??? ?r?{?}?@'@(@+@1@öíöäÛÒÉÛÉÀ·À·ÀÉ·© © |sjsasVHh]£!FH6Hh]£!FHHh_£!FHHhìB!HHhæB!HjHhãB!H0JËUHhãB!H0JËHhãB!HjHhÐ!&HUHhDz!HHhIJ!HHh€!FHHh€!FHHh€!FHHh€!FHHh€!FHHh€!FH1@2@3@;@?@@@A@@¬@@ž@Á@Â@Ö@ß@à@á@ A%A2A\AAAAŠAšA©AªAåAæAüAþAÿAóêáÖÊáÁž¯ê€óê€óê{x{q{h]{Hh£!FH0JËHh£!FH j0JËU0JËjHhÐ!&HUHh£!FHHh£!FHHh^£!FHHh]£!FH6Hh\£!FHHhôB!HHhìB!HHh£!FH6H*Hh£!FH6Hh£!FHHh]£!FHHh]£!FH6H* ÿABBB(B:BBBCBDBZB\B]B^ByBBËBCCCCC'C)C*C+C,CFCOCCÒCðçÞçÞçÐnjЬǡÐ{pÐ`{WLW{Hh £!FH6Hh £!FHjHh£!FH0JËUHh£!FH0JËHh£!FHHh£!FH6Hh£!FHHh£!FHHh£!FH6jHh£!FH0JËUHh£!FH0JËHh£!FHjHhÐ!&HUHh£!FHHh£!FHjHh£!FH0JËUÒCÛCåC<D=DMDNDkDwD|D}DD¯D°DÂDàDáDçD÷DøDùDEEEEõìãÕãÌãÁ¶ã̶̀sh[MhMHh¬£!FH5H*mHHh¬£!FH5mHHh£!FH5Hh«£!FH5H*mHHh«£!FH5mHHh€£!FH5mHHh«£!FHHh€£!FHHh¢£!FHHh£!FH5Hh£!FH5Hh£!FHHh£!FH jJðmHHh£!FHHh£!FHHh£!FH6C²DáD0EE¿E FZG'HTIäJ KMKLKMuMvMwMýýúýúýýýýýýýýýýøøÑ$ÑEEEEEE0E6E?E]E`EEEEE¡E¢E£EE®E³E»EŒEŸE¿EÀEÅEÎEñEôEüEFF FóåÚóåÚÑƜƜ°Æ¢°¢Æ°¢ÆÆwncwcwcwHh±£!FH5Hh°£!FHHh±£!FHHh°£!FH5Hh¯£!FH5Hh¯£!FH5H*Hh®£!FH5H*mHHh®£!FH5mHHh®£!FHHh®£!FH5Hh£!FHHh£!FH5Hh£!FH5H*mHHh£!FH5mH! F F F"F#F$F`FaFFFFŸF¿FÀFXGYGZG[GqGsGtGuGGGH%H&H'H(H>H@HAHBHcHòéÞòÎéÅéÅéÅŒ³ªéò¡ò¡{¡{¡òrgòWrjHhïC!H0JËUHhïC!H0JËHhïC!HHh¡£!FH6jHh¡£!FH0JËUHh¡£!FH0JËHh¡£!FHHhA€!FHHh;€!FHHh4€!FHHh3€!FHjHh0€!FH0JËUHh0€!FH0JËHh0€!FHjHhÐ!&HU!cHlHHHHHHHH¬HÕHìHSITIUIkImInIoIŒIJ¥JãJäJåJûJýJþJöíäíäÛíÒÇŒ±Œ££vmd£[P£Hh4C!H0JËHh4C!HHh¹²!HHhž²!HHh·²!HjHhµ²!H0JËUHhµ²!H0JËHhµ²!HjHhÐ!&HUHh«£!FH5Hhª£!FH5Hh©£!FH5Hh©£!FHHhñC!HHhðC!HHhïC!HHhš£!FHþJÿJK K!K7K9K:K;KAKDKKKLKMKNKdKfKgKhKÃKÚKâKôKÿKLLLLLLLL1L3L4LðçÙÐÅٵЪ¡ÐÙÙ}ttktktktkÙbWÙHhEC!H0JËHhEC!HHhAC!HHh@C!HjHh;C!H0JËUHh;C!H0JËHh;C!HHh;Ð!&HHh9C!H5jHh9C!H0JËUHh9C!H0JËHh9C!HjHhÐ!&HUHh4C!HjHh4C!H0JËU"4L5LDLLLlL~LM2MJMKMLMbMdMeMfMtMwMðçÞçÕçÌÕŸµªŸµjHhÄ£!FH0JËUHhÄ£!FH0JËHhÄ£!FHjHhÐ!&HUHhFC!HHhGC!HHhBÐ!&HHhEC!HjHhEC!H0JËU? 0 0000@&P P°. °ÈA!°S"°S#t$t%°7°Ë°S< 0 000@&P P°. °ÈA!°S"°S#t$t%°7°Ë°S6 00@&P P°. °ÈA!°n"°n#t$t%°7°Ë°S- 000&P P°. °ÈA!°n"°n# $ %°7$&P P°. °ÈA!°n"°n# $ %°7û&P P°. °ÈA!°n"°n# $ %°7ÒÔÐÐÐÐÐÐÐÐÐ...)()()()()()ê<Ddïffð<² ð CðA¿ÿð2ðZ<F÷~n=%k÷41ÿ6<D`!ð.<F÷~n=%k÷416VÿÿÿÿY =8¬ü;þx]Œže¶œbh¥€D@JDZ$¥$€Sî€EP)éîÎM7HKKÀÎŒïûÇ÷Éq²gÏÌ=÷Ü÷Z׺ֳ·šÄñ7²Ä±ÿp+áWìË ~ŸJ`/ùïU^eHIé®->íÞ©ëûé+«[§rYIõß#Y€t§?íÞŠiûé{µéÞ:}çnͺ¶éÜ=G¥6;uïÚ©cféß{/OxSî¢áØÑ}}5úK5ú¯qùúÔ$úïçåT8|ý×ô?þû]ý¿F1Þ'äkfõß³úµÿŒûÏȱþí¿#Ëÿ5²ËÿfÜTÃÉ2YÊßÕ} | }äô5 Rú:IàDáÛ*¿Ûv¹l;ågÛ+l¿l³Ã²ÚÉB;%Óí|gd]ö«ô²ÒÁþfö·Ô±ÇRÕ^ÈfZÄâê»P߶dÖÒhrËš¯XV ,>Õüz_èïZZ/kE=£ÕõšöÖù:H§ëH¬ãô[«Ù:Dj?]¯œtvÑÚNOjýEèM§÷ŽŠ>ÓÊË>ÒDVZ_·búÖÜ_Û»ú¡e×*ܵŸeÖæ^;3ŸJ¿²:Îê4fžÀ^ÑU_·2ãèif îè3&¶ÿ+Iý©dþXÂh^õûŒŸ/=ü/) xúß\ó·<³ä.+rÍÊi8ÈX[scÏã>Sžß8î;9|nµ#+Õ¹Õekiæ\вiNË©xVP_µ"êVRi9œÃÊýÊÊÓ:¬^#Ý£Í4õYÍ:-dœŠ³nY¿1:Z²_°®=tŠvàh]ÎõC=®%¡ #åÑ?4þ£õ ŠÑž¬Pbfö:³Ìij3ûü<M »/±ß5Ù÷FvUZÙ/ÒÅÎI?bc(1ò)vPæ;Ë¡ÍÄÓÛ"Çmübë䊿mŒ°xLîKäM_$Ù¡ /ÒPÙçIÉëéÆí(cdæŸiún°P³«õ F3û5mpBS5IpC÷4VðäeO=ýí)íOÏ`7=»]öŒvÎÚq/cŒmöƶÖ[Úbïhsœ¿MðÁ6ÚGÙÿÖúùÖÃgX;gÍ|Õó5VÝ7Y9ßn%|¯å÷ÃÝOXF?m©ü¢%ôkø {j·í/»g¿ÙC»`Oìšýk{L|GWX\FïS9{¬%ö¡ÔûX ïÄ-,µ7°4^ÍÒ1»t^ÈÒ{.FÏbýoÍìÇ4£ï eÞgÁ÷ÎGjš©œ§Šò¶Âk2¯¡Iœ¬&ô¢úçÑøYc{*5U_ 3Oí<²ÛòÀ.£'ä6Y~]ºÄηyrÊŠÈ1GÌ~%;/qÛYö[WÞÆ÷¿$GÉE(Wl¶Ü°%\¿AîÙnyH<±óšÑ 1 ¿ø9M9å`~ gæ\¹7äZó<Ýy¶~ÅkVK4ocÃ/Âߌ~),+ëuÉÂúdf2²^Y·t¬_:ïÂöa-²ŠcYÛp°Þ«X÷pý÷±ÇÙöÈnÚ»owywÛbûuvãWeÔSÓXAßo%}§UdÏk²÷ì^'b¢7±1ÐÇÙpbå[bf¢÷µÞÐvx Ûç¥ì³ûÅóØoþ¶ýái퟿F,&0ÄÞbÑ;Äê5bö4±{X3»ôí`#1œØMÏÔQ¬1ßÙÃø_Ë:mGc¶Jjß"©PëõN Qòø«ÐU¬ÿ2ö!d<¿mÜ¿Øß[pÃæ°çsЧYìå,ö}û>ýý}þý*[`MY0×ßÃx Ñ;ŸâÚÁð%c þý9tåÞ¡#1ÕÚùmQÖ€9ñÖuhJµiR|Bü|j4&G Ë(MãÇ{ /8WŽ)Ô<"®¶DC[¢áQ«Öèh[tœ-ZÚkßÙÒiW4µ+Uš;ºÚ3"º rèËùÐâBÔB:ÌÞ×V\ÇXß[š€?XjU¡ºþs¬Z^GY=h ˬ®h¢kìS]gÍtl±VÔVºÓÚénØoš5ôuÑcpºQwBzèyë¥àõÖë}ôõ£õÓ¿ìœÿØ@}Omù<HÅh\ïCɳ¡äÿpòj8ñ2Rß®e¡<Ç*AÎ µ}Öš ¡MàSr±Žò>Ð[ÛDôÒÐÉ»i7ïŽGD;íÑF{{+h¡}Œ4Ñ~Þè^jê@¯Eyý>äãX^ÈÁ¹Ù 3×dd¬ô±Ó@jî iO Ç+_Ûy\Íü 4£& MšÏMü©íHM¿)UüªTòËRJùùÀOKq?%E¡|Ã÷Rß÷cÛå?9¶ÛK~ídï%äÞ+Œ o Ï6PÍÖgëpgkpPÿ©p÷á/ªÜ]žCÜëäáždȹEäÜŽty7OöÂnòg¬!æÀ,^ÿßsl4âÜ0kG,!ïwËÈ»Ò>çÞE¬ÐêÛ|ë±<Ü {ÉÃÒ2âùxþâõ}øcá)çþF>| ɧÄJ)È©TúYD:ò*ö'ßúkȵø°/É·Á9tù6Ú _ïë·äÚxL®M(«³È·90[@Î-"ßÀ*òm l ß6Áòm+ì&ÏöÃaòìXD=E®³äÚyžhÈNäVòªÞ çnÃòî.üEÞý ÿwOá_rï¹ð $$7A r%3d%w @!^2«8·fDÑëMõ"Çzc=ȱnÄnHò1ÝZëBb?€¹P* ¯KAå<²Y 39Ò3V:HC€Täp HFN' ÄÜ3!÷qKHlæ(ðBêá{ëOu &ùTO[ªáq«àw«øRü*¥üWžJn]&·.ã Ï[çÈ3|ËC®å¬äZf?L$ÇöGyæ[üšŸ Ò€Á}}%ø~ÓøÁïp_ãá ÆĶ o$€TÓöÂSA:û×ÓSa3ÛcÏjÿx6_.ªn^ûËóáþ R Ûï^Ì®úžÀšÐÕí׎^Çx=;Øïl·jÛœmÅOlòV¶ÁÛØog+Œ-Á§-ÀcÌñn6Ã{ØTïe?Àxïmcñ£œ îñÜÁÖÇZ/è欱ŠÐoRªøp<Êp<ÊPŒÉP3ýcCp$ìܲv .ÚvÚúÙ 8l}l¯õ¶°ÅzÙ:ëa+¬-±.6fX'jì{kgcŽ6Ú§\ÝÄ>³FÖÕX{«c¶5µÖت[]«l5¬¢U±rVÞ>Ž2VÒ[ +dE,¶<ß²Y^ËÌ«ôÃÒð. e±€Ñ^±tïIJTöRÙ#úŒ{ôwèõn©ÙiýKOèz~o¿^ÕtoÛéùè.]DÇ2K×ê]©Séô&Ó|O×7îe,à7t0£èGè×:¿ëWú¥àO_íOÇØæsí€Ñ÷ôÔVÚš+MgzÃZ[ÛÓµ¥OjK¿Ôn³¥ÂÚŽ¹Ÿ«M5'dÒOôMH©5 ÜOô\¢w>'€¹¢zXZê^Ø-uŽÕØ(íutÔÕÒYKW],ÝuŸôÔ¹òÎÏuºôÕ)Ò_'Ê _ê8¡#d¬ñÚ_Ÿ×Ÿ2Y?YÚUæigY€e¶ÚVÖhkY§-e¯§òý8þ=ç}«Ýåýñ1î(î3ûMàŸžÿæ1ùÌfnsa!s]ÊW2ÿÕ°çÙ̳mƺöJC=G€>ÏY_OK]¹®^YYº2h}}ÞÑÞc B1Ö$|È:VdM«BMÖžëÝuÿ=hÁ^ŽcO:±7ÝØ£ÞìW_ö-ÜůØÇŒúœýwy7 =Éwæ åÄÄjâdΡË]AϺøY§t^Öô®±SúXÏÒ»^T±ëÄßmâðŠ²çÆšMôÆ'f»©åtDvf+hYñ\Vï$ÞK÷嬹PšDnÔ Gê/ùÒŒiDþ|J5#ZWmÈÖväYMþ}K~ONN%7g£ÈÕeäí*ÎÜ[ÉçdäA®:BŸó} ®ÛpzèÀHºÈÑô*£éLÆ cèÇ¢cÑ1Ör¬tòt##éV£9Cm(DKÆÀ·èÎ÷èÏdŽhº4æ¡SKЬ° [mBÓ¶¢m;ѹœ°Ý;þCO£çÐÆèäe¯M]ýM-¶FcK¢µÅÐÜÂhoA48ZMÎ>gC§³ ÙÑnt"H ©,~Ì^ Ã+0%þ¥<êÀÉšç¿)?Ë 9.ä«rZnòþ/9*ÿÈ!y!û$îWçääcZòñ-b<'±/FN~HüW&/ëÉÐüós _ÆÁ$&×à6¯C)I =nF+ÙlŸä³ RÜKY[*Õl¹Ô·ô#«éoÖKÛ(ý,FÚc{ðmûèÉ";*«èe¶ØiüÝyùûg».íÜŽ»xÄøÆ'øÈ°WEÞ8Þ=¹f÷7ô=Ï ým-é9õ#ϯ՜~¢$¢,5¿!Ÿ¹)º~åu£ÚøW:Í¿ÖÙ>Aú]ê³uµ/ÖŸZc|îðºÇ÷ë!úë£~VOú5=ã·ôßÓKþL¯¹ÛuºÕ[twü »ëìg·ÔÓG^ÔÐw?óJöÜkÙKºÞÞÜ4èhôþtž_ÁDüËxœösìåܳ 8 GìÕ`7âõ`øÜâ]¹Š-4åº_óËsâܯ÷ÍÅÞ¶þ&óIÉÜÙmÅ\ëušWüþâ×õ_Ôý÷ÃúïÖ}ŸEwÑCÇøRÖa.ë1u óýÖiëõ%ëö9ë×ul«œ9=JCŒQiüP1z¥üZÙsk9GKx&Íïi5§§Ô·Ù«tìY wüáKú'ôèîÈìñ¯vMαçGí,=õ)ÙÇ^g?É2;Çß#Som·Í28êE<u&®Z_µZÄ\b¯1XXÌcÓ%€³iÌŠH$OÐþ{ÔpZ0&òúkøcý¡;µ¡=ñÝß5ýäAiò¡05ë]rär%9óù<G>)yõ¯l¿eüAŸý*?É9F^r3ü>³°lŸ¯såM))}$ñIÀ'ûwòÌŸ6>h8=ÐPúAô=åõcMú°&œe£õÖM[mduï¬=Oú6ô6€»µ iAÒµùTÊA kB®6ú©üµÑrh+Ùµ¬Ôv²P;Èlelí"ßi7¥=dö/ŽôÒ~ÒIJ+$êP©§Ã¥ºfÆ !ãÐ hÊ$ÉÍúœÍÚedÝÒ )ÉX³hM|±^ÿY«]ò§@«~B³N²^gP¬_£ïGÂ36ÉSY#¢ËP°E¬ôV|€ÔÉšØ÷IDz£ÙáRÓ/Ø©>ÌŠ³êuF<Q®OÚ'ÿ\¡h dÖÅ!|,ŽLÓ*2W+Éb «µŒlÖ2²KK±2¥X¡ârNÊUž¥ïA äµ|¬h>IiyåMÈmy€ ôäu_Ì1º7fØ©BìØû²ÚÊfØeÅÙÑä³Vn·<o¹gäUVCâx-Iäu%¹7ŽÞH2ù§ÝÉ{ÞΡ]D'ºntœ€÷úþ 4õAÒÚJG-=}¬ôõñò¥Oaþ£|ísä;_ |Ì¥+_DŸÂwÉ:? [üšl÷e/ÝÈa:cTÓt.çéd.ÑÙ\wÓ[t>wèÐ=¢[zF÷ôÅõ ·Æ òk & JëkAEMT×TA=M4ÑôA+ÍtÒ,A/ÍôÓlÁÍÒ<Á8ÍLÒ|ÁL-,ÔBÁJ}?ØšEZ<8 Çá .ÃM-üŽlPÙʵLÐ[© =t·Ÿ0Ø£Eïìý` fc[Ÿ`¥å 6Z`«åöZ65+Ê%žhë>žci:xf)÷×x(Hâ¯)=NðŠÇ 2»Ùüçñ'^Èxq¿ëeü¶Wð^ïx]?ïýŽ7÷ÞÙ÷zOßé_ù*éK|¬Ïóñ>Ógøãßø"áËüK_ã}}gnáíÞ«úAoèGücF©Âhåõ¿èïs÷üºg÷[þwMëzJÿËùßÇÿqõ§þ?q?q?q ?q/qqvá%bðkñKa.b% &À×:º"h %y]2pìuH¹ñžFá =ç=úÍ[ô×àýæIµàJ°K_xþKíxJíøÚñ7µãŸOÔ?©ø"èKjÏçÔîÔÏzþŽ7Ñ^Oxu=èu/ud;udÔ þ®®¡,£,¢Ì£Löú=õ,ý÷ÈèçKáé¿KgÿEÚÁý'©KT×ð=RÉ·%é·×5«é³JšÁ¹|6}ötúêIòO$ËŸWý²n4Ù7,J6"+¿ ;ûÉyŽ÷Ú{íÝönA{×¢œKÑÞ¹hî4æ~æ~ ÞöGk{Z#tž5ª:Ü@>¶zhq=ŽžÊQ-®'ÁMÔè2AÂ>m"ÛPªõ°ÕZzÍI(Ù8Žy$ª6mîÂuCé: Í-Pœ&š_T°*º\E,2Öoä=ýN²Sã² Ëéši©šg©eñ©euì_YOÜ_ßQÞ_©_gÐããüœwÛÐãMèñ2ŽxZ<-þQ ÁIt<Z<VÞÔ8Ê¡Üe ZÜ»öTr̲23®MeiÀ4ãÚð]xÚèoEåF ©B¥©@Å)Oå)ËâÉ? "§2Eßge ±BùX©|TðŒrWó ùXÅ\¬fI)-Z -Îge²±ÙØìLv(;ËÃÎåeóIìF££Ï§Ðæhó5Žù6Úüm~6»Wx^ j]M^G3øÇò¶×Üèrt¹š·2èr%ï@ÔuA{È'Þ[Zz?iï¥;ü¹>-ÿÿÏéhò_oB·¢Å»d'Ñ»×/ÈYŽø"Z| ¿áÿÈÿWî¡ÅÑâ'ýMþŠC3£¿ÙÑßwÑßèo MC+£¿µ5sÐýmö¶C{»¡œ}ÐÞAhïHt÷tw"º;Ýæ.Go×£µ1hí>8ªåÑá Á/ðVB+ϵJÒªoZµ 7äu9šjÐåJèr¥N·<N·,º\]..B?f£ÓÑéÕèô&tz'}>FE£¯ Ñ·Ðç»9x>?Gcyê §^Cß@3x +úË=Èç/QÉ'^Ê¢÷PÏ;šè ÔôªzÑ[ûYïîýsß.oAסÉK|²ÏE'¡Éßù ÿMæÐæ¹+özG®jéÇü?åõ¥£UBË ÇE¹CÿÃs£Çïø}Ï¿î= zÀ_ž»PQ,xßA¯£ÃÑáShéatu7úÖ®¥hï\K .§FSÃxâþÐÒÒ±¢éŒ.osìMH¹qžæ¥Š`Gwéoiâàª&ΡÓÇÑéhô4z£TW¡ÊŸ Çù^ç±FB¿Bû£Ï=Ñç.ès;ô¹^ôzÖkë)¯¬ÇŒöºßëNO·zvÝäo¡Íoê ]økhó«:]ê>?±èòh¢v(ºü¥ÿ9>æŸOá£ËÕ|£TðµRÊAÉ€ù.úüß1ŸY-+Yãoq<=ºÊñôh¶û8 àz}ÝÈop Ï|Ý>GñÍG`?úœýÞh=d¬BÃWÂbt|Ú=ú£ßÝÑïÐ ohxlx¡¡nl"P²Ón&Ç`ä£[ÈvXNÏtºFû£=ÑçèsKò"uQËjšf4:ÚŸ#ÚmÎo ϯ¡ÏBñ]~÷eGÔ[Üßèë/£ÐWàFè @x$<+FDWlDzJ^Èq] qt$Äèw H®?p§ñžôñÜu}€äaf ?3-böx<Y{ŽOßýþÊ5ÿ< w~/B»7¡Ý;ÑîýcuÊYôû þù&:þþùt\ÐàØzèhr:}t.4ºôäu_ÌñQ0 No]hõ~4úßá:}ýýÒªI\Ž:×ÀC,) ¹×ÃG7ÀG7 ¢HÈvçC»{)vC»«¢Û Ðíf>D:¡Ùœü[^÷©2œïód²¯yŸAûYé;d=QãGdÎcQŸhÿÉÙgü79ãä²ßÇòò»Ç!ëbÃ+ž€×ÈÆ7ÈÊdhzÈB¶æ"sóÅEÉèRdw}=šŠWãk]M4ÖAKtœ¥f :â«{¢í}ÑöÁr¢ëïcÑ÷ýhùq8§ÑôËp n ëÁ]ø}¯N×F£Cstº=tG«ûFzý>>º:ýn°Írâ¡sáß~±LšYfT-cð§¥EáÒá¡Cýª*øOÄw€' z ÇÅSÇÒ{ìà-· »ÿëÙü¹¿bF=+úMôûºÑñË¡°PØ'OÞ§øòDÔįnÜã©%îsß?PÈ_ÏjÇÏÌ1z²yoÔÉô}šA}¡Ž£&µfÐgnµ ëPÙŸ#ì?Â>$ìGŸ$ìOÂ>¥8}Lú\ÁhÂ>ôc?zQo;±?¡5žŠ>úìau»¢&*AM×W/È£±¬ªA&}Û}âÉ©óôÇÓÛîzÃÉ5ž%§üñórùiÙíÇd«MŸ[Ö ¬Ë`9®wê:5?ø\rÑšçW>?2Aú×Òºû0ŒÊ0éàäSï+õŒ»TöÎò¡·ÞZ zsy\ÉKÍã@#Iã ¡$óÚ<K?íUå9ø^öòñ/òòŠ}(ÉÓËx«}Vá€Gœ0@fáÁŠBØ/$ÏAØC÷!ï{@ØWä}nxsRB®SŽàs¯x®¢9玧?Ѐ]ú¡ìF6ã3ã7çjU§uä{<è/ß eßhC7Ÿ ÐÆ2Pâ°[â°[JWmËnwÆÚW*é)£¥žBúµäÕq ϧÓ8ì¹õ»kEu3 Ÿ]Ên¹+åërQÎÊ59Å»#ÑwãÏ9ËuÊŒLÒê"É€ó$+µ.㮯ã®Z×àÎõA=TûS&Q+jK'zÏŽ¿ô¢Þ|ÑÏeŽöÄe÷Â]wÁ]wÂU·aeÚ°BšapÕ-äwÔý%Ä>/úTCÙè3€fÒQ;D/µnÐÏÚ°KágOíرv²Þhµu u öl£îî£wú:üõé§~¡>ÿbåW&ØH!FƧïߣÔ?J:T6-dDi3A6ŒAXÿÿçBšéWœ_ð~Ò»ø>ïå»|š¯öQŸÔÇù|:íYtÜßãîÆúbÜÞräkœïðvÝÌz®¬êgP^O÷_ÂAþâE9ÿæ9üwzí;šÍ^;%þ.j;>OQ%CÁÐsßÂç]³ŸÛQžôÞñqŽñéœ_A}ãïãïáíÑs§ çNCN ¿K|ÀëPÒs<Œÿûy¿ÂcªÁM<ÝUžç©'pÿ©éÁwR9¶PEè#CE¿Juù^À]£Á>\ïÀï>PóÞzÕ»é5žìíõ·Ô3ÞXOz]=êÕôWÐ}^Rwx(ª=®õ·u9j¹gÔù(ÔÔiÇ×(Ô8º<'t9à>óéGÓ nŠU±ø¿ÊCµÝ²¬¥ú®÷ØãÐß ¿áœÇ§±÷éÍ' .qTõ¡T÷!òîãñn[W±«powØ; ñu;ñu[èÏ×KÓe0ø=éÅ;BKzñÆð1œx9(aµq#µñyao^³fØ×ÃïÕÃï =z9[£œ¬äÌšOo!3àòj,p®ésò+p{r¯9Nª1ùX -ÃúŒý?ê1z¢€Ñiäý4ºê8µ¹hÁR1x*«QÕtáéÆw ;p{{p~Çå4åÕ.Ÿ³bððKð~ä%ŒY4Uâá÷C"ý VánÃQ!Ì`ŒbäÆ©b¶Åq¯eQJ<I-¢>OÙ§mÍÓwf5zàýúi Ô¥ N·|Kï> æ.@WàõöãõàõNÓ¯_°oÿMs°Â9¢=6œyBûöôëé ìÝsYü_v*+®<+ý{¶ša/ß÷= ìïò>7Œ_L ðqà%÷œ5ä=ÏP#R0¿ZZVi9üjyvªXIŠhEJmøg¥ÕQÌÚøÛzÏíOmèIMè]©m© ͵-ž£|¬]ÙÑRýÕ}_¿dGI ££@=B=.¯°£±©J]xÆNÞEíoÉ^jÁ jÁYjÁuÙ/·ÙÅ{²Z°Nbé Is]çÈ:>Q'Kvv1äù¿O=(¥¥òÔrÄUUvõªTKªUb®»Úøë®I_íNeëÁ®uqìð$âtÕm&q»0ú@KÙÀS®gÇ·ÁQvý\Š:Þ¿'ú,«u¢u"ü|«ÔFÑg^€t>kÂn5¡º9ØFæXkYBn®!G7«;šÈÛÔãôiçÈçsö9N¡?®a ÀAÆIÃQžñW'ÞY!9}®~ŒÛyס#Ëè)×H1ú8õŸ~s;}ç^i[oqPütÏý6nè.®è®Ái ÇqÁÇ©ÿSã©èu3ë*ÏŠë</}pqÝíeè+Ñ× O®O¿ü }skúçÐA/ywôµîm|î ×?ÿéÁ§¡ÓsÑìe° ¡Oß BÛOÁIzøð³Öð3×[ÔðsØ°&ÍÑÕÙݶŒï_ÁÎ `<µh, %Ôš-;Ø áµë8uìœð«ö¯ßŽÇþØþv¡îÅö?=!u0 ßò4~Ã3û5\û%Ïëçqígœòr~Ì+ûa¯í»ýSøÄ·zkhã«Œ|îK|/ðá0êüµÿèãá;ÿÖ§ûÃE>ØWxwßî= #£4eÔfð1w©ÆÃÞ ¬ÿ?G¿uKC]È&Èÿi0»ññ?Ã)üáEzÅkôÏð÷òâ{%I IŒŒN¯2à_߬^ª+¹éâuá{?2xàÊÞ*Ö>±~ùüóéãÃÑDÍ·DÍ÷ôSégÈÌ<_B¯ž>q}âÙåûé÷Á99ç7ä*=âU*åMÿ[þ$òþ€?|JÔ=õDA"HN€e÷3±óÙè h*ú7 MPŸ¢,=a%zÂZô é?êÛAsÍ9¶ô%mé »jÞàK-ùZ8£E h°p=à>اµRð\ëZ Þ§ =bà_€ŽjA Hg5ÜP×å ªU¡gªBïX WS)èO?9V[QúÆž üDZ"-_pÌòiïi9³ôcW,Gð;ýä-Ëܵ,Á_öVðØ2/è)ÓÃÅò4AzÈþJðýc~ ýbi\XU"³ñÐÈ%N~!ÚÎ;?qð1øÁõxÁ¥>Åçá 'ãÇûJ¢m-ѶOž3÷y'®hEL5àêRÿW8/JŒ`ôøÀ<xÀwü.qÿ·gàίãSÓ&e&Ið ü¿ÂÌ®ö¹ôø9vÜMNÆàíÖÃR:ä 0'ë-éPCq^ ãéàMHL'ø ÿÐ=þ©ÉðI+h :Æø¿DÉ,tc2ã·DηøÀx¿!x¿~èL?|_ô§3Ÿ¯þVóZú3ÚuÜËêOhÙ/š»ü]È«ÛÐžÍ ¿ÒéROßK 3ñyÓü%åcºÉûð@Ÿ&ráñùUéå?ãõKßÆî:øŒêŸí]-¥})4ùùÐ×çF³CÝÎÏûŸB>òŸN>ªŸIª@-4»m3²Š)tôSdÜY:Ö³hõuŽú6ó®1dÏxt{²þHÍ!y24;œnð,ºÅsèvϧ{ý}=èè/¯'ŒöõŒ7D«Û£Ó]Y§^ÐîÏÚ EGÃ(<õw¬íTNÏfœÃÏT±þ«`¥&Ä'F£wÙ£ðsÙðóÙ8ì_øymø¹møùmø9nøynchÄûÐúqÎPã%°Ö¡Ý[,!Y Ñ£ÑOÑh£O,&F£SéÑè¬ô-¹ 'J.FWôÓ^ÝOÐ1€c:èÍQÖöÐÁ·xoßàaý/óÑ0 "ÿù{6œY>oòÏ|/Wíõ®Ô[Á'Ü¥Ÿ_!®P®{-šä·É€ÛtWŒR^îïÁÛ+HïñÔþjxø9Qj2%]ð§enZæà2:pƲGÑ'Øýì¶@°Ê ¬ºR*C +ÖA#«ÀjVª@Yô§\hRîèçáÏ+Â[?¿þ<#ü¹Fš{áÏ:ÊëµTð F¢£`zÙ íìí£dZ -¡fjkÆàcšþÓÔA ²³ & A}5xKãoj¬ %DÓ)=òGr(œî·ä_Ó~PvÙÛ}lÍŸYÖørYí³eüèÓɶIdÚ$ùNh#_ÁP%_ø0ùÌ¿®ÐÍûÓauzÞÓ§Ó¬kEÖ5"Þk ¹ŒN©.|kª Õ%5/WÄ^QâRãz:òàCyJœ|jÐaÔÐVPQSYÙáÏͶàµç@ø3µ©øïñþmtä×Ãúü¿ÿçójô»jwå1±{_ñ'Ÿâ&Ÿâ:ú3=öQ|ÅAôu7Z» | Q³ø¿áåPîèzUÿxîE€uBý[שµŒ 1×ÄKá?Þ§ä!ÖÓ@R"ô¡µòÛFìÃvkæëìS_lM|&LŽ>ÊêùVÇ?³ÚÞÞª{S«ê[E¯h匀öV³[Ï` <¹åõË_j6šýwMç5Ô€~@_ñmÛW« mºÞ· ú»Ô«6H/Xo=iôµÐÝÖH·XM]guÔyVX§Z6mu¥Ñ>L»YBmg±µÖ·§RÃîKûC>°ôGWé.HfûYÒØqIf?I|Û/f{å±n§{ÝJÿ³I.ê:9¥kä ®ºg¿ÞlÌ£«øÆë<zy2£/Ôçu šÀ±RPsóp]V:ôñ:c%Ñ @·ÐSn§Ù-èZîÈa¹A/s-êi¶ÐÁl'²^g ÄáúDñÒ1vîKgI:âú#]ËRþŽ)ôåõ`ͱñð#çÍã\»1v2ÿÃy¹\âÙnñ÷xÖ§º3zöWì0œäQzÉÕÎI»,ïÛoRu«Äú}Ì:6f=[Y\íÄúöbZfk9t²œ§³¬.²ÊºÉêèNk¢·nzÎú±CõŠ}£Ùöv®Ÿ°åìõfö|{\SûMï7{ÄÆsÍãq¬¿f ýMâçâ(?ñT"«ª^Ëjú'Ä[b¯§5"þ-ËÄg+⎠ñÚÎÃiëàWà¶uòdD~:ô;+äõv8v^÷S X¯KÌ7 ¶äA7ò¡¹1M®ÇßL%æGKȧ5žšMä×N|ü~ŒÎQ²æyxZrŒü3ò7±ý ¿°0o3ZÃŽ+©«ï¡ì£Bÿ¢ÿÇÉÁÃ|úòðRô+ù©¹qSïàŠ2E¿œr×Sú=OD] ?E{fü=ñ;ö̯Ûs¿d/yÞ~Ì4úÈí°ÙbÓ`Å :G¿ý+šr¬çå\ó€eä1ã0öËP{qCwõßÀ] ÕÛìÙ-röºï òoÖ+äí/ŸX/PÙÏÐýìpG_ãé! ûü3ÜQWÜQ[ÜQs]ïtµ×Ñå^UûG8€:Ûàòë$Ï©ümçt¿¡Ãü5ýÒ_ÕþxûÞtÝp)p+mPÄÔ&þ+Úý}Å9úRÎB»÷¡Ý;ÐîÒFyÚ ºð Ýol(âßÉcûZîÓÿa_Éoö¥üB÷|.úž}uÖ»èŽcèº×Y;YadµYö)ÝÍn cèâZhµ¥·ÕnV]ÚYUºøÊtô¥®}$Õ¬úS\úPZi4š4T<+)I¹WB®iI4§€ì×"rDË ž¡Ñ£ò/¯Í K*+B~VLòAQ®+Å cÖeüFܧ÷lÇœ»1>Ìe óÎüÆ0ÏpÎSQô¬YôL¬Mô{xÖC<óI=ü$᪠¬É¬Í?6JþµošoßQë&Q÷ŠI )i|>œßRz¿8Òµòkÿ¡¢þóŒíSö,Ü»pÃœæÉ£œ ÷8Üë)[§³÷³œ.ôÒžæºÒ«ã ëèFo¬1ÞRwà0÷xwÜv_âj0ñ58GŒM$îŠóÃåÄäzh1ºXý=Eì^Ô~XŸËšÏÐçxO@ì¿FŒA>dìäÇ{/(¥-AP êÚ«AkèlÈ£DÁl^¯Í;Ç8÷,×]âúpñ2îsÆwçx·$t<)É×7ÉÛ·Èßìäñ{äs!òº8ùþVD\g r¿.Tc:ªæèAk?I?ÔCÝHý.ìP/(LžðLÄLŠI*.i œÌÌ2[²Ê\É!ó%Œ'¥ ,²TJ@IY.åd¥TÕRYÖJMY/ud£4ÍÒDb€lVÐNv!Ýdô>rHŸdã2RNÊùYŸÓòœeFçÉEfp »_á®×¹Û îr»Üæwý.£>`Ôr@1ÒFzÆ(/åï*äUªßM§È«ú'UðoªçcyMÿ¥Ÿ7Ô5ÆÑ@3i"}Kë;úºf绹ùî»|'?ß)È»ü]RèŒ*§¥µªVÔêü©Í:ZOëk#m¬hSmζÚSûjçþÀx!ýõMH˱7 æN#žÿ×ú¶~ÇÝ&iNÎçê{º».׺VéfîŒ;ïfõ#=Šõ4ó8¯5õ ãßкz[ê=fñ9<ÓªÖVcYGM`5}Š¯[_}Óh&¬ïØWÃFh^ûZØ8-jŽMÓ øŠ*6_?¶ÅÚÐVks[¯mmv·CÚ×~Ò/íõúþ`ðMt=ÇC©°X¶ÎâÙ{Õ¶Øk¶ÝÞŽÃö³wìåŽÓö®·vÉØ5+i×í#»cUíÕŽVÏþ±öÔ>±¥ uÙŒ³Åöî_ø÷·Ä>Øù0Ká#,eišÙi|¥ãX:ÿÜ2RÇ3r~fï ë³xGËÊX!ÙŒ%4·øËÔþ\ÞZ¯µñ5¡ºåóªPïP>ÄsxßA+(êïYqrÛxüm+ ?- ×(Cý+ã¯[YO¬<úPÞãYwP«nTâk5Ž£Ç>æzïßßñ~#;>#·uã^=Œ°õÆ·ôóÒö dÛæ:yfþcyoy¶ïyÆx橬ÃÖck3uZÄz-ñol O°U>ÅÖùtÛàsm3'ÆWÚ_o{<Æöù;äûì'ÿÉúI;éçìgŒÀ9<Á|Ï/øËø_ýýæ/íwEÇ8¥ÿ.=Æc<ÅküëïºÝb¥=vðǪú+AO4ò€ASOŽöAgOôô4A_OöôÁÏ|ãoýí`¿ÌõìÁbϬöwþ^°ÃóûŒ`pÔ?{à®yÉà¶îùÁ/hðQ'š$ *ɪAÚ fÒÕ×yï'áø«/(àbžŠtðq1ÞC/<`ü»p{ÝàŸ×žÿeÏÍýrgÓIæv9b®ûóÏÀÜÒ1<ÇFg-ϵþz)ϹçïÙ<ûtÖ` k1Ñãß±.ß°>_³V#à+ÖíKÖ¯?ëØ×ÿñ¬iWÿíþ?ù^ïwŒåMüÞožÊðg°éÂ~ÁU^ÀUÃUÁUÄU§ï?êÅÐûÂøÃü~:±žœÙFíñŸýÚàoø:ön¿æ«üU\i<pºŸ6_8ÃÙôoSýM&Æû bí:1wÅÆøEâïqxÆ/Cü8±ù3±| Ç¿àŒ/ü±{nXÆèCõfŒÞÄR/ÆéÁœzøsâ]qÍî]. ¢sëgmÇ<ÛyrŒvJx¿ý€ÅogLôoÁÛxïw"xNÈÍjœïyÖ"€ëRî¶kô1kRu©áETc=CªxešJw[jã®ëDe²¬}âüž¶(ãœÏØžW>î9äb^9XëlÌ7óÏȳ€gÓñ©yæTäS Ö"©ßEãn¡u×-.y54Öó?ÿÈ!Žq¹Ãþ¶4sœÝµvÛÚ-[ÎFS§¡ì¢M°³ö z;ÂNØvÐúÛ~ûÌv[wÛim«µG[¢ÓMÑëƶ í]fµmU·VÑæX9e%l²¶ï-¿G·ÇZvûÚ2ÙWhú`{ÝÕÄ0bëlΚϩ·š×Ž×JvFËS/Ú-d1Çj[ši©/¯Ñ·œf+©Gà'MdáŸjwà.µê<×xj;€ 7©.oÃ;Ü0¡âí¥Vê\ÑsuKhmOÑmjùþ]ÍìªÚu-ÇJ2ÃÂvZsÚA}ËöRwPcÕzT_ê|}¢³õNÔëÔåKÔçs:LOR¯÷égTâî£Úš+©¶sñÓñšÈßá Ÿ¡R b7ÇOÔ×W9zÔí§_wõ²d×sò¶Lúý®èÿÿŠ8ºï23?3o3ó-g4Þg(>h š\x¥.xŠvø§rÏuHêá¯jÊ.üØ6ŒÙf)[*k*OËÊËK³JÍBÏ»Äü`èÿ÷¯u ÿ×ÿþµ®@jE ÍçÄÖsâì¥MiŠÔ¥göÙ+bŸÅÔW#Z"HâË-9€€îŒoøj˱»úºZ²²¹Üª0F_HÍ\hµ·õëcîS7bŠÕgõ©m }ÐúûŽLÄ\ݱOçEÐ9tVÄ|tn!¬DëVÃzô.d3Ûš«;`56d:žö£ !ÑÂ#há é§ÐÃÓ6,⬠F¿þhaßkö9ôD»GܲÎÐüo -ÑÆO 1Ðꣿ£5 ZQ * e úò¢×ñ ¯±;øû^Ä<ÖtâñxhWàë"çSp59qÇpöa8²ìœvíž»v\A?®Ø&FÙÄ(ë#ÎÛjgeÄ)[qÂ3ÚbFÏhómnÄ^Ôjì²èÙLÛFmµDÔjXNt ,Ž\5ÑèwûtpÄ\Mâ!ûT#ès`alþï_ëÅëzùø=þ=þO<g¯¿e¯¿eÇúFØÌÆ°[a'û²}ÙKM;GØÇc6ú³ßýÙ럧ÙÓÓöûÝ3â<ûz}œd¡-ûݲߡ!û]êRkA jbšÄþž·ŒÏ|ÀÞ>À>$²Çȹ<ç=þŸÇ»ÑÛìÛ-žÁ«kp w#nPn°×ØÛkìÄ%vâ;p==Ïf?CNQUBN°ÇlcÄö5ä0{ºv³+!;©:!ÛÙÛÃNmìíZXÎÞ,doçñK§EìÐ)ÛtRD~±\ãxH>³mú(b>Ø£"ŠÁÓ`:=æá!YÅèÐJ4(d5k¶ýYþlDB6£AÑ {3b+ºCN lfýC6gÙõèÎzöh-{²|\É>. äjÈ|ö6d¶5Î~OätÈm±KGìЊÛô±\WEÄèmúcıK'GÐ"&Ùÿô¹Pôï2ŠôzÄÒë)ËqÚ E<²©rÚVE²5Çl]Ä!]q@WEìÓ©sµìÓ4}Äÿ?ÏÚG÷ÍGõ:fɹgʳ*⌥žhi".1·++âÍ+Ì%ämžh`³qʶEûï×ÔË]º%bnØŠ"bt^ÄrÍ¥!1&bŠØ¡©"viÊôÿ!§,|ÿëWÑóäIGö¶§p6!ÇèCnéäÛ:6âž«C"îé :úÑ÷x¢œéÚ{ã=zEžõgÝð%Ýô «1W»YÈV#"UÃUÃU ¿ÄUÂýT ?/eéÕËDÜÓRðšhÄzÿÛ#âw9ë 9eé"N[øüÿÛó¹ÑTöÌ«=.®qÄrmc!I¬QDkñRëE<Ó:pcáÖž{»;»Ëo3ç[Ì9äó ¹Î|¯kqû/ù+sœª¹ ]æ®!§íµóR¢z)Ñž4W,sÄ¥!WlQÄ%<^ÈEf|ÏwÎÚêS¶6â²N Éz=ùUÃPüàìß ýœîœÙãÏØßìm÷ÚUÂ#íñ¿ø^j{UÖ- ëçÑ¿úÿ1šê<Ddïèèð<² ð CðA¿ÿð2ðZ<F÷~n=%k÷41ÿ6<.=`!ð.<F÷~n=%k÷416VÿÿÿÿY =8¬ü;þx]Œže¶œbh¥€D@JDZ$¥$€Sî€EP)éîÎM7HKKÀÎŒïûÇ÷Éq²gÏÌ=÷Ü÷Z׺ֳ·šÄñ7²Ä±ÿp+áWìË ~ŸJ`/ùïU^eHIé®->íÞ©ëûé+«[§rYIõß#Y€t§?íÞŠiûé{µéÞ:}çnͺ¶éÜ=G¥6;uïÚ©cféß{/OxSî¢áØÑ}}5úK5ú¯qùúÔ$úïçåT8|ý×ô?þû]ý¿F1Þ'äkfõß³úµÿŒûÏȱþí¿#Ëÿ5²ËÿfÜTÃÉ2YÊßÕ} | }äô5 Rú:IàDáÛ*¿Ûv¹l;ågÛ+l¿l³Ã²ÚÉB;%Óí|gd]ö«ô²ÒÁþfö·Ô±ÇRÕ^ÈfZÄâê»P߶dÖÒhrËš¯XV ,>Õüz_èïZZ/kE=£ÕõšöÖù:H§ëH¬ãô[«Ù:Dj?]¯œtvÑÚNOjýEèM§÷ŽŠ>ÓÊË>ÒDVZ_·búÖÜ_Û»ú¡e×*ܵŸeÖæ^;3ŸJ¿²:Îê4fžÀ^ÑU_·2ãèif îè3&¶ÿ+Iý©dþXÂh^õûŒŸ/=ü/) xúß\ó·<³ä.+rÍÊi8ÈX[scÏã>Sžß8î;9|nµ#+Õ¹Õekiæ\вiNË©xVP_µ"êVRi9œÃÊýÊÊÓ:¬^#Ý£Í4õYÍ:-dœŠ³nY¿1:Z²_°®=tŠvàh]ÎõC=®%¡ #åÑ?4þ£õ ŠÑž¬Pbfö:³Ìij3ûü<M »/±ß5Ù÷FvUZÙ/ÒÅÎI?bc(1ò)vPæ;Ë¡ÍÄÓÛ"Çmübë䊿mŒ°xLîKäM_$Ù¡ /ÒPÙçIÉëéÆí(cdæŸiún°P³«õ F3û5mpBS5IpC÷4VðäeO=ýí)íOÏ`7=»]öŒvÎÚq/cŒmöƶÖ[Úbïhsœ¿MðÁ6ÚGÙÿÖúùÖÃgX;gÍ|Õó5VÝ7Y9ßn%|¯å÷ÃÝOXF?m©ü¢%ôkø {j·í/»g¿ÙC»`Oìšýk{L|GWX\FïS9{¬%ö¡ÔûX ïÄ-,µ7°4^ÍÒ1»t^ÈÒ{.FÏbýoÍìÇ4£ï eÞgÁ÷ÎGjš©œ§Šò¶Âk2¯¡Iœ¬&ô¢úçÑøYc{*5U_ 3Oí<²ÛòÀ.£'ä6Y~]ºÄηyrÊŠÈ1GÌ~%;/qÛYö[WÞÆ÷¿$GÉE(Wl¶Ü°%\¿AîÙnyH<±óšÑ 1 ¿ø9M9å`~ gæ\¹7äZó<Ýy¶~ÅkVK4ocÃ/Âߌ~),+ëuÉÂúdf2²^Y·t¬_:ïÂöa-²ŠcYÛp°Þ«X÷pý÷±ÇÙöÈnÚ»owywÛbûuvãWeÔSÓXAßo%}§UdÏk²÷ì^'b¢7±1ÐÇÙpbå[bf¢÷µÞÐvx Ûç¥ì³ûÅóØoþ¶ýái퟿F,&0ÄÞbÑ;Äê5bö4±{X3»ôí`#1œØMÏÔQ¬1ßÙÃø_Ë:mGc¶Jjß"©PëõN Qòø«ÐU¬ÿ2ö!d<¿mÜ¿Øß[pÃæ°çsЧYìå,ö}û>ýý}þý*[`MY0×ßÃx Ñ;ŸâÚÁð%c þý9tåÞ¡#1ÕÚùmQÖ€9ñÖuhJµiR|Bü|j4&G Ë(MãÇ{ /8WŽ)Ô<"®¶DC[¢áQ«Öèh[tœ-ZÚkßÙÒiW4µ+Uš;ºÚ3"º rèËùÐâBÔB:ÌÞ×V\ÇXß[š€?XjU¡ºþs¬Z^GY=h ˬ®h¢kìS]gÍtl±VÔVºÓÚénØoš5ôuÑcpºQwBzèyë¥àõÖë}ôõ£õÓ¿ìœÿØ@}Omù<HÅh\ïCɳ¡äÿpòj8ñ2Rß®e¡<Ç*AÎ µ}Öš ¡MàSr±Žò>Ð[ÛDôÒÐÉ»i7ïŽGD;íÑF{{+h¡}Œ4Ñ~Þè^jê@¯Eyý>äãX^ÈÁ¹Ù 3×dd¬ô±Ó@jî iO Ç+_Ûy\Íü 4£& MšÏMü©íHM¿)UüªTòËRJùùÀOKq?%E¡|Ã÷Rß÷cÛå?9¶ÛK~ídï%äÞ+Œ o Ï6PÍÖgëpgkpPÿ©p÷á/ªÜ]žCÜëäáždȹEäÜŽty7OöÂnòg¬!æÀ,^ÿßsl4âÜ0kG,!ïwËÈ»Ò>çÞE¬ÐêÛ|ë±<Ü {ÉÃÒ2âùxþâõ}øcá)çþF>| ɧÄJ)È©TúYD:ò*ö'ßúkȵø°/É·Á9tù6Ú _ïë·äÚxL®M(«³È·90[@Î-"ßÀ*òm l ß6Áòm+ì&ÏöÃaòìXD=E®³äÚyžhÈNäVòªÞ çnÃòî.üEÞý ÿwOá_rï¹ð $$7A r%3d%w @!^2«8·fDÑëMõ"Çzc=ȱnÄnHò1ÝZëBb?€¹P* ¯KAå<²Y 39Ò3V:HC€Täp HFN' ÄÜ3!÷qKHlæ(ðBêá{ëOu &ùTO[ªáq«àw«øRü*¥üWžJn]&·.ã Ï[çÈ3|ËC®å¬äZf?L$ÇöGyæ[üšŸ Ò€Á}}%ø~ÓøÁïp_ãá ÆĶ o$€TÓöÂSA:û×ÓSa3ÛcÏjÿx6_.ªn^ûËóáþ R Ûï^Ì®úžÀšÐÕí׎^Çx=;Øïl·jÛœmÅOlòV¶ÁÛØog+Œ-Á§-ÀcÌñn6Ã{ØTïe?Àxïmcñ£œ îñÜÁÖÇZ/è欱ŠÐoRªøp<Êp<ÊPŒÉP3ýcCp$ìܲv .ÚvÚúÙ 8l}l¯õ¶°ÅzÙ:ëa+¬-±.6fX'jì{kgcŽ6Ú§\ÝÄ>³FÖÕX{«c¶5µÖت[]«l5¬¢U±rVÞ>Ž2VÒ[ +dE,¶<ß²Y^ËÌ«ôÃÒð. e±€Ñ^±tïIJTöRÙ#úŒ{ôwèõn©ÙiýKOèz~o¿^ÕtoÛéùè.]DÇ2K×ê]©Séô&Ó|O×7îe,à7t0£èGè×:¿ëWú¥àO_íOÇØæsí€Ñ÷ôÔVÚš+MgzÃZ[ÛÓµ¥OjK¿Ôn³¥ÂÚŽ¹Ÿ«M5'dÒOôMH©5 ÜOô\¢w>'€¹¢zXZê^Ø-uŽÕØ(íutÔÕÒYKW],ÝuŸôÔ¹òÎÏuºôÕ)Ò_'Ê _ê8¡#d¬ñÚ_Ÿ×Ÿ2Y?YÚUæigY€e¶ÚVÖhkY§-e¯§òý8þ=ç}«Ýåýñ1î(î3ûMàŸžÿæ1ùÌfnsa!s]ÊW2ÿÕ°çÙ̳mƺöJC=G€>ÏY_OK]¹®^YYº2h}}ÞÑÞc B1Ö$|È:VdM«BMÖžëÝuÿ=hÁ^ŽcO:±7ÝØ£ÞìW_ö-ÜůØÇŒúœýwy7 =Éwæ åÄÄjâdΡË]AϺøY§t^Öô®±SúXÏÒ»^T±ëÄßmâðŠ²çÆšMôÆ'f»©åtDvf+hYñ\Vï$ÞK÷嬹PšDnÔ Gê/ùÒŒiDþ|J5#ZWmÈÖväYMþ}K~ONN%7g£ÈÕeäí*ÎÜ[ÉçdäA®:BŸó} ®ÛpzèÀHºÈÑô*£éLÆ cèÇ¢cÑ1Ör¬tòt##éV£9Cm(DKÆÀ·èÎ÷èÏdŽhº4æ¡SKЬ° [mBÓ¶¢m;ѹœ°Ý;þCO£çÐÆèäe¯M]ýM-¶FcK¢µÅÐÜÂhoA48ZMÎ>gC§³ ÙÑnt"H ©,~Ì^ Ã+0%þ¥<êÀÉšç¿)?Ë 9.ä«rZnòþ/9*ÿÈ!y!û$îWçääcZòñ-b<'±/FN~HüW&/ëÉÐüós _ÆÁ$&×à6¯C)I =nF+ÙlŸä³ RÜKY[*Õl¹Ô·ô#«éoÖKÛ(ý,FÚc{ðmûèÉ";*«èe¶ØiüÝyùûg».íÜŽ»xÄøÆ'øÈ°WEÞ8Þ=¹f÷7ô=Ï ým-é9õ#ϯ՜~¢$¢,5¿!Ÿ¹)º~åu£ÚøW:Í¿ÖÙ>Aú]ê³uµ/ÖŸZc|îðºÇ÷ë!úë£~VOú5=ã·ôßÓKþL¯¹ÛuºÕ[twü »ëìg·ÔÓG^ÔÐw?óJöÜkÙKºÞÞÜ4èhôþtž_ÁDüËxœösìåܳ 8 GìÕ`7âõ`øÜâ]¹Š-4åº_óËsâܯ÷ÍÅÞ¶þ&óIÉÜÙmÅ\ëušWüþâ×õ_Ôý÷ÃúïÖ}ŸEwÑCÇøRÖa.ë1u óýÖiëõ%ëö9ë×ul«œ9=JCŒQiüP1z¥üZÙsk9GKx&Íïi5§§Ô·Ù«tìY wüáKú'ôèîÈìñ¯vMαçGí,=õ)ÙÇ^g?É2;Çß#Som·Í28êE<u&®Z_µZÄ\b¯1XXÌcÓ%€³iÌŠH$OÐþ{ÔpZ0&òúkøcý¡;µ¡=ñÝß5ýäAiò¡05ë]rär%9óù<G>)yõ¯l¿eüAŸý*?É9F^r3ü>³°lŸ¯såM))}$ñIÀ'ûwòÌŸ6>h8=ÐPúAô=åõcMú°&œe£õÖM[mduï¬=Oú6ô6€»µ iAÒµùTÊA kB®6ú©üµÑrh+Ùµ¬Ôv²P;Èlelí"ßi7¥=dö/ŽôÒ~ÒIJ+$êP©§Ã¥ºfÆ !ãÐ hÊ$ÉÍúœÍÚedÝÒ )ÉX³hM|±^ÿY«]ò§@«~B³N²^gP¬_£ïGÂ36ÉSY#¢ËP°E¬ôV|€ÔÉšØ÷IDz£ÙáRÓ/Ø©>ÌŠ³êuF<Q®OÚ'ÿ\¡h dÖÅ!|,ŽLÓ*2W+Éb «µŒlÖ2²KK±2¥X¡ârNÊUž¥ïA äµ|¬h>IiyåMÈmy€ ôäu_Ì1º7fØ©BìØû²ÚÊfØeÅÙÑä³Vn·<o¹gäUVCâx-Iäu%¹7ŽÞH2ù§ÝÉ{ÞΡ]D'ºntœ€÷úþ 4õAÒÚJG-=}¬ôõñò¥Oaþ£|ísä;_ |Ì¥+_DŸÂwÉ:? [üšl÷e/ÝÈa:cTÓt.çéd.ÑÙ\wÓ[t>wèÐ=¢[zF÷ôÅõ ·Æ òk & JëkAEMT×TA=M4ÑôA+ÍtÒ,A/ÍôÓlÁÍÒ<Á8ÍLÒ|ÁL-,ÔBÁJ}?ØšEZ<8 Çá .ÃM-üŽlPÙʵLÐ[© =t·Ÿ0Ø£Eïìý` fc[Ÿ`¥å 6Z`«åöZ65+Ê%žhë>žci:xf)÷×x(Hâ¯)=NðŠÇ 2»Ùüçñ'^Èxq¿ëeü¶Wð^ïx]?ïýŽ7÷ÞÙ÷zOßé_ù*éK|¬Ïóñ>Ógøãßø"áËüK_ã}}gnáíÞ«úAoèGücF©Âhåõ¿èïs÷üºg÷[þwMëzJÿËùßÇÿqõ§þ?q?q?q ?q/qqvá%bðkñKa.b% &À×:º"h %y]2pìuH¹ñžFá =ç=úÍ[ô×àýæIµàJ°K_xþKíxJíøÚñ7µãŸOÔ?©ø"èKjÏçÔîÔÏzþŽ7Ñ^Oxu=èu/ud;udÔ þ®®¡,£,¢Ì£Löú=õ,ý÷ÈèçKáé¿KgÿEÚÁý'©KT×ð=RÉ·%é·×5«é³JšÁ¹|6}ötúêIòO$ËŸWý²n4Ù7,J6"+¿ ;ûÉyŽ÷Ú{íÝönA{×¢œKÑÞ¹hî4æ~æ~ ÞöGk{Z#tž5ª:Ü@>¶zhq=ŽžÊQ-®'ÁMÔè2AÂ>m"ÛPªõ°ÕZzÍI(Ù8Žy$ª6mîÂuCé: Í-Pœ&š_T°*º\E,2Öoä=ýN²Sã² Ëéši©šg©eñ©euì_YOÜ_ßQÞ_©_gÐããüœwÛÐãMèñ2ŽxZ<-þQ ÁIt<Z<VÞÔ8Ê¡Üe ZÜ»öTr̲23®MeiÀ4ãÚð]xÚèoEåF ©B¥©@Å)Oå)ËâÉ? "§2Eßge ±BùX©|TðŒrWó ùXÅ\¬fI)-Z -Îge²±ÙØìLv(;ËÃÎåeóIìF££Ï§Ðæhó5Žù6Úüm~6»Wx^ j]M^G3øÇò¶×Üèrt¹š·2èr%ï@ÔuA{È'Þ[Zz?iï¥;ü¹>-ÿÿÏéhò_oB·¢Å»d'Ñ»×/ÈYŽø"Z| ¿áÿÈÿWî¡ÅÑâ'ýMþŠC3£¿ÙÑßwÑßèo MC+£¿µ5sÐýmö¶C{»¡œ}ÐÞAhïHt÷tw"º;Ýæ.Go×£µ1hí>8ªåÑá Á/ðVB+ϵJÒªoZµ 7äu9šjÐåJèr¥N·<N·,º\]..B?f£ÓÑéÕèô&tz'}>FE£¯ Ñ·Ðç»9x>?Gcyê §^Cß@3x +úË=Èç/QÉ'^Ê¢÷PÏ;šè ÔôªzÑ[ûYïîýsß.oAסÉK|²ÏE'¡Éßù ÿMæÐæ¹+özG®jéÇü?åõ¥£UBË ÇE¹CÿÃs£Çïø}Ï¿î= zÀ_ž»PQ,xßA¯£ÃÑáShéatu7úÖ®¥hï\K .§FSÃxâþÐÒÒ±¢éŒ.osìMH¹qžæ¥Š`Gwéoiâàª&ΡÓÇÑéhô4z£TW¡ÊŸ Çù^ç±FB¿Bû£Ï=Ñç.ès;ô¹^ôzÖkë)¯¬ÇŒöºßëNO·zvÝäo¡Íoê ]økhó«:]ê>?±èòh¢v(ºü¥ÿ9>æŸOá£ËÕ|£TðµRÊAÉ€ù.úüß1ŸY-+Yãoq<=ºÊñôh¶û8 àz}ÝÈop Ï|Ý>GñÍG`?úœýÞh=d¬BÃWÂbt|Ú=ú£ßÝÑïÐ ohxlx¡¡nl"P²Ón&Ç`ä£[ÈvXNÏtºFû£=ÑçèsKò"uQËjšf4:ÚŸ#ÚmÎo ϯ¡ÏBñ]~÷eGÔ[Üßèë/£ÐWàFè @x$<+FDWlDzJ^Èq] qt$Äèw H®?p§ñžôñÜu}€äaf ?3-böx<Y{ŽOßýþÊ5ÿ< w~/B»7¡Ý;ÑîýcuÊYôû þù&:þþùt\ÐàØzèhr:}t.4ºôäu_ÌñQ0 No]hõ~4úßá:}ýýÒªI\Ž:×ÀC,) ¹×ÃG7ÀG7 ¢HÈvçC»{)vC»«¢Û Ðíf>D:¡Ùœü[^÷©2œïód²¯yŸAûYé;d=QãGdÎcQŸhÿÉÙgü79ãä²ßÇòò»Ç!ëbÃ+ž€×ÈÆ7ÈÊdhzÈB¶æ"sóÅEÉèRdw}=šŠWãk]M4ÖAKtœ¥f :â«{¢í}ÑöÁr¢ëïcÑ÷ýhùq8§ÑôËp n ëÁ]ø}¯N×F£Cstº=tG«ûFzý>>º:ýn°Írâ¡sáß~±LšYfT-cð§¥EáÒá¡Cýª*øOÄw€' z ÇÅSÇÒ{ìà-· »ÿëÙü¹¿bF=+úMôûºÑñË¡°PØ'OÞ§øòDÔįnÜã©%îsß?PÈ_ÏjÇÏÌ1z²yoÔÉô}šA}¡Ž£&µfÐgnµ ëPÙŸ#ì?Â>$ìGŸ$ìOÂ>¥8}Lú\ÁhÂ>ôc?zQo;±?¡5žŠ>úìau»¢&*AM×W/È£±¬ªA&}Û}âÉ©óôÇÓÛîzÃÉ5ž%§üñórùiÙíÇd«MŸ[Ö ¬Ë`9®wê:5?ø\rÑšçW>?2Aú×Òºû0ŒÊ0éàäSï+õŒ»TöÎò¡·ÞZ zsy\ÉKÍã@#Iã ¡$óÚ<K?íUå9ø^öòñ/òòŠ}(ÉÓËx«}Vá€Gœ0@fáÁŠBØ/$ÏAØC÷!ï{@ØWä}nxsRB®SŽàs¯x®¢9玧?Ѐ]ú¡ìF6ã3ã7çjU§uä{<è/ß eßhC7Ÿ ÐÆ2Pâ°[â°[JWmËnwÆÚW*é)£¥žBúµäÕq ϧÓ8ì¹õ»kEu3 Ÿ]Ên¹+åërQÎÊ59Å»#ÑwãÏ9ËuÊŒLÒê"É€ó$+µ.㮯ã®Z×àÎõA=TûS&Q+jK'zÏŽ¿ô¢Þ|ÑÏeŽöÄe÷Â]wÁ]wÂU·aeÚ°BšapÕ-äwÔý%Ä>/úTCÙè3€fÒQ;D/µnÐÏÚ°KágOíرv²Þhµu u öl£îî£wú:üõé§~¡>ÿbåW&ØH!FƧïߣÔ?J:T6-dDi3A6ŒAXÿÿçBšéWœ_ð~Ò»ø>ïå»|š¯öQŸÔÇù|:íYtÜßãîÆúbÜÞräkœïðvÝÌz®¬êgP^O÷_ÂAþâE9ÿæ9üwzí;šÍ^;%þ.j;>OQ%CÁÐsßÂç]³ŸÛQžôÞñqŽñéœ_A}ãïãïáíÑs§ çNCN ¿K|ÀëPÒs<Œÿûy¿ÂcªÁM<ÝUžç©'pÿ©éÁwR9¶PEè#CE¿Juù^À]£Á>\ïÀï>PóÞzÕ»é5žìíõ·Ô3ÞXOz]=êÕôWÐ}^Rwx(ª=®õ·u9j¹gÔù(ÔÔiÇ×(Ô8º<'t9à>óéGÓ nŠU±ø¿ÊCµÝ²¬¥ú®÷ØãÐß ¿áœÇ§±÷éÍ' .qTõ¡T÷!òîãñn[W±«powØ; ñu;ñu[èÏ×KÓe0ø=éÅ;BKzñÆð1œx9(aµq#µñyao^³fØ×ÃïÕÃï =z9[£œ¬äÌšOo!3àòj,p®ésò+p{r¯9Nª1ùX -ÃúŒý?ê1z¢€Ñiäý4ºê8µ¹hÁR1x*«QÕtáéÆw ;p{{p~Çå4åÕ.Ÿ³bððKð~ä%ŒY4Uâá÷C"ý VánÃQ!Ì`ŒbäÆ©b¶Åq¯eQJ<I-¢>OÙ§mÍÓwf5zàýúi Ô¥ N·|Kï> æ.@WàõöãõàõNÓ¯_°oÿMs°Â9¢=6œyBûöôëé ìÝsYü_v*+®<+ý{¶ša/ß÷= ìïò>7Œ_L ðqà%÷œ5ä=ÏP#R0¿ZZVi9üjyvªXIŠhEJmøg¥ÕQÌÚøÛzÏíOmèIMè]©m© ͵-ž£|¬]ÙÑRýÕ}_¿dGI ££@=B=.¯°£±©J]xÆNÞEíoÉ^jÁ jÁYjÁuÙ/·ÙÅ{²Z°Nbé Is]çÈ:>Q'Kvv1äù¿O=(¥¥òÔrÄUUvõªTKªUb®»Úøë®I_íNeëÁ®uqìð$âtÕm&q»0ú@KÙÀS®gÇ·ÁQvý\Š:Þ¿'ú,«u¢u"ü|«ÔFÑg^€t>kÂn5¡º9ØFæXkYBn®!G7«;šÈÛÔãôiçÈçsö9N¡?®a ÀAÆIÃQžñW'ÞY!9}®~ŒÛyס#Ëè)×H1ú8õŸ~s;}ç^i[oqPütÏý6nè.®è®Ái ÇqÁÇ©ÿSã©èu3ë*ÏŠë</}pqÝíeè+Ñ× O®O¿ü }skúçÐA/ywôµîm|î ×?ÿéÁ§¡ÓsÑìe° ¡Oß BÛOÁIzøð³Öð3×[ÔðsØ°&ÍÑÕÙݶŒï_ÁÎ `<µh, %Ôš-;Ø áµë8uìœð«ö¯ßŽÇþØþv¡îÅö?=!u0 ßò4~Ã3û5\û%Ïëçqígœòr~Ì+ûa¯í»ýSøÄ·zkhã«Œ|îK|/ðá0êüµÿèãá;ÿÖ§ûÃE>ØWxwßî= #£4eÔfð1w©ÆÃÞ ¬ÿ?G¿uKC]È&Èÿi0»ññ?Ã)üáEzÅkôÏð÷òâ{%I IŒŒN¯2à_߬^ª+¹éâuá{?2xàÊÞ*Ö>±~ùüóéãÃÑDÍ·DÍ÷ôSégÈÌ<_B¯ž>q}âÙåûé÷Á99ç7ä*=âU*åMÿ[þ$òþ€?|JÔ=õDA"HN€e÷3±óÙè h*ú7 MPŸ¢,=a%zÂZô é?êÛAsÍ9¶ô%mé »jÞàK-ùZ8£E h°p=à>اµRð\ëZ Þ§ =bà_€ŽjA Hg5ÜP×å ªU¡gªBïX WS)èO?9V[QúÆž üDZ"-_pÌòiïi9³ôcW,Gð;ýä-Ëܵ,Á_öVðØ2/è)ÓÃÅò4AzÈþJðýc~ ýbi\XU"³ñÐÈ%N~!ÚÎ;?qð1øÁõxÁ¥>Åçá 'ãÇûJ¢m-ѶOž3÷y'®hEL5àêRÿW8/JŒ`ôøÀ<xÀwü.qÿ·gàίãSÓ&e&Ið ü¿ÂÌ®ö¹ôø9vÜMNÆàíÖÃR:ä 0'ë-éPCq^ ãéàMHL'ø ÿÐ=þ©ÉðI+h :Æø¿DÉ,tc2ã·DηøÀx¿!x¿~èL?|_ô§3Ÿ¯þVóZú3ÚuÜËêOhÙ/š»ü]È«ÛÐžÍ ¿ÒéROßK 3ñyÓü%åcºÉûð@Ÿ&ráñùUéå?ãõKßÆî:øŒêŸí]-¥})4ùùÐ×çF³CÝÎÏûŸB>òŸN>ªŸIª@-4»m3²Š)tôSdÜY:Ö³hõuŽú6ó®1dÏxt{²þHÍ!y24;œnð,ºÅsèvϧ{ý}=èè/¯'ŒöõŒ7D«Û£Ó]Y§^ÐîÏÚ EGÃ(<õw¬íTNÏfœÃÏT±þ«`¥&Ä'F£wÙ£ðsÙðóÙ8ì_øymø¹møùmø9nøynchÄûÐúqÎPã%°Ö¡Ý[,!Y Ñ£ÑOÑh£O,&F£SéÑè¬ô-¹ 'J.FWôÓ^ÝOÐ1€c:èÍQÖöÐÁ·xoßàaý/óÑ0 "ÿù{6œY>oòÏ|/Wíõ®Ô[Á'Ü¥Ÿ_!®P®{-šä·É€ÛtWŒR^îïÁÛ+HïñÔþjxø9Qj2%]ð§enZæà2:pƲGÑ'Øýì¶@°Ê ¬ºR*C +ÖA#«ÀjVª@Yô§\hRîèçáÏ+Â[?¿þ<#ü¹Fš{áÏ:ÊëµTð F¢£`zÙ íìí£dZ -¡fjkÆàcšþÓÔA ²³ & A}5xKãoj¬ %DÓ)=òGr(œî·ä_Ó~PvÙÛ}lÍŸYÖørYí³eüèÓɶIdÚ$ùNh#_ÁP%_ø0ùÌ¿®ÐÍûÓauzÞÓ§Ó¬kEÖ5"Þk ¹ŒN©.|kª Õ%5/WÄ^QâRãz:òàCyJœ|jÐaÔÐVPQSYÙáÏͶàµç@ø3µ©øïñþmtä×Ãúü¿ÿçójô»jwå1±{_ñ'Ÿâ&Ÿâ:ú3=öQ|ÅAôu7Z» | Q³ø¿áåPîèzUÿxîE€uBý[שµŒ 1×ÄKá?Þ§ä!ÖÓ@R"ô¡µòÛFìÃvkæëìS_lM|&LŽ>ÊêùVÇ?³ÚÞÞª{S«ê[E¯h匀öV³[Ï` <¹åõË_j6šýwMç5Ô€~@_ñmÛW« mºÞ· ú»Ô«6H/Xo=iôµÐÝÖH·XM]guÔyVX§Z6mu¥Ñ>L»YBmg±µÖ·§RÃîKûC>°ôGWé.HfûYÒØqIf?I|Û/f{å±n§{ÝJÿ³I.ê:9¥kä ®ºg¿ÞlÌ£«øÆë<zy2£/Ôçu šÀ±RPsóp]V:ôñ:c%Ñ @·ÐSn§Ù-èZîÈa¹A/s-êi¶ÐÁl'²^g ÄáúDñÒ1vîKgI:âú#]ËRþŽ)ôåõ`ͱñð#çÍã\»1v2ÿÃy¹\âÙnñ÷xÖ§º3zöWì0œäQzÉÕÎI»,ïÛoRu«Äú}Ì:6f=[Y\íÄúöbZfk9t²œ§³¬.²ÊºÉêèNk¢·nzÎú±CõŠ}£Ùöv®Ÿ°åìõfö|{\SûMï7{ÄÆsÍãq¬¿f ýMâçâ(?ñT"«ª^Ëjú'Ä[b¯§5"þ-ËÄg+⎠ñÚÎÃiëàWà¶uòdD~:ô;+äõv8v^÷S X¯KÌ7 ¶äA7ò¡¹1M®ÇßL%æGKȧ5žšMä×N|ü~ŒÎQ²æyxZrŒü3ò7±ý ¿°0o3ZÃŽ+©«ï¡ì£Bÿ¢ÿÇÉÁÃ|úòðRô+ù©¹qSïàŠ2E¿œr×Sú=OD] ?E{fü=ñ;ö̯Ûs¿d/yÞ~Ì4úÈí°ÙbÓ`Å :G¿ý+šr¬çå\ó€eä1ã0öËP{qCwõßÀ] ÕÛìÙ-röºï òoÖ+äí/ŸX/PÙÏÐýìpG_ãé! ûü3ÜQWÜQ[ÜQs]ïtµ×Ñå^UûG8€:Ûàòë$Ï©ümçt¿¡Ãü5ýÒ_ÕþxûÞtÝp)p+mPÄÔ&þ+Úý}Å9úRÎB»÷¡Ý;ÐîÒFyÚ ºð Ýol(âßÉcûZîÓÿa_Éoö¥üB÷|.úž}uÖ»èŽcèº×Y;YadµYö)ÝÍn cèâZhµ¥·ÕnV]ÚYUºøÊtô¥®}$Õ¬úS\úPZi4š4T<+)I¹WB®iI4§€ì×"rDË ž¡Ñ£ò/¯Í K*+B~VLòAQ®+Å cÖeüFܧ÷lÇœ»1>Ìe óÎüÆ0ÏpÎSQô¬YôL¬Mô{xÖC<óI=ü$᪠¬É¬Í?6JþµošoßQë&Q÷ŠI )i|>œßRz¿8Òµòkÿ¡¢þóŒíSö,Ü»pÃœæÉ£œ ÷8Üë)[§³÷³œ.ôÒžæºÒ«ã ëèFo¬1ÞRwà0÷xwÜv_âj0ñ58GŒM$îŠóÃåÄäzh1ºXý=Eì^Ô~XŸËšÏÐçxO@ì¿FŒA>dìäÇ{/(¥-AP êÚ«AkèlÈ£DÁl^¯Í;Ç8÷,×]âúpñ2îsÆwçx·$t<)É×7ÉÛ·Èßìäñ{äs!òº8ùþVD\g r¿.Tc:ªæèAk?I?ÔCÝHý.ìP/(LžðLÄLŠI*.i œÌÌ2[²Ê\É!ó%Œ'¥ ,²TJ@IY.åd¥TÕRYÖJMY/ud£4ÍÒDb€lVÐNv!Ýdô>rHŸdã2RNÊùYŸÓòœeFçÉEfp »_á®×¹Û îr»Üæwý.£>`Ôr@1ÒFzÆ(/åï*äUªßM§È«ú'UðoªçcyMÿ¥Ÿ7Ô5ÆÑ@3i"}Kë;úºf绹ùî»|'?ß)È»ü]RèŒ*§¥µªVÔêü©Í:ZOëk#m¬hSmζÚSûjçþÀx!ýõMH˱7 æN#žÿ×ú¶~ÇÝ&iNÎçê{º».׺VéfîŒ;ïfõ#=Šõ4ó8¯5õ ãßкz[ê=fñ9<ÓªÖVcYGM`5}Š¯[_}Óh&¬ïØWÃFh^ûZØ8-jŽMÓ øŠ*6_?¶ÅÚÐVks[¯mmv·CÚ×~Ò/íõúþ`ðMt=ÇC©°X¶ÎâÙ{Õ¶Øk¶ÝÞŽÃö³wìåŽÓö®·vÉØ5+i×í#»cUíÕŽVÏþ±öÔ>±¥ uÙŒ³Åöî_ø÷·Ä>Øù0Ká#,eišÙi|¥ãX:ÿÜ2RÇ3r~fï ë³xGËÊX!ÙŒ%4·øËÔþ\ÞZ¯µñ5¡ºåóªPïP>ÄsxßA+(êïYqrÛxüm+ ?- ×(Cý+ã¯[YO¬<úPÞãYwP«nTâk5Ž£Ç>æzïßßñ~#;>#·uã^=Œ°õÆ·ôóÒö dÛæ:yfþcyoy¶ïyÆx橬ÃÖck3uZÄz-ñol O°U>ÅÖùtÛàsm3'ÆWÚ_o{<Æöù;äûì'ÿÉúI;éçìgŒÀ9<Á|Ï/øËø_ýýæ/íwEÇ8¥ÿ.=Æc<ÅküëïºÝb¥=vðǪú+AO4ò€ASOŽöAgOôô4A_OöôÁÏ|ãoýí`¿ÌõìÁbϬöwþ^°ÃóûŒ`pÔ?{à®yÉà¶îùÁ/hðQ'š$ *ɪAÚ fÒÕ×yï'áø«/(àbžŠtðq1ÞC/<`ü»p{ÝàŸ×žÿeÏÍýrgÓIæv9b®ûóÏÀÜÒ1<ÇFg-ϵþz)ϹçïÙ<ûtÖ` k1Ñãß±.ß°>_³V#à+ÖíKÖ¯?ëØ×ÿñ¬iWÿíþ?ù^ïwŒåMüÞožÊðg°éÂ~ÁU^ÀUÃUÁUÄU§ï?êÅÐûÂøÃü~:±žœÙFíñŸýÚàoø:ön¿æ«üU\i<pºŸ6_8ÃÙôoSýM&Æû bí:1wÅÆøEâïqxÆ/Cü8±ù3±| Ç¿àŒ/ü±{nXÆèCõfŒÞÄR/ÆéÁœzøsâ]qÍî]. ¢sëgmÇ<ÛyrŒvJx¿ý€ÅogLôoÁÛxïw"xNÈÍjœïyÖ"€ëRî¶kô1kRu©áETc=CªxešJw[jã®ëDe²¬}âüž¶(ãœÏØžW>î9äb^9XëlÌ7óÏȳ€gÓñ©yæTäS Ö"©ßEãn¡u×-.y54Öó?ÿÈ!Žq¹Ãþ¶4sœÝµvÛÚ-[ÎFS§¡ì¢M°³ö z;ÂNØvÐúÛ~ûÌv[wÛim«µG[¢ÓMÑëƶ í]fµmU·VÑæX9e%l²¶ï-¿G·ÇZvûÚ2ÙWhú`{ÝÕÄ0bëlΚϩ·š×Ž×JvFËS/Ú-d1Çj[ši©/¯Ñ·œf+©Gà'MdáŸjwà.µê<×xj;€ 7©.oÃ;Ü0¡âí¥Vê\ÑsuKhmOÑmjùþ]ÍìªÚu-ÇJ2ÃÂvZsÚA}ËöRwPcÕzT_ê|}¢³õNÔëÔåKÔçs:LOR¯÷égTâî£Úš+©¶sñÓñšÈßá Ÿ¡R b7ÇOÔ×W9zÔí§_wõ²d×sò¶Lúý®èÿÿŠ8ºï23?3o3ó-g4Þg(>h š\x¥.xŠvø§rÏuHêá¯jÊ.üØ6ŒÙf)[*k*OËÊËK³JÍBÏ»Äü`èÿ÷¯u ÿ×ÿþµ®@jE ÍçÄÖsâì¥MiŠÔ¥göÙ+bŸÅÔW#Z"HâË-9€€îŒoøj˱»úºZ²²¹Üª0F_HÍ\hµ·õëcîS7bŠÕgõ©m }ÐúûŽLÄ\ݱOçEÐ9tVÄ|tn!¬DëVÃzô.d3Ûš«;`56d:žö£ !ÑÂ#há é§ÐÃÓ6,⬠F¿þhaßkö9ôD»GܲÎÐüo -ÑÆO 1Ðꣿ£5 ZQ * e úò¢×ñ ¯±;øû^Ä<ÖtâñxhWàë"çSp59qÇpöa8²ìœvíž»v\A?®Ø&FÙÄ(ë#ÎÛjgeÄ)[qÂ3ÚbFÏhómnÄ^Ôjì²èÙLÛFmµDÔjXNt ,Ž\5ÑèwûtpÄ\Mâ!ûT#ès`alþï_ëÅëzùø=þ=þO<g¯¿e¯¿eÇúFØÌÆ°[a'û²}ÙKM;GØÇc6ú³ßýÙ럧ÙÓÓöûÝ3â<ûz}œd¡-ûݲߡ!û]êRkA jbšÄþž·ŒÏ|ÀÞ>À>$²Çȹ<ç=þŸÇ»ÑÛìÛ-žÁ«kp w#nPn°×ØÛkìÄ%vâ;p==Ïf?CNQUBN°ÇlcÄö5ä0{ºv³+!;©:!ÛÙÛÃNmìíZXÎÞ,doçñK§EìÐ)ÛtRD~±\ãxH>³mú(b>Ø£"ŠÁÓ`:=æá!YÅèÐJ4(d5k¶ýYþlDB6£AÑ {3b+ºCN lfýC6gÙõèÎzöh-{²|\É>. äjÈ|ö6d¶5Î~OätÈm±KGìЊÛô±\WEÄèmúcıK'GÐ"&Ùÿô¹Pôï2ŠôzÄÒë)ËqÚ E<²©rÚVE²5Çl]Ä!]q@WEìÓ©sµìÓ4}Äÿ?ÏÚG÷ÍGõ:fɹgʳ*⌥žhi".1·++âÍ+Ì%ämžh`³qʶEûï×ÔË]º%bnØŠ"bt^ÄrÍ¥!1&bŠØ¡©"viÊôÿ!§,|ÿëWÑóäIGö¶§p6!ÇèCnéäÛ:6âž«C"îé :úÑ÷x¢œéÚ{ã=zEžõgÝð%Ýô «1W»YÈV#"UÃUÃU ¿ÄUÂýT ?/eéÕËDÜÓRðšhÄzÿÛ#âw9ë 9eé"N[øüÿÛó¹ÑTöÌ«=.®qÄrmc!I¬QDkñRëE<Ó:pcáÖž{»;»Ëo3ç[Ì9äó ¹Î|¯kqû/ù+sœª¹ ]æ®!§íµóR¢z)Ñž4W,sÄ¥!WlQÄ%<^ÈEf|ÏwÎÚêS¶6â²N Éz=ùUÃPüàìß ýœîœÙãÏØßìm÷ÚUÂ#íñ¿ø^j{UÖ- ëçÑ¿úÿ1šDÐÉêyùºÎªK©_Toc410402794eaDÐÉêyùºÎªK©_Toc410402795eaDÐÉêyùºÎªK©_Toc410402796eaDÐÉêyùºÎªK©_Toc410402797eaDÐÉêyùºÎªK©_Toc410402798eaDÐÉêyùºÎªK©_Toc410402799eaDÐÉêyùºÎªK©_Toc410402800eaDÐÉêyùºÎªK©_Toc410402801eaDÐÉêyùºÎªK©_Toc410402802eaDÐÉêyùºÎªK©_Toc410402803eaDÐÉêyùºÎªK©_Toc410402804eaDÐÉêyùºÎªK©_Toc410402805eaDÐÉêyùºÎªK©_Toc410402806eaDÐÉêyùºÎªK©_Toc410402807eaDÐÉêyùºÎªK©_Toc410402808eaDÐÉêyùºÎªK©_Toc410402809eaDÐÉêyùºÎªK©_Toc410402810eaDÐÉêyùºÎªK©_Toc410402811eaDÐÉêyùºÎªK©_Toc410402812eaDÐÉêyùºÎªK©_Toc410402813eaDÐÉêyùºÎªK©_Toc410402814eaDÐÉêyùºÎªK©_Toc410402815eaDÐÉêyùºÎªK©_Toc410402816eaDÐÉêyùºÎªK©_Toc410402817eaDÐÉêyùºÎªK©_Toc410402818eaDÐÉêyùºÎªK©_Toc410402819eaDÐÉêyùºÎªK©_Toc410402820eaDÐÉêyùºÎªK©_Toc410402821eaDÐÉêyùºÎªK©_Toc410402822eaDÐÉêyùºÎªK©_Toc410402823eaDÐÉêyùºÎªK©_Toc410402824eaDÐÉêyùºÎªK©_Toc410402825eaDÐÉêyùºÎªK©_Toc410402826eaDÐÉêyùºÎªK©_Toc410402827eaDÐÉêyùºÎªK©_Toc410402828eaDÐÉêyùºÎªK©_Toc410402829eaDÐÉêyùºÎªK©_Toc410402830ea2Dd¡$bèèð<² ð CðA¿ÿð2ð¢ëj}ò%æ&Æ!×Þã9Šÿ~`!ðvëj}ò%æ&Æ!×Þã9ŠC~`ÛZšÊDþxXklTE>3wÝ×Ýmʶ]máFimk_4"AÀºBxXë³)f)k©Ð.Ž5h? &&HbCL4š£Â Aý)Mÿ F0úC£ JgæÎœwîÝ÷âÞÜÝsgÎùŸ33ç¹|¢D`°ÏŒë=a·ñãâÿNnVaíÐÀhj,õžÆþ»Q lû€{ÎpýËe¶ àÅö%â.%üC !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`abcdefghijklmnopqrstuvwxyz{|}~ ¡¢£€¥Š§š©ª«¬®¯°±²³Žµ¶·ž¹º»ŒœŸ¿ÀÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿ þÿÿÿ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ1ýÿÿÿýÿÿÿýÿÿÿ_lŸ€cdefghijkþÿÿÿnopqrstuvwxyþÿÿÿýÿÿÿ|}~Root Entryÿÿÿÿÿÿÿÿ{ ÀFncHä)œ@7Mç)œa@ÆData ÿÿÿÿÿÿÿÿÿÿÿÿÏÛWordDocumentzÿÿÿÿÿÿÿÿ &ObjectPool}ÿÿÿÿ#àÄJç)œ@7Mç)œ_947279105ÿÿÿÿÿÿÿÿ ÀFàÄJç)œµ¥Jç)œOle ÿÿÿÿÿÿÿÿÿÿÿÿPIC ÿÿÿÿLMETAÿÿÿÿÿÿÿÿÿÿÿÿbFþÿÿÿþÿÿÿþÿÿÿþÿÿÿþÿÿÿþÿÿÿ !"#$%&'()*+,-./0123456þÿÿÿ8þÿÿÿþÿÿÿ;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`abcdefghþÿÿÿjklmnoþÿÿÿqrsþÿÿÿþÿÿÿvþÿÿÿxyz{|}~L@Ì£$dèèþÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qLCV&Ôèè@Ì 1&ÿÿÿÿWordMicrosoft WordDûŒSystem -Ã)¿ûµÿŒ"ArialO 3!íw*íwÀgïwO 3 - 12 8¿D clearToken [ ({generalID***..**.K.*.**6 2 IhDb.2 8D XOR random2:6*...C 2 Iv DbX.12 8€ D XOR }E ) ]2:6K2KûÿTimes New Roman*íwÀgïwµ * -'ÿÿ-^ GûœÿŒ"Arial; -!íw*íwÀgïw; - -2 GD EPA,,0'ÿÿY7{-2
{D EPB,,0'ÿÿ]M-2 MD Request0%))%%'ÿÿ TûÎÿ"Arial E!íw*íwÀgïw E -2 ^ DDH-secret $$'ÿÿú-ßß5ú-ðü-ú-$'ð-ß'ÍOß-üÿÿÿ-ðú-¥0¥J-ðü--$?9¥?·¥--ðú-ªª5-ðü--$'Á-°'O°--ðú-m7mQ-ðü--$F[@mF~m--ðwÕîûµÿ"Ariali V!íw*íwÀgïwi V - 2 ýD -.2 ý(DclearToken [ (generalIDÿ***..**.K.*.**6 2 Da*2 ýÉD, random*...C 2 Db.2 ý5 D) ]aK'ÿÿ=Cäç -2 ñç DResponse0%%)))%%'ÿÿÖõ 9%-#2 H%D clearToken[ (Dh***..**.K6.2 Y©Da, p*ûµÿŒ"Arial" !íw*íwÀgïw" - 2 HýDtimeC* 2 YDa* 2 HÂD)- 2 YÛD K2 H&D],- 2 HTD ,- 12 HiDcryptoToken[ ({generalID**....**.K.*.**6 2 Y3 Da,*2 H] D, timeC* 2 Y"Da,*2 HLD, Dh6. 2 YÚDa,*2 HD} Sign2.. 2 YÙDa,*2 H D) ]iKûµÿ"Arial( !íw*íwÀgïw( - 'ÿÿ·â&Î-%2 5ÎD clearToken[ (DH***..**.K66 2 FoDb .2 5D, random*...C2 FÛDb, a.- 2 53DtimeC* 2 FÎDai*-2 5øD) ],K-
2 5D - /2 5ŽDcryptoToken[ ({generalID**....**.K.*.**6 2 FiDa *2 5D, timeC* 2 FXDb .2 5D, Dh6. 2 F Db .2 5B D} Sign2.. 2 FDb .2 5ED) ]K--'ÿÿú-âgâ -ðü-ú-ø0-ð-ì$-2 DPhase 2³.*% %*'ÿÿ-ú-0-ð-$ª-2 »DPhase 1³.*% %*'ÿÿ-1Table ÿÿÿÿmšCompObjÿÿÿÿÿÿÿÿÿÿÿÿhObjInfo ÿÿÿÿOlePres000ÿÿÿÿÿÿÿÿÿÿÿÿ{0 [$@ñÿ$NormalmH <A@òÿ¡<Default Paragraph Font )/9?f©Riÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ )/9?f©RU ÿÿiÿÿÿÿ ÿÿiiihð8ð@ñÿÿÿ÷ð: ððØ ð( ð£ÿÿÿÿ ððx ð £ð< ¿Ëÿ?¿ ð ð ð ðr ð ð6¿Ëÿ?ðð ððr ð ð6¿Ëÿ?ðð ððr ð ð6¿Ëÿ?ðð ððr ð ð6¿Ëÿ?ðð ðð<B ð #ðË? ?ð ððŒ ð ðB NC NEÁFÁ¿ÀÿÿÿËÐÑ×ÿ?ðÿ5MÖ&VM&5M@¬¬`ððð<B ð #ðË? ?ðððŒ ð ðB NC NEÁFÁ¿ÀÿÿÿËÐÑ×ÿ?ðÿTM+B&TM5M&TM@¬¬`ððð<B ð #ðË? ?ðððŒ ð ðB NC NEÁFÁ¿ÀÿÿÿËÐÑ×ÿ?ðÿ5MÖ&VM&5M@¬¬`ððð<B ð #ðË? ?ðððŒ ð ðB NC NEÁFÁ¿ÀÿÿÿËÐÑ×ÿ?ðÿTM+B'TM2M'TM@¬¬`ðððr ð ð6¿Ëÿ?ðð ððr ð ð6¿Ëÿ?ðð ððr ð ð6¿Ëÿ?ðð ððr ð ð6 ¿Ëÿ?ð ð ð ðTB ð cð$Ë8cÒÓÔÕ?ðððf ð sð*1111¿?ðð ððf ð sð*1111¿?ðð ððB ðSð¿Ëÿ ?ð iH.(0¯(j°$!%j°(¡)j'É7'jÉ['ç.(j¹"c#j5s)I8F*ji6",8V#j×) 0Ò*j§±'7(j@ýD%`7&jÏ #&5$j¹æ(Â5ç(j¹$Â5$j5n$6Ã$j êu&õ5v&j ¬K& &j5Ë(6 )j úº*6»*jŒ*ä*jjjÿ@ips2c\NRCCSL01HE\ips2cPSCRIPTHP LaserJet 4/4M Plus PSips2cžw 3dXXÀÈéM¶Ù!€Àë³pRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BBips2cžw 3dXXÀÈéM¶Ù!€Àë³pRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BB(;ÌiP@GTimes New Roman5Symbol3&Arial"ÁÐhžãf!¥ÀŽŽr0¹ÿÿ James TogaPekka Pessi þÿÿÿ£þÿÿÿþÿÿÿ ¡¢þÿÿÿ«¥Š§š©ª¬»®¯°±Œ³Žµ¶·ž¹ºþÿÿÿœ¿Ê×ÀÁÂÃÄÅÆÇÈÉÔÕÌÍÎÏÐÑÒÓþÿÿÿÖÞØàÙÚÛÜÝßñàáâãäåòçèéêëìíîïðþÿÿÿóþÿõö÷øùúûüýþÿÿÿSIÿÿÿÿÿÿÿÿ@É 1&ÿÿÿÿWordMicrosoft Word~C û-ü- úÿÿÿ"-Ã)¿üÿÿÿ- ú"-Ä)¿ûµÿŒ@ Arialµ- +¿.12 +¿C~ clearToken [ ({generalID***..**.K.*.**6.âûÎÿŒ@ Arialµ-Jh. 2 JhC~b.T{°¢-+.2 +C~ XOR random2:6*...C.T{°¢-Jg . 2 Jg C~b.T{°¢-+ .12 + C~ XOR }E ) ]2:6K2K.T{°¢ûÿ@Times New RomanH-'ÿÿ- --_ G--^GûœÿŒ@ Arialic-G.2 GC~ EPA---.T{°¢'ÿÿ--Y8{--Y8{- {.2 {C~ EPB--0.T{°¢'ÿÿ--^M--]M- M.2 MC~ Request0%))%%.T{°¢'ÿÿ-- T-- TûÎÿ@ ArialNe- V.2 V C~DH-secret$$.T{°¢'ÿÿ&ÿÿÿÿÛ9ã ú"- -%Þ5ß-ð -&ÿÿÿÿ&ÿÿÿÿ&ÍPñ-ü- $&ð-Þ&ÍOÞ&ð--&ÿÿÿÿ&ÿÿÿÿ-¢Nª ú"--%0¥JŠ-ð-&ÿÿÿÿ&ÿÿÿÿ@ž-- $?9¥?·¥?--&ÿÿÿÿ&ÿÿÿÿ§9® ú"--%ª5ª-ð-&ÿÿÿÿ&ÿÿÿÿ&PÂ-- $&Á-°&O°&Á--&ÿÿÿÿ&ÿÿÿÿ4jUq ú"--%7mQm-ð-&ÿÿÿÿ&ÿÿÿÿ[G-- $F[@mF~mF[--&ÿÿÿÿ--xÕî--wÖîûµÿ@ ArialT- ó. 2 óC~ .T{°¢-ð(..2 ð(C~clearToken [ (generalID***..**.K.*.**6.T{°¢-. 2 C~a.T{°¢-ð».2 ð»C~, random*...C.T{°¢-ù . 2 ù C~b.T{°¢-ð .2 ð C~) ]K.T{°¢'ÿÿ--=Däç --=Däç - æç .2 æç C~Response0%%)))%%.T{°¢'ÿÿ--×õ 9%--Öö 9%- ;%.#2 ;%C~ clearToken[ (Dh***..**.K6..T{°¢-Z©.2 Z©C~a, .T{°¢ûµÿŒ@ ArialNe-=á.2 =áC~timeC*.T{°¢ûÎÿŒ@ ArialNe- [|. 2 [|C~a.T{°¢-=. 2 =C~).T{°¢-Z°. 2 Z°C~ 2.T{°¢-;â.2 ;âC~],.T{°¢->. 2
C~ .T{°¢-=%.12
=%C~cryptoToken[ ({generalID**....**.K.*.**6.T{°¢- [ï . 2 [ï C~a.T{°¢-= .2 = C~, timeC*.T{°¢- [Ð . 2 [Ð C~a.T{°¢-=ì .2 =ì C~, Dh6..T{°¢- [z. 2 [zC~a.T{°¢-=.2 =C~} Sign2...T{°¢- [k. 2 [kC~a.T{°¢-=.2 =C~) ]K.T{°¢ûµÿ@ ArialNe-'ÿÿ--žã&Î--·ã&Î- (Î.%2 (ÎC~ clearToken[ (DH***..**.K66.T{°¢-Go. 2 GoC~b.T{°¢-(.2 (C~, random*...C.T{°¢-GÌ.2 GÌC~b, .T{°¢-*.2 *C~timeC*.T{°¢- H¢. 2 H¢C~a.T{°¢-(Ÿ.2 (ŸC~) ],K.T{°¢-+e. 2 +eC~ .T{°¢-*z./2 *zC~cryptoToken[ ({generalID**....**.K.*.**6.T{°¢- H/. 2 H/C~a.T{°¢-*K.2 *KC~, timeC*.T{°¢- H. 2 HC~b.T{°¢-*/.2 */C~, Dh6..T{°¢- Hœ. 2 HœC~b.T{°¢-*Ü.2 *ÜC~} Sign2...T{°¢- H± . 2 H± C~b.T{°¢-*Ð .2 *Ð C~) ]K.T{°¢-'ÿÿ&ÿÿÿÿ^Ùì-- $gÚgë ë Ú--&ÿÿÿÿ- ú"-ù0--ðí&- .2 C~Phase 2/)% %*.T{°¢'ÿÿ- ú"-0--ð &«- ¯.2 ¯C~Phase 1/)% %*.T{°¢'ÿÿ-WordDocument ÿÿÿÿSummaryInformation(ÿÿÿÿÿÿÿÿDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿ_947279106 ÀF`~¶Jç)œ@GÇJç)œì¥ÁG ¿ibjbjÙÙ ì³ì³Sÿÿÿÿÿÿ]JJJzzzzzzª¶}}}:ÙL%Lq$`ôTTJ}! \}}} }<J^l}Î|J ?3õŒzz DH-secret
Phase 1
Phase 2
Request
EPA
Response
EPB
clearToken [ (generalIDa, randomb) ]
clearToken [ ({generalIDb XOR randomb XOR }E ) ]
clearToken[ (DHb, randomb, timea) ], cryptoToken[ ({generalIDa, timeb, Dhb} Signb) ]
clearToken[ (Dha, timea) ], cryptoToken[ ({generalIDa, timea, Dha} Signa) ]
"4TUlmuvz{ ¡ŒœŸÏÐØÛßàåæþÿ (+/01245NOUVZ[abefgiøîâØÌ¿Ì¿ÌØÌ¿Ì¿ÌØÌ¿Ì¿²£Ì²£²£²£²£²ØÌ¿²£²¿Ìز£²£²£²£²Ø6B*CJOJQJmH56B*CJH*OJQJmH56B*CJOJQJmH5B*CJH*OJQJmH5B*CJOJQJmHB*CJOJQJmH5B*CJOJQJmHB*CJOJQJmH jUmH9!"*+34=>CDMNSTz{ŒœŸfghiûùùùùùùùùùùùùùùùùùùùùùùùùùû0ýhþþ°ÀN °ÀN!°©"°w#"$Ü#%°þÿà òùOh«+'³Ù0 ¬žÌØäø 4@L Xdlt|ässJames TogaameameNormal.dotPekka Pessi3kkMicrosoft Word 8.0@@@piÃŒ@ëü2õŒþÿÕÍÕ.+,ù®DÕÍÕ.+,ù®T px€¬ŽŒÄÌ ÔáäPictureTel6³ Title 6> _PID_GUIDäAN{753DDA04-612F-11D1-9D2F-0000C04BE66A}Ole ÿÿÿÿÿÿÿÿÿÿÿÿPIC ÿÿÿÿLMETAÿÿÿÿÿÿÿÿÿÿÿÿ ~CompObjÿÿÿÿ7hC » A&ÿÿÿÿWordMicrosoft Word®ùûŒSystem -ûÿTimes New Roman*íwÀgïwò € - \ÌûœÿŒ"Arial (!íw*íwÀgïw ( -2 Ìù®EPA,,0'ÿÿc· û-2 ûù®EPB,,0'ÿÿeLûµÿ"Arial
!íw*íwÀgïw
-"2 Lù®( .., generalIDK*****6 2 &Kù®a *'ÿÿkXo-2 où®, .)K'ÿÿx[8(ûÎÿ"Arialá !íw*íwÀgïwá -2 B(ù®'ÿÿkí 6-(2 6ù®[Not Authenticated]6*2****&***'ÿÿU6 ûµÿŒ"ArialÜ !íw*íwÀgïwÜ -A2 ¯$ù® CryptoToken [ (timeStamp, generalID6*....**.KC*2*C..*.**6 2 À ù®BC62 ¯H ù®)E22 À ù®k-pw*.:2 ¯>ù® ]K-'ÿÿú-xDx^ú-ðü-ú-$IOyIgry-üÿÿÿ- ðú->R>l-ðü--$a-[?aP8?-- ðú-H>HW-ðü--$IZOHI7rH-- ðú-Ys-ðü--$hóbh?-- ðEÙ Õ-A2 Õ$ù® CryptoToken [ (timeStamp, generalID6*....**.KC*2*C..*.**6 2 °N ù®a*2 x ù®)E22 °Ã ù®k-pw*.:2 nù® ]K--'ÿÿ8ÁÙ- 2 èù®( , generalIDK*****6 2 ùù®b]*/2 è0ù®, ) [Not Authenticated]K6*2****&***'ÿÿ-þÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿCx » A&ÿÿÿÿWordMicrosoft Word®ùûŒSystem -ûÿTimes New Roman*íwÀgïwò € - \ÌûœÿŒ"Arial (!íw*íwÀgïw ( ObjInfoÿÿÿÿÿÿÿÿÿÿÿÿ9OlePres000ÿÿÿÿ: WordDocumentÿÿÿÿÿÿÿÿÿÿÿÿ²³SummaryInformation(ÿÿÿÿiž-2 Ìù®EPA,,0'ÿÿc· û-2 ûù®EPB,,0'ÿÿeLûµÿ"Arial
!íw*íwÀgïw
-"2 Lù®( .., generalIDK*****6 2 &Kù®a *'ÿÿkXo-2 où®, .)K'ÿÿx[8(ûÎÿ"Arialá !íw*íwÀgïwá -2 B(ù®'ÿÿkí 6-(2 6ù®[Not Authenticated]6*2****&***'ÿÿU6 ûµÿŒ"ArialÜ !íw*íwÀgïwÜ -A2 ¯$ù® CryptoToken [ (timeStamp, generalID6*....**.KC*2*C..*.**6 2 À ù®BC62 ¯H ù®)E22 À ù®k-pw*.:2 ¯>ù® ]K-'ÿÿú-xDx^ú-ðü-ú-$IOyIgry-üÿÿÿ- ðú->R>l-ðü--$a-[?aP8?-- ðú-H>HW-ðü--$IZOHI7rH-- ðú-Ys-ðü--$hóbh?-- ðEÙ Õ-A2 Õ$ù® CryptoToken [ (timeStamp, generalID6*....**.KC*2*C..*.**6 2 °N ù®a*2 x ù®)E22 °Ã ù®k-pw*.:2 nù® ]K--'ÿÿ8ÁÙ- 2 èù®( , generalIDK*****6 2 ùù®b]*/2 è0ù®, ) [Not Authenticated]K6*2****&***'ÿÿ-þÿà òùOh«+'³Ù0 ¬žÌØäô 8DP \hpxäJames TogaG NormaldjtogaTo2Microsoft Word for Windows 95@G@@FÎÆHÃŒ@2IÌܥhWà eÙ³ÆjjjjÀÀÀÀÀÀ Ê À1ÔÔÔÔÔ =Ñ Ýé8X# Ô® jjÔÔ j,ÔÔ àKIÃŒª²jjjj CryptoToken [ (timeStamp, generalIDa)Ek-pw ]
CryptoToken [ (timeStamp, generalIDB)Ek-pw ]
( .., generalIDa
EPA
EPB
, .)
[Not Authenticated]
( , generalIDb, ) [Not Authenticated]
€ÀN¥ÀNŠV§šz#©t"ª20(ð )¡±ÿÿÿÿÿÿ2û/(``'±ÿÿÿÿÿÿ2ö/( #âÿÿÿÿÿÿ0þ/&Ç$ 2ò/(A#ÒÓÿÿÿÿÿÿ2ó/(K7#ÃÓÿÿÿÿÿÿ2ø/(/%#,âÿÿÿÿÿÿ2ù/(ë&$yÿÿÿÿÿÿ2ú/('#âÿÿÿÿÿÿDÿ/: 5q$cUÿÿÿ T*b*00&év& D0:«M&bTÿÿÿ aS)aS)00&žô( D0: 5Ê(cUÿÿÿ T*b*00&ù·* D0:»*cUÿÿÿ bS*bT*20(%ñâÿÿÿÿÿÿ679=?BfgimpŒœ×ØÙùòêòêòäòêòêòäÝäÖäÐäÝäÎu]abc U]abc ]abch]abcU]abch U]abcuDa@ABqr®Ö×ØÙþS&ðþ£Øþ£ØþþØþþØþþÔÀþþÃÀþþ/ØþþzþþØþþòØþþþS&ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font0`rw|ÅÈÙ Ùÿÿÿÿ ÿÿÙÙ Ùð"T¶èL~°ô$hÜPÚÿ@\BAHARI\JF3-2-D13-4SINe00:winspool\BAHARI\JF3-2-D13-4SI\BAHARI\JF3-2-D13-4SIpSLettereeeeeeeeeeeeeeeeeeeeeeeee ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''\BAHARI\JF3-2-D13-4SIpSLettermic8Ä ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''1Times New RomanSymbol"Arial"ÁÐhEHf!# James TogajtogaDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿpØ_947279108ÿÿÿÿÿÿÿÿ ÀF ØJç)œÙèJç)œOle ÿÿÿÿÿÿÿÿÿÿÿÿtPIC ÿÿÿÿuLþÿÕÍÕ.+,ù®0šHPdlt|äPictureTel.LCÆ V&ÏppCÆ A&ÿÿÿÿWordMicrosoft WoMETAÿÿÿÿÿÿÿÿÿÿÿÿw* CompObjÿÿÿÿ hObjInfoÿÿÿÿÿÿÿÿÿÿÿÿ¢OlePres000!ÿÿÿÿ£L þÿÿÿ¡þÿÿÿþÿÿÿ€¥Š§š©ª«¬®¯°±²³Žµ¶·ž¹º»ŒœŸ¿ÀÁÂÃÄÅÆÇÈÉÊËÌþÿÿÿÎÏÐÑÒÓþÿÿÿÕÖ×þÿÿÿþÿÿÿÚþÿÿÿÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿrdAùûŒSystem -ûÿTimes New Roman*íwÀgïwá - \ÌûœÿŒ"ArialÜ !íw*íwÀgïwÜ -2 ÌùAEPA,,0'ÿÿc· û-2 ûùAEPB,,0'ÿÿ+
mûµÿŒ"Arial !íw*íwÀgïw -A2 ¯m$ùA CryptoToken [ (timeStamp, generalID6*....**.KC*2*C..*.**6 2 ÀæùAb.%2 ¯ ùA, password)Hash ].***:..6**.Kûµÿ"Arial !íw*íwÀgïw -'ÿÿú-x>xWú-ðü-ú-$IOyIgry-üÿÿÿ-ðú->R>l-ðü--$a-[?aP8?--ðú-H>HW-ðü--$IZOHI7rH--ðú-Ys-ðü--$hóbh?--ðqm-@2 m#ùACryptoToken [ (timeStamp, generalID6*....**.KC*2*C..*.**6 2 °ÑùAa*%2 ûùA, password)Hash ]m.***:..6**.K--'ÿÿ8ÁÙ- 2 èùA( , generalIDK*****6 2 ùùAb*/2 è0ùA, ) [Not Authenticated]K6*2****&***'ÿÿ€ü- 2 -üùA( , generalIDK*****6 2
æùAa*/2
-ùA, ) [Not Authenticated]K6*2****&***-'ÿÿ-þÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿCÆ $ A&ÿÿÿÿWordMicrosoft WordAùûŒSystem -ûÿTimes New Roman*íwÀgïwá - \ÌûœÿŒ"ArialÜ !íw*íwÀgïwÜ -2 ÌùAEPA,,0'ÿÿc· û-2 ûùAEPB,,0'ÿÿ+
mûµÿŒ"Arial !íw*íwÀgïw -A2 ¯m$ùA CryptoToken [ (timeStamp, generalID6*....**.KC*2*C..*.**6 2 ÀæùAb.%2 ¯ ùA, password)Hash ].***:..6**.Kûµÿ"Arial !íw*íwÀgïw -'ÿÿú-x>xWú-ðü-ú-$IOyIgry-üÿÿÿ-ðú->R>l-ðü--$a-[?aP8?--ðú-H>HW-ðü--$IZOHI7rH--ðú-Ys-ðü--$hóbh?--ðqm-@2 m#ùACryptoToken [ (timeStamp, generalID6*....**.KC*2*C..*.**6 2 °ÑùAa*%2 ûùA, password)Hash ]m.***:..6**.K--'ÿÿ8ÁÙ- 2 èùA( , generalIDK*****6 2 ùùAb*/2 è0ùA, ) [Not Authenticated]K6*2****&***'ÿÿ€ü- 2 -üùA( , generalIDK*****6 2
æùAa*/2
-ùA, ) [Not Authenticated]K6*2****&***-'ÿÿ-þÿà òùOh«+'³Ù0 ¬žÌØäô 8DP \hpxWordDocumentÿÿÿÿÿÿÿÿÿÿÿÿËSummaryInformation( "ÿÿÿÿÍžDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿÔØ_947279109:' ÀFCKç)œàKç)œÜ¥hWà eãÓjjjjŽŽŽŽŽŽ Ÿ Žé1ÈÈÈÈÈX X X t v v v =³ ¿ËXr#éX ÈX X X ét jjÈÈt t t X j ÈÈt P@îIÃŒŠjjjjX t t t CryptoToken [ (timeStamp, generalIDa, password)Hash ]
CryptoToken [ (timeStamp, generalIDb, password)Hash ]
( , generalIDa, ) [Not Authenticated]
EPA
EPB
( , generalIDb, ) [Not Authenticated]
€ÀN¥ÀNŠV§šz#©z#ª20( )¡;ÿÿÿÿÿÿ2û/(`'Kÿÿÿÿÿÿ2 0(;¯#<ÿÿÿÿ2ò/(A#ÒÓÿÿÿÿÿÿ2ó/(K7#ÃÓÿÿÿÿÿÿ0þ/&ž$ Dÿ/: 5q$cUÿÿÿ T*b*00&év& D0:«M&bTÿÿÿ aS)aS)00&žô( D0: 5Ê(cUÿÿÿ T*b*00&ù·* D0:»*cUÿÿÿ bS*bT*20(%ñâÿÿÿÿÿÿ23FJno¬®žÆÇáâãöùòêòäòêòäÝäÖäÝäÔu U]abc ]abch]abcU]abch U]abcuDaGHIJ¬®²³·žàáâãþS&ðþ£Øþ£Øþ£ØþþØþþúØþúðþþÔÀþþÃÀþþòØþþþS&ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font;u€©ÒÕã ãÿÿÿÿ ÿÿãöã ãú,^Âô$hÜPÄ)3äÿ@\BAHARI\JF3-2-D13-4SINe00:winspool\BAHARI\JF3-2-D13-4SI\BAHARI\JF3-2-D13-4SIpSLettereeeeeeeeeeeeeeeeeeeeeeeee ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''\BAHARI\JF3-2-D13-4SIpSLettermic8Ä ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''1Times New RomanSymbol"Arial"ÁÐhKMf!# James TogajtogaätJames Togaÿipt NormaldjtogaTo2ExMicrosoft Word for Windows 95@FÃ#@@êaIÃŒ@vèäIÃŒþÿÕÍÕ.+,ù®0šHPdlt|äPictureTel.Ole ÿÿÿÿÿÿÿÿÿÿÿÿØPIC $&ÿÿÿÿÙLMETAÿÿÿÿÿÿÿÿÿÿÿÿÛ<CompObj%)ÿÿÿÿhLCÆ V&ÏppCÆ A&ÿÿÿÿWordMicrosoft WordAù û-ûÿTimes New Roman4- \ÌûœÿŒ"Arial-2 ÌùAEPA--- þÿÿÿ þÿÿÿþÿÿÿ !"#$%&'()*+,-./0123456789:;<=>?@þÿÿÿBCDEFGþÿÿÿIJKþÿÿÿþÿÿÿNþÿÿÿþÿÿÿQþÿÿÿþÿÿÿTUþÿÿÿþÿÿÿþÿÿÿYþÿÿÿþÿÿÿ\þÿÿÿþÿÿÿ_`þÿÿÿþÿÿÿþÿÿÿdþÿÿÿfþÿÿÿþÿÿÿijklmnþÿÿÿpqrþÿÿÿþÿÿÿuþÿÿÿwxyz{|}~'ÿÿc· û-2 ûùAEPB--0'ÿÿg®ÜA- 2 ÚAùA ûµÿŒ"Arial-@2 ÞV#ùACryptoToken [ (timeStamp, generalID6&....**.KC*2*C..*.**6ûÎÿŒ"ArialNe- 2 ý¶ùAb-.2 ÞÕùA ,{timeStamp, generalIDC*2*C..*.**6- 2 ýùAb-2 Þ=ùA}Sign2..- 2 ýýùAa-2 ÞùA), ûµÿŒ"ArialT-2 à\ùA(Certificate6****-2 Þå ùA) ]Kûµÿ"ArialNe--'ÿÿ ú"-x>xW ú"-ðü- úÿÿÿ"- $IOyIgry-ð üÿÿÿ- ð ú"->R>l-ðü- úÿÿÿ"- $a-[?aP8?-ð - ð ú"-H>HW-ð ú"-Ys-ðü- úÿÿÿ"- $hóbh?-ð - ð®A-A2 A$ùA CryptoToken [ (timeStamp, generalID6&....**.KC*2*C..*.**6- 2 ±¶ùAa-.2 ÒùA ,{timeStamp, generalIDC*2*C..*.**6- 2 ±ùAa-2 7ùA}Sign2..- 2 ±÷ùAb-2 ùA), -2 Y ùA(Certificate)6****-2 ú ùA ]K--'ÿÿ8ÁÙ- 2 ÛùA( , generalIDK*****6ûÎÿ"Arialr - 2 øùAb-/2 Û"ùA, ) [Not Authenticated]K6*2****&***'ÿÿsrö- 2 öùA( , generalIDK*****6- 2 +àùAa-/2 üùA, ) [Not Authenticated]K6*2****&***-'ÿÿ-þÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿCÆ 4 A&ObjInfoÿÿÿÿÿÿÿÿÿÿÿÿOlePres000(+ÿÿÿÿ\WordDocumentÿÿÿÿÿÿÿÿÿÿÿÿæ"SummaryInformation(*,ÿÿÿÿAŒÿÿÿÿWordMicrosoft WordAù û-ûÿTimes New Roman4- \ÌûœÿŒ"Arial-2 ÌùAEPA---'ÿÿc· û-2 ûùAEPB--0'ÿÿg®ÜA- 2 ÚAùA ûµÿŒ"Arial-@2 ÞV#ùACryptoToken [ (timeStamp, generalID6&....**.KC*2*C..*.**6ûÎÿŒ"ArialNe- 2 ý¶ùAb-.2 ÞÕùA ,{timeStamp, generalIDC*2*C..*.**6- 2 ýùAb-2 Þ=ùA}Sign2..- 2 ýýùAa-2 ÞùA), ûµÿŒ"ArialT-2 à\ùA(Certificate6****-2 Þå ùA) ]Kûµÿ"ArialNe--'ÿÿ ú"-x>xW ú"-ðü- úÿÿÿ"- $IOyIgry-ð üÿÿÿ- ð ú"->R>l-ðü- úÿÿÿ"- $a-[?aP8?-ð - ð ú"-H>HW-ð ú"-Ys-ðü- úÿÿÿ"- $hóbh?-ð - ð®A-A2 A$ùA CryptoToken [ (timeStamp, generalID6&....**.KC*2*C..*.**6- 2 ±¶ùAa-.2 ÒùA ,{timeStamp, generalIDC*2*C..*.**6- 2 ±ùAa-2 7ùA}Sign2..- 2 ±÷ùAb-2 ùA), -2 Y ùA(Certificate)6****-2 ú ùA ]K--'ÿÿ8ÁÙ- 2 ÛùA( , generalIDK*****6ûÎÿ"Arialr - 2 øùAb-/2 Û"ùA, ) [Not Authenticated]K6*2****&***'ÿÿsrö- 2 öùA( , generalIDK*****6- 2 +àùAa-/2 üùA, ) [Not Authenticated]K6*2****&***-'ÿÿ-þÿà òùOh«+'³Ù0 ¬žÌØäô <HT `lt|äçAdJames Toga,FNormal Jim Toga-D2IMicrosoft Word for Windows 95@FÃ#@@ìóLÉŒ@ZìjɌܥhWà e" jjjjŽŽŽŽŽŽ Ÿ Žs1ÈÈÈÈÈN N N j l l l Qœ L LU€Xü&sN ÈN N N sj jjÈÈj j j N j ÈÈj E|ÉŒŠjjjjN j j j CryptoToken [ (timeStamp, generalIDa ,{timeStamp, generalIDa}Signb), (Certificate) ]
CryptoToken [ (timeStamp, generalIDb ,{timeStamp, generalIDb}Signa), (Certificate) ]
( , generalIDa, ) [Not Authenticated]
EPA
EPB
( , generalIDb, ) [Not Authenticated]
€ÀN¥ÀNŠV§šz#©z#ª20(À )Ñ;ÿÿÿÿÿÿ2û/(Àð'ÑKÿÿÿÿÿÿ2 0(,#µÿÿÿÿ2ò/(A#ÒÓÿÿÿÿÿÿ2ó/(K7#ÃÓÿÿÿÿÿÿ0þ/&ž$ Dÿ/: 5q$cUÿÿÿ T*b*00&év& D0:«M&bTÿÿÿ aS)aS)00&žô( 00&ù·* D0:»*cUÿÿÿ bS*bT*20(%ñâÿÿÿÿÿÿ 23JKPQTacfg¢£š©¬ž»ŒœÌÍåçñÿëùòêòêòêòâòÜÚòêòêòêòâòÜÚÜÓÜÌÜÓÜÊu U]abc ]abcha]abcUV]abcU]abch U]abcuDa#defŒœŸæçëìðñþS&ëþÒØþÒÌþþÒØþÒëþþÌþþÔÀþþÃÀþþòÌþþþS&ëK@ñÿNormala "A@òÿ¡"Default Paragraph FontX°ÙÞã ÿÿÿÿ ÿÿë 3eÉû-]¡ÑEu¹Tcÿ@HP LaserJet 4/4M Plus PS\Bahari\jf3-2-d13-4siPSCRIPTHP LaserJet 4/4M Plus PSHP LaserJet 4/4M Plus PSžwê odXXÀÈW¹)x!€ÀëlÐMRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BBHP LaserJet 4/4M Plus PSžwê odXXÀÈW¹)x!€ÀëlÐMRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BB1Times New RomanSymbol&Arial"ÁÐhrijÂf!& James TogaJim TogaDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿHØ_947279111ÿÿÿÿÿÿÿÿ1dOÏꪹ)èÀÔ"Kç)œ@øeKç)œOle ÿÿÿÿÿÿÿÿÿÿÿÿLPIC .0ÿÿÿÿMLþÿÕÍÕ.+,ù®0šHPdlt|äPictureTel,L²œøu èè Microsoft (R) PowerPoint (R) Windows ð_ÀãMETAÿÿÿÿÿÿÿÿÿÿÿÿôHeader/5ÿÿÿÿO9CompObjÿÿÿÿÿÿÿÿÿÿÿÿPuObjInfo24ÿÿÿÿR²œ Æ (&ÿÿÿÿeüÿÿLýÿÿ® &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±T & TNPPð &ÿÿÿÿ&TNPPLýeüb0 úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ ¶LýeüûÜÿTimes New Roman)-. ûÜÿTimes New Roman1-ð. &ÿÿÿÿ ú"--þ©ýzý£üûÂÿTimes New Roman)-ð. 2 ÖýÁüCODEC)-,&) &ÿÿÿÿ÷ý &ÿÿÿÿü²²²-ð ²²²|çý>[ýûÂÿTimes New Roman1-ð. Ò¶ 2 lkýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²þAøýûÂÿTimes New Roman)-ð. Ò¶ 2 pþabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}ÿAòþûÂÿTimes New Roman1-ð. Ò¶ 2 pÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²ÆB:ûÂÿTimes New Roman)-ð. Ò¶ 2 pJabcd &ÿÿÿÿûÂÿTimes New Roman1-ð. Ò¶(2 þTransport Segmentation%#0 &ÿÿÿÿ ²²²$ýþÿµýÿýÿý3þfý3þfýÿLýÿûÂÿTimes New Roman)-ð. ÄÒ2 ÿýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿüÿÿÿ-ð ÿÿÿ_ÿùþ*ûÂÿTimes New Roman1-ð. °ÿ2 8ÿIKey #1- &ÿÿÿÿ &ÿÿÿÿü²²²-ð ²²²É0ŸûÂÿTimes New Roman)-ð. Òÿ2 {ì Encryption% &ÿÿÿÿ-$bNb\\{b{b®l$âÿ³Œÿ©Œÿ©xÿxÿŒÿŒÿ &ÿÿÿÿü-ð $|ØAÚCb~`- $Ô4Ö6omûÂÿ Times New Roman1-ð. Òÿ 2 çPabcd &ÿÿÿÿ &ÿÿÿÿ- $|AC~ - $}46ûÂÿ Times New Roman)-ð. ðÿ 2 Pabcd &ÿÿÿÿ--Þ÷qý &ÿÿÿÿ- Îçý[ý- Üóý}XýûÂÿTimes New Roman1-ð. ðÿ 2 Ÿkýabcd &ÿÿÿÿ &ÿÿÿÿ- Οþ3þ- ÜËþ}/þûÂÿTimes New Roman)-ð. Òÿ 2 ŸBþabcd &ÿÿÿÿ &ÿÿÿÿ- ÎŽÿ)ÿ- ÜÁÿ}%ÿûÂÿTimes New Roman1-ð. Òÿ 2 Ÿ8ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Î- ܧ}ûÂÿTimes New Roman)-ð. Òÿ 2 Ÿabcd &ÿÿÿÿ--$D®ÌœÜœÜü²²²-ð ²²²Ú`ý}1ý ²²²Þ7þþ ²²²Ý&ÿ÷þ ²²²Ø{âÿûÂÿTimes New Roman1-ð. Òÿ2 aAþ SDU Header"-,--úþªþ)ûÂÿTimes New Roman)-ð. ÄÒ2 åþEKey #2-ûÂÿTimes New Roman1-ð. ÄÒ'2 +þiKeys as passed in the-ûÂÿTimes New Roman)-ð. ÄÒ2 uþi H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðþÿ ÿÿÿÿdOÏꪹ)èMicrosoft PowerPoint SlideMSPresentationPowerPoint.Slide.7ô9²qCODEC
abcd
abcd
abcd
abcd
Transport Segmentation
abcdabcdabcd
Key #1
Encryption
abcd
abcd
abcd
abcd
abcd
abcd
SDU Header
Key #2
Keys as passed in the H.245 channel
ÆPowerPoint DocumentOlePres000ÿÿÿÿÿÿÿÿÿÿÿÿŽText_Content37ÿÿÿÿS¶SummaryInformation(ÿÿÿÿÿÿÿÿÿÿÿÿšPowerPoint Document(68ÿÿÿÿeýÿÿÿ þÿÿÿ þÿÿÿ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHþÿÿÿRKLMNOPQþÿÿÿ^iUVWXYZ[\]þÿÿÿu`abcdefghþÿÿÿÜklmnopqrstþÿÿÿ²ýÿÿÿxyz{|}~ÿÿÿÿÿÿÿÿ²œ Æ (&ÿÿÿÿeüÿÿLýÿÿ® &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±T & TNPPð &ÿÿÿÿ&TNPPLýeüb0 úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ ¶LýeüûÜÿTimes New Roman)-. ûÜÿTimes New Roman1-ð. &ÿÿÿÿ ú"--þ©ýzý£üûÂÿTimes New Roman)-ð. 2 ÖýÁüCODEC)-,&) &ÿÿÿÿ÷ý &ÿÿÿÿü²²²-ð ²²²|çý>[ýûÂÿTimes New Roman1-ð. Ò¶ 2 lkýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²þAøýûÂÿTimes New Roman)-ð. Ò¶ 2 pþabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}ÿAòþûÂÿTimes New Roman1-ð. Ò¶ 2 pÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²ÆB:ûÂÿTimes New Roman)-ð. Ò¶ 2 pJabcd &ÿÿÿÿûÂÿTimes New Roman1-ð. Ò¶(2 þTransport Segmentation%#0 &ÿÿÿÿ ²²²$ýþÿµýÿýÿý3þfý3þfýÿLýÿûÂÿTimes New Roman)-ð. ÄÒ2 ÿýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿüÿÿÿ-ð ÿÿÿ_ÿùþ*ûÂÿTimes New Roman1-ð. °ÿ2 8ÿIKey #1- &ÿÿÿÿ &ÿÿÿÿü²²²-ð ²²²É0ŸûÂÿTimes New Roman)-ð. Òÿ2 {ì Encryption% &ÿÿÿÿ-$bNb\\{b{b®l$âÿ³Œÿ©Œÿ©xÿxÿŒÿŒÿ &ÿÿÿÿü-ð $|ØAÚCb~`- $Ô4Ö6omûÂÿ Times New Roman1-ð. Òÿ 2 çPabcd &ÿÿÿÿ &ÿÿÿÿ- $|AC~ - $}46ûÂÿ Times New Roman)-ð. ðÿ 2 Pabcd &ÿÿÿÿ--Þ÷qý &ÿÿÿÿ- Îçý[ý- Üóý}XýûÂÿTimes New Roman1-ð. ðÿ 2 Ÿkýabcd &ÿÿÿÿ &ÿÿÿÿ- Οþ3þ- ÜËþ}/þûÂÿTimes New Roman)-ð. Òÿ 2 ŸBþabcd &ÿÿÿÿ &ÿÿÿÿ- ÎŽÿ)ÿ- ÜÁÿ}%ÿûÂÿTimes New Roman1-ð. Òÿ 2 Ÿ8ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Î- ܧ}ûÂÿTimes New Roman)-ð. Òÿ 2 Ÿabcd &ÿÿÿÿ--$D®ÌœÜœÜü²²²-ð ²²²Ú`ý}1ý ²²²Þ7þþ ²²²Ý&ÿ÷þ ²²²Ø{âÿûÂÿTimes New Roman1-ð. Òÿ2 aAþ SDU Header"-,--úþªþ)ûÂÿTimes New Roman)-ð. ÄÒ2 åþEKey #2-ûÂÿTimes New Roman1-ð. ÄÒ'2 +þiKeys as passed in the-ûÂÿTimes New Roman)-ð. ÄÒ2 uþi H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðþÿà òùOh«+'³Ù0x`h šŽ Ôà ìøäNo Slide TitleJames TogaJames Toga7Microsoft PowerPoint@yþ@@GUÖÔØ»@ ±?å»Gnÿÿÿÿ1% ¯ (&ÿÿÿÿ`úÿÿÈûÿÿ2 &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P± & TNPPð &ÿÿÿÿ&TNPPÈû`új: úÿÿÿ"-üÿÿÿ- ÿÿÿ :¢Èû`úûÈÿTimes New Roman)-. ûÈÿTimes New Roman1-ð. &ÿÿÿÿ ú"-ü-ýYüüÀúû ÿTimes New Roman)-ð. 2 üðúCODEC@FE;@ &ÿÿÿÿÙ0hû &ÿÿÿÿü²²²- ²²²Á¹ü`àûû ÿTimes New Roman1-ð. XÀžo 2 šøûabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²ÇýfÔüû ÿTimes New Roman)-ð. XÀžo 2 ®ìüabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²Ç3ÿfZþû ÿTimes New Roman1-ð. XÀžo 2 ®rþabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²È4g[û ÿTimes New Roman)-ð. XÀžo 2 ¯sabcd+0*0 &ÿÿÿÿû ÿTimes New Roman1-ð. XÀžo(2 ýTransport Segmentation; *0&00 6*0K+0+00 &ÿÿÿÿ ²²²$üÿÿoüBÿFüBÿFü2ýóû2ýóûBÿÊûBÿû ÿTimes New Roman)-ð. À+2 Yÿ9üabcdabcdabcd+0*0+0+0*0+0 &ÿÿÿÿ &ÿÿÿÿ-ð ÿÿÿÿÉfþ`û ÿTimes New Roman1-ð. °ÿ2 ÈþKey #1F*000 &ÿÿÿÿ &ÿÿÿÿü²²²- ²²²9ù0žû ÿTimes New Roman)-ð. XÀÿ2 À Encryption;0+0000 &ÿÿÿÿ-$)z)²²À)À)ש$Ñÿ7ÿ&ÿ&,ÿ,ÿÿòÿ &ÿÿÿÿü-ð $âRT(æ&- $KpMt<:û ÿ Times New Roman1-ð. XÀÿ 2 iabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- $âZ\0æ.- $SpUtDBû ÿ Times New Roman)-ð. ðÿ 2 qabcd+0*0 &ÿÿÿÿ--é@hû &ÿÿÿÿ- ѹüpàû- åÌüSÛûû ÿTimes New Roman1-ð. ðÿ 2 žøûabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ñ þp0ý- åþS+ýû ÿTimes New Roman)-ð. XÀÿ 2 žHýabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ñÿp°þ- åÿS«þû ÿTimes New Roman1-ð. XÀÿ 2 žÈþabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ññp- åSû ÿTimes New Roman)-ð. XÀÿ 2 ž0abcd+0*0 &ÿÿÿÿ--$ú¡qÏqžçžçqqrü²²²- ²²²äçûSû ²²²é7ýXîü ²²²è«þWbþ ²²²áPÑÿû ÿTimes New Roman1-ð. XÀÿ2 'Fý SDU Header6EEF*+0* -fþÐëý`û ÿTimes New Roman)-ð. À+2 GþKey #2F*000û ÿTimes New Roman1-ð. À+'2 $ý3Keys as passed in theF*0&*&0*%&*000*û ÿTimes New Roman)-ð. À+2 ý3 H.245 channelF000*0+00*&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðÿÿódèÿÿãdé,ààØb) PØöòÿÿ:ëÿÿfØáØáØáÈÿÿ4Ò(ºÿÿºÿÿÖÿÿ âá°ÿÿåÿÿT ³4ØÔ Ð@ð`@æËáåÿÿT ³4 @@``@æËáåÿÿT ³4Ð@ð`0 @æËáÕÿÿø¶ÿÿL ·<Times New RomanÊá¶ÿÿL ·<"ArialÊáÕÿÿï$äÿÿ)ÿÿB* ÝÔØè, ,÷¿,÷¿,^,Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿÔØè ÷¿÷¿^Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿÔØè ÷¿÷¿^Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿÔØè ÷¿÷¿^Pÿÿÿddþÿÿÿ×ddþÿÿÿVddþÿÿÿÈddþÿÿÿddþÿÿÿ×ÿÿÿÔØ è ÷¿÷¿^Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿÔØÿÿÿÿèÿÿÿ ÿÿÿ÷¿ÿÿÿ÷¿ÿÿÿ^ÿÿÿPÿÿÿÿÿÿ×ÿÿÿVÿÿÿÈÿÿÿÿÿÿ×ÿÿÿÔØÿÿÿÿèÿÿÿ ÿÿÿ÷¿ÿÿÿ÷¿ÿÿÿ^ÿÿÿPÿÿÿÿÿÿ×ÿÿÿVÿÿÿÈÿÿÿÿÿÿ×ÿÿÿÔØÿÿÿÿèÿÿÿ ÿÿÿ÷¿ÿÿÿ÷¿ÿÿÿ^ÿÿÿPÿÿÿÿÿÿ×ÿÿÿVÿÿÿÈÿÿÿÿÿÿ×ÿÿÿÔØÿÿÿÿèÿÿÿ ÿÿÿ÷¿ÿÿÿ÷¿ÿÿÿ^ÿÿÿPÿÿÿÿÿÿ×ÿÿÿVÿÿÿÈÿÿÿÿÿÿ×ÿÿÿÄÿÿÅÁ(ýÿÿÿýÿÿÿœ8ÿ00¡ÿÿt :À'PÔb¢ÿÿD£$ÿÿµàÿÿìã42Öýÿÿddâ3î5ìÿÿ/î/ìÿÿ0î0ìÿÿ1î1Ðÿÿ; Ñîÿÿê:ïíÀôÿÿ÷ÿÿ@p÷ÙÿÿHÚºÿÿ.ºÿÿ/ºÿÿ0ôÿÿ4xï$ÿÿÿÌ33ÌÌÌÿ²²²ÀÿÿÁ(ýÿÿÿÀôÿÿ÷ÿÿ@pýÿÿÿœ8ÿÿ00×bžÿÿR9¹ÿÿíºÙPžÿÿÉÀÿÿÁ(ýÿÿÿõÿÿ øÿÿ°øÿÿúÿÿýÿÿÿœ8ÿÿ00ÖbÀÿÿ)Á(ýÿÿÿŠõÿÿvøÿÿ¥øÿÿùÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿi£$@ùÿÿàõÿÿøÿÿkøÿÿyùÿÿµàÿÿî5CODECìÿÿ</î,/â|ìbìÿÿX0îH0ã4|ìýÿÿddìÿÿ(1î1á|ìÿÿÿÿÀÿÿÁ(ýÿÿÿ$Ðöÿÿ`°ýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿÀ÷ÿÿÀpùÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ¶÷ÿÿùÿÿŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$Pð÷ÿÿ£Zùÿÿµàÿÿî5abcdìÿÿ</î,/â #bìÿÿX0îH0ã4 #ýÿÿddìÿÿ(1î1á #ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿšùÿÿÌXûÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿùÿÿ|ûÿÿ²ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$\Øùÿÿ¯Bûÿÿµàÿÿî5abcdìÿÿ</î,/âl/bìÿÿX0îH0ã4l/ýÿÿddìÿÿ(1î1ál/ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿµüÿÿÌeþÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ«üÿÿþÿÿ²ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$Q\åüÿÿ¯Oþÿÿµàÿÿî5abcdìÿÿ</î,/â8;bìÿÿX0îH0ã48;ýÿÿddìÿÿ(1î1á8;ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ¶Ífýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ¬³ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$Q]æ°Pµàÿÿî5abcdìÿÿ</î,/âGbìÿÿX0îH0ã4Gýÿÿddìÿÿ(1î1áGÿÿÿÿÀÿÿ:Á(ýÿÿÿ$Æùÿÿfÿÿÿtýÿÿÿœ8ÿÿÿ00 P¡ÿÿª :Ñ'PÔb¢ÿÿz£$Q0úÿÿÿÿÿ:iµàÿÿ"î5Transport Segmentationìÿÿ</î,/â?bìÿÿX0îH0ã4?ýÿÿddìÿÿ(1î1á?ÿÿÿÿ¹ÿÿôºÙPžÿÿÐÀÿÿÁ( p>÷ÿÿ`úÿÿàøÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ0Á(ýÿÿÿÕõÿÿüÿÿúÿÿ$ýÿÿ°ýÿÿÿœ8ÿÿÿ00Öb°¡ÿÿ :Ñ'PÔb¢ÿÿp£$QÎüÿÿ°öÿÿ!üÿÿNúÿÿýÿÿµàÿÿî5abcdabcdabcdìÿÿ</î,/âÐRbìÿÿX0îH0ã4ÐRýÿÿddìÿÿ(1î1áÐRÿÿÿÿ¹ÿÿºÙPžÿÿúÀÿÿÁ(ýÿÿÿÀÌüÿÿ þÿÿýÿÿÿœ8ÿ00ÖbÀÿÿZÁ(ýÿÿÿæÆüÿÿ æýÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿÊ :Ñ'PÔb¢ÿÿ£$Qýÿÿ ãüÿÿP Éýÿÿµ×8ýÿÿàÿÿ*î5Key #1ìÿÿ</î,/â€^bìÿÿX0îH0ã4€^ýÿÿddìÿÿ@1î01á€^ÿÿÿÿá€^ÿÿÿÿ¹ÿÿòºÙPžÿÿÎÀÿÿÁ(ýÿÿÿp`ð pýÿÿÿœ8ÿ00ÖbÀÿÿ.Á(ýÿÿÿƶ Öýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿn£$QÓU ¹µàÿÿî 5Encryptionìÿÿ</î,/ âŽjbìÿÿX0îH0 ã4Žjýÿÿddìÿÿ(1î1 áŽjÿÿÿÿÀÿÿÁ( 0*$`ð@°ýÿÿÿœ8ÿÿ00 PÀÿÿÁ( p+6$àUþÿÿp¥ÿÿÿýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿCÙpúÿÿýÿÿÿœ8ÿ00ÖbpúÿÿÀÿÿ(Á(ýÿÿÿödpúÿÿýÿÿÿœ8ÿÿ00Öbpúÿÿ¡ÿÿ :Ñ'PÔb¢ÿÿh£$ÀpúÿÿÀ*ùµàÿÿî5abcdìÿÿ</î,/âvbìÿÿX0îH0ã4výÿÿddìÿÿ(1î1ávÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ)Cépúÿÿýÿÿÿœ8ÿ00ÖbpúÿÿÀÿÿ(Á(ýÿÿÿd&púÿÿýÿÿÿœ8ÿÿ00Öbpúÿÿ¡ÿÿ :Ñ'PÔb¢ÿÿh£$ÐpúÿÿÀ#* µàÿÿî5abcdìÿÿ</î,/âTbìÿÿX0îH0ã4Týÿÿddìÿÿ(1î1áTÿÿÿÿÀÿÿÁ(ýÿÿÿ$ÐöÿÿÐýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿÀ÷ÿÿàpùÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ¶÷ÿÿŠùÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$pð÷ÿÿÃZùÿÿ©µàÿÿî5abcdìÿÿ</î,/â bìÿÿX0îH0ã4 ýÿÿddìÿÿ(1î1á ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`úÿÿàüÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVúÿÿŠ4üÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$púÿÿÃúûÿÿ©µàÿÿî5abcdìÿÿ</î,/âìbìÿÿX0îH0ã4ìýÿÿddìÿÿ(1î1áìÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`ýÿÿàÿÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVýÿÿŠ4ÿÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$pýÿÿÃúþÿÿ©µàÿÿî5abcdìÿÿ</î,/➥bìÿÿX0îH0ã4ž¥ýÿÿddìÿÿ(1î1ឥÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ0àà ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ&ŠÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$p`ÃÊ©µàÿÿî5abcdìÿÿ</î,/â±bìÿÿX0îH0ã4±ýÿÿddìÿÿ(1î1á±ÿÿÿÿÀÿÿÁ( @0*$ðàÐ ýÿÿÿœ8ÿÿ00 PÀôÿÿÀÿÿÁ(ýÿÿÿ$<÷ÿÿ¥Ì÷ÿÿÅýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ$Üùÿÿ¯lúÿÿÏýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ$ÅüÿÿUýÿÿÍýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ$¢ÿÿÿ2¿ýÿÿÿœ8ÿ00 PÀÿÿ^Á(ýÿÿÿ$Rúÿÿ þÿÿ€ýÿÿÿœ8ÿÿÿ00 P¡ÿÿÎ :Ñ'PÔb¢ÿÿ£$ÑNúÿÿ¡fþÿÿµ×úÿÿVàÿÿ.î 5SDU Headerìÿÿ</î,/ ‬bìÿÿX0îH0 ã4€¬ýÿÿddìÿÿ@1î01ာÿÿÿÿာÿÿÿÿÀÿÿÁ(ýÿÿÿ$¿Öûÿÿ Ëüÿÿýÿÿÿœ8ÿÿ00 PÀÿÿ*Á(ýÿÿÿ$ÚÄûÿÿ~ äüÿÿýÿÿÿœ8ÿÿÿ00 P¡ÿÿ :Ñ'PÔb¢ÿÿj£$ÑüÿÿáûÿÿD Çüÿÿµàÿÿî5Key #2ìÿÿ</î,/âðµbìÿÿX0îH0ã4ðµýÿÿddìÿÿ(1î1áðµÿÿÿÿÀÿÿ§Á(ýÿÿÿ$+ùÿÿ ûÿÿýÿÿÿœ8ÿÿÿ00 P¡ÿÿ :Ñ'PÔb¢ÿÿç£$ÑIúÿÿeùÿÿÏ hûÿÿµ×mQúÿÿàÿÿwî#5Keys as passed in the H.245 channelìÿÿ</î,/#âòbìÿÿ 0î0ã4òýÿÿdd ã4òýÿÿddìÿÿ(1î1#áòÿÿÿÿÐÿÿÍÑøÿÿ©ïíÀôÿÿ÷ÿÿ@p×bï$7ÿÿÿÌ33ÌÌÌÿ²²²ï$7ÿÿÿÿÿÿÿÿÿÿ3ï$7ÿÿÌ3333ÌÿÌfï$7ÿÿÿ999ËËËMMMêêêï$7ÿÿÿÿÌfÿÌÌÀÀÀï$7ÿÿÿËËËfÿÿ3ï$7ÿÿÿ3ÿÿÌÌ̲²²÷ÙÿÿHÚºÿÿ.ºÿÿ/ºÿÿ0ôÿÿ4xï$ÿÿÿÌ33ÌÌÌÿ²²²ÀÿÿÁ(ýÿÿÿÀôÿÿ÷ÿÿ@pýÿÿÿœ8ÿÿ00×bžÿÿ Âÿÿ\ÃbÁ(ýÿÿÿ Ppöÿÿùÿÿ àûÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿŽ :Ä'PÔbäÿÿ£$Äÿÿªöÿÿ-ùÿÿV Ãûÿÿµàÿÿ,î 5Click to edit Master title styleìÿÿ</î,/ â¿,bìÿÿX0îH0 ã4¿ýÿÿddìÿÿ(1î1 á¿ÿÿÿÿÂÿÿ2ÃbÁ(ýÿÿÿ Ppöÿÿpüÿÿ ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ä'PÔbäÿÿZ£$ÄÿÿªöÿÿüÿÿV sµàÿÿîR5Click to edit Master text styles Second level Third level Fourth level Fifth levelìÿÿÀ/î°/!â€Ã b â€Ãbâ€Ãbâ€Ãbìÿÿx0îh0!ã4€Ãýÿÿdd ã4€Ãýÿÿddã4€Ãýÿÿdd ã4€Ãýÿÿddã4€Ãýÿÿddìÿÿ(1î1Rá€ÃÿÿÿÿÂÿÿ=ÃbÁ(ýÿÿÿ Ppöÿÿð ûÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿªöÿÿ æúÿÿóµàÿÿ î5*ìÿÿ</î,/âhÉbìÿÿX0îH0ã4hÉýÿÿddìÿÿ(1î1áhÉÂÿÿ=ÃbÁ(ýÿÿÿ Ppüÿÿðýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿªüÿÿ Vóµàÿÿ î5*ìÿÿ</î,/âhÍbìÿÿX0îH0ã4hÍýÿÿddìÿÿ(1î1áhÍÂÿÿ=ÃbÁ(ýÿÿÿ Pàð ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿ V óµàÿÿ î5*ìÿÿ</î,/âPæbìÿÿX0îH0ã4Pæýÿÿddìÿÿ(1î1áPæºÿÿÐÿÿÑÿÿÿDºÿÿ_VBA_PROJECTºÿÿ úÿÿŽþêÿÿ0ûûý4 d deded>pdüÿÿHýÿÿÿÿ$dãÿÿeé,êDocumentSummaryInformation8ÿÿÿÿ9ÿÿÿÿJPersistentStorage Directory8ÿÿÿÿÿÿÿÿÿÿÿÿV>_947279112-Q>dOÏꪹ)èàèKç)œ z¡Kç)œOle ÿÿÿÿÿÿÿÿÿÿÿÿWþÿÕÍÕ.+,ù®0d`h š° žäOn-screen ShowódArialTimes New RomanDefault DesignNo Slide TitleFonts UsedDesign Template Slide TitlesÿÿÿÿÿÿÿÿyJ@tu)g óH103:35 PM 3/14/96 -0500Majordomo@concours.ctron.comMajordomo resultsÿÿÿÿÿÿÿÿzJ\sÜ6óH103:35 PM 3/14/96 -0500Majordomo@concours.ctron.comWelcome to cogÿÿÿÿÿÿÿÿyJ\sóAb ©J109:51 AM 3/15/96 -0800Carl MetlerNew member app requestsÿÿÿÿÿÿÿÿWKkUKWëS104:06 PM 3/22/96 ESTFrank Georgere:Re: O ringÿÿÿÿÿÿÿÿÆD¬Vœ¹Z102:06 AM 3/28/96 -0600James R. DavisInvitation to safety oriented pageÿÿÿÿÿÿÿÿÍYibN §©`108:14 PM 4/1/96 +0000Perry ColemanRE: Kawasaki homepageÿÿÿÿÿÿÿÿ?TÝ·lQ~±a110:00 AM 4/2/96 -0500I Can't Wait To See What Happens NextBun Cooler and ShaftÿÿÿÿÿÿÿÿâæŒA{poc105:43 PM 4/3/96 -0500I Can't Wait To See What Happens NextSeatsÿÿÿÿÿÿÿÿŸæ+Yxªr108:59 AM 4/15/96 -0400Matthew E. StollerRe: Robert/relayÿÿÿÿÿÿÿÿçZ+ ñk110:11 PM 4/24/96 -0700David NealNeophyte Software Map Review?ÿÿÿÿÿÿÿÿ3Ä¥B 108:17 AM 5/2/96 EDTBob Shriner\VATales from the COG Past . . .ÿÿÿÿÿÿÿÿ÷€ßGŠŒ< 9º110:26 PM 5/8/96 -0400MJNessler@aol.comRe: radar accuracyÿÿÿÿÿÿÿÿZ' âÅ?~112:48 AM 5/11/96 -0400MJNessler@aol.comPolice RADAR, Pt. 2ÿÿÿÿÿÿÿÿT]nñÄ Ñ²111:08 AM 5/13/96 -0400Jim BeckRe: Suches Trip resultsÿÿÿÿÿÿÿÿÄhµÃ î107:00 PM 5/15/96 -0700Rick HallRe: Long Road Tripsÿÿÿÿÿÿÿÿ]¥Úsxø¬Š106:47 PM 5/24/96 -0500pfennig@fwb.gulf.netRe: screwsÿÿÿÿÿÿÿÿåö=I(©ðª110:24 PM 5/27/96 -0700Carl MetlerRidePIC ;=ÿÿÿÿXLMETAÿÿÿÿÿÿÿÿÿÿÿÿTHeader<BÿÿÿÿZ9CompObjÿÿÿÿÿÿÿÿÿÿÿÿ[uL ú% èè Microsoft (R) PowerPoint (R) Windows ð_Àãþÿ ÿÿÿÿdOÏꪹ)èMicrosoft PowerPoint SlideMSPresentationPowerPoint.Slide.7ô9²qCODEC
abcd
abcd
abcd
abcd
Transport De-Segmentation
abcdabcdabcd
Decryption
abcd
abcd
abcd
abcd
abcd
abcd
SDU Head ú ¿ -&ÿÿÿÿ\üÿÿEýÿÿµ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±¢ & TNPPð &ÿÿÿÿ&TNPPEý\üpB úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ œŠEý\üûÜÿTimes New Roman4-. ûÜÿTimes New Roman%-ð. &ÿÿÿÿ ú"--þ£ýtýüûÂÿTimes New Roman4-ð. 2 Ñý¹üCODEC)--&* &ÿÿÿÿúý &ÿÿÿÿü²²²-ð ²²²}þ>ýûÂÿTimes New Roman%-ð. Ò 2 m¢ýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ÿþ>.þûÂÿTimes New Roman4-ð. Ò 2 m=þabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}³ÿ>'ÿûÂÿTimes New Roman%-ð. Ò 2 m6ÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ú>NûÂÿTimes New Roman4-ð. Ò 2 m]abcd &ÿÿÿÿûÂÿTimes New Roman%-ð. Ò-2 þTransport De-Segmentation& -#1 &ÿÿÿÿ ²²²$Eýþ_ýþ_ýòÿýòÿýþ±ýþ{ý"þûÂÿ Times New Roman4-ð. ÄÒ2 þiýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿ ²²²Ë8ÂûÂÿTimes New Roman%-ð. ðÿ2 |ñ Decryption- &ÿÿÿÿ-$mee}²}²^e^eO &ÿÿÿÿü-ð $ÛGÝIec- $Ö9Ø;sqûÂÿ Times New Roman4-ð. Òÿ 2 éVabcd &ÿÿÿÿ &ÿÿÿÿ- $GI- $9;ûÂÿ Times New Roman%-ð. ðÿ 2 Vabcd &ÿÿÿÿ--ãúuý &ÿÿÿÿ- ÓáýUý- àîýQýûÂÿTimes New Roman4-ð. ðÿ 2 Ãdýabcd &ÿÿÿÿ &ÿÿÿÿ- Ó»þ.þ- àÇþ+þûÂÿTimes New Roman%-ð. Òÿ 2 Ã=þabcd &ÿÿÿÿ &ÿÿÿÿ- Ó³ÿ'ÿ- àÀÿ#ÿûÂÿTimes New Roman4-ð. Òÿ 2 Ã6ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Ó- à©ûÂÿTimes New Roman%-ð. Òÿ 2 Ãabcd &ÿÿÿÿ--$ಀG¥GÃÁÐü²²²-ð ²²²ßYý*ý ²²²â3þþ ²²²â$ÿôþ ²²²ÝâÿûÂÿTimes New Roman4-ð. Òÿ2 e<þ SDU Header#,-- &ÿÿÿÿüÿÿÿ-ð ÿÿÿ]ÿ÷þ/ûÂÿTimes New Roman%-ð. ÄÒ2 6ÿNKey #1- &ÿÿÿÿ-$£âÿº»ÿ¯»ÿ¯vÿvÿ»ÿ»ÿ÷þ§þ/ûÂÿTimes New Roman4-ð. Ò°¡2 ãþJKey #2- ûÂÿTimes New Roman%-ð. ÄÒ-*2 'þlKeys as received in the- ûÂÿTimes New Roman4-ð. ÄÒ-2 qþl H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðObjInfo?Aÿÿÿÿ]OlePres000ÿÿÿÿÿÿÿÿÿÿÿÿ_šText_Content@Dÿÿÿÿ^»SummaryInformation(ÿÿÿÿÿÿÿÿÿÿÿÿjÿÿÿÿÿÿÿÿ ú ¿ -&ÿÿÿÿ\üÿÿEýÿÿµ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±¢ & TNPPð &ÿÿÿÿ&TNPPEý\üpB úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ œŠEý\üûÜÿTimes New Roman4-. ûÜÿTimes New Roman%-ð. &ÿÿÿÿ ú"--þ£ýtýüûÂÿTimes New Roman4-ð. 2 Ñý¹üCODEC)--&* &ÿÿÿÿúý &ÿÿÿÿü²²²-ð ²²²}þ>ýûÂÿTimes New Roman%-ð. Ò 2 m¢ýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ÿþ>.þûÂÿTimes New Roman4-ð. Ò 2 m=þabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}³ÿ>'ÿûÂÿTimes New Roman%-ð. Ò 2 m6ÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ú>NûÂÿTimes New Roman4-ð. Ò 2 m]abcd &ÿÿÿÿûÂÿTimes New Roman%-ð. Ò-2 þTransport De-Segmentation& -#1 &ÿÿÿÿ ²²²$Eýþ_ýþ_ýòÿýòÿýþ±ýþ{ý"þûÂÿ Times New Roman4-ð. ÄÒ2 þiýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿ ²²²Ë8ÂûÂÿTimes New Roman%-ð. ðÿ2 |ñ Decryption- &ÿÿÿÿ-$mee}²}²^e^eO &ÿÿÿÿü-ð $ÛGÝIec- $Ö9Ø;sqûÂÿ Times New Roman4-ð. Òÿ 2 éVabcd &ÿÿÿÿ &ÿÿÿÿ- $GI- $9;ûÂÿ Times New Roman%-ð. ðÿ 2 Vabcd &ÿÿÿÿ--ãúuý &ÿÿÿÿ- ÓáýUý- àîýQýûÂÿTimes New Roman4-ð. ðÿ 2 Ãdýabcd &ÿÿÿÿ &ÿÿÿÿ- Ó»þ.þ- àÇþ+þûÂÿTimes New Roman%-ð. Òÿ 2 Ã=þabcd &ÿÿÿÿ &ÿÿÿÿ- Ó³ÿ'ÿ- àÀÿ#ÿûÂÿTimes New Roman4-ð. Òÿ 2 Ã6ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Ó- à©ûÂÿTimes New Roman%-ð. Òÿ 2 Ãabcd &ÿÿÿÿ--$ಀG¥GÃÁÐü²²²-ð ²²²ßYý*ý ²²²â3þþ ²²²â$ÿôþ ²²²ÝâÿûÂÿTimes New Roman4-ð. Òÿ2 e<þ SDU Header#,-- &ÿÿÿÿüÿÿÿ-ð ÿÿÿ]ÿ÷þ/ûÂÿTimes New Roman%-ð. ÄÒ2 6ÿNKey #1- &ÿÿÿÿ-$£âÿº»ÿ¯»ÿ¯vÿvÿ»ÿ»ÿ÷þ§þ/ûÂÿTimes New Roman4-ð. Ò°¡2 ãþJKey #2- ûÂÿTimes New Roman%-ð. ÄÒ-*2 'þlKeys as received in the- ûÂÿTimes New Roman4-ð. ÄÒ-2 qþl H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðer
Key #1
Key #2
Keys as received in the H.245 channel
ÆPowerPoint DocumentLw;f*¶! èèàþÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qþÿà òùOh«+'³Ù0h`h šŽ Ôà ìøäNo Slide TitleJames TogaJames Toga5Microsoft PowerPoint@`ž)@@GUÖÔØ»@`R?å»G`ÿÿÿÿ1% š -&ÿÿÿÿ`úÿÿÈûÿÿ2 &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P± & TNPPð &ÿÿÿÿ&TNPPÈû`új: úÿÿÿ"-üÿÿÿ- ÿÿÿ :¢Èû`úûÈÿTimes New Roman4-. ûÈÿTimes New Roman%-ð. &ÿÿÿÿ ú"-ü-ýYüüÀúû ÿTimes New Roman4-ð. 2 üðúCODEC@FE;@ &ÿÿÿÿÙ0hû &ÿÿÿÿü²²²- ²²²Áý`@üû ÿTimes New Roman%-ð. XÀ8- 2 šXüabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²Áþ`0ýû ÿTimes New Roman4-ð. XÀ8- 2 šHýabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²Áÿ`°þû ÿTimes New Roman%-ð. XÀ8- 2 šÈþabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²ÁQ`xû ÿTimes New Roman4-ð. XÀ8- 2 šabcd+0*0 &ÿÿÿÿû ÿTimes New Roman%-ð. XÀ8--2 ýTransport De-Segmentation; *0&00 F* 6*0K+0+00 &ÿÿÿÿ ²²²$ÈûÛýòûÛýòûëÿEüëÿEüÛýnüÛýüýû ÿ Times New Roman4-ð. À+2 Ãýÿûabcdabcdabcd+0*0+0+0*0+0 &ÿÿÿÿ &ÿÿÿÿ ²²²9ù0žû ÿTimes New Roman%-ð. ðÿ2 À DecryptionF*+ 0000 &ÿÿÿÿ-$²©)×)ÀÀ))z &ÿÿÿÿü-ð $âRT(æ&- $KpMt<:û ÿ Times New Roman4-ð. XÀÿ 2 iabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- $âZ\0æ.- $SpUtDBû ÿ Times New Roman%-ð. ðÿ 2 qabcd+0*0 &ÿÿÿÿ--é@hû &ÿÿÿÿ- ѹüpàû- åÌüSÛûû ÿTimes New Roman4-ð. ðÿ 2 žøûabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ñ þp0ý- åþS+ýû ÿTimes New Roman%-ð. XÀÿ 2 žHýabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ñÿp°þ- åÿS«þû ÿTimes New Roman4-ð. XÀÿ 2 žÈþabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ññp- åSû ÿTimes New Roman%-ð. XÀÿ 2 ž0abcd+0*0 &ÿÿÿÿ--$æorpúú¹p·qÎü²²²- ²²²äçûSû ²²²é7ýXîü ²²²è«þWbþ ²²²áPÑÿû ÿTimes New Roman4-ð. XÀÿ2 'Fý SDU Header6EEF*+0* &ÿÿÿÿ-ð ÿÿÿÿÉfþ`û ÿTimes New Roman%-ð. À+2 ÈþKey #1F*000 &ÿÿÿÿ-$Ñÿ7ÿ&ÿ&,ÿ,ÿÿòÿfþÐëý`û ÿTimes New Roman4-ð. XÀ̯2 GþKey #2F*000û ÿTimes New Roman%-ð. ÀF*2 $ý3Keys as received in theF*0&*&++*0+000+û ÿTimes New Roman4-ð. ÀF2 ý3 H.245 channelF000*0+00*&TNPP &ÿÿÿÿ--ðûŒ"Systemn-ðPowerPoint Document(CEÿÿÿÿweDocumentSummaryInformation8ÿÿÿÿFÿÿÿÿªPersistentStorage Directory8ÿÿÿÿÿÿÿÿÿÿÿÿa>_947279114ÿÿÿÿÿÿÿÿK ÀF ä¹Kç)œÊKç)œ ¡¢£€¥Š§š©þÿÿÿ«¬®¯°±þÿÿÿÀŽµ¶·ž¹º»ŒœŸ¿þÿÿÿÝÂÃÄÅÆÇÈÉÊËÌÍþÿÿÿÏÐÑÒÓÔÕÖ×ØÙÚÛþÿÿÿÞßáíûâãäåæçèéêëìøùïðñòóôõö÷þÿÿÿúýýÿÿÿþÿÿÿeèÿÿteé,ààØb) PØöòÿÿ:ëÿÿfØáØáØáÈÿÿ4Ò(ºÿÿºÿÿÖÿÿ âá°ÿÿåÿÿT ³4ØÔ Ð@ð`@æËáåÿÿT ³4 @@``@æËáåÿÿT ³4Ð@ð`0 @æËáÕÿÿø¶ÿÿL ·<Times New RomanÊá¶ÿÿL ·<"ArialÊáÕÿÿï$äÿÿ)ÿÿB* 8ÔØwPüÿÿb,,b,b,^,Pÿÿ ÿxT3Pýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿ4"L"X"d"ÔØwPüÿÿb bb^Pÿÿ$ÿt$ýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿddä×ÿÿÿ(,(8(D(ÔØwPüÿÿbbb^Pÿÿ<*ÿT*ýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿddô×ÿÿÿPÿÿ3PøÔØwPüÿÿbbb^PÿÿÿPóddþÿÿÿ×ddþÿÿÿVddþÿÿÿÈddþÿÿÿddþÿÿÿ×ÿÿÿxTÔØwPüÿÿbbb^Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿddÀ×ÿÿÿÿÿàûÿÿÔØÿÿÿÿwPüÿÿbÿÿÿÿÿøóÿbÿÿHóÿb:ÿÿfÿ^âÿÿÿP`ßÿÿèóÿ àÿÿÿf8ßêTT×ÿßÿÿ(ßL ß~úVÿÿÿ.B`ÈÿÿÿRpͪìÿÍÿÿÍÍŠÊ×ÿÿÿH^°ÔØÿÿÿÿwPüÿÿbÿÿÆÿÿÿÿÿÿÖÿÿÿÿÿÿÿÿÿÿbÿÿÿÖÿÿÿÿÿÿbÿÿÿÿ^ÿÿÿÿÿÿÿÿÿÿrÿPØÍÿÿlÌÿÿÿh¹ÿÿÀÿÿÿÿÿuh×ÿ3PÿÿP`Vÿ3PÿÿÿÿÿÿÈÿÿÿÿÿÿÿ3PÿÿÿxT3PK×ÿÿÿÉŠèÔØÿÿÿÿwPüÿÿbÿÿXÿ'ÿÿoÿb(Íÿÿ0ÍÿbÈÿÿÿ^ÃÿÿSÿPPÍÿÿXÍÿ`ÿÿÿKpͳ(ì×ÿÍÿÿÍÍ¿ OVÿÿÿh×!H øÈÿÿÿ¯" ó÷"ìÈÿÍÿÿ8 ß(ð¹K${×ÿÿÿ÷$<@ÔØÿÿÿÿwPüÿÿbÿÿ(ÿG'ÿÿw'ÿbðßÿÿžßÿb<ÿÿXÿ^§(ÿÿï(ÿPÈßÿÿßÿzÐÿÿÿ=*øß*X(×ÿÍÿÿžÍÐÀÍm+ýVÿÿÿ œ,pàèÈÿÿÿ-(Íõ-(ÿÍÿÿ ÍšÍ/×ÿÿÿ10*ðÄÿÿÅÁ(ýÿÿÿýÿÿÿœ8ÿ00¡ÿÿt :À'PÔb¢ÿÿD£$ÿÿµàÿÿìã42Öýÿÿddâ3î5ìÿÿ/î/ìÿÿ0î0ìÿÿ1î1Ðÿÿ; Ñîÿÿ{;ïíÀôÿÿ÷ÿÿ@p÷ÙÿÿHÚºÿÿ.ºÿÿ/ºÿÿ0ôÿÿ4xï$ÿÿÿÌ33ÌÌÌÿ²²²ÀÿÿÁ(ýÿÿÿÀôÿÿ÷ÿÿ@pýÿÿÿœ8ÿÿ00×bžÿÿã9¹ÿÿíºÙPžÿÿÉÀÿÿÁ(ýÿÿÿõÿÿ øÿÿ°øÿÿúÿÿýÿÿÿœ8ÿÿ00ÖbÀÿÿ)Á(ýÿÿÿŠõÿÿvøÿÿ¥øÿÿùÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿi£$@ùÿÿàõÿÿøÿÿkøÿÿyùÿÿµàÿÿî5CODECìÿÿ</î,/âèbìÿÿX0îH0ã4èýÿÿddìÿÿ(1î1áèÿÿÿÿÀÿÿÁ(ýÿÿÿ|Ðöÿÿ`°ýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿøÿÿÀ0úÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿvøÿÿTúÿÿŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$P°øÿÿ£úÿÿµàÿÿî5abcdìÿÿ</î,/âhÉbìÿÿX0îH0ã4hÉýÿÿddìÿÿ(1î1áhÉÿÿÿÿ¹ÿÿºÙPžÿÿàÀÿÿÁ(ýÿÿÿ`úÿÿÀüÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ@Á(ýÿÿÿVúÿÿ4üÿÿŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ° :Ñ'PÔb¢ÿÿ£$Púÿÿ£úûÿÿµ×Kûÿÿàÿÿî5abcdìÿÿ</î,/â4ÕbìÿÿX0îH0ã44Õýÿÿddìÿÿ(1î1á4Õÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`ýÿÿÀÿÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVýÿÿ4ÿÿÿŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$QPýÿÿ£úþÿÿµàÿÿî5abcdìÿÿ</î,/âábìÿÿX0îH0ã4áýÿÿddìÿÿ(1î1ááÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿðÀ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿæÄŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$QP £µàÿÿî5abcdìÿÿ</î,/âÌìbìÿÿX0îH0ã4Ììýÿÿddìÿÿ(1î1áÌìÿÿÿÿÀÿÿ Á(ýÿÿÿ|Æùÿÿfÿÿÿýÿÿÿœ8ÿÿÿ00 P¡ÿÿõ :Ñ'PÔb¢ÿÿÅ£$Q0úÿÿÿÿÿZiµ×ýÿÿöÿÿÿàÿÿUî5Transport De-Segmentationìÿÿ</î,/âÌäbìÿÿX0îH0ã4ÌäýÿÿddìÿÿX1îH1 áÌäÿÿÿÿáÌäÿÿÿÿáÌäÿÿÿÿ¹ÿÿôºÙPžÿÿÐÀÿÿÁ( >÷ÿÿ8úÿÿáøÿÿØÿÿÿýÿÿÿœ8ÿ00Öb@Àÿÿ0Á(ýÿÿÿêõÿÿýÿÿúÿÿ3þÿÿðýÿÿÿœ8ÿÿÿ00Öbð¡ÿÿ :Ñ'PÔb¢ÿÿp£$QÝýÿÿð$öÿÿ0ýÿÿcúÿÿþÿÿµàÿÿî5abcdabcdabcdìÿÿ</î,/âøbìÿÿX0îH0ã4øýÿÿddìÿÿ(1î1áøÿÿÿÿ¹ÿÿ ºÙPžÿÿæÀÿÿÁ(ýÿÿÿp`ð pýÿÿÿœ8ÿ00ÖbÀÿÿFÁ(ýÿÿÿƶ Öýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ¶ :Ñ'PÔb¢ÿÿ£$QÓ` ¹µ×ªFàÿÿî 5Decryptionìÿÿ</î,/ â|bìÿÿX0îH0 ã4|ýÿÿddìÿÿ(1î1 á|ÿÿÿÿÀÿÿÁ( @0*|`ð@°ýÿÿÿœ8ÿÿ00 PÀôÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿCÙpúÿÿýÿÿÿœ8ÿ00ÖbpúÿÿÀÿÿ(Á(ýÿÿÿödpúÿÿýÿÿÿœ8ÿÿ00Öbpúÿÿ¡ÿÿ :Ñ'PÔb¢ÿÿh£$QÀpúÿÿÀ*ùµàÿÿî5abcdìÿÿ</î,/âPbìÿÿX0îH0ã4Pýÿÿddìÿÿ(1î1áPÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ)Cépúÿÿýÿÿÿœ8ÿ00ÖbpúÿÿÀÿÿ(Á(ýÿÿÿd&púÿÿýÿÿÿœ8ÿÿ00Öbpúÿÿ¡ÿÿ :Ñ'PÔb¢ÿÿh£$ÐpúÿÿÀ#* µàÿÿî5abcdìÿÿ</î,/â(bìÿÿX0îH0ã4(ýÿÿddìÿÿ(1î1á(ÿÿÿÿÀÿÿÁ(ýÿÿÿ|ÐöÿÿÐýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿÀ÷ÿÿàpùÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ¶÷ÿÿŠùÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$pð÷ÿÿÃZùÿÿ©µàÿÿî5abcdìÿÿ</î,/âè3bìÿÿX0îH0ã4è3ýÿÿddìÿÿ(1î1áè3ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`úÿÿàüÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVúÿÿŠ4üÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$púÿÿÃúûÿÿ©µàÿÿî5abcdìÿÿ</î,/âŽ?bìÿÿX0îH0ã4Ž?ýÿÿddìÿÿ(1î1áŽ?ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`ýÿÿàÿÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVýÿÿŠ4ÿÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$pýÿÿÃúþÿÿ©µàÿÿî5abcdìÿÿ</î,/âKbìÿÿX0îH0ã4Kýÿÿddìÿÿ(1î1áKÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ0àà ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ&ŠÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$p`ÃÊ©µàÿÿî5abcdìÿÿ</î,/âLWbìÿÿX0îH0ã4LWýÿÿddìÿÿ(1î1áLWÿÿÿÿÀÿÿÁ( @0*|ðàÐ Ðôÿÿýÿÿÿœ8ÿÿ00 PÀÿÿÁ(ýÿÿÿ|<÷ÿÿ¥Ì÷ÿÿÅýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ|Üùÿÿ¯lúÿÿÏýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ|ÅüÿÿUýÿÿÍýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ|¢ÿÿÿ2¿ýÿÿÿœ8ÿ00 PÀÿÿ^Á(ýÿÿÿ|Rúÿÿ þÿÿ€ýÿÿÿœ8ÿÿÿ00 P¡ÿÿÎ :Ñ'PÔb¢ÿÿ£$Núÿÿ¡fþÿÿµ×úÿÿVàÿÿ.î 5SDU Headerìÿÿ</î,/ âlRbìÿÿX0îH0 ã4lRýÿÿddìÿÿ@1î01álRÿÿÿÿálRÿÿÿÿ¹ÿÿ2ºÙPÐÿÿÑÀÿÿÁ(ýÿÿÿÀÌüÿÿ þÿÿýÿÿÿœ8ÿP00ÖbÀÿÿZÁ(ýÿÿÿæÆüÿÿ æýÿÿýÿÿÿ6Pœ8ÿÿÿP00Öb¡ÿÿÊ :Ñ'PÔb¢ÿÿ£$ýÿÿ ãüÿÿP Éýÿÿµ×8ýÿÿàÿÿ*î5Key #1ìÿÿ</î,/âbìÿÿX0îH0ã4ýÿÿddìÿÿ@1î01áÿÿÿÿáÿÿÿÿÀÿÿÁ( p+6|àUþÿÿp¥ÿÿÿýÿÿÿœ8ÿ3Pÿ00 PÀÿÿÁ(ýÿÿÿ|¿Öûÿÿ Ëüÿÿýÿÿÿœ8ÿ3Pÿ00 PÀÿÿ*Á(ýÿÿÿ|ÚÄûÿÿ~ äüÿÿýÿÿÿœ8ÿÿ3Pÿ00 P¡ÿÿ :Ñ'PÔb¢ÿÿj£$ÑüÿÿáûÿÿD Çüÿÿµàÿÿî5Key #2ìÿÿ</î,/âüýbìÿÿX0îH0ã4üýýÿÿddìÿÿ(1î1áüýÿÿÿÿÀÿÿ©Á(ýÿÿÿ|+ùÿÿ ûÿÿýÿÿÿœ8ÿÿ3Pÿ00 P¡ÿÿ :Ñ'PÔb¢ÿÿé£$ÑIúÿÿeùÿÿZhûÿÿµ×mQúÿÿàÿÿyî%5Keys as received in the H.245 channelìÿÿ</î,/%âDbìÿÿ 0î0ã4Dýÿÿdd ã4Dýÿÿddìÿÿ(1î1%áDÿÿÿÿÐÿÿÍÑøÿÿ©ïíÀôÿÿ÷ÿÿ@p×bï$7ÿÿÿÌ33ÌÌÌÿ²²²ï$7ÿÿÿÿÿÿÿÿÿÿ3ï$7ÿÿÌ3333ÌÿÌfï$7ÿÿÿ999ËËËMMMêêêï$7ÿÿÿÿÌfÿÌÌÀÀÀï$7ÿÿÿËËËfÿÿ3ï$7ÿÿÿ3ÿÿÌÌ̲²²÷ÙÿÿHÚºÿÿ.ºÿÿ/ºÿÿ0ôÿÿ4xï$ÿÿÿÌ33ÌÌÌÿ²²²ÀÿÿÁ(ýÿÿÿÀôÿÿ÷ÿÿ@pýÿÿÿœ8ÿÿ00×bžÿÿ Âÿÿ\ÃbÁ(ýÿÿÿ Ppöÿÿùÿÿ àûÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿŽ :Ä'PÔbäÿÿ£$Äÿÿªöÿÿ-ùÿÿV Ãûÿÿµàÿÿ,î 5Click to edit Master title styleìÿÿ</î,/ âHe,bìÿÿX0îH0 ã4Heýÿÿddìÿÿ(1î1 áHeÿÿÿÿÂÿÿ2ÃbÁ(ýÿÿÿ Ppöÿÿpüÿÿ ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ä'PÔbäÿÿZ£$ÄÿÿªöÿÿüÿÿV sµàÿÿîR5Click to edit Master text styles Second level Third level Fourth level Fifth levelìÿÿÀ/î°/!âli b âlibâlibâlibìÿÿx0îh0!ã4liýÿÿdd ã4liýÿÿddã4liýÿÿdd ã4liýÿÿddã4liýÿÿddìÿÿ(1î1RáliÿÿÿÿÂÿÿ=ÃbÁ(ýÿÿÿ Ppöÿÿð ûÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿªöÿÿ æúÿÿóµàÿÿ î5*ìÿÿ</î,/â0obìÿÿX0îH0ã40oýÿÿddìÿÿ(1î1á0oÂÿÿ=ÃbÁ(ýÿÿÿ Ppüÿÿðýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿªüÿÿ Vóµàÿÿ î5*ìÿÿ</î,/â0sbìÿÿX0îH0ã40sýÿÿddìÿÿ(1î1á0sÂÿÿ=ÃbÁ(ýÿÿÿ Pàð ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿ V óµàÿÿ î5*ìÿÿ</î,/â0wbìÿÿX0îH0ã40wýÿÿddìÿÿ(1î1á0wºÿÿÐÿÿÑÿÿÿDºÿÿ_VBA_PROJECTºÿÿ úÿÿŽþêÿÿ0ûûý4 d dededP|düÿÿBýÿÿÿÿ$dãÿÿeé,êþÿÕÍÕ.+,ù®0d`h š° žäOn-screen ShoweArialTimes New RomanDefault DesignNo Slide TitleFonts UsedDesign Template Slide Titleseadonly def/packedarraytype{dup rcheck{dup xcheck{({)tprint{typeprint} forall(})tprint}{([)tprint{typeprint}forall(])tprint}ifelse}{pop (-packedarray- )tprint}ifelse}readonly def/courier/Courier findfont 10 scalefont def end errordict/handleerror{systemdict begin $error begin $brkpage begin newerror{/newerror false store vmstatus pop pop 0 ne{grestoreall}if showpage initgraphics courier setfont lmargin 720 moveto(ERROR: )prnt errorname prnt nl(OFFENDING COMMAND: )prnt/command load prnt $error/ostack known{nl nl(STACK:)prnt nl nl $error/ostack get aload length{==}repeat}if systemdict/showpage get exec(%%[ Error: )print errorname =print (; OffendingCommand: )print/command load =print( ]%%)= flush}if end end end} dup 0 systemdict put dup 4 $brkpage put bind readonly put/currentpacking where {pop/setpacking where{pop oldpack setpacking}if}if %%EndProcSet userdict /Pscript_Win_Driver_Incr 200 dict dup begin put %%BeginResource: file Pscript_FatalError 2.0 0 /FatalErrorIf{{initgraphics findfont exch scalefont setfont counttomark 3 div cvi{moveto show}repeat showpage quit}{cleartomark}ifelse}bind def %%EndResource /VM? {vmstatus exch sub exch pop gt { [ (This job requires more memory than is available in this printer.) 100 500 (Try one or more of the following, and then print again:) 100 485 (In the PostScript dialog box, click Optimize For Portability.) 115 470 (In the Device Options dialog box, make sure the Available Printer Memory is accurate.) 115 455 (Reduce the number of fonts in the document.) 115 440 (Print the document in parts.) 115 425 12 /Times-Roman showpage (%%[ PrinterError: Low Printer VM ]%%) = true FatalErrorIf}if} bind def 30000 VM? %%BeginResource: file Pscript_Win_Utils 2.0 0 /|/def load def/,/load load |/~/exch , |/?/ifelse , |/!/pop , |/`/begin , |/^ /index , |/@/dup , |/+/translate , |/$/roll , |/U/userdict , |/M/moveto , |/- /rlineto , |/&/currentdict , |/:/gsave , |/;/grestore , |/F/false , |/T/true , |/N/newpath , |/E/end , |/Ac/arc , |/An/arcn , |/A/ashow , |/D/awidthshow , | /C/closepath , |/V/div , |/O/eofill , |/L/fill , |/I/lineto , |/-C/rcurveto , |/-M/rmoveto , |/+S/scale , |/Ji/setfont , |/Lc/setlinecap , |/Lj/setlinejoin , |/Lw/setlinewidth , |/S/show , |/LH/showpage , |/K/stroke , |/W/widthshow , |/R/rotate , |/b{bind |}bind |/bd{bind |}bind |/xd{~ |}bd/ld{, |}bd/lw/Lw ld /lc/Lc ld/lj/Lj ld/sg/setgray ld/L2? F/languagelevel where{! languagelevel 2 ge{! T}if}if |/g{@ not{U/DefIf_save save put}if U/DefIf_bool 2 ^ put}b /DefIf_El{if U/DefIf_bool get not @{U/DefIf_save get restore}if}b/e{DefIf_El ! }b/self & |/reinitialize{[/TextInit/GraphInit/UtilsInit counttomark{@ where{ self eq}{F}?{cvx exec}{!}?}repeat cleartomark}b/initialize{`{/ADO_mxRot ~ | /TextInitialised? F | reinitialize E}{U/Pscript_Win_Data 200 dict @ ` put /ADO_mxRot ~ |/TextInitialised? F | reinitialize}?}b/terminate{!{& self eq{ exit}{E}?}loop E}b/suspend/terminate , |/resume{` Pscript_Win_Data `}b/snap{ transform 0.25 sub round 0.25 add ~ 0.25 sub round 0.25 add ~ itransform}b /dsnap{dtransform round ~ round ~ idtransform}b<04>cvn{}|/setjn{{statusdict /jobname known{statusdict/jobname 3 -1 $ put}if}stopped cleartomark}b/solid{[] 0 setdash}b/setdsh{0 setdash}b/colspRefresh{}b/rp{4 2 $ M 1 ^ 0 - 0 ~ - neg 0 -}b/rr{1 ^ 0 - 0 ~ - neg 0 - C}b %%EndResource %%BeginResource: file Pscript_Win_Utils_L1 2.0 0 L2? not g{/rf{N rp L}b/fx{1 1 dtransform @ 0 ge{1 sub 1}{1 add -0.25}? 3 -1 $ @ 0 ge{1 sub 1}{1 add -0.25}? 3 1 $ 4 1 $ idtransform 4 -2 $ idtransform}b/BZ{ 4 -2 $ snap + +S fx rf}b/rs{N rp C K}b/rc{N rp clip N}b/sg{setgray}b/sco{ setrgbcolor}b/sgco{{sg}{sco}?}b}e %%EndResource Ole ÿÿÿÿÿÿÿÿÿÿÿÿbPIC HJÿÿÿÿcLMETAÿÿÿÿÿÿÿÿÿÿÿÿ³ÜCompObjIMÿÿÿÿehw;f* ê:&ÿÿÿÿWordMicrosoft Word û-ûÖÿTimes New Roman%- üÎÎÎ- ú"-hC ú"-ðüÿÿÿ-ð ú"-þü-ð ú"-úr]r-ðüÿÿÿ- ú"-o -ð-ðüÿÿÿ- ú"-lá¡-ð-ðüÿÿÿ- ú"-Åáj-ð-ðüÿÿÿ- ú"-vá-ð-ðO8ìûÒÿ"Arial¶- 2 ìPhysical Layer
'ÿÿ÷ÞÀì-2 Âì Link Layer 'ÿÿ_,)p-)2 +pUnreliable Transport!
'ÿÿ_l)Ô-&2 +ÔReliable Transport!
'ÿÿü- ú"-áÃ-ð-ž6ð-2 ð Network Layer! ! 'ÿÿüÿÿÿ- ú"- A-ð-ðüÿÿÿ- ú"- ùA-ð-ðüÿÿÿ- ú"-cáDh-ð-ðš|ûßÿ"Arial-2 }G.XXX 'ÿÿ€tûÚÿ"Arial-2 uH.26X'ÿÿÑUº-2 ºH.245! 'ÿÿüÎÎÎ- ú"- ù -ð -ð- ú"-šAû-ð-ªŽeûãÿ"ArialNe-2 eRTP'ÿÿ¢Ú{|-2 ||T.124'ÿÿ;Û|-2 |T.125'ÿÿá¹-2 â¹Q.931'ÿÿª$-2 $RTCP'ÿÿüÎÎÎ- ú"- C¡-ð -ð ×/°æ-2 ±æCall'ÿÿ9å¯-2 æ¯ Signaling'ÿÿüÿÿÿ- ú"- CiÄö-ð -ð UrÍ-2 sÍH.225.0'ÿÿ-Ü[-:2 Ý[Terminal Control and Management 'ÿÿüÿÿÿ- ú"- CüÄ-ð -ð üÿÿÿ- ú"- CáÄi-ð -ð ôÔÎ-2 ÏData'ÿÿ!Êú-2 ûApp'ÿÿ©å2-2 æ2AV App'ÿÿüÎÎÎ- ú"- ¡D¥-ð -ð DgÆ-2 hÆH.225.0'ÿÿÁ>¹-2 ¹Terminal 'ÿÿû*Õñ-2 Öñto'ÿÿ)Z-2 Gatekeeper 'ÿÿ^;7±-2 8± Signaling'ÿÿ;oÖ-2 pÖ(RAS) 'ÿÿ&ÿÿÿÿëy ü- ú"- #ùã-ð -ð ü- !ð=Íã,-ð êíF-2 îF Encryption
'ÿÿ & ÿÿÿÿ,i-2 Sec.'ÿÿLl%-2 &Cap.'ÿÿ&ÿÿÿÿI±üÎÎÎ- ú"- OÿÿÌ-ð -ð c=þ- 2
þScope of H.235'ÿÿ
& ÿÿÿÿõV¿±-&2 Á±Transport Security
'ÿÿüÿÿÿ- ú"- µábk-ð -ð Oß(-2 )T.123'ÿÿ·²NûÖÿ"Arial- #2 NNetwork Security 'ÿÿ-ObjInfoÿÿÿÿÿÿÿÿÿÿÿÿgOlePres000LOÿÿÿÿÁüWordDocumentÿÿÿÿÿÿÿÿÿÿÿÿÎÜSummaryInformation(NPÿÿÿÿhÀÿÿÿÿÿÿÿÿv;e*Ô ê:&ÿÿÿÿWordMicrosoft Word û-ûÖÿTimes New Roman%- üÎÎÎ- ú"-hC ú"-ðüÿÿÿ-ð ú"-þü-ð ú"-úr]r-ðüÿÿÿ- ú"-o -ð-ðüÿÿÿ- ú"-lá¡-ð-ðüÿÿÿ- ú"-Åáj-ð-ðüÿÿÿ- ú"-vá-ð-ðO8ìûÒÿ"Arial¶- 2 ìPhysical Layer
'ÿÿ÷ÞÀì-2 Âì Link Layer 'ÿÿ_,)p-)2 +pUnreliable Transport!
'ÿÿ_l)Ô-&2 +ÔReliable Transport!
'ÿÿü- ú"-áÃ-ð-ž6ð-2 ð Network Layer! ! 'ÿÿüÿÿÿ- ú"- A-ð-ðüÿÿÿ- ú"- ùA-ð-ðüÿÿÿ- ú"-cáDh-ð-ðš|ûßÿ"Arial-2 }G.XXX 'ÿÿ€tûÚÿ"Arial-2 uH.26X'ÿÿÑUº-2 ºH.245! 'ÿÿüÎÎÎ- ú"- ù -ð -ð- ú"-šAû-ð-ªŽeûãÿ"ArialNe-2 eRTP'ÿÿ¢Ú{|-2 ||T.124'ÿÿ;Û|-2 |T.125'ÿÿá¹-2 â¹Q.931'ÿÿª$-2 $RTCP'ÿÿüÎÎÎ- ú"- C¡-ð -ð ×/°æ-2 ±æCall'ÿÿ9å¯-2 æ¯ Signaling'ÿÿüÿÿÿ- ú"- CiÄö-ð -ð UrÍ-2 sÍH.225.0'ÿÿ-Ü[-:2 Ý[Terminal Control and Management 'ÿÿüÿÿÿ- ú"- CüÄ-ð -ð üÿÿÿ- ú"- CáÄi-ð -ð ôÔÎ-2 ÏData'ÿÿ!Êú-2 ûApp'ÿÿ©å2-2 æ2AV App'ÿÿüÎÎÎ- ú"- ¡D¥-ð -ð DgÆ-2 hÆH.225.0'ÿÿÁ>¹-2 ¹Terminal 'ÿÿû*Õñ-2 Öñto'ÿÿ)Z-2 Gatekeeper 'ÿÿ^;7±-2 8± Signaling'ÿÿ;oÖ-2 pÖ(RAS) 'ÿÿ&ÿÿÿÿëy ü- ú"- #ùã-ð -ð ü- !ð=Íã,-ð êíF-2 îF Encryption
'ÿÿ & ÿÿÿÿ,i-2 Sec.'ÿÿLl%-2 &Cap.'ÿÿ&ÿÿÿÿI±üÎÎÎ- ú"- OÿÿÌ-ð -ð c=þ- 2
þScope of H.235'ÿÿ
& ÿÿÿÿõV¿±-&2 Á±Transport Security
'ÿÿüÿÿÿ- ú"- µábk-ð -ð Oß(-2 )T.123'ÿÿ·²NûÖÿ"Arial- #2 NNetwork Security 'ÿÿ-Ü¥hWà eÜ5ejjjjööö * +1:::::FFFVXXX=ŒQŒ \XŽ(+öF :FFF+Vjj::VVVFj:ö:VÀ}œâÃŒ jjjjFVVV Network Security
Transport Security
Physical Layer
Link Layer
Unreliable Transport
Reliable Transport
Network Layer
G.XXX
H.26X
H.245
RTP
T.124
T.125
Q.931
RTCP
Call
Signaling
H.225.0
Terminal Control and Management
Data
App
AV App
H.225.0
Terminal
to
Gatekeeper
Signaling
(RAS)
Encryption
Sec.
Cap.
Scope of H.235
T.123
€ÀN¥ÀNŠ§š\©]ª20(è,Í!ÿÿÿ20(p#(áÿÿÿÿÿÿ0æ/&Õ'k!Ó_ÎÎÎÎÎÎ00&%#k!Á_ÎÎÎÎÎÎ0ç/&G3!!G0è/&wM0òñG0é/&*·ÿÿÿÿÿÿ0ê/&%#H*Ç }ÿÿÿÿÿÿ0ë/&¿+æ®ÿÿÿÿÿÿ0ì/&/æ±ÿÿÿÿÿÿ2í/(Ÿ/7ÿÿÿÿÿÿ2î/(Ÿ]-ÿÿÿÿÿÿ2ï/(*Sÿÿÿÿÿÿ2ð/($ *ÿÿÿÿÿÿ0ñ/&g-æ®ÿÿÿ2ò/(Ò/,ÿÿÿÿÿÿ0ó/&b!PŸÿÿÿÿÿÿ0ô/&Sb!ØŸÿÿÿÿÿÿ0õ/&¬+m!@_ÿÿÿÿÿÿ2ö/(ùy"YÓÿÿÿÿÿÿ2÷/(QV"wâÿÿÿÿÿÿ2ø/(j( #àÿÿÿÿÿÿ0ù/&%%ÎÎÎÎÎÎ0ú/&:b!9×ÿÿÿ2û/(hn'xµÿÿÿÿÿÿ2ü/( ,x"õÿÿÿÿÿÿ2ý/(,W%õÿÿÿÿÿÿ2ÿ/(Ëáµÿÿÿÿÿÿ20(þn'áµÿÿÿÿÿÿ20(n$u#Zµÿÿÿÿÿÿ20(e#r$µÿÿÿÿÿÿ00&$_ÿÿÿÿÿÿ20(ø#I"µÿÿÿÿÿÿ20(|Œµÿÿÿÿÿÿ00&*]ÿÿÿÿÿÿ00&®+ >[ÿÿÿÿÿÿ2 0(,7µÿÿÿÿÿÿ2 0(&, Zµÿÿÿÿÿÿ20(s€;µÿÿÿÿÿÿ00&jo!·ÊÎÎÎÎÎÎ2 0("Yµÿÿÿÿÿÿ20(Ë#wµÿÿÿÿÿÿ20(Ö&$µÿÿÿÿÿÿ20(%:µÿÿÿÿÿÿ20(£ý%µÿÿÿÿÿÿ20(S'áµÿÿÿÿÿÿ0i$ 2&1&GØÿÿÿ(È/ µÿÿÿÿÿÿâèÛ~ÿ20($* %µÿÿÿÿÿÿ20($*§%µÿÿÿÿÿÿt0j%V=Ó&<ÒÎÎÎÎÎÎ(ï(µÿÿÿÿÿÿÌàä€ÿ00&»+É&1Zÿÿÿÿÿÿ20(,*õÿÿÿÿÿÿ45FG°·ŸÅ^ù÷ñëåñßÝu]abc]abc]abc]abc]uDa5FGZ[jkvw ¡¯°¶·œŸÄÅÉÊÐÑ×ØÞßäåêëõöÿ !&'+,34þ²!ðþæþþåþþ:þþþþSþþŠþþþþ]»þþzÓþþèþþ{£þþãþþÈ£þþå£þþå£þþ^£þþ£þþ£þþœ£þþ£þþZ£þþ;£þ-4<=FGKLWXbcijuv{|þ]£þþ~£þþ£þþ>£þþ£þþå£þþ£þþ£þþ£þþ£þþÈ£þþþ²!ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font&6BXl{£ª°¶ÁËìò÷ÿ#.5AGM]dgÿÿÿÿ ÿÿ^4 !"#$%&'()*+,-./0123²äFvŠÖ6fÈú,^Àð PŽæ F x ª Ü @ r € Ô 8hÊü.^Âô& X $Vü,5ÿ@HP DeskJet 520 PrinterLPT1:DESKJETCHP DeskJet 520 PrinterHP DeskJet 520 Printer(,,A^|žÖ¹×¹ÖHP DeskJet 520 Printer(,,A^|žÖ¹×¹Ö1Times New RomanSymbol&Arial"ðÐhÚf+!( James Toga James Togaþÿà òùOh«+'³Ù0 ¬žÌØäø @LX dpxätõþÿJames TogaNormal.dotJames Toga2Microsoft Word for Windows 9500@FÃ#@@,BÄŒ@e¹âÃŒ+þÿÕÍÕ.+,ù®0šHDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿoØ_947279116GeU ÀF äKç)œgõKç)œOle ÿÿÿÿÿÿÿÿÿÿÿÿsPIC RTÿÿÿÿtLPdlt|ä Acme CorpEDLr;Æ Ž!Ïèèr;Æ £ U&ÿÿÿÿWordMicrosoft WordA û-METAÿÿÿÿÿÿÿÿÿÿÿÿvPCompObjSWÿÿÿÿ€hObjInfoÿÿÿÿÿÿÿÿÿÿÿÿŠOlePres000VYÿÿÿÿ§p ¡¢£þÿÿÿ¥þÿÿÿþÿÿÿš©ª«¬®¯°±²³Žµ¶·ž¹º»ŒœŸ¿ÀÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔþÿÿÿÖ×ØÙÚÛþÿÿÿÝÞßþÿÿÿþÿÿÿâþÿÿÿäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿûÿTimes New Romanl- §êO'ûœÿŒ"Arial²-2 'AGRQ404'ÿÿiV -2 V AGCF40)'ÿÿAäé4-2 ö4AxxQ%%4'ÿÿÑ64-2 C4AIRR00'ÿÿk4£ûµÿ"ArialNe-2 £A( .., AliasK2*&'ÿÿx@8ûÎÿ"Arial- 2 BAa'ÿÿk-2 A, .)K'ÿÿx8Ô-2 BÔA'ÿÿk â-(2 âA[Not Authenticated]6*2****&***'ÿÿcÃØ©ûµÿŒ"Arial-@2 ç©#A cryptoTokens [ (cryptoEPPwdEncr) ]**....**.*K**..222:.2.*K-'ÿÿ ú"-xêx ú"-ðü- úÿÿÿ"-$õûyõg y-ðüÿÿÿ-ð ú"->þ> -ðü- úÿÿÿ"- $ -? Pä?-ð -ð ú"-HêH -ðü- úÿÿÿ"- $õZûHõ7 H-ð -ð ú"- -ðü- úÿÿÿ"- $óë-ð -ð*¶§³-@2 ¶³#A cryptoTokens [ (cryptoGKPwdEncr) ]**....**.*K**..:62:.2.*K--'ÿÿ,Ôh -2 áh AxCF%0)'ÿÿ8m ÙÈ-U2 èÈ1A( , GatekeeperIdentifier, ) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-þÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿs;Æ H £ U&ÿÿÿÿWordMicrosoft WordA û-ûÿTimes New Romanl- §êO'ûœÿŒ"Arial²-2 'AGRQ404'ÿÿiV -2 V AGCF40)'ÿÿAäé4-2 ö4AxxQ%%4'ÿÿÑ64-2 C4AIRR00'ÿÿk4£ûµÿ"ArialNe-2 £A( .., AliasK2*&'ÿÿx@8ûÎÿ"Arial- 2 BAa'ÿÿk-2 A, .)K'ÿÿx8Ô-2 BÔA'ÿÿk â-(2 âA[Not Authenticated]6*2****&***'ÿÿcÃØ©ûµÿŒ"Arial-@2 ç©#A cryptoTokens [ (cryptoEPPwdEncr) ]**....**.*K**..222:.2.*K-'ÿÿ ú"-xêx ú"-ðü- úÿÿÿ"-$õûyõg y-ðüÿÿÿ-ð ú"->þ> -ðü- úÿÿÿ"- $ -? Pä?-ð -ð ú"-HêH -ðü- úÿÿÿ"- $õZûHõ7 H-ð -ð ú"- -ðü- úÿÿÿ"- $óë-ð -ð*¶§³-@2 ¶³#A cryptoTokens [ (cryptoGKPwdEncr) ]**....**.*K**..:62:.2.*K--'ÿÿ,Ôh -2 áh AxCF%0)'ÿÿ8m ÙÈ-U2 èÈ1A( , GatekeeperIdentifier, ) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-þÿà òùOh«+'³Ù0 ¬žÌØäø @LX dpxWordDocumentÿÿÿÿÿÿÿÿÿÿÿÿîxSummaryInformation(XZÿÿÿÿÕÀDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿÜØ_947279117ÿÿÿÿÿÿÿÿ_ ÀFÑ Lç)œÀb/Lç)œÜ¥hWà eßxÈjjjjŠŠŠÐÐÐÐÐÐ Ú ÐÇ1ääää人ºÊÌÌÌ5ÔÕÔ©øXP(ÇŠºäÖºººÇÊjjääÊÊʺj<äŠäÊ b¿ŒºÂjjjjºÊÊÊ cryptoTokens [ (cryptoGKPwdEncr) ]
cryptoTokens [ (cryptoEPPwdEncr) ]
GRQ
GCF
xxQ
IRR
( .., Alias
a
, .)
[Not Authenticated]
xCF
( , GatekeeperIdentifier, ) [Not Authenticated]
€ÀN¥ÀNŠ§šz#©z#ª20(gÖ)¡;ÿÿÿÿÿÿ2û/(Qç'ÕKÿÿÿÿÿÿ2ò/(å6$ÒÓÿÿÿÿÿÿ2ó/(6&ÃÓÿÿÿÿÿÿ2ô/((¥Óÿÿÿÿÿÿ2õ/(Ç(xÓÿÿÿÿÿÿ2ö/(š!#Áâÿÿÿÿÿÿ2÷/(î$$ÿÿÿÿÿÿ2ø/(/%#,âÿÿÿÿÿÿ2ù/(ë&$yÿÿÿÿÿÿ2ú/('#âÿÿÿÿÿÿ0þ/&ž$ Dÿ/: 5q$cUÿÿÿ T*b*00&év& D0:«M&bTÿÿÿ aS)aS)00&žô( D0: 5Ê(cUÿÿÿ T*b*00&ù·* D0:»*cUÿÿÿ bS*bT*20(Ž6B*¥Óÿÿÿÿÿÿ20(%ñâÿÿÿÿÿÿûú!úûú!úûú!úûú-- -- &$!úúú!úúú!úúú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úúú!úúú-- -- 6$%úúú%úúú%úúú$úûú$úûú#úûú#úûú"úûú"úúú!úúú!úûú"úûú"úûú#úûú#úûú$úûú$úûú%úûú%úûú%úûú%úûú&úûú&úûú&úúú%úúú-- -- &$&úûú&úûú&úûú&úúú&úúú%úúú%úûú&úûú&úûú&úûú&úûú&úûú&úûú&úûú&úûú&úûú&úûú-- -- $&úýú&úýú&úûú&úûú&úýú&ú9<_au ¥ªÝÞßPùòìòìåìßìßìåìÝu]abc U]abc]abc U]abcuDa:;<`aefjkoptu €¥©ªÜÝÞßþ²!ðþ¡Øþ¡ØþþØØþþÔÀþþÃÀþþŠÀþþyÀþþÂØþþþþ/ØþþzþþØþþŠÀþþòØþþþ²!ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font&KPUZ_lowzÇÊß ßÿÿÿÿ ÿÿßPß ßö(ZŸð"TžêLÀ4xšìàÿ@HP LaserJet 4 PlusLPT1:HPPCL5MSHP LaserJet 4 PlusHP LaserJet 4 Plus@w XX@MSUDNHP LaserJet 4 Plusä;d HP LaserJet 4 Plus@w XX@MSUDNHP LaserJet 4 Plusä;d 1Times New RomanSymbol&Arial"ÁÐh`P\!( James Toga James TogaäHC GJames Toga&GNormal.dotJames Toga2Microsoft Word for Windows 95@FÃ#@@rÕK¿Œ@à9¿ŒþÿÕÍÕ.+,ù®0šHPdlt|äPictureTel.Ole ÿÿÿÿÿÿÿÿÿÿÿÿàPIC ^ÿÿÿÿáLMETAÿÿÿÿÿÿÿÿÿÿÿÿãøCompObj]aÿÿÿÿhLr;š Ž!Ÿèèr;š ø U&ÿÿÿÿWordMicrosoft Word:ûŒSystem -ûÿTimes New Roman*íwÀgïw( € - åHûœÿŒ"Ar þÿÿÿþÿÿÿþÿÿÿ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFþÿÿÿHIJKLMþÿÿÿOPQþÿÿÿþÿÿÿTþÿÿÿVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ þÿÿÿ%Å !"#$0²'()*+,-./þÿÿÿ³23456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnoprýÿÿÿstuvwxyz{|}~ialV 2!íw*íwÀgïwV 2 -2 U:GRQ404'ÿÿb I -2 I :GCF40)'ÿÿ;ßâ(-2 ï(:xxQ%%4'ÿÿÌ/(-2 <(:IRR00'ÿÿk~ûµÿ"ArialR 2!íw*íwÀgïwR 2 -2 ~:( .., AliasK2*&'ÿÿw#8ÜûÎÿ"ArialB ;!íw*íwÀgïwB ; - 2 BÜ:a'ÿÿkæ÷-2 ÷:, .)K'ÿÿwê8°-2 B°:'ÿÿk{ œ-(2 œ:[Not Authenticated]6*2****&***'ÿÿ>ßûµÿŒ"Arial 9!íw*íwÀgïw 9 -@2 î#: cryptoTokens [ (cryptoEPPwdHash) ]ÿ**....**.*K**..222:.6**.K'ÿÿú-rÝrþú-ðü-ú-$éðré` r-üÿÿÿ- ðú-8ø8 -ðü--$'8Iß8-- ðú-BÝBþ-ðü--$éSðBé0 B-- ðú-þøþ -ðü--$ìþßþ-- ð Ï-@2 #: cryptoTokens [ (cryptoGKPwdHash) ]**....**.*K**..:62:.6**.K-'ÿÿ&Í\ -2 Ú\ :xCF%0)'ÿÿ8P Ù£-U2 è£1:( , GatekeeperIdentifier, ) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-þÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿs;š ð ø U&ÿÿÿÿWordMicrosoft Word:ûObjInfoÿÿÿÿÿÿÿÿÿÿÿÿOlePres000`cÿÿÿÿWordDocumentÿÿÿÿÿÿÿÿÿÿÿÿ ÷SummaryInformation(bdÿÿÿÿGžŒSystem -ûÿTimes New Roman*íwÀgïw( € - åHûœÿŒ"ArialV 2!íw*íwÀgïwV 2 -2 U:GRQ404'ÿÿb I -2 I :GCF40)'ÿÿ;ßâ(-2 ï(:xxQ%%4'ÿÿÌ/(-2 <(:IRR00'ÿÿk~ûµÿ"ArialR 2!íw*íwÀgïwR 2 -2 ~:( .., AliasK2*&'ÿÿw#8ÜûÎÿ"ArialB ;!íw*íwÀgïwB ; - 2 BÜ:a'ÿÿkæ÷-2 ÷:, .)K'ÿÿwê8°-2 B°:'ÿÿk{ œ-(2 œ:[Not Authenticated]6*2****&***'ÿÿ>ßûµÿŒ"Arial 9!íw*íwÀgïw 9 -@2 î#: cryptoTokens [ (cryptoEPPwdHash) ]ÿ**....**.*K**..222:.6**.K'ÿÿú-rÝrþú-ðü-ú-$éðré` r-üÿÿÿ- ðú-8ø8 -ðü--$'8Iß8-- ðú-BÝBþ-ðü--$éSðBé0 B-- ðú-þøþ -ðü--$ìþßþ-- ð Ï-@2 #: cryptoTokens [ (cryptoGKPwdHash) ]**....**.*K**..:62:.6**.K-'ÿÿ&Í\ -2 Ú\ :xCF%0)'ÿÿ8P Ù£-U2 è£1:( , GatekeeperIdentifier, ) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-þÿà òùOh«+'³Ù0Ü¥hWà eß÷ÈjjjjŠŠŠÐÐÐÐÐÐ Ú ÐK1ääää人ºÖØØØ=!-|XÔ#KŠºäÖºººKÖjjääÖÖÖºj<äŠäÖ0¿äRÃŒºÂjjjjºÖÖÖ cryptoTokens [ (cryptoGKPwdHash) ]
cryptoTokens [ (cryptoEPPwdHash) ]
GCF
xxQ
IRR
( .., Alias
a
, .)
[Not Authenticated]
xCF
( , GatekeeperIdentifier, ) [Not Authenticated]
GRQ
€ÀN¥ÀNŠ§š#©#ª20(ç)ö6ÿÿÿÿÿÿ2ý/(Ñþ'Ýâÿÿÿÿÿÿ2õ/(j6ÿ%ÕÓÿÿÿÿÿÿ2ö/(æ(·Óÿÿÿÿÿÿ2÷/(æ¿(Óÿÿÿÿÿÿ2ø/(O!#Óâÿÿÿÿÿÿ2ù/($$©ÿÿÿÿÿÿ2ú/(×$#>âÿÿÿÿÿÿ2û/(&$ÿÿÿÿÿÿ2ü/(³&#âÿÿÿÿÿÿ0þ/&$ Dÿ/:5h$uUÿÿÿ T*t*00&Ûn& D0:D&uTÿÿÿ tb*tS*00&ì( D0:5Â(uTÿÿÿ S*t*00&Û¯* D0: *uUÿÿÿ tb*tT*2 0(6:*·Óÿÿÿÿÿÿ2 0(B%âÿÿÿÿÿÿ2ô/(Ç-$äÓÿÿÿÿÿÿ:<`ap} ¥ØÝÞßPùòìòìåìßìßìåìåÝu]abc U]abc]abc U]abcuDa:;<`aefjkop|} €¥×ØÜÝÞßþ²!ðþþöØþþÞØþþÖÀþþ·ÀþþÀþþÓØþþªþþ>ØþþþþØþþ·ÀþþØþþåÀþþþ²!ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font&KPUZgjruÂÇÊß ßÿÿÿÿ ÿÿßPß ßö(ZŸð"Tžê^ÒFvºì$9àÿ@\BAHARI\JF3-2-D13-4SINe00:winspool\BAHARI\JF3-2-D13-4SI\BAHARI\JF3-2-D13-4SIpsXXLettereeeeeeeeeeeeeeeeeeeeeeeee ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''\BAHARI\JF3-2-D13-4SIpsXXLettermicHü¡ ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''1Times New RomanSymbol"Arial"ÁÐh./f!# James Togajtoga ¬žÌØäô 8DP \hpxäJames TogaNormaldjtogaTo2Microsoft Word for Windows 95@FÃ#@@Ts-ÃŒ@6QÃŒþÿÕÍÕ.+,ù®0šHPdlt|äDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿNØ_947279119[oi ÀF`SILç)œ@ZLç)œOle ÿÿÿÿÿÿÿÿÿÿÿÿRPIC fhÿÿÿÿSLPictureTelÿ.Lr;š Ž!Ÿèèr;š } U&ÿÿÿÿWordMicrosoft Word: û-ûÿTimes New Roman,- METAÿÿÿÿÿÿÿÿÿÿÿÿUCompObjgkÿÿÿÿhObjInfoÿÿÿÿÿÿÿÿÿÿÿÿOlePres000jmÿÿÿÿ $þÿÿÿþÿÿÿþÿÿÿ ¡¢£€¥Š§š©ª«¬®¯°±þÿÿÿ³Žµ¶·žþÿÿÿº»Œþÿÿÿþÿÿÿ¿þÿÿÿÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛþÿÿÿÝþÿÿÿþÿÿÿàáâãäåæçèéêëìíîïðñòóôõö÷øùúûþÿÿÿýþÿ§žNõÿûœÿŒ"Arial²-2 [õÿ:GRQ404'ÿÿià $ -2 $ :GCF40)'ÿÿA²è-2 õ:xxQ%%4'ÿÿ6-2 C:IRR00'ÿÿqøgûµÿ"ArialNe-2 !g:( .., AliasK2*&'ÿÿ~>ÄûÎÿ"Arial±- 2 HÄ:a'ÿÿqÈß-2 !ß:, .)K'ÿÿ~Ë>-2 H:'ÿÿq\ Š-(2 !Š:[Not Authenticated]6*2****&***'ÿÿ ú"-x®xÇ ú"-ðü- úÿÿÿ"-$¹¿x¹gáx-ðüÿÿÿ-ð ú"->É>ã-ðü- úÿÿÿ"-$×-Ò?×P¯?-ð-ð ú"-)ó'q -ð ú"-%É%ã-ðü- úÿÿÿ"-$×Ò&×7¯&-ð-ð,æ Ó6 -2 à6 :xCF%0)'ÿÿ>ß-U2 ð1:( , GatekeeperIdentifier, ) [Not Authenticated]S<%%*%%*%*%*%S<*<**%*%%%*'ÿÿkôÏ{ûÿŒTimes New Roman4-:2 à{: CryptoTokens[ (cryptoEPCert) ]<%*.*7*.%. S%%*.*73<%%S'ÿÿ' -82 š:CryptoTokens[ (cryptoGKCert) ]<%*.*7*.%. S%%*.*AA<%%S-'ÿÿ ú"-KûK -ð-þÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿs;š ü } U&ÿÿÿÿWordMicrosoft Word: û-ûÿTimes New Roman,- §žNõÿûœÿŒ"Arial²-2 [õÿ:GRQ404'ÿÿià $ -2 $ :GCF40)'ÿÿA²è-2 õ:xxQ%%4'ÿÿ6-2 C:IRR00'ÿÿqøgûµÿ"ArialNe-2 !g:( .., AliasK2*&'ÿÿ~>ÄûÎÿ"Arial±- 2 HÄ:a'ÿÿqÈß-2 !ß:, .)K'ÿÿ~Ë>-2 H:'ÿÿq\ Š-(2 !Š:[Not Authenticated]6*2****&***'ÿÿ ú"-x®xÇ ú"-ðü- úÿÿÿ"-$¹¿x¹gáx-ðüÿÿÿ-ð ú"->É>ã-ðü- úÿÿÿ"-$×-Ò?×P¯?-ð-ð ú"-)ó'q -ð ú"-%É%ã-ðü- úÿÿÿ"-$×Ò&×7¯&-ð-ð,æ Ó6 -2 à6 :xCF%0)'ÿÿ>ß-U2 ð1:( , GatekeeperIdentifier, ) [Not Authenticated]S<%%*%%*%*%*%S<*<**%*%%%*'ÿÿkôÏ{ûÿŒTimes New Roman4-:2 à{: CryptoTokens[ (cryptoEPCert) ]<%*.*7*.%. S%%*.*73<%%S'ÿÿ' -82 š:CryptoTokens[ (cryptoGKCert) ]<%*.*7*.%. S%%*.*AA<%%S-'ÿÿ ú"-KûK -ð-þÿà òùOh«+'³Ù0 ¬žÌØäø @LX dpxä&GqMJames TogaHCNormal.dotJames Toga2Microsoft Word for Windows 95@êVú@WordDocumentÿÿÿÿÿÿÿÿÿÿÿÿ&xSummaryInformation(lnÿÿÿÿ²ÀDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿ¹Ø_947279121ÿÿÿÿÿÿÿÿs ÀF OLç)œÀ?Lç)œÜ¥hWà eÖx¿jjjjŠŠŠÐÐÐÐÐÐ Ú ÐÇ1ääää人ºÊÌÌÌ5ÔÕÔ©øXP(ÇŠºäÖºººÇÊjjääÊÊʺj<äŠäÊàL}¿ŒºÂjjjjºÊÊÊ ( , GatekeeperIdentifier, ) [Not Authenticated]
CryptoTokens[ (cryptoGKCert) ]
CryptoTokens[ (cryptoEPCert) ]
GRQ
GCF
xxQ
IRR
( .., Alias
a
, .)
[Not Authenticated]
xCF
€ÀN¥ÀNŠ§š#©#ª2þ/( %Zâÿÿÿÿÿÿ20(ðž)0 Wÿÿÿÿÿÿ2ÿ/(áØ'! tÿÿÿÿÿÿ00&á) 0ú/&Í+ýü 2í/(m<$ÒÓÿÿÿÿÿÿ2î/(6&ÃÓÿÿÿÿÿÿ2ï/((¥Óÿÿÿÿÿÿ2ð/(Î(xÓÿÿÿÿÿÿ2ñ/(!#Áâÿÿÿÿÿÿ2ò/(^$$ÿÿÿÿÿÿ2ó/($#,âÿÿÿÿÿÿ2ô/([&$yÿÿÿÿÿÿ2õ/({&#âÿÿÿÿÿÿ0ö/&(¡$ D÷/:5w$bUÿÿÿ T*a*0ø/&i}& Dù/:+S&bTÿÿÿ aS*aS*0û/&i+ Dü/:+å*bTÿÿÿ aS)aS)2ý/(<6I*¥Óÿÿÿÿÿÿüõúcüüúcüûcüûcü ûcü ûcü û--üfff-- L$$cüýùcüýùcüüùdüûùdüúùdüùùdüøùdü÷ùdü÷ùeü÷ùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùdüöùdüöùdü÷ùdü÷ùcüøùcüùùcüùùcüûùcüüùcüýùcüýù--ðüfff-- $Bcü ûcü ûcü ûcüûcüûcüüúcüõúcüìúcüãúcüÚúcüÏúcüÄúcüžúcü¬úcü úcüúcüúcüzúcünúcüaúcüUúcüIúcü>úcü3úcü)úcü úcüúcüúcü úcüúcüúcüþùcüýùcüýùcüþùcüúcüúcü úcüúcüHIhj¬¯·ºÏÔÕÖ3ùöðìðìðåðßðßðåÝu]abc U]abcUab]abcabuDaHIhij«¬®¯¶·¹ºÎÏÓÔÕÖþ²!ðþZðþþ1 ðþ1 Øþþ" ðþþÔÀþþÃÀþþŠÀþþyÀþþÂØþþþþ/ØþþzþþØþþŠÀþþþ²!ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font3Tuz¡€¹ŸÁÖ Öÿÿÿÿ ÿÿÖ3Ö ÖíQ³ãGy«ÝAs¥ÕIœ×ÿ@HP LaserJet 4 PlusLPT1:HPPCL5MSHP LaserJet 4 PlusHP LaserJet 4 Plus@w XX@MSUDNHP LaserJet 4 Plusä;d HP LaserJet 4 Plus@w XX@MSUDNHP LaserJet 4 Plusä;d 1Times New RomanSymbol&Arial"ÁÐh`W\!( James Toga James Toga@žžK¿Œ@Ê¿ŒþÿÕÍÕ.+,ù®0šHPdlt|äPictureTelBLt8a Ú Ý\Fáñòþw»^§_ªôsE÷1F+bŽeÎíÛ¹\G%êøë`Ï(Úp¬'oëc>ãã]ËA[1:Ø'_Óuž9;Ésœ_èhEÌc~&qá=6°-íMmMh} »#ÉÑĶǺ MünZhÅýjEIÖà]Ë%ü)ë E [2l\UtÜÓyp{ÄÕt×@âhHh7Á<Þ]ÇÊìçýŠÁy¿7 s~f}6ÙFÜð0brüêÌjÃB:ès"ôtÏ9;û|1'ÒÉÝ+5ùÓ8©õKž× ò>/6_ì;3¶º6Êgëc1[HïÐprL[Ü©õ€#kÖ²ûÛÖöÜZö'ıg?õ@71vIŠ=±w°ÑÇÚg³¬¡]Gà[&F2_s_ëÉ×+7¬š~åöÁ4dzðP`ÜÇòHYÚÞ¥¢ XØ?ª#n/ñFúuÓµ9=ßOß5ûäBì}â*IÊdÄ=É/%ÇÆ+q4âUWeÉ觚/ØK«¹Ð¿EýfkÝL;W¹X7ëº_»§Æ.ÆÙ1Ob×oK&Ça>^åØ«ïrüV`Èp±\VÉs@m²Åï®1, g=óXÃoî©2lë 5ô ,T0œÁÚY³Âû1KnI÷l¹-^@Ùlÿ°ùü»ëØ æ+n5-êl/ÀzÞÎÚb¹µE/C¥ÇHvÎ4Îíô=²Z}Ø9 ¶\ VŠÐârlO³å2:E£eô©âí)%Ùš>³ÐbXÖÐct¡zÊÍìaªÏì4;Ëzõ<mQÓzõ0]ÏÛóŽX þq#>Jw(Å°|+«ÃJ©,kÑJZìÆv¯å*Ú§,G[«°¬åmeæ8ô²òMàwZáÎv*Í>é53õÞqÆ¡? «ö`¹öÐ0ç«=fi©¥ka*Iœ0ŽêÂ\UaŸ0œ +GÊìlDfÀøÍSK`sŠLÎ<Í¢àYé >'ŸEWz³ŽÚoh|Õ~EÒÒ8Ù/|Xj.\ªt ¢¿rA¹O®Lþ³ècùIdö$Ƕ§FÆí<7¹ŒTôßÂ_¡ÅPGs¡¿},ôé§%¢C/GÏ$̧\Û][2uôùX¿òçàC}~DßD³ÆëLótG SE#Š-œ.Ô%q¬×cȧYd³6ÇZHèWÑI Ýæ·ZDÖÒÕxùžCÈZ&ñ$o/.«ŠU¬«n*iéoå !y";&)4[©3µ,©óÈgÀÑW¶§ÄZÕäzd1ͬU-èn¡±fûÏ9Û7|ÅÏvÀvs§ßcÆlê§ÓlëÔlÆïD6ã/ÙuS±wDFÆ¢A4ç®·0M&Åc:pzëP@öÖní¡ÁZ~æòÎlkÐlk°xdûM-lеªqœÝ7ª$ãñBz~8M®©õd:ç9õÔ'W~h}¯:ÎIʳä D<ËÛ°ÿÂrDþJ§€\ö9ab+rÀÔR%°pýN7ùÚmm&g{æ°yYr}å4¯Õô}ŠK ÍQöÕ'GIÈ9SK ðÜ9Û¶µþf3~fݪñþ$ï+€ØÐD&L-mÂWÞêl@JÙãiÑ?NÚN?·ÏÈG<c;þq :E îY[й*€Žè'gÓ0-Óå Ó[wýãäDÈìDšxd3Š@6*4úµmŠ·^QËwxW ®gxÃZþ;û`"äW ³ûѱ?ÿ9Þx+áá¬o%Â"ïÜ€íd/UL=²ÞYì%çßh=ymíoÁuÿŒ)ú0ÏVrÏ2Wòì-±€Öñª4Œ£YwIŠÜUŽ#P«©'A~V€³ZP"+àšþûYDdV&Ôèèð<² ð CðA¿ÿð2ðýèçÖÉF;è¥&_ÿÙÊ`!ðÑèçÖÉF;è¥&_vù®_PåþxÅVMLA~3»ýaU¬Æ`i xJR¢ jÅdÁвžôâE/zÒWñ &¯Æ/ÞŒ|3»Ûm)j%q'·oÞ÷ŸyoöÍš^úH{àÛêAlã#sy$¿©Âù©ñ|n>wËÔ&PKÕÑi3Ô£-ºé×âCæMc ÈfÂ]ÂŒù ±ãb!Q°n[ËìµÿÒÔ¬1¯ ÚPnVÏBìÎÆÂÚÄ oòÄE"©ŠÈÎÂÜi$áÛÂù¯Ã="û2¯mÅõKæ§ôDd%z8,ì² °ûN¥1%þ `3Ž"õ]LB;¶S'Š=A¶·Çq^ØRœ®¯CšóúêÚ~8ç+ÇsOVÄxÜEÝxHps#fHà-ÄãíÚ5òúLÿYÀí³[ßPÏ1Za @œ«b Óp%X¹@i4%hä^pë¥]+ÄÛ8/Æ0R ÇEÈ» ,éû1ý$+1ŠLvc*C-gÚ 0&J$å±Ú±HÁ©%oFÖ×Mãæ(ÏOǧ÷Vî¹֢®"jiB}LÊvbùùQVT1jLv£æãµ®SyÇ 5i©üÒ»6²ZŠ5±Úúì°=ÙqqÌ·Â|ßF° ! _:ùMqMÏbo³g¯ýž{S Pmni ¶Ÿb6ØV÷YÐMwÌ-Ä83EëîZѺ0Êž9Ý-¬Fÿ V&ØGËÆÏåtÎR6jÄÑ Õë<ÖÜï¿Ú6¥yeýiÙPÇÂo{õñ ñ8.ÉÐ¯Þ êöÇÞñä áQUŽªÙÕÿîëë&CöúºÉZýzJùëŽdhÑéEÒ œüoÓŽÛfŠ#{Èž_œF/šiÚ¯Šyì÷±,]µËÒü2€ßébNÒRöÃxçºÓ'×/Ó²÷qëÇ#Ôýßú±J=õCGœjs[¬X?VéÛßÔG4ûGõ£üŽøûêÞEÞÔ®C¯Kã>£NõÜÚ57îm¡Ò]aü»ÂØhNÚȧœç{¶ÃÁfø;òÕpÎ WâŸ~ÊG -DdV&Ïppð<² ð CðA¿ÿð2ðr¥.±#"7ÛµYšŸÃ ÿyW`!ðqr¥.±#"7ÛµYšŸÃ " ùA_p^?þxµVÏOA~3»ýÁ¶T[ȪPx(V4iC$DÃ+m€-¶k*W^H$þxðjôbŒhw/MŒx!^&úfv·ÝRêN&ïœyß|óÍìËh|@öø±÷8œÐE|DÏf²K2ÜN.f3¹Ì}]a1Š²æ5Óš°ëí@o¶#œã£øÐéµ®¥Ül&¬ 6_D¿H ÒË¢°É^±Y§f)-§kye*RÓ|ò=¿œü#ÿUÜe$ÂJìÌZœómïÁáãïM¥ýfê :_DÉ{X,X\fA¡mXò!ŠÀßìz£ÂÉ(° ÚVb£H±xÇExë`O®Ì,¯uÇ*׺qìµ.S©å9I ÕzŒ9T QòØõ`qYß°°ô 1»mÑìÚªÉ<ÐÒÊ\¡WÇ3ÖÕÔjHYÖÒZV]ßÀtB®@;vÖ< `<œœQ|F/ ðY¬³LAg°MvÜÄÆ`g]4¹ù|¶²ªæryŒï}15(̵kèurNC&Æ¥R%ãîÚUz*J~»J,.«$Ö=)öýŠÆ±FÇ~ú"y§Ñ¹ÖcÌurûÓÌ©>vòûFµ2æª H.ü~ºâò:LÈkh!ÖZÉBÃBRÊr×]¿þþ"dÊÜ_¬ÈÇßO5ö9:BT:IÑÚOÆ8FÑÙ2Ëwé£qù*Í¢mcQžc2 \'è/º Ú& ýƵë_xØŒIíõɪ3×}Ë[8vÁö-ÿEihyM?UTÍ*³E÷Üu«Lêè*s°ZTëP¿ÔÖt|ð|ÇA, 3ÿc²yo!€åc*xéä³i²NWEåEMLäA×Ù M }ÊÜxFW¢ôÖª®-Í3ô1~®³anž^O)CgðÂÓûâaôãØI4À³ú^ÈÿYê=úXcçñߌDdV&Ïppð<² ð CðA¿ÿð2ðe·ÔqÕvRLËH®çù ÿä`!ðÜe·ÔqÕvRLËH®çù 2ùA_p^ªþxµVÏOÔ@~3íîÊn· °ÈF~4HpYÍÆ ÁM$F4J$8¬P`#ìR£ÄxÜñßzÑwãÁÄ?bžx71Q ŸNK[· mfßtæÍ÷œ÷Šóu THÉ0@²À®ZlmáJhMŒdþ<\4&Už0Å)ScÏ!Q¶õV+ãØ[çc"£é"ÌRB Á=lZ ûŹê¡üŸ ê·µ«Å¹\Nµp *ü8ßJh ¿uò< 2Œvæª8ßKÁ÷ÂÆiÉùÜ,@ÅB¹_&Æ_°ZÎ_ÉB¿ÝG «OpðŒ2 ëªÛgCÁ/ÇYÎpbWÓtIýD²ÔËA Î9>àqqhXw«O*QM, ÎpÏä:=âBè7çÍâPñŠ^ÐFKí&n×5377ÒŠõnäfÎA74B€!Ýx§9 ±%±×#ìubÍ$žkØØs·óM@º§,2Ý Ï"îLo@3Ø€E&ï"ܵHÝ-=coÜqþ(bAQÔ(NÇB.{×òÓÄËpôôxŒ48xU/©žß¢Æcÿs§~C'Üg )§œ_7ÌüT~"gêI̳SÔ5¶¬*þHŸÄ=ÆÅ{#qκo'ÃeÏuïÙ}P¹`ZúÃZÄ©¥w ²^ öUÛÛŸlïÜ~ÅU~~vÂ~Y+(8ØNX(N(h[%ÔûpY]D; Z/O ËV³:(í²ì%WEœdVÝÛ¢NN9ÚEFiÉÑ+€'úßY\ ö^] ÃÛf±,4YZØ·ÌÐoô2ÌÐ:©ínkRNÏk¥%õ!õë¹Ä¿Íè#iukØä8±GzìUŠeêÕ[·2¥E¬o÷]oéá@}¬QÚ Þ.Óú]%ðêôÖÖÓfî÷(ñ=í EwØTÁ¶§.Ò8Û±¿ë¥w|»ÿ=äUì=4üçÿ3ª;RJÛÚ:öþ$øÝ)nÃÁ2_o¿æ}ʬºÿ°ïëÝàDr\DÒ©wy€ŽR6:X4µì-sF/Œ²ã,bGºÅ[áÖ0ñµ9Ï]ÕjßåòµRqæßjåÅ1X §íZšð+Œ_µúÞ²ÿîgü º|`âDdøu èèð<² ð CðA¿ÿð2ðRßXêtnÌpftkqdüÿ.¢`!ð&ßXêtnÌpftkqdüeüLý®P,Èa!ôþxœX]hU>çÎl¶Ùn»»!Y#+QS4Ö (€I jÑD*ØM2Ú`²ÙÆtÛBD²Û->ø õ!hª}Dñ¡H)%ö¡ yñ!èC4fæzöîÿÝ4³»gîùŸsÎœçì"Th7Ø© ?L«|P~06)=nRzQX À3vLÁæHMPhtØœ}}nèxéŸoªæ<©û¡ °ŠåZaŠÁÒÔY:xA.&»ÉqÓØä#/tµž¹ â÷9ØÐÙš=âf×M¢ZLiÅ\¢ŽDX®&\Ç5:îóBú5rYãï«cßþ#+TÚJ*£5#cF<ÒkŒyy|,ŠEM\aœ°ìá»6ZS6tq]+j+×sJ³Aª@VICÅ<€×YWÌ÷Í/R~°ÍÈB£A#œÇßÊGµDù°·ò¶yn×E̺^ìîéb6áqhLÙ&Ìÿ¹|8ö#X0ì5ùª8...Šãš<ŠâÉïI;§aÕ|NvY·Š3CZtÙ`={óW±Þ#XÂ[&×DCÒ9æ³ óV'ücE~ìHY,&Àmm/í¿¬Å Ý^7à(< ;çÁ>òðAíÚV&£±øÄøäT€ßxsÌME§FÆc¶Iíï¶3ìq°s}Â%åF¡ökn8gZô;s~&ä°õ9Væhÿí&ù»ýÛoÒ{ÜÿEúéMÅFÑCðp8ÉŒâKíÆÊ%óòuZ£ýk=JÆ^wû¯]ô¬âîÜ;ès¬öŒ`LGöµ6Î>&å1ÍÞÓ31É_?Aetº3Ÿ³åŠAÁtþDÞËôÄ&§'dfóøÖÌŒkUUþb/× (d¹|8sÜ£WÉœ"ä=:/d~À€Ž9üÊèÊbèÖu8MnC'¹]dÏšú§ÂIòŽ[pã<Ëòü%Ï%OéõÕZÖÞñŒÜûV¡T²«~šÎa'9]d79CªÉVH`;9GH='Ab×ù¹ggùó=D'(ÞÿÝÅuxuT*S28ä¿âªÄf¡WäýüÛLà«{+'ÙPèe¬¬·*ÌÅvÙJâa«4Û>a»{)'ò ¹¿G+êÁJ³ý&±f{&ðœ±-ƶ£¢^4ÛOvfû%$Ð랧«4¶a=]þªV5¢0¿0ùW|ÎÆ>Æêª^PWïàI¶[Í|ý]|ÊÅ]VŸþwl€³ž^ ¿Á{sG/3wd}b§Åës÷+cFtØl¿6}À»éߺŽs÷Æ +š}e5ÙîÊé(²ûFÙ;ýaõdz§¶bœÓýô`6GǬQÙx$LDãqc82L2 9ÕÅûص1àýìlÄ»Z¿è~|ârŸRoúwzŸ®jk22t*£µôhaTk#€Qþó}Z~NbÖÒ;_°öÌXèþéø1±ìuÌ#%ÿ·ùÊ=ÌD ú% èè ¿ -&ÿÿÿÿ\üÿÿEýÿÿµ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±¢ & TNPPð &ÿÿÿÿ&TNPPEý\üpB úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ œŠEý\üûÜÿTimes New Roman4-. ûÜÿTimes New Roman%-ð. &ÿÿÿÿ ú"--þ£ýtýüûÂÿTimes New Roman4-ð. 2 Ñý¹üCODEC)--&* &ÿÿÿÿúý &ÿÿÿÿü²²²-ð ²²²}þ>ýûÂÿTimes New Roman%-ð. Ò 2 m¢ýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ÿþ>.þûÂÿTimes New Roman4-ð. Ò 2 m=þabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}³ÿ>'ÿûÂÿTimes New Roman%-ð. Ò 2 m6ÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ú>NûÂÿTimes New Roman4-ð. Ò 2 m]abcd &ÿÿÿÿûÂÿTimes New Roman%-ð. Ò-2 þTransport De-Segmentation& -#1 &ÿÿÿÿ ²²²$Eýþ_ýþ_ýòÿýòÿýþ±ýþ{ý"þûÂÿ Times New Roman4-ð. ÄÒ2 þiýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿ ²²²Ë8ÂûÂÿTimes New Roman%-ð. ðÿ2 |ñ Decryption- &ÿÿÿÿ-$mee}²}²^e^eO &ÿÿÿÿü-ð $ÛGÝIec- $Ö9Ø;sqûÂÿ Times New Roman4-ð. Òÿ 2 éVabcd &ÿÿÿÿ &ÿÿÿÿ- $GI- $9;ûÂÿ Times New Roman%-ð. ðÿ 2 Vabcd &ÿÿÿÿ--ãúuý &ÿÿÿÿ- ÓáýUý- àîýQýûÂÿTimes New Roman4-ð. ðÿ 2 Ãdýabcd &ÿÿÿÿ &ÿÿÿÿ- Ó»þ.þ- àÇþ+þûÂÿTimes New Roman%-ð. Òÿ 2 Ã=þabcd &ÿÿÿÿ &ÿÿÿÿ- Ó³ÿ'ÿ- àÀÿ#ÿûÂÿTimes New Roman4-ð. Òÿ 2 Ã6ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Ó- à©ûÂÿTimes New Roman%-ð. Òÿ 2 Ãabcd &ÿÿÿÿ--$ಀG¥GÃÁÐü²²²-ð ²²²ßYý*ý ²²²â3þþ ²²²â$ÿôþ ²²²ÝâÿûÂÿTimes New Roman4-ð. Òÿ2 e<þ SDU Header#,-- &ÿÿÿÿüÿÿÿ-ð ÿÿÿ]ÿ÷þ/ûÂÿTimes New Roman%-ð. ÄÒ2 6ÿNKey #1- &ÿÿÿÿ-$£âÿº»ÿ¯»ÿ¯vÿvÿ»ÿ»ÿ÷þ§þ/ûÂÿTimes New Roman4-ð. Ò°¡2 ãþJKey #2- ûÂÿTimes New Roman%-ð. ÄÒ-*2 'þlKeys as received in the- ûÂÿTimes New Roman4-ð. ÄÒ-2 qþl H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðyDd¶! ëèðB² ð Sð¯;A¿ÿð2ðãY%ž€'HØÓÞôÐâíÿ¿Ê»`!ð·Y%ž€'HØÓÞôÐâíÔðS; þxœY[lU>·œömµ[h§Ü€ «\I³U4P°Ñš¡ÙîlŠ€£ >ø`""> ÑIÖxÃEÑ#5Ä/€xÀK0ñ(¡þsff;;³ÓÝY7Ìdçö9ßùþÎ9Q!z¹¡*Ži[#üæùëPñûu[-Z''UeHÙŽ{<¯"ÚÚU5!> ®Æù³Œ £j§ !íL0FÞòìÞàE¬AVß+JCBŽKØši4éob"F;ÞyÀù:HFGG 2ÚÍ.tÍž×Î2$·ofÉKà#Ôlgnf;ÆÏWöZÿàrœèRâÐÆì¯ÎKžäÓmi × äcyïíS±ÞÛ#pU¬7%%xÊgxJ¡GI=m¶ùÅWÔå¡¥èA_!7ís@{üŠÙöcÍÌ;yŠpná}MgëÙ2ÚÄ~ÊlÏšoí5«KÅz©£çp3ŒYkèéßá!9)Šµâ°€¶¢Â_5pñëº<nÃZ p×ñ_ú3ùNêhêã:| °Eµrz¯ajxåâ>FvAvÜv{H-žÓªÅ)IèUÅôPFQ³mSÓ#ÌuÐ5hŠk€Ék<jbíô±k5ÏÐê©·hµ± Nåê£óëäȱү~¯3¯9²ÃÇ×b<ý.¥{èZ¹ÕÏ€ÆbuÝ¥š P·REil(~W;arua»[^úKª¥ ]Ž7 -IÆX7`^Ñ Åòhœßé5çŒKÍÔ±Çú)xÓgõx__D3£m÷K¯á&Ål+¢IÀÐd'ŒiÕäŸxÇÒ>Ôc M&O|7³ðGÔÎoéeØt£u.ÇòØ:Š ºÆ:dÄ:F¯ÂÉÎã-ÖÁ±ªsýÃ]xÜÖÐS=8NÞEûdÜÈõHŠÓž?7©µJön5Àî%f¯âsìIŒåÛ4b¶$ÖõÆu,Š¶{AZI~`Ä )BHe"pC'pa€_@bEz Ÿ|ñ"š¥å 'Ïã}dé#BsfJlÐ""F Ørec87?JØ>RÛØ*ßã;éÛø)lÓLÚS©xM«±^<WEÓø-JG¹eÜSrº<0â0®Œ|ÿ{2ev ý*áÉÃx3UñiÓ¹C ä×ÃÎø]ÀAl€x!ý=ì`ã ÷HZ&©2xUH(鬪€1œMX'ŠÅ~iPJgÁÓÓ`lÕdx9ÚDÂÆœ©eÔžÒö&ãY¥£rB3=G¥\Ž1àÌ*Á¿Ð6vT==ŸæÉtY1RFäÛðìÚë@Ñ¿ã ±~)º2]oUø tu ;F£± ñ[1¶ÓÀ+øÔXåUŒÌ»ñëž1zw~ü #oô<Ieóô$^M`ç÷)ôqÒ c§ö|ô8o'ßá?µñ,H1«xµš<D(yÓÑ¿>»e ±În×Yi$e$5jx¯6W?Âp%+ÉÝdÄ«Eäÿ~E ¡T u_d@b_Ìßص©ìÒÇfîöi±ÐVëùj#¿ ô+!ÌÙ¿¿ ³«žxÕtï}Š¿ ]A«ÐiègknY}Ó@.£ßñœ*¡3áXpO:©g²²ÖØ]Ç×W4FL°á©0÷>/%ÏùHÔ¥û¹ÄÂ)×µrÿBYKRl®+Ê<JBÌÄÍïªfÜ*³zDëéÄÄW%WO«}ITMW¡öÜŸÕ ±®ŠmJ*IP¶P6w67'kf)»Ëößdûž¬1u)·Ž$@Üwªrvع¢TZs«.S£åŒGÇØV²£"ãõô<OqmµÄ>ÛZ\ælëúÞK{r2}ëø?ÃÅRlzc6ÒWœzŒüU/3 -àåjùE!"p5®"ü.w WJŽW(ïñ?C¡_ÐDs;Æ Ž!Ïèè £ U&ÿÿÿÿWordMicrosoft WordA û-ûÿTimes New Romanl- §êO'ûœÿŒ"Arial²-2 'AGRQ404'ÿÿiV -2 V AGCF40)'ÿÿAäé4-2 ö4AxxQ%%4'ÿÿÑ64-2 C4AIRR00'ÿÿk4£ûµÿ"ArialNe-2 £A( .., AliasK2*&'ÿÿx@8ûÎÿ"Arial- 2 BAa'ÿÿk-2 A, .)K'ÿÿx8Ô-2 BÔA'ÿÿk â-(2 âA[Not Authenticated]6*2****&***'ÿÿcÃØ©ûµÿŒ"Arial-@2 ç©#A cryptoTokens [ (cryptoEPPwdEncr) ]**....**.*K**..222:.2.*K-'ÿÿ ú"-xêx ú"-ðü- úÿÿÿ"-$õûyõg y-ðüÿÿÿ-ð ú"->þ> -ðü- úÿÿÿ"- $ -? Pä?-ð -ð ú"-HêH -ðü- úÿÿÿ"- $õZûHõ7 H-ð -ð ú"- -ðü- úÿÿÿ"- $óë-ð -ð*¶§³-@2 ¶³#A cryptoTokens [ (cryptoGKPwdEncr) ]**....**.*K**..:62:.2.*K--'ÿÿ,Ôh -2 áh AxCF%0)'ÿÿ8m ÙÈ-U2 èÈ1A( , GatekeeperIdentifier, ) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-@Ds;š Ž!Ÿèè ø U&ÿÿÿÿWordMicrosoft Word:ûŒSystem -ûÿTimes New Roman*íwÀgïw( € - åHûœÿŒ"ArialV 2!íw*íwÀgïwV 2 -2 U:GRQ404'ÿÿb I -2 I :GCF40)'ÿÿ;ßâ(-2 ï(:xxQ%%4'ÿÿÌ/(-2 <(:IRR00'ÿÿk~ûµÿ"ArialR 2!íw*íwÀgïwR 2 -2 ~:( .., AliasK2*&'ÿÿw#8ÜûÎÿ"ArialB ;!íw*íwÀgïwB ; - 2 BÜ:a'ÿÿkæ÷-2 ÷:, .)K'ÿÿwê8°-2 B°:'ÿÿk{ œ-(2 œ:[Not Authenticated]6*2****&***'ÿÿ>ßûµÿŒ"Arial 9!íw*íwÀgïw 9 -@2 î#: cryptoTokens [ (cryptoEPPwdHash) ]ÿ**....**.*K**..222:.6**.K'ÿÿú-rÝrþú-ðü-ú-$éðré` r-üÿÿÿ- ðú-8ø8 -ðü--$'8Iß8-- ðú-BÝBþ-ðü--$éSðBé0 B-- ðú-þøþ -ðü--$ìþßþ-- ð Ï-@2 #: cryptoTokens [ (cryptoGKPwdHash) ]**....**.*K**..:62:.6**.K-'ÿÿ&Í\ -2 Ú\ :xCF%0)'ÿÿ8P Ù£-U2 è£1:( , GatekeeperIdentifier, ) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-HDs;š Ž!Ÿèè } U&ÿÿÿÿWordMicrosoft Word: û-ûÿTimes New Roman,- §žNõÿûœÿŒ"Arial²-2 [õÿ:GRQ404'ÿÿià $ -2 $ :GCF40)'ÿÿA²è-2 õ:xxQ%%4'ÿÿ6-2 C:IRR00'ÿÿqøgûµÿ"ArialNe-2 !g:( .., AliasK2*&'ÿÿ~>ÄûÎÿ"Arial±- 2 HÄ:a'ÿÿqÈß-2 !ß:, .)K'ÿÿ~Ë>-2 H:'ÿÿq\ Š-(2 !Š:[Not Authenticated]6*2****&***'ÿÿ ú"-x®xÇ ú"-ðü- úÿÿÿ"-$¹¿x¹gáx-ðüÿÿÿ-ð ú"->É>ã-ðü- úÿÿÿ"-$×-Ò?×P¯?-ð-ð ú"-)ó'q -ð ú"-%É%ã-ðü- úÿÿÿ"-$×Ò&×7¯&-ð-ð,æ Ó6 -2 à6 :xCF%0)'ÿÿ>ß-U2 ð1:( , GatekeeperIdentifier, ) [Not Authenticated]S<%%*%%*%*%*%S<*<**%*%%%*'ÿÿkôÏ{ûÿŒTimes New Roman4-:2 à{: CryptoTokens[ (cryptoEPCert) ]<%*.*7*.%. S%%*.*73<%%S'ÿÿ' -82 š:CryptoTokens[ (cryptoGKCert) ]<%*.*7*.%. S%%*.*AA<%%S-'ÿÿ ú"-KûK -ð-83Djb8Ë7ÌXX t6&ÿÿÿÿÍôÿÿ@øÿÿø &ÿÿÿÿ&ÿÿÿÿTNPP8Q=Pù & TNPPð &ÿÿÿÿ&TNPP@øÍôžQ úÿÿÿ"-ü- &ÿÿÿÿ &ÿÿÿÿ ú"- %û>ýdúö--ð,û@dúÀ ú"-búÎú&ûÎú--ð'ÿÿ--@öÀÍôü- $Ëô`úËôhúëôhúëô`ú $õ`úõhú+õhú+õ`ú $Kõ`úKõhúkõhúkõ`ú $õ`úõhú«õhú«õ`ú $Ëõ`úËõhúëõhúëõ`ú $ö`úöhúöhúö`ú --ð'ÿÿ--@öÀÍôü- $Ëô ûËô(ûëô(ûëô û $õ ûõ(û+õ(û+õ û $Kõ ûKõ(ûkõ(ûkõ û $õ ûõ(û«õ(û«õ û $Ëõ ûËõ(ûëõ(ûëõ û $ö ûö(ûö(ûö û --ð'ÿÿ &ÿÿÿÿ ú"-å>ý$ö--ðì@$À ú"-"ÎúæÎú--ð'ÿÿ--@öÀÍôü- $Ëô Ëô(ëô(ëô $õ õ(+õ(+õ $Kõ Kõ(kõ(kõ $õ õ(«õ(«õ $Ëõ Ëõ(ëõ(ëõ $ö ö(ö(ö --ð'ÿÿ--@öÀÍôü- $ËôàËôèëôèëôà $õàõè+õè+õà $KõàKõèkõèkõà $õàõè«õè«õà $ËõàËõèëõèëõà $öàöèöèöà --ð'ÿÿûÿTimes New Roman1-. æÎú 2 ôúÍ÷PGûÿTimes New Roman5-ð d,MM2 ôúøn-10 0ûÿTimes New Roman(-ð. d,MM 2 ôúœûPn50 ú"-5ýÎútüöÕÿ6ùþ ÷EÎúö--ðûŒ"Systemn-ðD@|À ú"-z[ø>[ø--ð'ÿÿ ú"-ÕÿFþþüE®ÿýúûÿTimes New Roman1-. >[ø 2 ýý÷PGûÿTimes New Roman5-ð d,MM2 ýDøn-10 0ûÿTimes New Roman(-ð. d,MM 2 kÿøENûÿTimes New Roman4-ð d,MM 2 kÿløk0ûÿTimes New Roman(-ð. d,MM 2 ÷CUûÿTimes New Roman4-ð d,MM 2 b÷n0ûÿTimes New Roman(-ð. d,MM 2 }ùCU+ûÿTimes New Roman4-ð. d,MM 2 ŽœûCUûÿTimes New Roman(-ð d,MM 2 Žün0ûÿTimes New Roman4-ð. d,MM 2 Ž-øCUûÿTimes New Roman(-ð d,MM2 Žøn-10 0 &ÿÿÿÿ5ý®ÿtüýú--ð-ð<ý@tüÀ ú"-rü=ý6ý=ý--ð'ÿÿûÿTimes New Roman1-. 6ý=ý 2 ýœûPGûÿTimes New Roman5-ð @ 2 ýün0ûÿTimes New Roman(-ð. @ 2 ý-þCU+ &ÿÿÿÿûÿTimes New Roman4-ð. @ 2 üCUûÿTimes New Roman(-ð +U2 ýn-10 0ûÿTimes New Roman4-ð. +U 2 Sÿ.ýENûÿTimes New Roman(-ð +U 2 Sÿ|ýk0---ð_þ@4ýÀ ú"-Yþ]ø2ý]ø--ð'ÿÿü- $CøHþ]øQþwøHþ]øþ --ðOü@$ûÀ ú"-Iü]ø"û]ø--ð'ÿÿü- $Cø8ü]øAüwø8ü]øtü --ð_@ÔÿÀ ú"-Òÿ]øY]ø--ð'ÿÿü- $CøH]øQwøH]ø ú"--%=÷D=÷4íû4íû÷-- $Óûèíûñüèíû$ --ððOü@$ûÀ ú"-"ûíûIüíû--ð'ÿÿü- $Óû8üíûAüü8üíûtü --ð_þ@4ýÀ ú"-2ýmýYþmý--ð'ÿÿü- $SýHþmýQþýHþmýþ --ð_@ÔÿÀ ú"-ÒÿmýYmý--ð'ÿÿü- $SýHmýQýHmý ú"--%mýDmýÔ]øÔ]ø÷-- $Cøè]øñwøè]ø$ &ÿÿÿÿ--%û®dú--ðð,û@dúÀ ú"-bú>&û>--ð'ÿÿ--@À=ü- $;`ú;hú[hú[`ú ${`ú{húhú`ú $»`ú»húÛhúÛ`ú $û`úûhúhú`ú $;`ú;hú[hú[`ú ${`ú{húhú`ú --ð'ÿÿ--@À=ü- $; û;(û[(û[ û ${ û{(û(û û $» û»(ûÛ(ûÛ û $û ûû(û(û û $; û;(û[(û[ û ${ û{(û(û û --ð'ÿÿ &ÿÿÿÿ &ÿÿÿÿ ú"-å®$--ðì@$À ú"-">æ>--ð'ÿÿ--@À=ü- $; ;([([ ${ {(( $» »(Û(Û $û û(( $; ;([([ ${ {(( --ð'ÿÿ--@À=ü- $;à;è[è[à ${à{èèà $»à»èÛèÛà $ûàûèèà $;à;è[è[à ${à{èèà --ð'ÿÿ &ÿÿÿÿûÿTimes New Roman1-. æ> 2 ôú=CUûÿTimes New Roman5-ð +U2 ôún-10 0ûÿTimes New Roman(-ð. +U 2 ôú-Cn@0 ú"-5ý>tüÕÿŠþõE>--ð-ðL@À ú"-ËFË--ð'ÿÿ ú"-5ýtüm--ð<ý@tüÀ ú"-rüµ6ýµ--ð'ÿÿ ú"-Õÿ¶ þEmûÿTimes New Roman1-. 6ýµ 2 ýmCUûÿTimes New Roman5-ð +U2 ýÂn-10 0ûÿTimes New Roman(-ð. +U 2 kÿD\ûÿTimes New Roman4-ð +U 2 kÿêk0ûÿTimes New Roman(-ð. +U 2 }PGûÿTimes New Roman4-ð +U 2 Än0ûÿTimes New Roman(-ð. +U 2 íCU+ûÿTimes New Roman4-ð. +U 2 Ž-PGûÿTimes New Roman(-ð +U 2 Žtn0ûÿTimes New Roman4-ð. +U 2 ŽPGûÿTimes New Roman(-ð +U2 Žän-10 0ûÿTimes New Roman4-ð. +U 2 ý-CUûÿ ¡¢£€¥Š§š©ª«¬®¯°±Ç·Žµ¶žÄ¹º»ÆœŸ¿ÀÁÂÃþÿÿÿïþÿÿÿîÈÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíþÿÿÿðþÿÿÿ=ýÿÿÿóôõö÷øùúûüýþÿTimes New Roman(-ð +U 2 ýn0ûÿTimes New Roman4-ð. +U 2 ý CU+ûÿTimes New Roman(-ð. +U 2 PGûÿTimes New Roman4-ð +U2 dn-10 0ûÿTimes New Roman(-ð. +U 2 SÿD\ûÿTimes New Roman4-ð +U 2 Sÿúk0--ð-ð_þ@4ýÀ ú"-YþÍ2ýÍ--ð'ÿÿü- $³HþÍQþçHþÍþ --ðOü@$ûÀ ú"-IüÍ"ûÍ--ð'ÿÿü- $³8üÍAüç8üÍtü --ð_@ÔÿÀ ú"-ÒÿÍYÍ--ð'ÿÿü- $³HÍQçHÍ ú"--%D4]4]÷-- $Cè]ñwè]$ --ððOü@$ûÀ ú"-"û]Iü]--ð'ÿÿü- $C8ü]Aüw8ü]tü --ð_@ÔÿÀ ú"-ÒÿÝYÝ--ð'ÿÿü- $ÃHÝQ÷HÝ ú"--%ÝDÝÔÍÔÍ÷-- $³èÍñçèÍ$ûpÿTimes New Roman1-. YÝ62 ßø¡üCiphertext Stealing in ECB mode`(HH@0(@H($P(@@((HH$(H$X``$pHH@--%€ù€ùÙýUþÙýUþbý-- $oþqýUþhý;þqýUþ5ý--%âýË âýË bý-- $å qýË hý± qýË 5ý --ðð-ðaþ@=ýÀ ú"-;ýÝ[þÝ--ð'ÿÿü- $ÃJþÝSþ÷JþÝþûpÿTimes New Roman1-. [þÝ2 Éù÷EncryptXH@0HH(ûpÿTimes New Roman5-ð. +U2 ÉùDecrypth@@0HH( &ÿÿÿÿ&TNPP &ÿÿÿÿ--ð-ðL@Djb8Ë7ÎXX ÿ6&ÿÿÿÿÀôÿÿ@øÿÿù &ÿÿÿÿ&ÿÿÿÿTNPP8Q=Pù & TNPPð &ÿÿÿÿ&TNPP@øÀô¹Q úÿÿÿ"-ü- &ÿÿÿÿ &ÿÿÿÿ ú"- &û1ýeú ö--ð-û@eúÀ ú"-cúÁú'ûÁú--ð'ÿÿ--@öÀÀôü- $ŸôaúŸôiúÞôiúÞôaú $þôaúþôiúõiúõaú $>õaú>õiú^õiú^õaú $~õaú~õiúõiúõaú $ŸõaúŸõiúÞõiúÞõaú $þõaúþõiúöiúöaú --ð'ÿÿ--@öÀÀôü- $Ÿô!ûŸô)ûÞô)ûÞô!û $þô!ûþô)ûõ)ûõ!û $>õ!û>õ)û^õ)û^õ!û $~õ!û~õ)ûõ)ûõ!û $Ÿõ!ûŸõ)ûÞõ)ûÞõ!û $þõ!ûþõ)ûö)ûö!û --ð'ÿÿ &ÿÿÿÿ ú"-æ1ý% ö--ðí@%À ú"-#ÁúçÁú--ð'ÿÿ--@öÀÀôü- $Ÿô!Ÿô)Þô)Þô! $þô!þô)õ)õ! $>õ!>õ)^õ)^õ! $~õ!~õ)õ)õ! $Ÿõ!Ÿõ)Þõ)Þõ! $þõ!þõ)ö)ö! --ð'ÿÿ--@öÀÀôü- $ŸôáŸôéÞôéÞôá $þôáþôéõéõá $>õá>õé^õé^õá $~õá~õéõéõá $ŸõáŸõéÞõéÞõá $þõáþõéöéöá --ð'ÿÿûÿTimes New Roman-. çÁú 2 õúÀ÷PGûÿTimes New Roman1-ð d,MM2 õúøn-10 0ûÿTimes New Roman-ð. d,MM 2 õú°ûPn50 ú"-6ýÁúuüöe)ùÿx÷FÁú ö--ðûŒ"Systemn-ðM@ À ú"-øGø--ð'ÿÿ ú"-6ý¡ÿuüðú--ð=ý@uüÀ ú"-sü0ý7ý0ý--ð'ÿÿ ú"-e9þÿüF¡ÿ ðúûÿTimes New Roman-. 7ý0ý 2 ýð÷PGûÿTimes New Roman1-ð d,MM2 ý7øn-10 0ûÿTimes New Roman-ð. d,MM 2 ûÿøENûÿTimes New Roman1-ð d,MM 2 ûÿ_øk0ûÿTimes New Roman-ð. d,MM 2 ÷CUûÿTimes New Roman1-ð d,MM 2 U÷n0ûÿTimes New Roman-ð. d,MM 2 pùCU+ûÿTimes New Roman1-ð. d,MM 2 µ°ûCUûÿTimes New Roman-ð d,MM 2 µün0ûÿTimes New Roman1-ð. d,MM 2 µ øCUûÿTimes New Roman-ð d,MM2 µuøn-10 0ûÿTimes New Roman1-ð. d,MM 2 ý°ûPGûÿTimes New Roman-ð d,MM 2 ý÷ûn0ûÿTimes New Roman1-ð. d,MM 2 ý þ0@ûÿTimes New Roman-ð. d,MM 2 üCUûÿTimes New Roman1-ð d,MM2 õün-10 0ûÿTimes New Roman-ð. d,MM 2 ãÿ!ýENûÿTimes New Roman1-ð d,MM 2 ãÿoýk0--ð-ðý@5ýÀ ú"-ýPø3ýPø--ð'ÿÿü- $6øýPøýjøýPøÄý --ðPü@%ûÀ ú"-JüPø#ûPø--ð'ÿÿü- $6ø9üPøBüjø9üPøuü --ð`@dÀ ú"-bPøZPø--ð'ÿÿü- $6øIPøRjøIPø ú"--%0÷E0÷5àû5àûø-- $Æûéàûòúûéàû% --ððPü@%ûÀ ú"-#ûàûJüàû--ð'ÿÿü- $Æû9üàûBüúû9üàûuü --ðý@5ýÀ ú"-3ý`ýý`ý--ð'ÿÿü- $Fýý`ýýzýý`ýÄý --ð`@dÀ ú"-b`ýZ`ý--ð'ÿÿü- $FýI`ýRzýI`ý ú"--%`ýE`ýÕPøÕPøø-- $6øéPøòjøéPø% &ÿÿÿÿ--&û¡eúz--ðð-û@eúÀ ú"-cú1'û1--ð'ÿÿ--@À0ü- $.aú.iúNiúNaú $naúniúiúaú $®aú®iúÎiúÎaú $îaúîiúiúaú $.aú.iúNiúNaú $naúniú|iú|aú --ð'ÿÿ--@À0ü- $.!û.)ûN)ûN!û $n!ûn)û)û!û $®!û®)ûÎ)ûÎ!û $î!ûî)û)û!û $.!û.)ûN)ûN!û $n!ûn)û|)û|!û --ð'ÿÿ &ÿÿÿÿ &ÿÿÿÿ ú"-æ¡%z--ðí@%À ú"-#1ç1--ð'ÿÿ--@À0ü- $.!.)N)N! $n!n))! $®!®)Î)Î! $î!î))! $.!.)N)N! $n!n)|)|! --ð'ÿÿ--@À0ü- $.á.éNéNá $nánééá $®á®éÎéÎá $îáîééá $.á.éNéNá $náné|é|á --ð'ÿÿ &ÿÿÿÿûÿTimes New Roman-. ç1 2 õú0CUûÿTimes New Roman1-ð d,MM2 õú n-10 0ûÿTimes New Roman-ð. d,MM 2 õú Cn@0 ú"-6ý1uülÿþÜF1 --ð-ðM@ À ú"-ðGð--ð'ÿÿ ú"-6ýuü`--ð=ý@uüÀ ú"-sü 7ý --ð'ÿÿ ú"-lÿ þìF `ûÿTimes New Roman-. 7ý 2 ý`CUûÿTimes New Roman1-ð d,MM2 ýµn-10 0ûÿTimes New Roman-ð. d,MM 2 ÿuD\ûÿTimes New Roman1-ð d,MM 2 ÿÑk0ûÿTimes New Roman-ð. d,MM 2 pPGûÿTimes New Roman1-ð d,MM 2 ·n0ûÿTimes New Roman-ð. d,MM 2 àCU+ûÿTimes New Roman1-ð. d,MM 2 µ PGûÿTimes New Roman-ð d,MM 2 µgn0ûÿTimes New Roman1-ð. d,MM 2 µPGûÿTimes New Roman-ð d,MM2 µ×n-10 0ûÿTimes New Roman1-ð. d,MM 2 ý CUûÿTimes New Roman-ð d,MM 2 ýun0ûÿTimes New Roman1-ð. d,MM 2 ý CU+ûÿTimes New Roman-ð. d,MM 2 PGûÿTimes New Roman1-ð d,MM2 Wn-10 0ûÿTimes New Roman-ð. d,MM 2 êþ D\ûÿTimes New Roman1-ð d,MM 2 êþák0--ð-ðöý@5ýÀ ú"-îýÂ5ýÀ--ð'ÿÿü- $šßýÂèýÜßýÃþ --ðPü@%ûÀ ú"-JüÀ#ûÀ--ð'ÿÿü- $Š9üÀBüÚ9üÀuü --ð[@ÅÀ ú"-ŪS§--ð'ÿÿü- $DšMÂD§ ú"--% E 5P5Pø-- $6éPòjéP% --ððPü@%ûÀ ú"-#ûPJüP--ð'ÿÿü- $69üPBüj9üPuü --ðöý@5ýÀ ú"-5ýÐîýË--ð'ÿÿü- $²ÞýÌèýæàýÊþ --ð`@ÊÀ ú"-ÊÊXÎ--ð'ÿÿü- $ŽJÎRèHÐ ú"--%ÐEÐÕÀÕÀø-- $ŠéÀòÚéÀ%--vþ«øÄýí÷--ðð{þ@ÄýÀ ú"-ÂýVøuþVø--ð'ÿÿ--@±øÀí÷ ú"-þë÷þ«ø--ð'ÿÿ--îþ@pþÀ ú"-nþUøèþUø--ð'ÿÿü- $;ø×þUøàþoø×þUøÿ --ð@È÷ÀW÷ ú"-þW÷þÀ÷--ð'ÿÿü- $±÷4þº÷þ±÷þí÷þûÿTimes New Roman-. þÀ÷ 2 BþöCUûÿTimes New Roman1-ð d,MM2 Bþqön-20 0 ú"--rþ·ýÀýùü--ðð-ðwþ@ÀýÀ ú"-ŸýYýqþYý--ð'ÿÿ--@œýÀùü ú"-þ÷üþ·ý--ð'ÿÿ--êþ@lþÀ ú"-jþXýäþXý--ð'ÿÿü- $>ýÓþXýÜþrýÓþXýÿ ú"--%Uø¯Žú¯Žúþ¶üþ-- $§ü5þ°üþ§üþãüþ --ððôÿ@lÿÀ ú"-lÿÊìÿÉ--ð'ÿÿü- $¯ÝÿÉæÿãÝÿÉ ú"--ÆN--ððÍ@À ú"-ŠÇŠ--ð'ÿÿ--@ÀN ú"-kLk--ð'ÿÿ ú"-Æ( j--ðÍ@À ú"-ËÇË--ð'ÿÿ--@. Àj ú"-khk( --ð'ÿÿ ú"-Ï€]ÿ--ðÖ@À ú"-ïÐï--ð'ÿÿûÿTimes New Roman-. Ðï 2 ãÿCUûÿTimes New Roman1-ð d,MM 2 8n0ûÿTimes New Roman-ð. d,MM 2 0@ûÿTimes New Roman1-ð. d,MM 2 CUûÿTimes New Roman-ð d,MM2 Õn-20 0ûpÿTimes New Roman1-ð. d,MM62 ßø¡üCiphertext Stealing in CBC mode`(HH@0(@H($P(@@((HH$(H$```$pHH@---ðëÿ@lÿÀ ú"-jÿ«åÿ«--ð'ÿÿü- $Ôÿ«ÝÿÅÔÿ« --ð@=À ú"-k7k«--ð'ÿÿü- $& /k&Qbk --ð@"À» ú"-kk¹--ð'ÿÿü- $ kQGkûpÿTimes New Roman-. k¹2 Éù÷EncryptXH@0HH(ûpÿTimes New Roman1-ð. d,MM2 ÉùDecrypth@@0HH( &ÿÿÿÿ&TNPP &ÿÿÿÿ--ð-ðt2DcÔ$$8áXX +&ÿÿÿÿÀôÿÿHøÿÿ5¢ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=Pù & TNPPð &ÿÿÿÿ&TNPPHøÀôZu úÿÿÿ"-ü- &ÿÿÿÿûpÿTimes New Roman-. +2 çø¡üZero Padding in CFB modeX@0H$P@HH(HH$(H$`P`$pHH@ûpÿTimes New Roman5-ð. d,MM2 Ñù÷EncryptXH@0HH(ûpÿTimes New Roman(-ð. d,MM2 ÑùDecrypth@@0HH( ú"- ûûÁúèö7þÉÿÇûûÉÿîöûÿTimes New Roman4-ð. d,MM 2 QûÈøPGûÿTimes New Roman(-ð d,MM2 Qûùn-10 0ûÿTimes New Roman4-ð. d,MM 2 P·üCUûÿTimes New Roman(-ð d,MM 2 Pýn0ûÿTimes New Roman4-ð. d,MM 2 YøCUûÿTimes New Roman(-ð d,MM2 Yóøn-10 0--ðûŒ"Systemn-ðý@ûÀ ú"-ý+ùû(ù--ð'ÿÿü- $ùùü+ùýEùùü,ù5ý --ð¬ÿ@òýÀ ú"-òý-ù€ÿ(ù--ð'ÿÿü- $ùÿ)ùÿCùÿ(ùÑÿ --ðý@ûÀ ú"-û8þý8þ--ð'ÿÿü- $þðü8þùüRþðü8þ,ý ú"--çýù5ýÅø--ððìý@5ýÀ ú"-3ý&ùæý&ù--ð'ÿÿ--@ùÀÅø ú"-ýÃøýù--ð'ÿÿ--@øÀø ú"-ýøýø--ð'ÿÿü- $xøšýøýxøtýŽøýûÿTimes New Roman-. ýø 2 «ýúôCUûÿTimes New Roman5-ð d,MM2 «ýOõn-20 0 ú"--åýþ3ýÑý--ðð-ðëý@4ýÀ ú"-2ý0þåý0þ--ð'ÿÿ--@þÀÚý ú"-ýØýýþ--ð'ÿÿ &ÿÿÿÿ ú"-üÿÿÿ- ÿÿÿ5þüäüßú- ÿÿÿþ2ü:ý>ûûÿTimes New Roman-. ýþ 2 ËýxûENûÿTimes New Roman5-ð 0H 2 ËýÆûk0 &ÿÿÿÿ --ðð-ð@®ýÀü ú"-ýüýŠý--ð'ÿÿü- $ý§ý ýýýsýÓýý ú"--%+ùèþúèþúýßúý-- $>þÎÿ6þÎÿ6þîÿ>þîÿ $>þ6þ6þ.>þ. $>þN6þN6þn>þn $HþHþhþhþ $þþšþšþ $ÈþÈþèþèþ $ÿÿ(ÿ(ÿ $HÿHÿhÿhÿ $ÿÿšÿšÿ $ÈÿÈÿèÿèÿ $(( $HHhh $qmymyMqM $q-y-y q $qíÿyíÿyÎÿqÎÿ $qÎÿqÆÿpÆÿpÎÿ $PÎÿPÆÿ0Æÿ0Îÿ $ÎÿÆÿðÿÆÿðÿÎÿ $ÐÿÎÿÐÿÆÿ°ÿÆÿ°ÿÎÿ $ÿÎÿÿÆÿpÿÆÿpÿÎÿ $PÿÎÿPÿÆÿ0ÿÆÿ0ÿÎÿ $ÿÎÿÿÆÿðþÆÿðþÎÿ $ÐþÎÿÐþÆÿ°þÆÿ°þÎÿ $þÎÿþÆÿpþÆÿpþÎÿ $PþÎÿPþÆÿ>þÆÿ>þÎÿ --ððÿ@éýÀ ú"-çý6þÿ6þ--ð'ÿÿü- $þÿ6þÿPþÿ6þŸÿ &ÿÿÿÿ ú"--û8þÃúÈûûÿTimes New Roman-. ÿ6þ 2 JûžüPGûÿTimes New Roman5-ð 0H 2 Jûÿün0-- $?þÌú7þÌú7þìú?þìú $?þû7þû7þ,û?þ,û $?þLû7þLû7þlû?þlû $Mþ~ûMþûmþûmþ~û $þ~ûþûþûþ~û $Íþ~ûÍþûíþûíþ~û $ ÿ~û ÿû-ÿû-ÿ~û $Mÿ~ûMÿûmÿûmÿ~û $ÿ~ûÿûÿûÿ~û $Íÿ~ûÍÿûíÿûíÿ~û $ ~û û-û-~û $M~ûMûmûm~û $rcûzcûzCûrCû $r#ûz#ûzûrû $rãúzãúzÌúrÌú $rÌúrÄúiÄúiÌú $IÌúIÄú)Äú)Ìú $ Ìú ÄúéÿÄúéÿÌú $ÉÿÌúÉÿÄú©ÿÄú©ÿÌú $ÿÌúÿÄúiÿÄúiÿÌú $IÿÌúIÿÄú)ÿÄú)ÿÌú $ ÿÌú ÿÄúéþÄúéþÌú $ÉþÌúÉþÄú©þÄú©þÌú $þÌúþÄúiþÄúiþÌú $IþÌúIþÄú?þÄú?þÌúûÿTimes New Roman(-ð. 0H 2 Pû5ÿ0@ &ÿÿÿÿ--ûUÆú€óÎÿ[ÎÿªûÿTimes New Roman4-ð. 0H 2 VûCUûÿTimes New Roman(-ð d,@2 VûÙn-10 0ûÿTimes New Roman4-ð. d,@ 2 UsPGûÿTimes New Roman(-ð d,@ 2 Uºn0ûÿTimes New Roman4-ð. d,@ 2 ^ZPGûÿTimes New Roman(-ð d,@2 ^¡n-10 0--ðð-ðý@ûÀ ú"-ýâûä--ð'ÿÿü- $Èýâ ýüýâ=ý --ð±ÿ@úýÀ ú"-úýâ©ÿä--ð'ÿÿü- $Êÿä£ÿþÿäÖÿ --ðý@ûÀ ú"-ûôýô--ð'ÿÿü- $Úõüôþü õüô1ý ú"--ìý?:ý--ððñý@:ýÀ ú"-8ýâëýâ--ð'ÿÿ--@EÀ ú"-ýý?--ð'ÿÿ--@\ÀÓ ú"-ýÓýT--ð'ÿÿü- $E§ýNýEsýýûÿTimes New Roman-. ýT 2 žý¢ÿCUûÿTimes New Roman5-ð d,@2 žý÷ÿn-20 0 ú"--êýK 8ý--ðð-ðøý@AýÀ ú"-?ýëòýë--ð'ÿÿ--@Z À ú"-ýýT --ð'ÿÿ &ÿÿÿÿ ú"-üÿÿÿ- ÿÿÿ:þLéü- ÿÿÿþî?ýúûÿTimes New Roman-. ýT 2 Ðý4ENûÿTimes New Roman5-ð 0H 2 Ðýk0 &ÿÿÿÿ --ðð-ð@jÀR ú"-ýRýb--ð'ÿÿü- $S«ý\ýSwýý $úÓÿòÓÿòóÿúóÿ $úòò3ú3 $úSòSòsús $ ) ) $I I i i $ © © $É É é é $ ) ) $I I i i $ © © $É É é é $ )) $-h5h5H-H $-(5(5- $-èÿ5èÿ5Óÿ-Óÿ $-Óÿ-Ëÿ"Ëÿ"Óÿ $ÓÿËÿâ Ëÿâ Óÿ $ Óÿ Ëÿ¢ Ëÿ¢ Óÿ $ Óÿ Ëÿb Ëÿb Óÿ $B ÓÿB Ëÿ" Ëÿ" Óÿ $ Óÿ Ëÿâ Ëÿâ Óÿ $ Óÿ Ëÿ¢ Ëÿ¢ Óÿ $ Óÿ Ëÿb Ëÿb Óÿ $B ÓÿB Ëÿ" Ëÿ" Óÿ $ Óÿ ËÿúËÿúÓÿ --ðÿ@îýÀ ú"-ìýòÿò--ð'ÿÿü- $Øÿòÿ ÿòÃÿ ú"--ûìÃú|ûÿTimes New Roman-. ÿò 2 JûlCUûÿTimes New Roman5-ð d,0 2 JûÁn0-- $óÌúëÌúëìúóìú $óûëûë,ûó,û $óLûëLûëlûólû $ ~û û! û! ~û $A ~ûA ûa ûa ~û $ ~û û¡ û¡ ~û $Á ~ûÁ ûá ûá ~û $ ~û û! û! ~û $A ~ûA ûa ûa ~û $ ~û û¡ û¡ ~û $Á ~ûÁ ûá ûá ~û $~ûû!û!~û $&cû.cû.Cû&Cû $&#û.#û.û&û $&ãú.ãú.Ìú&Ìú $&Ìú&ÄúÄúÌú $ý Ìúý ÄúÝ ÄúÝ Ìú $œ Ìúœ Äú Äú Ìú $} Ìú} Äú] Äú] Ìú $= Ìú= Äú Äú Ìú $ý Ìúý ÄúÝ ÄúÝ Ìú $œ Ìúœ Äú Äú Ìú $} Ìú} Äú] Äú] Ìú $= Ìú= Äú Äú Ìú $ýÌúýÄúóÄúóÌúûÿTimes New Roman(-ð. d,0 2 Pûé 0@--%êFüžFüžýyý-- $j©ýsýjuýŠý &ÿÿÿÿ-üÿÿÿ-ð ÿÿÿ<þøëü^ö- ÿÿÿþ±÷AýœöûÿTimes New Roman4-ð. d,0 2 Òý÷öENûÿTimes New Roman(-ð 0H 2 ÒýE÷k0 &ÿÿÿÿ --ðð-ð@;öÀÝõ ú"-ýÛõý5ö--ð'ÿÿü- $$öŠý-öý$örý`öý &ÿÿÿÿ ú"-üÿÿÿ-ð ÿÿÿ5þÊäü- ÿÿÿþl:ýxûÿTimes New Roman-. ý5ö 2 Ëý²ENûÿTimes New Roman5-ð 0H 2 Ëýk0 &ÿÿÿÿ --ðð-ð@óÀ{ ú"-ýyýí--ð'ÿÿü- $ܱýåýÜ}ýý &ÿÿÿÿ&TNPP &ÿÿÿÿ--ð89DÏ^1À5ll up&ÿÿÿÿFõÿÿ@øÿÿÆ z &ÿÿÿÿ&ÿÿÿÿTNPP8Q=Pù| & TNPPð &ÿÿÿÿ&TNPP@øFõ: úÿÿÿ"-ü- &ÿÿÿÿûpÿTimes New Roman-. +2 ßø¡üZero Padding in OFB modeX@0H$P@HH(HH$(H$hPOle ÿÿÿÿÿÿÿÿÿÿÿÿœPIC prÿÿÿÿŸLMETAÿÿÿÿÿÿÿÿÿÿÿÿÀøCompObjquÿÿÿÿÜht8a x&ÿÿÿÿWordMicrosoft WordV ûŒSystem -ü-ú-ºÊú-ðüÿÿÿ-®Õûÿ"ArialC ]!íw*íwÀgïwC ] - 2 'ô V Endpoint 8.....ûÿŒ"Arial U!íw*íwÀgïw U - 2 'SV A<-'ÿÿüÿÿÿ-ú-©$R-ð-ð|/]-2 @ V GatekeeperA..*....'ÿÿ--ú-?S ¯-ð-3G º#-2 ËV GatewayA..<.*'ÿÿ-ú-R§Él-ð-FÔw-2 å²V Endpoint X8.....8'ÿÿú-EM 2× -ðú-8Ý Ê -ðú-Ö Û¥ -ð-ú-_ËÕG -ð-RŸáS ûÿTimes New Roman*íwÀgïw -2 òS V POTS B.<3.8'ÿÿ-ú-Ü.¯Œ-ð--þÿ ÿÿÿÿ ÀFMicrosoft Word Picture MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿt8að x&ObjInfoÿÿÿÿÿÿÿÿÿÿÿÿÞObjectPooltwÿÿÿÿLç)œLç)œOlePres000ÿÿÿÿÿÿÿÿÿÿÿÿßWordDocumentvxÿÿÿÿŒÿÿÿÿWordMicrosoft WordV ûŒSystem -ü-ú-ºÊú-ðüÿÿÿ-®Õûÿ"ArialC ]!íw*íwÀgïwC ] - 2 'ô V Endpoint 8.....ûÿŒ"Arial U!íw*íwÀgïw U - 2 'SV A<-'ÿÿüÿÿÿ-ú-©$R-ð-ð|/]-2 @ V GatekeeperA..*....'ÿÿ--ú-?S ¯-ð-3G º#-2 ËV GatewayA..<.*'ÿÿ-ú-R§Él-ð-FÔw-2 å²V Endpoint X8.....8'ÿÿú-EM 2× -ðú-8Ý Ê -ðú-Ö Û¥ -ð-ú-_ËÕG -ð-RŸáS ûÿTimes New Roman*íwÀgïw -2 òS V POTS B.<3.8'ÿÿ-ú-Ü.¯Œ-ð--þÿà òùOh«+'³Ù0 ¬žÈÔàð 4@L Xdlt|äG. ThomÜ¥hWà eCj 8 j jj j ° ° ° ° ° °
º
° § KÄ Ä Ä Ä Ä """2444=q} ò XJ § "Ä ^"""§ 2j j Ä Ä 222"j Ä Ä 2D¯ÄŒ ¢ j j j j "222 Gatekeeper
Gateway
Endpoint A
POTS B
Endpoint X
€Ð/¥à=Š §Ðš^©ªª2(aµM?ÿÿÿÿÿÿ20(p YZÿÿÿ2(èà¥Nÿÿÿ.0$ Ñÿÿÿ20(%*!£Kÿÿÿÿ0 0&$ðï20( šYHÿÿÿ00&$.Ž-³00&U#jK;J: ()*4@BCøòøòððððíðððëuU]]uDauD]a *+34@ABCûÿðøðöø#ðöøoðöögðöø#ðööûÿð×òZ K@ñÿNormala "A@òÿ¡"Default Paragraph Font!*7:CCÿÿÿÿ ÿÿCCCZŸðP²â Dÿ@\BAHARI\JF3-2-D13-4SINe00:winspool\BAHARI\JF3-2-D13-4SI\BAHARI\JF3-2-D13-4SIpsXXLetter8¥dC ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''\BAHARI\JF3-2-D13-4SIpsXXLettereeeeeee8¥ôE ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''KTimes New RomanSymbol"Arial Univers (W1)Arial"ÁÐh! G. ThomjtogaSummaryInformation(ÿÿÿÿyÿÿÿÿüŽDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿØ1TableÿÿÿÿòSummaryInformation(|ÿÿÿÿÈþÿÿÿþÿÿÿ þÿÿÿþÿÿÿþÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿNormal®jtoga#2Microsoft Word for Windows 95@FÃ#@@žÄŒ@þJÄŒþÿÕÍÕ.+,ù®0šHPdlt|ä Acme Corp.þÿà òùOh«+'³Ù0`$pHH@ûpÿTimes New Roman1-ð. d,MM2 Éù÷EncryptXH@0HH(ûpÿTimes New Roman-ð. d,MM2 ÉùDecrypth@@0HH( &ÿÿÿÿ ú"- zûû¹úèöx8þ·Èûx û·ïöûÿTimes New Roman1-ð. d,MM 2 IûÈøPGûÿTimes New Roman-ð Øy2 Iûùn-10 0ûÿTimes New Roman1-ð. Øy 2
žüCUûÿTimes New Roman-ð Øy 2
ýn0ûÿTimes New Roman1-ð. Øy 2 GøCUûÿTimes New Roman-ð Øy2 Gôøn-10 0--ðûŒ"Systemn-ðý@yûÀ ú"-ý+ùyû(ù--ð'ÿÿü- $ùñü+ùúüEùñü,ù-ý --ð@êýÀ ú"-êý-ù)ù--ð'ÿÿü- $ùy)ùCùy)ùµ --ðÿü@yûÀ ú"-wû8þùü8þ--ð'ÿÿü- $þèü8þñüRþèü8þ$ý ú"--ßýù-ýÅø--ððäý@-ýÀ ú"-+ý&ùÞý&ù--ð'ÿÿ--@ùÀÅø ú"-ýÃøýù--ð'ÿÿ ú"-Ýýþ+ýÑý--ðãý@,ýÀ ú"-*ý0þÝý0þ--ð'ÿÿ--@þÀÚý ú"-ýØýýþ--ð'ÿÿ &ÿÿÿÿ ú"-üÿÿÿ- ÿÿÿ+üÚþ×ú- ÿÿÿ*ü0ÿ6ûûÿTimes New Roman-. ýþ 2 ÁÿpûENûÿTimes New Roman1-ð Øy 2 ÁÿŸûk0 &ÿÿÿÿü-ð $?þŒ7þŒ7þÜ?þÜ $?þü7þü7þ?þ $?þ<7þ<7þ\?þ\ $IþrIþziþziþr $þrþz©þz©þr $ÉþrÉþzéþzéþr $ ÿr ÿz)ÿz)ÿr $IÿrIÿziÿziÿr $ÿrÿz©ÿz©ÿr $ÉÿrÉÿzéÿzéÿr $ r z)z)r $IrIzizir $r[z[z;r; $rzzûrû $rÛzÛzŒrŒ $rŒrŽqŽqŒ $QŒQŽ1Ž1Œ $ŒŽñÿŽñÿŒ $ÑÿŒÑÿŽ±ÿŽ±ÿŒ $ÿŒÿŽqÿŽqÿŒ $QÿŒQÿŽ1ÿŽ1ÿŒ $ÿŒÿŽñþŽñþŒ $ÑþŒÑþŽ±þŽ±þŒ $þŒþŽqþŽqþŒ $QþŒQþŽ?þŽ?þŒ --ðð-ð@áýÀ ú"-áý6þ4þ--ð'ÿÿü- $þq4þzNþq4þ &ÿÿÿÿ ú"--|û8þ»úÈûûÿTimes New Roman-. 4þ 2 BûžüPGûÿTimes New Roman1-ð Øy 2 Bûÿün0-- $?þÄú7þÄú7þäú?þäú $?þû7þû7þ$û?þ$û $?þDû7þDû7þdû?þdû $MþvûMþ~ûmþ~ûmþvû $þvûþ~ûþ~ûþvû $ÍþvûÍþ~ûíþ~ûíþvû $ ÿvû ÿ~û-ÿ~û-ÿvû $MÿvûMÿ~ûmÿ~ûmÿvû $ÿvûÿ~ûÿ~ûÿvû $ÍÿvûÍÿ~ûíÿ~ûíÿvû $ vû ~û-~û-vû $MvûM~ûm~ûmvû $r[ûz[ûz;ûr;û $rûzûzûúrûú $rÛúzÛúzÄúrÄú $rÄúrŒúiŒúiÄú $IÄúIŒú)Œú)Äú $ Äú ŒúéÿŒúéÿÄú $ÉÿÄúÉÿŒú©ÿŒú©ÿÄú $ÿÄúÿŒúiÿŒúiÿÄú $IÿÄúIÿŒú)ÿŒú)ÿÄú $ ÿÄú ÿŒúéþŒúéþÄú $ÉþÄúÉþŒú©þŒú©þÄú $þÄúþŒúiþŒúiþÄú $IþÄúIþŒú?þŒú?þÄúûÿTimes New Roman-ð. Øy 2 Hû5ÿ0@ &ÿÿÿÿ &ÿÿÿÿ-üÿÿÿ-ð ÿÿÿ+È÷Úþö- ÿÿÿj÷0ÿvöûÿTimes New Roman1-ð. Øy 2 Áÿ°öENûÿTimes New Roman-ð Øy 2 Áÿþök0 &ÿÿÿÿ --ðð-ð@÷õÀFõ ú"-ÿDõÿñõ--ð'ÿÿü- $àõÿéõÿàõhÿöÿ --ð@ùÀÐ÷ ú"-ÿÎ÷ÿ ù--ð'ÿÿ--@žúÀRù ú"-ÿPùÿ²ú--ð'ÿÿü- $¡úÿªúÿ¡úhÿÝúÿ ú"- ÿørÿñ÷- % ø ÿ øýøý-- $zø¡ýøýzømý¶øý --ðð@ÆýÀü ú"-ÿüÿÀý--ð'ÿÿ ú"-ü- ÿêüqÿÈü- %ØüqÿØüý€ýý-- $ýšýýýýtýÑýýûÿTimes New Roman-. ÿÀý 2 °ý<÷SGûÿTimes New Roman1-ð 02 °ý÷n-10 0ûÿTimes New Roman-ð. 0 2 ŸýLüSGûÿTimes New Roman1-ð 0 2 Ÿýün0 &ÿÿÿÿûÿTimes New Roman-ð. 02 6L÷Note: S@$9# HûÿTimes New Roman1-ð 0 2 6ÐøiûÿTimes New Roman-ð 0p2 6ëøF is the result of repetitive encryption (i.e., permutations) of the IV $1 $@9 *92@$# @+ *9@9$#$#@9 9@9*@@$#@@ +$ 8 @9+c@$9#$@@2* @+ $@8 +\ &ÿÿÿÿ--ûå¿ú4~œ~ìœ;ûÿTimes New Roman1-ð. 0 2 OûCUûÿTimes New Roman-ð FØy2 Oûin-10 0ûÿTimes New Roman1-ð. FØy 2 DPGûÿTimes New Roman-ð FØy 2 DKn0ûÿTimes New Roman1-ð. FØy 2 MëPGûÿTimes New Roman-ð FØy2 M2n-10 0--ðð-ðý@ûÀ ú"-ýwût--ð'ÿÿü- $]÷üwý÷üx3ý --ð@ðýÀ ú"-ðýyu--ð'ÿÿü- $[uu» --ðý@ûÀ ú"-}ûÿü--ð'ÿÿü- $jîü÷üîü*ý ú"--åýÏ3ý--ððêý@3ýÀ ú"-1ýräýr--ð'ÿÿ--@ÕÀ ú"-ýýÏ--ð'ÿÿ ú"-ãýÛ1ý--ðéý@2ýÀ ú"-0ý|ãý|--ð'ÿÿ--@êÀ& ú"-ý$ýä--ð'ÿÿ &ÿÿÿÿ ú"-üÿÿÿ- ÿÿÿ1Ôàþ#- ÿÿÿv6ÿûÿTimes New Roman-. ýä 2 ÇÿŒENûÿTimes New Roman1-ð Øy 2 Çÿ k0 &ÿÿÿÿü-ð $ÂÂââ $"" $BBbb $xµµx $ÕxÕõõx $ x 5 5 x $U xU u u x $ x µ µ x $Õ xÕ õ õ x $ x 5 5 x $U xU u u x $ x µ µ x $Ÿ aÆ aÆ AŸ A $Ÿ !Æ !Æ Ÿ $Ÿ áÆ áÆ ÂŸ  $Ÿ Ÿ ºœ ºœ  $  º} º}  $] Â] º= º=  $  ºý ºý  $Ý ÂÝ ºœ ºœ  $  º} º}  $] Â] º= º=  $  ºýºý $ÝÂݺœºœÂ $ººÂ --ðð-ð@çýÀ ú"-çý--ð'ÿÿü- $fww³ &ÿÿÿÿ ú"--ûÁúûÿTimes New Roman-. 2 HûCUûÿTimes New Roman1-ð Øy 2 HûYn0-- $ÊúÊúêúêú $ û û*û*û $JûJûjûjû $|ûû¹û¹|û $Ù|ûÙûùûù|û $ |û û9 û9 |û $Y |ûY ûy ûy |û $ |û û¹ û¹ |û $Ù |ûÙ ûù ûù |û $ |û û9 û9 |û $Y |ûY ûy ûy |û $ |û û¹ û¹ |û $Ÿ aûÆ aûÆ AûŸ Aû $Ÿ !ûÆ !ûÆ ûŸ û $Ÿ áúÆ áúÆ ÊúŸ Êú $Ÿ ÊúŸ Âúµ Âúµ Êú $ Êú Âúu Âúu Êú $U ÊúU Âú5 Âú5 Êú $ Êú Âúõ Âúõ Êú $Õ ÊúÕ Âúµ Âúµ Êú $ Êú Âúu Âúu Êú $U ÊúU Âú5 Âú5 Êú $ Êú ÂúõÂúõÊú $ÕÊúÕÂúµÂúµÊú $ÊúÂúÂúÊúûÿTimes New Roman-ð. Øy 2 Nû 0@ &ÿÿÿÿ &ÿÿÿÿ-üÿÿÿ-ð ÿÿÿ1àþc- ÿÿÿ¶6ÿÂûÿTimes New Roman1-ð. Øy 2 ÇÿüENûÿTimes New Roman-ð Øy 2 ÇÿJk0 &ÿÿÿÿ --ðð-ð@CÀÿ ú"-ÿÿÿ=--ð'ÿÿü- $,¢ÿ5ÿ,nÿhÿ --ð@\À ú"-ÿÿV--ð'ÿÿ--@À ú"-ÿÿþ--ð'ÿÿü- $í¢ÿöÿínÿ)ÿ ú"- ÿ_xÿ=- %UÿUýÕý-- $ƧýÏýÆsýý --ðð@ÀÒ ú"-ÿÐÿ--ð'ÿÿ ú"-ü- ÿ6wÿ- %$wÿ$ýðý-- $á®ýêýázýýûÿTimes New Roman-. ÿ 2 ¶ýSGûÿTimes New Roman1-ð F02 ¶ýÏn-10 0ûÿTimes New Roman-ð. F0 2 ÄýSGûÿTimes New Roman1-ð F0 2 Äýßn0 &ÿÿÿÿ &ÿÿÿÿ&TNPP &ÿÿÿÿ--ðð-ðDDgVÞü0šš {5&ÿÿÿÿ#öÿÿŸùÿÿ» Ÿ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=PùS & TNPPð &ÿÿÿÿ&TNPPŸù#ö úÿÿÿ"-ü- &ÿÿÿÿ ú"-5B( ÎÎÎÿÿÿ|øñãÇ>- ÎÎÎÿÿÿ þçšý¬úûÿŒ"ArialT-. 2 Aþ'þActual PayloadQ>%E>K>?D?D5B( ÎÎÎÿÿÿ>Çãñø|ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ-ð ÎÎÎÿÿÿþ9šýàûÿŒ"Arial-ð. d,MM2 AþüPadK>Düÿÿÿ-ð ÿÿÿþ» šý;ûÿŒ"ArialT-ð. d,MM 2 AþÕLDûÿ"Arial-ð. d,MM12 @ú]öPadding as prescribed by RTPK>>??>>8 >%>88&>>> >8QDK --ððûŒ"Systemn-ð@ ÀÇú ú"-pûÅúpû --ð'ÿÿü- $ÜúVûÓúpûÜúû úpû $u û~ pûu Vû± pûûÿŒ"Arial-. pû (2 7ûRTP Payload (M octets)QDKK>> D>E%]E>%?%>& --ð-ð@ºÀÕú ú"-ŠüÓúŠüŽ--ð'ÿÿü- $äúüÛúŠüäúÀüšúŠü $£Àü¬Šü£üߊü --ð@À ú"-Šü Šü--ð'ÿÿü- $üŠüÀüߊü $úÀüŠüúü6Šü --ð@ Àc ú"-ŠüaŠü --ð'ÿÿü- $rüiŠürÀü6Šü $} Àü Šü} ü¹ ŠüûÿŒ"Arial-. Šü 2 ü2ÿM-L]&DûÿŒ"ArialT-ð. d,MM2 üÈL-1D&>ûÿŒ"Arial-ð. d,MM 2 üÌ1>û ÿ"ArialT-ð. d,MM2 ÿ¢Pad value can be@56066505565û ÿ"Arial-ð. d,MM2 µderived by some56 0565005P5û ÿ"ArialT-ð. d,MM"2 jconventional means056056556P5560 ú"-üÿÿÿ-ð ÿÿÿþ©ú¥ýu÷ûÿŒ"Arial-ð. d,MM2 ýÈ÷ RTP headerQDKE>>E>+ûÿŒ"ArialT-ð. d,MM 2 Lþ·÷PKûÿŒ"Arial-ð. d,MM2 \ÿ}÷P=1KA> &ÿÿÿÿ&TNPP &ÿÿÿÿ--ðð-ð@Dt8a Ú x&ÿÿÿÿWordMicrosoft WordV ûŒSystem -ü-ú-ºÊú-ðüÿÿÿ-®Õûÿ"ArialC ]!íw*íwÀgïwC ] - 2 'ô V Endpoint 8.....ûÿŒ"Arial U!íw*íwÀgïw U - 2 'SV A<-'ÿÿüÿÿÿ-ú-©$R-ð-ð|/]-2 @ V GatekeeperA..*....'ÿÿ--ú-?S ¯-ð-3G º#-2 ËV GatewayA..<.*'ÿÿ-ú-R§Él-ð-FÔw-2 å²V Endpoint X8.....8'ÿÿú-EM 2× -ðú-8Ý Ê -ðú-Ö Û¥ -ð-ú-_ËÕG -ð-RŸáS ûÿTimes New Roman*íwÀgïw -2 òS V POTS B.<3.8'ÿÿ-ú-Ü.¯Œ-ð--@ ÄÐàìø , HT` lxäITU-T H.235 RecommendationTU-G. Thom. T. TNormal.dot Pekka Pessi3kkMicrosoft Word 8.0n@ÒIk@Àl,õŒ@Œ_ëÓ)œ@x£2ç)œ+2õþÿÕÍÕ.+,ù®DÕÍÕ.+,ù®DocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿäCompObjÿÿÿÿÿÿÿÿÿÿÿÿjÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿLhp š°ž ÀçäNRC/CSL}-jITU-T H.235 RecommendationTitle 6> _PID_GUIDäAN{C94FF6E1-95E7-11D1-9D2F-0000C04BE66A}þÿ ÿÿÿÿ ÀFMicrosoft Word Document MSWo !"#$%&'()*+,-./0123456789:;<þÿÿÿþÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÜ [$@ñÿ$NormalmH N@N Heading 1$$€ð€x5;>*CJOJQJkHäF@F Heading 2 $€ð€x5CJOJQJkHäH@H Heading 3 $€ð€<56CJOJQJkHäF@F Heading 4 $€ð€<5CJOJQJkHäB@B Heading 5 $€ð€<CJOJQJkHäF@F Heading 6 $€ð€<6CJOJQJkHä>@> Heading 7 $€ð€<OJQJkHäB@B Heading 8 $€ð€<6OJQJkHäF @F Heading 9 $€ð€<6CJOJQJkHä<A@òÿ¡<Default Paragraph FontFþOòF¥Normal$€ Ƨ4ÁOJQJkHäFþOFAddress€ ÆByCJOJQJkHäHþOHAn #$€Ê€D Ƨ4ÁCJOJQJkHä,þO",Annex $€P5B*NþOA2Nannex a"dû ÆnÐ U"&OJQJkHä*@*TOC 4X ÆÀ! DþODAnnex_#$€Ð€D Æñà%OJQJkHä:þO: Annex_Ref$ Ƨ4ÁNþONAnnex_Title$€€D Ƨ4Á5CJ(þOQ( Appendix_#LþOaLAppendix_Ref Ƨ4Áñà%OJQJkHäTþOqTAppendix_Title Ƨ4Áñà%CJOJQJkHäJþOJASN.1$€ Ƨ4Á5CJOJQJkHäDþO±ÂD ASN.1 Cont€B*CJOJ QJ kHämH 2þO±Ò2ASN.1 Cont. $€xþOÑâxASN.1 Cont. T.124/ú Æ&O Û gì xš4ÀB*CJOJQJkHäPþOÒP ASN.1 ital$ Ƨ4Á6CJOJQJkHäjþOñjASN.1 title_ital4 $€ª Æ(§4Á T7n¥ÜJ ž&CJ,þO,asn1!$OJQJkHä|þO"|asn1.8ptF"$ Æ>hÐ8 pØ @šxàH°èPž 5CJOJQJkHä8þO8attr#$€h ÆpOJQJkHä:þOB:attr2$$h ÆxOJQJkHä:þOR:attr3%$ Æ OJQJkHä8þO8Blanc&$$$CJOJQJkHä>þOr>bullet list'ÿÿB*OJ QJ kHäBþOBcall($$€ã Æ6OJQJkHä4þO4CCI)$$$€ÇOJQJkHä<þO¢<CCITT|ISO/IE*CJOJQJkHäBþOB Chapter_#+$$$$€ÀOJQJkHä>þO±> Chapter_title ,$€ð€ª5dþOd Citations,-¥ªdð€[€µ ƪSü¥O6CJOJQJkHä0þOâ0clause.CJOJQJkHä<þOò<clause5thlvl/CJOJQJkHähþOhCorrection begin+0$$œ €h&d Ƨ4Á 56B*@þO@Correction end1$$d&d\þO\Correction Separator2$ €ð€ð&d56LþO!2LCorrection Separator Begin3$PþO!BPCorrection Separator End4$d&dNþORN dash list58Täý ÆT5CJOJQJkHä4þO4Data 6 Æ7CJOJQJkHäJþOrJ def texte7$€ Ƨ4ÁOJQJkHä^þo!r^ def title)8$$æü€9€@& Æñà%CJOJQJkHäLþOL Defect report 9$€x5>*CJ$OJQJkHä:þO¢:Description :7€xCJmH\þoA²\Doc Heading$;$$€h€@& Ƨ4ÁB*OJQJkHä2þOÂ2docname<CJOJQJkHä8þOÒ8 docNameCap=CJOJQJkHäFþOâFentry>€ð ÆÐ 5CJOJQJkHämH JþOáòJentry contents?€ Æp@à5DþODenumlev1"@$§sþ€V Ƨ4Á(þO(enumlev2A4(þO"(enumlev3BÁ>þO2>EquationC€Á€ð Æ4ñà%<þO<FigureD$€ð€à Ƨ4ÁBþOBFigure_#E$$€7€qCJOJQJkHäJþOJ Figure_LegendF$€q Ƨ4ÁCJVþOrV Figure_RemarkG$$d9ÿ€ ÆCJOJQJkHäTþOTFigure_Title!H$$€x€Ð Ƨ4Á5CJ4þO4footI$CJOJ QJ kHämH 2 @¢2FooterJ$€x ÆàÀ!<&@¢±<Footnote ReferenceCJEHXþOÂXfootnote texL$ Ælª<ÈTCJOJ QJ kHämH N@ÒN Footnote TextM$€ Ƨ4ÁCJ@þOâ@GDMON$€ Ƨ4ÁOJ QJ kHäDþOÑòD GDMO Cont. O ƪ5CJOJ QJ kHä6þOÁ6GDMO indent Pôü5<þO<GDMO TemplatQCJOJQJkHä:þO":ibal-endcmtRCJOJQJkHä>þO2>ibal-newtxtSpCJOJQJkHä@þOB@ibal-proposaT CJOJQJkHä8þOR8ibal-ratUpCJOJQJkHä@þOb@ibal-severitV CJOJQJkHä6þOqr6Index TitleWOJQJkHä*þOq*Index_TitleXHþOHInfodocY$$§Yû ƧCJOJQJkHä<þO¢<ISO documentZCJOJQJkHä8þO²8 iso2column[CJOJQJkHä:þOÂ: iso3rdlvl\ÐCJOJQJkHä:þOÒ: isoalpha1]ÐCJOJQJkHä>þOâ>isoalphalis^ÐCJOJQJkHä<þOò< isoannexl1_pCJOJQJkHä>þO>isoannexl1I`$CJOJQJkHä<þO< isoannexl2a CJOJQJkHä:þO":isoannexstrbCJOJQJkHä:þO2: isobulletc`CJOJQJkHä:þOB: isoclausedÐCJOJQJkHä<þOR< isoclause0eÐCJOJQJkHä4þOb4isodeff CJOJQJkHä6þOr6isodefngÐCJOJQJkHä8þO8 isoendbullhCJOJQJkHä6þO6 isofont10iCJOJQJkHä4þO¢4isofont9jCJOJQJkHä8þO²8 isomarginskCJOJQJkHä2þOÂ2isonotelCJOJQJkHä4þOÒ4isoparasmCJOJQJkHä8þOâ8isoromannÐCJOJQJkHä8þOò8 isosectionoCJOJQJkHä>þO>isosubclauspÐCJOJQJkHäþOisotabsXq ÆS `à à" %@&`'À*à+-`B MÀNàOQ@S`TUZ`]`f@wàwy zCJOJQJkHä4þO"4isotitlerCJOJQJkHä,þO2,ItemsCJOJQJkHäjþOqBjjustified bullet list$88þ Æ85B*CJOJQJkHä:þOAR:justified dash listuDþObDl0v$ìäý€ð ÆìB*CJOJ QJ kHä8þOr8l1 w$ì€ðB*CJOJ QJ kHäFþOFlevel 3 headingx$<OJQJkHä0þO0Line y$€OJQJkHä<þO<listzÐþ€d ÆÐOJQJkHäDþO²Dlistitem{$ Ƨ4ÁOJQJkHäFþOÂF memo list|Ðþ€d ÆÐOJQJkHä:þOÁÒ:memo list 2}€ð ÆÐ.þOQâ. new dash list~dþodNormal after title$€9@& Æñà%5CJOJQJkHäD@D Normal IndentÐdðOJQJkHä:þO:Note$€q Ƨ4ÁCJ8þO8Object Æ7CJOJQJkHäRþO2RoNormal$€ð Ƨ4ÁB*CJOJ QJ kHämH 2þOB2p $€ðB*CJOJ QJ kHä:)@¢Q:Page NumberB*CJOJQJkHäDþObDPart¥[ù€Ç Æü¥CJOJQJkHä þOQ Part_#DþOaDPart_Ref Ƨ4Áñà%OJQJkHäLþOqòL Part_Title Ƨ4Áñà%CJOJQJkHäDþO¢Dprec&€7/q.q:CJOJQJkHä2þO²2prose $€xOJQJkHäFþOÂFQlistÜ$÷€Ç ÆÁÜCJOJQJkHäLþOL Question_#$$$€Ð Æñà%OJQJkHä\þO\Question_Title$$$€ð Æñà%5CJOJQJkHä\þO\Question_Title/Date$$$€ Æà%OJQJkHä\þOò\Question_Title/Ref$$$€ Æñà%OJQJkHä>þO>Rec #$$€Ð Ƨ4Á52þO 2 Rec Title $€ðCJBþOBRec_#$$$€Ð Æñà%OJQJkHä4þOB 4Rec_CCITT_#$$54þO R 4 Rec_ISO_# Æ §4Á2þO1 2 Rec_Title€ð5CJRþORRec_Title/Date$$$€ Æà%OJQJkHä:þOa r : Rec_Title/Ref€5CJ,þO ,Ref$ŬþdLÿVþOVRef_Doc"$æü€ã Ƨ4Á6CJOJQJkHäTþO² TRef_Text"$æü€ Ƨ4ÁCJOJQJkHäDþO² D Ref_Title$$$€XCJOJQJkHäþO1 Rep_#&þOa & Rep_Title0þOq 0Rep_Title/Date.þO ò . Rep_Title/Ref þO1 Res_#¡&þOa & Res_Title¢0þOq 0Res_Title/Date£.þO 2 . Res_Title/Ref€6þOR 6sc21box¥$CJOJQJkHä<þOb < sc21numberŠ$CJOJQJkHäLþOL Section #§$$$Â>ú ÆÂOJQJkHä:þOq 2 : Section title š$€ð64þOq 2 4Section_sous ©$€ð\þO¢ \ Section_Titleª€ Ƨ4Á5CJ OJQJkHänþO² nSingle Space PostScr«$€ Ƨ4Á5<B*OJ QJ kHämH @þOA @ star list¬$bòþ Æ8bZþOZstitre_p$dð€Z€Ž ƪSü¥O5CJOJQJkHäRþOâ RStyle-®$jd>€T Ƨ4Ád$+16CJPþOò Pstyles¯Éý€ Ƨ4Á5>*CJOJQJkHä:þO:Subject ° Æ7CJOJQJkHä.þO.table±OJQJkHämH Nþo!"NTable header²$€à€@& 6OJQJkHämH @þO@Table_#³$$€7€qCJOJQJkHäJþOJ Table_finŽ$€ Ƨ4ÁOJQJkHäLþOLTable_Legendµ$€q€à Ƨ4ÁCJLþObL Table_Text!¶$$€€ Ƨ4ÁCJ:þOar:Table_Text_Body ·€€8þOq8Table_Text_Firstž€:þOq:Table_Text_Last ¹$€6þOa¢6Table_Text2 º$€€RþObRTable_Title!»$$€x€q Ƨ4Á5CJBþOaÂBTable2_Text Œ€P€POJQJkHämH 2þOÁÒ2Table3_Text œ€€šþOšTitle 1sŸ$ &Fÿhþ€à€ð>ÆTh)>*CJOJQJkHä*þOá*Title 2¿€>*&þOñ&Title 3À€àXþOXtitre-p$Ádð€Z€Ž ƪSü¥O5CJOJQJkHäBþO2Btoc 0Â$€ Æ&>*CJOJQJkHäL@LTOC 1Àx ÆÛšÀ! 5CJOJQJkHämHnH6@6TOC 3ÄÛ ÆnÀ! mHnH@@@TOC 5$Å$€ Ƨ4Áý% .@.TOC 6Æ ÆÀ! CJ2@2TOC 7Ç$°€x ÆÀ! 2@2TOC 8È$x€x ÆÀ! 2@2TOC 9É$@€x ÆÀ! :þO¢:verytempnotÊCJOJQJkHä6'@¢±6Comment ReferenceCJRþOÂRCouv Rec TitleÌ$$€ð5CJ$OJQJkHäHþOÒH Couv Rec # Í$€5CJ OJQJkHäDþOâD Couv NoteÎ$€È ÆnOJQJkHäZþoòZforeword(Ï$$æü€ž@& Ƨ4ÁCJOJQJkHä$þO $ParaЀxmH8@ 8Comment TextÑOJQJkHä6@" 6Header Ò ÆàÀ! 5>*CJ6B@2 6 Body TextÓ€xOJQJkHäþoB HeadingcÔ &Fÿ@& >ÆT 2þOR 2HeadÕ$€x ÆŠmH 1@b List NumberlÖ &Fÿhþ€x>ÆTh.:@1B:TOC 2 ×$ô€CJOJQJkHä|þo! |aaacØ &Fÿ@& >ÆT ,þO¢ ,codeOJQJkHämHnH0@¢ List BulletpÚ &Fÿ Æhhþ>ÆT<Y@² <Document MapÛ-D OJQJkHäÕwHSenthil SengodanPekka PessiSirpa Kuisma¯]6à:/;(<}<=.@â@#JJL%NkOP QWïWêY5]ù]°hf7h Oú³ŠÆÈvÔÕ±ÝöäwHsseØzbUv8PPeØzbUv8PPeØzbUv8PPeØzbUv8SKuØzbUv8sseØzbUv8sseØzbUv8SKuØzbUv8SKuØzbUv8SKuØzb Uv8SKuØzb Uv8sseØzbUv8SKuØzbUv8SKuØzb Uv8PPeØzbUv8sseØzbUv8sseØzbUv8SKuØzbUv8SKuØzbUv8SKuØzbUv8PPeØzbUv8SKuØzbUv8sseØzbUv8PPeØzbUv8SKuØzbUv8SKuØzbUv8SKuØzbUv8SKuØzbUv8sseØzbUv8SKuØzbUv8PPeØzb Uv8sseØzb!Uv8PPeØzb"Uv8PPeØzb#Uv8PPeØzb$Uv8PPeØzb%Uv8sseØzb&Uv8EñçG÷Iñ?ùOòë | ¿ ê /s>ïæD [(Uå!NLvy~Ôtì²ËÅwH$ÿÿÿÿA$ÿÿÿÿ$ÿÿÿÿ·$ÿÿÿÿæ$ÿÿÿÿ%ÿÿÿÿ%JÉÉÉÉÉÉÉÉÉÉÉÉÉÉÉÉÉÉüw¯Iïb 0"0@äEXN5bf ã€v±]Õ€ìeùýÀS/[1ç2458Y9H;Ú<1@ÿAÒCE FcHþJ4LwMš®±³Žµ¶žŸÀÂÇËÏÒÕãçíïõÿ ¢òüÅ ¹i!Š%u(v*T9LHN¹OMQhI¡y£æªí°]²Ë¹«ŒŸ¿;ÃÓÆÖÉÙçó$ô>÷Š÷ý F*Â@Ö %ó)Ù*€,ã-þ/CwM©«¬¯²·¹º»œÁÃÅÆÈÊÍÎÑÓÔÖØÚÜÞàâäæèêëìðñòôö÷øùûüýþÂ,ÛC¹O+s:~¢7³ýºŸºÁeÅɱÚ$ôý)wMª°Œ¿ÄÉÌÐ×ÙÛÝßáåéîóúÿÿUnknownfoobarSenthil SengodanPekka PessiSirpa KuismaJim TogaÕëõ-IK\xzµ·Èäæÿ+GI^z|¯Ñíï02Mik ³ÏÑæ-IK_{}¡œ¿ä*FIc°³Ôðó*-B^aoœÙÜðB^aŠ©¿ÛÞ &)Hdg®±Úöù/2Ploqp#p:pw§wÏwd{} ~â÷ùw£££š£Á£Ã£ZÆoÆqÆ̧̥̩ÌÀÌÂÌSäjäläoääää¢ä€ä«äÂäÄäØçïçñçYðpðrðdôyô{ôõ#õ%õOõdõfõŠõœõ¿õø wH ÿ%ÿÄ%ÿÀ%ÿÀ%ÿÀ%ÿÀ%ÿÀ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÀ%ÿÄ%ÿÀ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÀ%ÿÄ%ÿÄ%ÿÀ%ÿÄ%ÿÄ%ÿÄ%ÿÀ%ÿÀ%ÿÀ%ÿÀ%ÿÀ%ÿÄ%ÿÀÿÿÿ:ÿ:ÿ:ÿ:ÿ:ÿ:ÿ:ÿÿÿÿÿÿÿÿÿ:ÿ:ÿ:ÿÿ:ÿJQT]x°¿Ïêùü!ÿÿ!ÿÿÿ!ÿE^ñ ®çG`³÷Ibñ ?X³ùOhò ë | ¿ Ø ê /Hs>Wï©æÿD]* #[t(AUnåþ!:Ng4Ley!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!ÿÿddatedorlangdnumstarttoc _Toc410402439 _Toc410402613 _Toc410402794 _Toc410402440 _Toc410402614 _Toc410402795 _Toc410402441 _Toc410402615 _Toc410402796 _Toc410402442 _Toc410402616 _Toc410402797 _Toc410402443 _Toc410402617 _Toc410402798 _Ref379881422 _Toc410402444 _Toc410402618 _Toc410402799 _Toc410402445 _Toc410402619 _Toc410402800 _Ref379881658 _Ref379881663 _Ref379881901 _Toc410402446 _Toc410402620 _Toc410402801 _Toc410402447 _Toc410402621 _Toc410402802 _Ref379881670 _Toc410402448 _Toc410402622 _Toc410402803 _Toc410402449 _Toc410402623 _Toc410402804 _Toc410402450 _Toc410402624 _Toc410402805 _Ref379881675 _Ref379882051 _Ref379882131 _Toc410402451 _Toc410402625 _Toc410402806 _Toc410402452 _Toc410402626 _Toc410402807 _Toc410402453 _Toc410402627 _Toc410402808 _Ref379881553 _Toc410402454 _Toc410402628 _Toc410402809 _Toc410402455 _Toc410402629 _Toc410402810 _Toc410402456 _Toc410402630 _Toc410402811 _Ref379883882 _Toc410402457 _Toc410402631 _Toc410402812 _Toc410402458 _Toc410402632 _Toc410402813 _Toc410402459 _Toc410402633 _Toc410402814 _Toc410402460 _Toc410402634 _Toc410402815 _Toc410402461 _Toc410402635 _Toc410402816 _Toc410402462 _Toc410402636 _Toc410402817 _Ref394290845 _Toc410402463 _Toc410402637 _Toc410402818 _Toc410402464 _Toc410402638 _Toc410402819 _Toc410402465 _Toc410402639 _Toc410402820 _Ref379884024 _Toc410402466 _Toc410402640 _Toc410402821 _Ref394290868 _Toc410402467 _Toc410402641 _Toc410402822 _Ref399040960 _Toc410402468 _Toc410402642 _Toc410402823 _Toc410402469 _Toc410402643 _Toc410402824 _Ref399040981 _Toc410402470 _Toc410402644 _Toc410402825 _Ref399041035 _Toc410402471 _Toc410402645 _Toc410402826 _Ref394290904 _Toc410402472 _Toc410402646 _Toc410402827 _Ref379881757 _Toc410402473 _Toc410402647 _Toc410402828 _Toc410402474 _Toc410402648 _Toc410402829 _Toc410402475 _Toc410402649 _Toc410402830endtoc _Ref379881781 _Ref379883848 _Ref379882083 _Ref379882088 _Ref379882197 _Ref379882173nttttF+F+F+Q5Q5Q5ÕBÕBÕB»D»D»DôHôHôHôHIIIµLµLµLµLµLµL{W{W{WZZZZ€\€\€\ÓaÓaÓaôhôhôhôhôhôh+n+n+noooŽo¶o¶o¶oÝoÝoÝouuu'uwww y y yo{o{o{IIIâââPPPiiiifff|||©©©©::::ŠŠŠkkkkQQQQ!¡#¡#¡#¡Ù£Ù£Ù£^^^êÅBÇÔ^â^â^âhõxH !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`abcdefghijklmnopqrstuvwxyz{|}~ ¢fft|||]+]+]+_5_5_5ñBñBñBÉDÉDÉD I I I IIIIÇLÇLÇLÇLÇLÇLWWW=Z=Z=Z=ZÆ\Æ\Æ\ëaëaëaiiiiii;n;n;n®o®o®oÜoÜoÜoÜoîoîoîo&u&u&uAwAwAwAwªyªyªy{{{XXXhhh{{{{qqqšššººººjjjj¥¥¥¥¹¹¹ÈÈÈÈyyyyI¡I¡I¡I¡ð£ð£ð£yyyêÅ^Ç ÔzâzâzâõxHÿÿ% Uv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿ Uv8ÿÿÿÿ Uv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿ Uv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿ Uv8ÿÿÿÿ!Uv8ÿÿÿÿ"Uv8ÿÿÿÿ#Uv8ÿÿÿÿ$Uv8ÿÿÿÿ%Uv8ÿÿÿÿ&Uv8ÿÿÿÿ`5þ9 ;µ;m<O=r?C@J4L'MóNíOPWãWY.]ô]shøÞb€i ~âì²ÆÈiÔÕ*Ýéä`) !"#$¯]6à:/;(<}<=.@â@#JJL%NkOP QWïWêY5]ù]°hf7h Oú³ŠÆÈvÔÕ±Ýöä`)SXÜä9C!+T^((///3;3*52575>5G5N5ñ5]6Í:Ø:+<7<:<F<="=9=B=Ü>ê>ä@å@æ@í@î@ò@ó@µABBzBB0D4DODUDWD]DbDiD,H>H I*IûJ KK&KbKyK~KKgTqTRX\X«aµafbibÕbØbÈdÚd^hph³jÀjýno o®oárär¹zÁzÚzèz^{l{ö 24<ªïXj§«¿ À Ò w£Øê:Hÿ#?MÄÎN\Q_Sa€ÖàIR^h7@ùØÝ÷ü {fh€€É¥Ö¥§§ššršš²©Â©ß©ö©ª ª¬"¬f¬v¬ï°±ì±²²²P³_³³³Ë³Ô³ó³ü³Ž'Ž8ŽCŽeŽyŽŽŽTµYµlµsµµµ¡µšµ¶¶^¶u¶ ¶¶¶§¶©¶²¶à¶ç¶ ··8·=·`·c·m·x·z··«·µ·ø·žžž7ž<ž?žDž[žjžžž¡ž±žœžÆžÞžéžìž¹¹¹š¹²¹µ¹¿¹Ä¹Ð¹é¹ï¹ò¹ø¹yººº§ºÁºÇºËºÑºòºÿº=»J»Y»c»x»»»€»š»®»ŒŒ€ŒªŒÛŒáŒGœZœdœtœvœœœ€œ©œ³œËœÔœÖœßœãœöœŸŸŸŸ"Ÿ0Ÿ<ŸPŸŸŸÁŸÔŸÜŸíŸ+¿3¿\¿o¿w¿¿Å¿Í¿ç¿ñ¿ó¿ý¿À#À+À8ÀFÀYÀGÁTÁUÁ`ÁcÁoÁ|ÁÁÁŠÁ°ÁÈÁÔÁåÁöÁÿÁÂ&Â'Â0ÂLÂSÂTÂ]¹ÂÃÂÈÂÑÂÝÂóÂøÂÃÃ*Ã,Ã=Ã@ÃOÃ_ÃhÃwÃÃÃÃìõÃÆÃÈÃ×ÃÄ Ä#Ä1Ä3Ä<Ä?ÄNÄOÄXÄyÄÄÄÄĶÄØÄæÄèÄñÄõÄÅÅÅ*Å:Å_ÅoÅyÅÅÅÅÆÆEÇOÇÇÇÎ*ÎoÎrÎtÏÏÐ,ÐmÒ|Ò»ÒÊÒÐÓßÓöÓÔ;ÔEÔÖ%ÖÍÜÑÜÌÞÖÞgáqáeâoâ`çnç¶è»èðèþèé)éééýéêê©êëë!ë*ëTëaëkëpëëë©ëœëúëììì\ìiìpììííîîîî î#îBîVîÚîÝîöîùî'ï;ï|ïïïïïïÌïÞïðð¡ó¯óa÷k÷÷ ÷®÷¶÷^h0~H T X f q È Ð ò / : ",'?Qhlu~ §±×à0:LU\nAN©ÀL[cou ÓëóÆÜàñ ËÐ «°SYªŽ{#)ÑÛ9>ÁÆìöíó! ' y!~!##Ä#É#"$0$/%9%:%F%G%M%Ó%Ø%h&o&t&}&_'e'''ô'ý'R(Z(Ž(Œ(Ë(Ð(M)R)^)ö)þ*ÿ*²+º+¢2«26»6c:q:+;2;;;@;ž;Â;Ö;à;<<Ÿ<Ç<y==>>F>P>Ò>Û>á>ê>?$?k?|??€?¥?¯?Æ?Ñ?7@:@]@`@¯@»@Æ@É@ç@ð@ñ@ô@ü@AaAjAlAuAôA÷AÿAB5B8BTBWBBBC%CH*HxHÝßbqÛòŽ ž ÷ £§ŸÈ%a¬¯~ |""ú$%É%Ú%.(2( +°+,,É/:0Â5Î5ñ5^6_6e6ò67K7Y7€7ª799â:ã: ;/;;©;+<7<D=M===(>->Ü>ê>s?z?0@1@ä@ŽAµAŸA¡B§B¬CµC>DIDäFèFïIùI`KaKmMwM¿MÍM TTZUlUUUWWXXóXY\\O\T\ì^ø^²_œ_Ç`Ò`<bNbœbÅbHcMc)dAdhh isikjvj¯o³oppªqžqKr`rfsosõuýuz§z{I{h|y|}¡}~$~¶Ä <Øñ³¶Ìru€§÷06%mt¡¥ÉÒÇÑÕ×7<OQ15ÑØh µ §€¥Å¥Ö¥§§©©6¬9¬×éE±H±Ø±Û±R²U²0³6³`³b³³³ª³±³×³Ù³ï³ñ³ŽŽFŽHŽeŽ{ŽŽŽŽŽžŽÎŽÐŽµ!µTµ[µlµsµ¡µšµÇµËµÍµÖµ¶¶!¶%¶<¶G¶v¶x¶ ¶¶©¶²¶à¶ç¶ ··8·=·`·c·m·x···¹·ø·žž ž7ž<žPžYžvž|žžžœžÆžÞžéž¹(¹¹¹š¹²¹Ä¹Ð¹é¹ï¹º"º3º@ºwººº§ºÁºÇºòºÿº»»W»c»x»»»€»Ï»Ó»ä»ñ»ŒŒ5Œ<Œ}ŒŒ€Œ¬Œ»Œ¿ŒÛŒáŒœœGœ\œœŠœãœøœ-Ÿ/Ÿ<ŸPŸŸŸŸ²ŸÜŸíŸ+¿3¿K¿P¿w¿¿Å¿Í¿ç¿ñ¿ÀÀ+À8À ÁÁGÁTÁcÁoÁÁŠÁÔÁçÁöÁÿÁÂ&ÂLÂSÂÂÂÈÂÑÂøÂÃPÃRÃ_ÃhÃwÃÃïÃóÃõÃÄ Ä#Ä1Ä?ÄNÄdÄmÄÄÄĶÄØÄæÄõÄÅÅ&Å_ÅqÅWÆXÆÆÆdÉnÉËËðËÿËÆÌÏÌ]ÐoÐ@ÑNÑÑ¡Ñ`ÔnÔ±ÕñÕøÖ|×:Ø;ØTÙYÙíÙîÙ,Ú5ÚGÜPÜbÝeÝyà{àà¥àŽàÃáŠä«ä÷äýäìåúåeæhæGéRéëëÊìÐìííïï9ñHñbóróßôçô>÷F÷ø&øøøpùsù.þ8þQÿRÿîÿ.<òÖàæìÜåc e q È Ð ð -:z^(7ŽŸÂÃ¥Ž t Á ô!"m$u$$§$^)¿)Ã)ö)þ*ÿ*xHÿÿPekka Pessi*\home\pessi\Docs\h235-white-commented.docPekka Pessi8C:\95\TEMP\AutoRecovery save of h235-white-commented.asd þÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ?nšvÑðÿÿÿÿÿÿÿÿÿPGKªVÿÿÿÿÿÿÿÿÿ.ZRÜÛÿÿÿÿÿÿÿÿÿ³lº"KªVÿÿÿÿÿÿÿÿÿÁ8&&vÑðÿÿÿÿÿÿÿÿÿå{c4KªVÿÿÿÿÿÿÿÿÿÅwMvÑðÿÿÿÿÿÿÿÿÿ· ~D¡ÿÿÿÿÿÿÿÿÿ*@hhþ.@hhþ.@h8þ56CJOJQJo() @h8þ.@hhþ.@h8þ.@hhþ.@h8þ) Á8&&PGå{c4þÿÿÿ .Z· ~³lº"ÅwM?nšÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ @hhþOJQJo(·ðÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ ÿ@ips2c\NRCCSL01HE\ips2cPSCRIPTips2cips2cžw 3dXXÀÈéM¶Ù!€Àë³pRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BBips2cžw 3dXXÀÈéM¶Ù!€Àë³pRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BBÂâÂâÂâÂâ( wH @ @GTimes New Roman5Symbol3&Arial3Times;"Helvetica;WingdingsM" Univers (W1)ArialcCG Times (W1)Times New Roman?5 Courier New7Courier="AvantGardeCCG Times (WN)INewCenturySchlbk5"System5&Tahoma#A©ÐhºÍ!PÐ!&°f+2õ}ì¥ÀŽŽ20d-,ëÿÿITU-T H.235 RecommendationG. ThomPekka PessirdDocWord.Document.8ô9²q
participants (1)
-
Pekka Pessi