Verifiable Intent
Open specification for cryptographic agent authorization in commerce. Tamper-evident delegation chains that bind AI agent actions to human-approved scope.
Delegation Chain
Key Capabilities
Layered Credentials
SD-JWT delegation chain binding issuer, user, and agent through key confirmation claims. Each layer cryptographically constrains the next.
Constraint Enforcement
8 constraint types — amount bounds, merchant allowlists, budget caps, recurrence terms — cryptographically bound and machine-verifiable.
Protocol Agnostic
Works across agent payment ecosystems. Integration mappings for AP2, ACP, and UCP. Extensible to other protocols.
Selective Disclosure
Data is private by default, revealed only to the right party at the right time.