Know Your Agent (KYA) — The Identity Fortress

Chapter 1 (book 3) through Chapter 6 (book 3) have documented the threats. Chapter 7 (book 3) and Chapter 8 (book 3) document the defenses.

The transition from threat to defense begins with a question that the Synthesis economy has been avoiding since its inception: How do you know who you are talking to?

In the Legacy economy, the answer was identity. A person has a name, a photograph, a date of birth, a Social Security number, a biometric signature, and a physical body that can be located, summoned to a courtroom, and held accountable for its actions. The entire apparatus of modern finance — every banking regulation, every anti-money-laundering protocol, every securities exchange rule — is built on the premise that the entity on the other side of the transaction is a person who can be identified, verified, and, if necessary, prosecuted. This is the Know Your Customer (KYC) framework, and it has governed financial regulation for thirty years.

KYC is architecturally incapable of governing the Agent Economy.

An autonomous AI agent has no name, no photograph, no date of birth, no Social Security number, and no biometric signature. It has no physical body. It cannot be located in geographic space, summoned to a courtroom, or held personally accountable for its actions.

It can be copied, duplicated, instantiated in multiple jurisdictions simultaneously, and terminated without consequence. The agent that executed a fraudulent transaction five minutes ago may no longer exist. The agent that exists now may be an identical copy of the one that was terminated, running the same code from a different server in a different jurisdiction, with no memory of its predecessor’s actions and no legal connection to its predecessor’s liability.

KYC assumes that the entity on the other side of the transaction is singular, persistent, locatable, and accountable. None of these assumptions hold for an autonomous AI agent. The framework does not need to be updated. It needs to be replaced. And the replacement — the framework that will govern identity, trust, and accountability in the Agent Economy — is Know Your Agent (KYA).

The Three Pillars of KYA

KYA is not a single technology or a single standard. It is an architectural framework built on three pillars, each of which addresses a dimension of the identity problem that KYC was never designed to handle.

Pillar 1: Provenance — Where did this agent come from? KYA requires that every autonomous agent operating in the A2A commerce layer carry a verifiable cryptographic attestation of its origin — a digital certificate issued by a vetted provider (the entity that built, trained, and deployed the agent) and signed with a key that can be traced to a specific organization, a specific model version, and a specific deployment instance. The attestation is not an assertion. It is a proof — a cryptographic artifact that cannot be forged, cannot be transferred, and cannot be generated by an entity that has not been vetted by the issuing authority.

Pillar 2: Intent — What is this agent authorized to do? KYA requires that every agent transaction carry a machine-readable specification of the agent’s authorized scope — the actions it is permitted to take, the value thresholds it is permitted to transact up to, the counterparties it is permitted to interact with, and the conditions under which its authorization expires. Intent verification is not a post-hoc audit. It is a pre-execution gate: the transaction does not execute unless the receiving party can verify that the requesting agent’s stated action falls within its documented authorization scope.

Pillar 3: Accountability — Who is responsible when this agent fails? KYA requires that every agent’s provenance chain terminate in a legal entity — an organization or individual that has accepted liability for the agent’s actions and that can be located, contacted, and, if necessary, prosecuted within a defined jurisdiction. The agent itself has no legal personhood. But the entity that deployed it does. And KYA ensures that the connection between the agent and its deploying entity is cryptographically verifiable, legally binding, and resistant to the kind of jurisdictional shell-gaming documented in Chapter 6 (book 3).

Visa’s Trusted Agent Protocol (TAP)

The first production-grade implementation of KYA came, perhaps unsurprisingly, from the financial layer — the entities that have the most experience with identity verification and the most to lose from its failure.

Visa’s Trusted Agent Protocol (TAP) is a cryptographic verification framework that implements all three pillars of KYA using established open standards. TAP is not a proprietary black box. It is built on HTTP Message Signature (RFC 9421) — the IETF standard for attaching cryptographic signatures to HTTP messages — and WebAuthn — the W3C standard for hardware-backed authentication that powers the passkey ecosystem already embedded in billions of consumer devices.

TAP operates on three verification dimensions that map directly to the KYA pillars:

Agent Intent Verification: Before a TAP-enrolled agent can execute a transaction, Visa verifies that the agent’s provider has been vetted through the Visa Intelligent Commerce program — a registration and auditing process that evaluates the provider’s security practices, model governance, and operational controls. The agent carries a cryptographic key issued by Visa that attests to its provider’s vetting status. A counterparty receiving a transaction from a TAP-enrolled agent can verify, in real-time, that the agent was deployed by a vetted provider and that the provider’s credentials have not been revoked.

Consumer Recognition: TAP requires that every agent transaction be linked to a specific consumer account — a verified identity that has explicitly authorized the agent to act on their behalf, within defined parameters. This is the Intent pillar in action: the agent’s actions are bound to a human authorizer, and the scope of the authorization is encoded in the transaction’s cryptographic payload. An agent that attempts to execute a transaction outside its authorized scope will fail verification — not because a human reviewed the transaction, but because the cryptographic math does not permit it.

Payment Data Integrity: TAP ensures that the payment data transmitted between agents is cryptographically signed at the point of origin and verified at the point of receipt. The data cannot be modified in transit. It cannot be intercepted and replayed. It cannot be forged by a third-party agent attempting to impersonate the original sender. The integrity guarantee is mathematical, not procedural — it does not depend on the trustworthiness of any intermediate system, because the cryptographic verification is end-to-end.

TAP is, at the time of this writing, the most mature production-grade KYA implementation in the world. It is also, notably, a system built by a payment network — not by a government, not by a standards body, not by an AI safety research organization. The financial layer moved first because it had to. The payment network that cannot verify the identity of an autonomous agent executing a $50,000 procurement order is not a payment network. It is a liability.

Mastercard Agent Pay and Agentic Tokens

Mastercard’s parallel implementation — Agent Pay — takes a complementary approach that emphasizes the Intent pillar.

Agent Pay introduces the concept of Agentic Tokens — specialized cryptographic tokens that encode not just the payment credentials but the intent of the transaction. An Agentic Token carries a machine-readable specification of what the consumer authorized the agent to do: purchase a specific category of goods, up to a specific amount, from a specific set of counterparties, within a specific time window. The issuing bank receives the Agentic Token and can verify, before approving the transaction, that the agent’s requested action matches the consumer’s stated authorization.

The innovation is subtle but architecturally significant. Traditional payment tokens carry information about who is paying and how much. Agentic Tokens carry information about what the payment is for and whether the agent was authorized to make it. The distinction transforms the payment authorization from a financial question (“does this account have sufficient funds?”) to an intent question (“did a human being authorize this specific agent to perform this specific action?”). The answer to the intent question is encoded in the token itself — not in a separate database, not in a compliance filing, not in a governance layer that can be deepfaked. In the cryptographic payload. Verifiable by any counterparty. Unforgeable by any adversary.

Mastercard has also deployed its subsidiary Recorded Future — a threat intelligence platform — as an Autonomous Threat Operations layer that monitors A2A transaction flows for anomalous patterns. The threat operations layer does not wait for fraud to be reported. It hunts for adversarial behavior proactively, using AI reasoning models to identify transaction patterns that are consistent with the attack vectors documented in this volume: spoofing, cascading manipulation, Supply Chain Ghosts, and prompt-injection-mediated payment redirection.

Decentralized Identifiers (DID)

TAP and Agent Pay are centralized solutions — they depend on Visa and Mastercard, respectively, as trusted authorities that vet providers, issue credentials, and maintain revocation lists. This centralization is, in the current market, a strength: it provides a single point of accountability and a well-established governance framework. But it is also, in the long term, a vulnerability: a single trusted authority is a single point of failure, and the compromise of that authority would compromise the entire trust infrastructure built upon it.

Decentralized Identifiers (DID) represent the complementary approach — an identity framework in which trust is distributed rather than centralized, and in which the trust anchor is not an institution but a physical substrate.

A DID is a globally unique identifier that is controlled by its subject (the agent or the agent’s operator) rather than by a central authority. The identifier is registered on a distributed ledger — a blockchain, a DAG, or any other append-only data structure that provides tamper-evident storage — and is associated with a set of cryptographic keys and verification methods that any counterparty can resolve and verify without contacting a central authority.

The connection to Book 2 is direct and strategic: the physical substrate documented in The Energy Island — rare earth mineral stocks, reactor serial numbers, facility coordinates, hardware attestation certificates from specific GPUs in specific racks — can serve as the trust anchor for a DID-based identity system. An agent whose identity is cryptographically bound to a specific physical infrastructure — a specific Energy Island, a specific reactor, a specific copper stockpile — possesses an identity that cannot be forged without simultaneously forging the physical asset. The atoms, once again, are the moat.

The Identity Stack

The PredictionOracle synthesizes TAP, Agent Pay, and DID into a comprehensive Identity Stack — a layered architecture that provides defense in depth against the identity attacks documented in this volume:

KYA Implementations — Comparative Analysis

DimensionVisa TAPMastercard Agent PayDecentralized Identifiers (DID)
Trust ModelCentralized (Visa as authority)Centralized (Mastercard as authority)Distributed (no central authority)
KYA Pillar FocusProvenance + AccountabilityIntent (Agentic Tokens)Provenance + Physical Binding
Technical StandardsRFC 9421, WebAuthnProprietary token formatW3C DID Core
MaturityProduction-grade (2026)Production-grade (2026)Emerging (spec finalized)
Physical BindingNone (digital only)None (digital only)Strong (hardware, infrastructure)
Single Point of FailureYes (Visa compromise)Yes (Mastercard compromise)No (distributed ledger)
Threat IntelligenceN/ARecorded Future integrationN/A

Layer 1 — Hardware Attestation: The agent runs on specific hardware that provides a hardware-backed trust root (TPM, secure enclave). The hardware attestation proves that the agent is running on genuine, untampered infrastructure.

Layer 2 — Provenance Certificate: The agent carries a cryptographic certificate issued by its provider, attesting to its model version, training lineage, and deployment instance. The certificate is signed by the provider and registered with a KYA authority (Visa, Mastercard, or a DID registry).

Layer 3 — Intent Token: Every transaction carries an Agentic Token or equivalent specification that encodes the consumer’s authorized scope. The token is cryptographically bound to both the agent’s provenance certificate and the consumer’s verified identity.

Layer 4 — Behavioral Biometrics: The agent’s behavioral patterns — response times, reasoning patterns, communication cadences — are continuously monitored and compared to a baseline established during the agent’s vetted deployment. Significant deviations from the baseline trigger a Friction Agent intervention (Chapter 4 (book 3)) and a re-verification of the agent’s provenance and intent.

Layer 5 — DID Resolution: The agent’s decentralized identifier can be resolved by any counterparty to verify the agent’s provenance chain, its current authorization scope, and its accountability trail — without contacting any central authority and without trusting any single institution.

The Identity Stack does not make agent impersonation impossible. It makes agent impersonation as difficult as counterfeiting physical currency — technically conceivable, practically prohibitive, and detectable at the point of use. In the adversarial context documented in this volume, that is the minimum viable standard. Anything less is a system waiting to be breached.

External Citations

  1. Visa — Trusted Agent Protocol (TAP): Visa’s production-grade KYA implementation built on HTTP Message Signature (RFC 9421) and WebAuthn, providing cryptographic agent verification through the Intelligent Commerce platform. https://www.visa.com
  2. Mastercard — Agent Pay and Agentic Commerce Framework: Mastercard’s A2A commerce framework introducing Agentic Tokens for intent-encoded transactions and Autonomous Threat Operations via Recorded Future for proactive adversarial detection. https://www.mastercard.com
  3. W3C — Decentralized Identifiers (DID) Standard: The World Wide Web Consortium’s specification for self-sovereign, decentralized digital identifiers that enable trust verification without centralized authorities. https://www.w3.org/TR/did-core/

Previous: ← Chapter 6 (book 3) | Navigation (book 3) | Next: Chapter 8 (book 3) →