payments Banking · payments
PSD3
DORA
EU AI Act
High-value payment approval via AI agent
A multinational corporate treasurer’s AI agent prepares a $2.4M cross-border FX payment overnight. The bank’s PSD3 rail must prove that the action was authorised, scope-bound, signed, and recoverable — with no human re-keying and full audit reconstructibility.
- 1. Entity Treasury agent registered as
kye:agent:acme.eu:treasury:fx-router with model + capability inventory.
- 2. Delegation Signed chain: Group CFO → Regional treasurer → Agent; PSD3 SCA satisfied at the human edge once, attenuated through the chain.
- 3. Capability
kye-payments-1.0 profile scopes the agent to USD ≤ $5M, EU/US corridors only, no first-time beneficiaries without approval.
- 4. Decision KYE™ ePDP returns
allow_with_constraints; constraints carry the obligation to record an SCA proof artefact.
- 5. Audit Append-only chain links the payment intent, decision, payment authority, payment attestation, and bank-side rail confirmation.
- 6. Recovery If reconciliation fails, the payment authority is revoked; cascade kills any downstream wallet grants in < 1 second.
Outcome: a single signed evidence pack proves SCA, attenuated authority, payment intent ↔ rail confirmation, and a Decision Map™ the bank’s PSD3 supervisor can replay from public keys alone.
vpn_key Custody · break-glass
MiCA
FFIEC
ISO 27001
Break-glass recovery when an agent signing key is suspected compromised
02:14 UTC: a digital-asset custody desk’s anomaly detector flags an unusual signing pattern from the trading agent. Whether the key is actually compromised is not yet clear — but the custodian must act before the next settlement cycle, and prove every step.
- 1. Entity The trading agent
kye:agent:acme-cust.eu:desk-a:signer sits inside a delegation chain rooted at the Head of Custody.
- 2. Signal SOC issues a
quarantine signal on the agent’s authority token; cascade fans out to every dependent capability.
- 3. Capability Time-boxed break-glass grant issued to the on-call lead under the
kye-recovery-1.0 profile; signs every action with a recovery key.
- 4. Decision KYE™ ePDP enforces the recovery scope: read evidence, freeze positions, re-key, but cannot initiate new trades.
- 5. Audit Recovery-request resource, decision resource, and signed proof artefact linked into the audit chain; break-glass auto-expires in 4 hours.
- 6. Closure Once forensics clears the agent, signal bus emits
restore; cascade re-issues attenuated grants under fresh keys.
Outcome: 380 ms from quarantine signal to dead delegation chain. The MiCA Art. 70 / FFIEC Cybersecurity Resilience evidence pack produces itself — no spreadsheet reconstruction the morning after.
trending_up Asset management · AI research
EU AI Act
ISO 42001
NIST AI RMF
Investment-research agent — EU AI Act high-risk technical-documentation pack
A €18B AUM asset manager runs an AI research agent that drafts investment memos for the IC. Under EU AI Act Title III the agent is high-risk: technical documentation, data governance, human oversight, post-market monitoring — due continuously, on demand.
- 1. Entity Research agent + every model variant inventoried; per-version
model_card attestation.
- 2. Delegation Chain rooted at Head of Research, attenuated to the agent for memo drafting only — never trade execution.
- 3. Capability
kye-euaiact-1.0 binds AI system registry, capability classification (high-risk), human-oversight gate at memo finalisation.
- 4. Decision Every research-tool invocation is an
authorize call — data sources, retrieval scope, and licence terms enforced at the runtime layer.
- 5. Audit Evidence chain produces the Title III §11 technical-documentation pack: data governance log, accuracy/robustness telemetry, human-oversight events.
- 6. Monitoring Post-market signals continuously fed back into the audit chain; corrective-action trail is immutable.
Outcome: the technical-documentation pack the EU AI Act notified body asks for ships from one endpoint — no parallel evidence team, no spreadsheet reconciliation.
credit_card Card issuing · agent purchasing
PCI DSS 4.0
PSD3
DORA
EU AI Act
Bank-backed AI shopping agent on a tokenised card — before the bank authorises the payment, KYE™ authorises the agent
A retail bank ships an AI purchasing agent to its customers. The customer delegates limited buying authority — capped amount, allowed merchant categories, jurisdiction, time window, approval threshold — bound to a virtual card token (never the raw PAN). On every purchase intent, KYE™ answers was the agent allowed to use this card, on this customer’s behalf, for this merchant, this amount, this category, in this state? before the bank’s issuer authorisation pipeline runs.
- 1. Entity Customer (
kye:human:bank-z.eu:psu:alice-meier), shopping agent (kye:agent:bank-z.eu:retail:shopping-bot), virtual-card token (kye:credential:card-token:tok_abc123) registered as KYE™ entities. Agent never holds the raw PAN.
- 2. Delegation Customer → agent grant: ≤ £100 / purchase, ≤ £300 / day, GB only, allowed MCCs (
groceries, travel, office_supplies); blocked MCCs (gambling, crypto, adult, weapons); approval required > £50.
- 3. Capability
kye-payments-1.0 + kye-capability-1.0 bind sub-capabilities: purchase.search · purchase.compare · purchase.prepare · purchase.request_approval · purchase.execute · purchase.refund_request · purchase.dispute_prepare. The agent may prepare without being allowed to execute.
- 4. Decision Per purchase, the agent calls
POST /v1/runtime/authorize. KYE™ checks: customer + agent + card token active · delegation valid · merchant allowed · amount within scope · approval threshold · risk state · payload signed and fresh. Returns allow_with_constraints · require_approval (push to bank-app) · deny with reason (e.g. merchant_category_blocked, amount_above_agent_threshold).
- 5. Audit Per-purchase Decision Map™ + signed evidence pack: customer → agent → capability → card-token → merchant → amount → approval → decision → receipt. Used for chargebacks, disputes, fraud investigations, regulatory review.
- 6. Recovery If the agent or its session key is suspected compromised —
quarantine signal, cascade revokes the delegation + the card-token grant in < 1 second. Stale-consent purchases become impossible before the next clearing cycle.
Outcome: the bank’s issuer authorisation pipeline still answers “is this card transaction financially authorised?”. KYE™ answers the prior question — “is this agent authorised to request this purchase, on this customer’s behalf, under this delegation?”. KYE™ Authority Finality™ + bank issuer authorisation = agent-backed card purchase with proof a regulator, court, or chargeback panel can replay offline.