Whitepaper · Version 1.0 · April 2026 · github.com/KYE-Protocol · Download PDF (2.3 MB)

© 2026 KYE Protocol™ project. All rights reserved. This whitepaper is published for reference; the underlying mechanism designs remain on the patent track. Trademarks listed at legal.html#trademarks.

KYE Protocol: the Entity Authority Protocol for AI Governance

KYE Protocol proves who or what is acting, on behalf of whom, using which capability, under what authority, in what state, and with what audit trail — for every action a human, business, AI agent, service, model, tool or workflow takes. The technical and evidentiary foundation for the KYE Chain of Authority — the linked, attenuating delegation chain over which Authority Finality is asserted. For AI-agent systems: accountability, compliance, dispute resolution, legally defensible audit trails.

Abstract

The agentic stack — AI agents, models, tools, workflows acting autonomously on behalf of humans and businesses — is reaching production at a velocity that has outrun the identity, authorization and audit infrastructure beneath it. KYC verifies humans. KYB verifies businesses. KYA (just emerging in 2026 from Visa, Skyfire, Persona, Sumsub, Trulioo) verifies agents. Each layer is siloed; each verifies once, at registration; none answers "is the answer still true 200 ms from now when the next call arrives?"

KYE ProtocolKnow Your Entity — is the Entity Authority Protocol for AI governance. It proves who or what is acting, on behalf of whom, using which capability, under what authority, in what state, and with what audit trail. Every entity (human, business, agent, service, model, tool, workflow) shares one identifier — the KYEID, in URN form kye:<class>:<trust-domain>:<subclass>:<local>. Every action is bound to a signed delegation chain with attenuable scope, gated at runtime by the Authority Gate and admitted by an unrevoked Purpose Permission. Every decision is projected as a signed Decision Map, sealed under an Execution Context Seal, exported in an Evidence Pack, and re-verifiable as a Replay Proof. Every call is logged to the AI Call Ledger. Every revocation feeds the Resilience Loopdetect drift → revoke → re-grant → replay → improve. The result: a complete KYE Chain of Authority over which Authority Finality holds — replayable proof for accountability, compliance, dispute resolution, and legally defensible audit trails in agentic systems. KYE does not replace legal agreements, signatures, or regulatory obligations; it provides the technical and evidentiary foundation for them.

0 · Canonical inventory

Five locked inventories define the whole surface area of KYE: a nine-element kernel, seven rails, eight surfaces, ten engines, eight public profiles, and seventeen schema namespaces. Nothing in the protocol — not a schema, not an engine, not a page — lives outside these inventories. They are governed by constitution/01-NAMING.md and bind every downstream specification.

0.1 The kernel (9 elements)

Every KYE feature, decision, schema, engine and product surface reduces to one of these nine kernel concepts, in order:

Entity → Purpose → Authority → Scope → State → Rules → Decision → Evidence → Replay

Commercial restatement: Define → Govern → Decide → Prove → Revoke → Replay → Improve. The 9-element kernel is the contract; data structures, schemas and engines are how that contract lands on the wire. If a proposed feature does not advance one of these nine, it is secondary and does not get a top-level home.

0.2 The seven rails

#RailOwns kernelSub-modules · canonical sub-engines
1Operating Model RailDefineOperating Model · Authority Model · Behaviour Model · Control Compiler · Review Model · Evidence Requirements · Revocation Plan
2Authority RailAuthorityEntity Registry · Agent Entity · Principal · Delegation Chain · Authority Grant · Authority Graph · Authority Gate · Revocation
3Purpose & Scope RailPurpose / ScopePurpose Permission · Action Purpose Request · Admissibility · Scope · Restrictions · Reconfirmation · Jurisdiction · Data Classes · Time Windows
4Runtime Decision RailDecideDecision Engine · Rules & Obligations · State · Continuity Module · Commit Boundary · Tool Guard · MCP Guard · SDK / API Enforcement
5Evidence & Replay RailEvidence / ReplayDecision Record · Decision Map · Evidence Pack · Audit Chain · Execution Context Seal · Replay Proof · AI Call Ledger
6Directory & Assurance RailGovern / ProveKYE Directory · KYE Authority Search · KYE Evidence Finder · KYE Investigation Console · Risk Search · Blast Radius · Conformance · Certification · Badges · Regulatory Artifact Maps
7Ecosystem RailImproveKYE Partner Engine · KYE Partner Governance Rail · Connector Hub · App Store · KYE Partner Widgets · KYE Partner App · Training · Marketplace · KYEID

0.3 The eight surfaces

#SurfaceWhat it is
1KYE ProtocolThe open contract — vocabulary, schemas, KYEID format, profiles, examples. Apache-2.0.
2KYE GatewayThe runtime — Authority Gate fire, Purpose Permission admit, state, rules, tool guard, MCP guard, evidence triggers, webhooks.
3KYE CloudCustomer dashboard. app.kyeprotocol.com.
4KYE DirectorySearch & discovery: authority, evidence, risk, blast radius, connectors, certification.
5KYE AssuranceEvidence, replay & compliance: assurance records, conformance, regulatory mapping.
6KYE Partner RailEcosystem governance: partner registry, authority, widgets, app, certifications, deals.
7KYE Developer ToolsIntegration surface: SDKs, API, MCP server, OpenAPI, schemas, webhooks, sandbox. dev.kyeprotocol.com.
8KYE Admin ConsoleOwners-only. KYE operator console (tenants, transparency log, key rotation, billing). admin.kyeprotocol.com. Never appears in any public navigation, sitemap, footer, or breadcrumb.

0.4 The ten engines

#EngineOwning railOwns
1Entity EngineAuthority RailEntity Registry, Agent Entity, KYEID
2Authority EngineAuthority RailDelegation, Grant, Graph, Gate, Revocation
3Purpose & Scope EnginePurpose & Scope RailPurpose Permission, Admissibility, Scope, Restrictions
4State EngineRuntime Decision RailLifecycle states, six-dimension state vector, transitions
5Rules EngineRuntime Decision RailRights, Obligations, Stop Conditions, Policy bundles
6Decision EngineRuntime Decision RailPDP / ePDP / sPDP, signal fusion, decision binding
7Evidence EngineEvidence & Replay RailDecision Map, Evidence Pack, Audit Chain, Signatures
8Replay EngineEvidence & Replay RailExecution Context Seal, Replay Proof
9Directory EngineDirectory & Assurance RailSearch, indexing, blast radius, connector registry
10Ecosystem EngineEcosystem RailPartner, Connector, Widget, Certification

Engines decide deterministically; agents (Temporal-style workflows) orchestrate calls to engines. Continuity is a module inside Runtime Decision Engine + the Assurance surface, not a top-level engine. Discoverability is the Directory Engine’s surface name. Ontology / Taxonomy / Metadata / Dictionary all fold into a single Semantic Registry supporting all engines — not a standalone product.

0.5 The eight public profiles

The public profile catalogue is exactly eight. v1.0 ships 8 public profiles + sector extensions. Sector profiles (Healthcare, Payments, Open Banking, Sovereign AI, Agent Purchasing, Custody, Treasury, Capital Markets, Insurance) are extensions of the eight, not equal to them.

#ProfileWhat it normalises
1KYE Core ProfileEntity model, lifecycle, delegation, scope, decision, audit, proof
2KYE Agent Entity ProfileAI-agent / model / capability identity + attestation
3KYE Operating Model ProfilePre-runtime authority design + behaviour model
4KYE Authority ProfileDelegation chains, grants, graphs, revocation
5KYE Purpose & Scope ProfilePurpose Permission, admissibility, scope, restrictions
6KYE Runtime Decision ProfilePDP shape, rules, obligations, continuity, commit boundary
7KYE Evidence & Replay ProfileDecision record, Decision Map, Evidence Pack, audit chain, Replay Proof
8KYE Assurance ProfileDirectory, conformance, certification, regulatory mappings

0.6 The 17 schema namespaces

Every JSON schema, regardless of which profile authored it, MUST live under exactly one of these top-level families:

#NamespaceOwns
1kye.entity.*Entity records, agent entity, KYEID resolution
2kye.operating_model.*Pre-runtime artefact, Authority Model, Behaviour Model
3kye.authority.*Grants, delegations, graphs, gate decisions, revocations
4kye.purpose.*Purpose Permission grants and bindings
5kye.scope.*Scope, restrictions, time windows, data classes
6kye.state.*Six-dimension state, composition matrix, transitions
7kye.rules.*Rules, obligations, stop conditions, policy bundles
8kye.decision.*Decision records, reason codes
9kye.evidence.*Decision Map, Evidence Pack, audit events, AI Call Ledger entries
10kye.replay.*Execution Context Seal, Replay Proof
11kye.directory.*Index descriptors, directory entries, query/result shapes
12kye.assurance.*Conformance reports, certifications, regulatory mappings
13kye.partner.*Partner entity, certification, deal, widget licence
14kye.connector.*Connector manifests, capability descriptors
15kye.developer.*SDK descriptors, MCP tool inventories, sandbox artefacts
16kye.billing.*Usage, metering, invoicing records
17kye.admin.*Owner-only operator records (tenants, key rotation logs)

1 · Problem

Modern agentic workflows generate three classes of pain that legacy identity stacks cannot resolve.

1.1 Fragmented identity

One agent typically holds three or four identities at once: a SPIFFE SVID for workload attestation, an OAuth client_id for the API gateway, a vendor-specific KYA passport for payment rails, and a model card for inference governance. Each format is reconcilable only by hand. Auditors reconstructing an incident traverse four logging systems and stitch traces by timestamp.

1.2 Static authorization

OAuth scopes and KYC files describe state at issuance. Neither propagates a revocation. When a delegated agent is compromised, the human delegator may not learn about it until the next compliance review. Stop signals (entity stopped, credential revoked, attestation stale) need to ripple through dependent grants in real time, recursively, with cryptographic guarantees they were applied.

1.3 Unprovable history

Audit logs are usually JSON lines in a search engine. They are searchable but not provable: a malicious operator can edit the past. Each audit event is durably ordered and publicly committed; the construction is part of the patent track and is not disclosed here.

2 · Prior art & gaps

LayerSolvesDoesn’t solve
OAuth 2.1 / GNAPHuman authorization, token introspectionNo agent identity, no delegation chain, no cascade
SPIFFE / SPIREWorkload identity (SVIDs)No first-class delegation, no decision vocabulary
Anthropic MCPAgent ↔ tool communicationNo identity, no policy, no audit
Google A2A / ADKAgent registration metadataNo delegation, no cascade, no proof
OpenID AuthZENStandard decision API shapeNo URN, no chain, no signals
OpenSSF SCITTTransparency receiptsNo identity, no scope, no cascade
OpenID SSF / CAEPStop-event distributionNo delegation chain, no Evidence Pack
Visa Trusted Agent / Skyfire / Persona KYAAgent passport (AID), spend caps (TXG)Vendor-specific, agent-only, no unified URN, no cascade

Each of these solves a slice. None composes into a single contract that an auditor can read end-to-end. KYE Protocol is that contract layer; it does not replace these, it composes them.

3 · Design principles

KYE Protocol stands on 16 protocol-core principles grouped in three tiers: six runtime-governance semantics that define what KYE decides, eight protocol-design disciplines that define how KYE classifies and ships, and two developer-adoption disciplines that define how KYE reaches developers.

3.1 Tier A — Runtime governance (what KYE decides)

  1. Authority-first. KYE’s centre is authority, not identity. Every action answers who or what is acting, on behalf of whom, using which capability, under what authority, in what state, with what audit trail. Core records: KYEAuthorityGrant, KYEAuthorityScope, KYEDelegation, KYEActingOnBehalfOf, KYEAuthorityState, KYEAuthorityDecision, KYEAuthorityRevocation, KYEAuthorityEvidence.
  2. State-first. Authority is meaningless without state. Every authorize call composes entity_state, authority_state, delegation_state, credential_state, capability_state, payload_state, recovery_state, risk_state. KYE is state-aware authority infrastructure.
  3. Decision-first. Runtime systems need an answer. POST /v1/runtime/authorize returns one of allow / allow_with_constraints / require_approval / require_step_up / require_human_review / require_recovery / quarantine / deny — with reason code, matched policies, obligations, evidence refs — in milliseconds.
  4. Evidence-first. KYE turns authority into evidence. Every decision produces a policy_decision_id binding to validation results, audit events, transparency receipts, signals, and a signed evidence_pack consumable by GRC, auditors, regulators, dispute panels.
  5. Audit-trail-first. No authority without audit. No audit without evidence. Every material change emits an append-only, hash-linked, timestamped, reason-coded, actor-bound, policy-bound, decision-bound audit event — exportable, replayable, externally verifiable.

3.2 Tier B — Protocol design (how KYE classifies and ships)

  1. Schema-first. JSON Schema 2020-12 with absolute $id at kye-protocol.github.io/schemas. OpenAPI, SDKs, validators, docs, and conformance tests are derived from schemas, not hand-written.
  2. Dictionary-first. Canonical vocabulary for entity types, all state dimensions, decisions, reason codes, capability kinds, side-effect levels, data classes, signal types, redaction fields, taxonomies, graph types.
  3. Taxonomy-first. 16 V1 canonical taxonomies (entity_type, capability_type, action_type, resource_type, data_class, side_effect_level, risk_state, environment, decision, reason_code, evidence_type, compliance_framework, sector, jurisdiction + state taxonomies). Versioned, status-bound, mappable to framework controls.
  4. Metadata-first. Every KYE object carries a normative metadata block — labels, classifications, ownership, lineage, compliance. Field values draw from registered taxonomies. Metadata influences decisions; the runtime exposes it to the policy layer as request.{actor,capability,resource,authority}.metadata.
  5. Graph-first. Authority is relational. Every entity, delegation, capability, credential, policy, state, decision, and evidence object is a node; every authority relationship is a typed edge. Authority Graph, Decision Map, Evidence Graph, Blast Radius Map, Compliance Map. Storage substrate is implementation choice.
  6. Profile-first. Core stays small. 8 public profiles + sector extensions add domain semantics; profiles never modify Core.
  7. Registry-first. Every object is resolvable. /.well-known/kye advertises versions, profiles, crypto suites, JWKS, dictionaries, taxonomies, metadata schemas, registries.
  8. Conformance-first. 41-fixture black-box pack that any conformant Gateway must pass. Vendor self-attestation via conformance-report.json.

3.3 Tier C — Developer adoption (how KYE reaches developers)

  1. API-first. 193 OpenAPI operations across 87+ runtime endpoints across runtime, registry, taxonomy, metadata, and graph endpoints. POST /v1/runtime/authorize is the headline; GET /v1/decisions/{id}/map returns a Decision Map.
  2. SDK-first. TypeScript, Python, Go SDKs ship with schema types, local validators, decision clients, signing/verification helpers, policy adapters, audit emitters, evidence-pack builders, taxonomy resolvers, metadata classifiers, graph traversal clients, decision-map renderers.

Protocol-design corollaries that fall out of the 16 principles:

4 · Conceptual model

KYE governs acting entities, principal entities, capability entities, resource entities, credential entities, and evidence artefacts — and keeps them strictly distinct. Payloads are evidence artefacts, never authority-bearing entities; the KYE Payload Trust Profile binds signed payloads to entity authority, capability state, policy decisions, and replayable audit evidence.

KYE Protocol surfaces the 9-element kernel through these first-class on-the-wire records. The 9-element kernel chain — Entity → Purpose → Authority → Scope → State → Rules → Decision → Evidence → Replay — is the contract; the records below are how that contract lands on the wire.

Three derived records support proof, replay & observability:

4.1 Six-dimension state model

An entity is not a single state. KYE Protocol runtime evaluates authorization against six independent state dimensions:

Each dimension transitions independently and emits its own signal class. “Can this actor act now?” is a single composed test against the six dimensions plus scope. The full vocabulary is open and pinned in the conformance pack.

4.2 Cascade revocation & the Resilience Loop

When an entity is stopped, quarantined, revoked or marked compromised, downstream authorities are no longer usable. The propagation mechanism is part of the patent track and is not disclosed here. Dependent delegations, payment authorities, access rights, capability grants, and recovery decisions are all affected. What KYE does publish is the surrounding loop: Resilience Loop is the closed-loop control surface — detect drift → revoke → re-grant → replay → improve. A governed deployment that can emit evidence but cannot close a loop on its own drift is not conformant. The Resilience Loop turns drift signals — model drift, purpose drift, principal drift, scope drift, agency_drift — into runtime control events with the same SLO discipline as an HTTP request.

4.3 · Implementation architecture

KYE Protocol stands on 16 protocol-core principles in three tiers (see §3 above). Tier A — runtime governance — defines what KYE decides: authority-first, state-first, decision-first, policy-bound, evidence-first, audit-trail-first. Tier B — protocol design — defines how KYE classifies and ships: schema-first, dictionary-first, taxonomy-first, metadata-first, graph-first, profile-first, registry-first, conformance-first. Tier C — developer adoption — defines how KYE reaches developers: API-first, SDK-first. Canonical JSON Schemas drive OpenAPI, SDK code generation, validators, documentation, and conformance fixtures. Shared dictionaries (entity types, states, decisions, reason codes, capability kinds, side-effect levels, data classes, signal types, taxonomies, graph types) make implementations interoperable. Versioned taxonomies (16 V1 canonical taxonomies) and a normative metadata model (labels, classifications, ownership, lineage, compliance) drive policy decisions at runtime. Profiles keep Core small while letting domain extensions (Capability, Recovery, Payments, Payload Trust, Taxonomy & Metadata, Graph, Healthcare, EU AI Act, ISO 42001, sector overlays) compose without modifying it. Registries make every object resolvable. The runtime API is decisioning-led, with POST /v1/runtime/authorize as the headline endpoint and GET /v1/decisions/{id}/map returning a Decision Map for every adjudication. SDKs in TypeScript, Python, and Go ship with schema types, signing/verification helpers, evidence-pack builders, taxonomy resolvers, metadata classifiers, graph traversal clients. Every adjudicated action produces a signed evidence_pack a regulator can verify with public keys alone. A 41-fixture black-box conformance pack tests vendor and reference implementations byte-for-byte the same.

5 · Contract surface

v1.0 publishes 193 OpenAPI operations across the Core + Payments specs (87+ runtime endpoints in the KYE Reference Gateway), spanning resource families: Entities, Delegations, Scopes, Access Rights, Credentials, Attestations, Capabilities, Capability Grants, Runtime (authorize / invoke), KYE Signal Bus (publish / subscribe / replay / webhook-endpoints / deliveries), Audit, Evidence Packs, Transparency, Federation, Recoveries, Break-Glass Grants, Compromise Reports, Keys, Conformance, plus the Payments families (Wallets, Payment Authorities, Payment Intents, Beneficiaries). 158 JSON Schemas with absolute $id URIs at https://kyeprotocol.com/schemas/; 87 example payloads pinned to schemas and validated in CI. 126 conformance fixtures assert deterministic behaviour under happy paths and edge cases.

Every state-changing endpoint accepts an Idempotency-Key header and returns the original response on replay; conflicting bodies under the same key return HTTP 409. Every state-changing endpoint emits an audit event whose correlation_id matches the originating request.

6 · Reference runtime

The reference deployment ships:

The reference is illustrative. It does not implement the patent-track decision algorithm; conformant production Gateways are expected to substitute that mechanism while preserving the open contract surface.

6.5 · Resilience Loop

A governed deployment of KYE Protocol MUST run a Resilience Loop as a continuous control. A system that can issue grants and emit evidence but cannot close a loop on its own drift is not conformant. The loop is the difference between an audit log and a control system.

The Resilience Loop is the closed-loop control surface that continuously detects drift, revokes the affected grants, re-grants under corrected scope, replays affected decisions against the new state (producing fresh Replay Proofs), and emits an improvement record that proves the loop closed. The five drift classes are:

Each drift event is dispatched to closure with the same SLO discipline as an HTTP request. Detect-to-revoke, revoke-to-replay and replay-to-improve are time-bound floors the rail commits to. The loop closes against the AI Call Ledger entries and Evidence Packs the runtime already produced; the improvement record updates the Operating Model rule bundle via the Control Compiler.

7 · Profiles — the full v1.0 inventory

Profiles add vocabulary, schemas, endpoints, and conformance fixtures to Core. v1.0 ships 8 public profiles + sector extensions; the eight are listed in the inventory at §0.5 — eight public profiles. Sector profiles (Healthcare, Payments, Open Banking, Sovereign AI, Agent Purchasing, Custody, Treasury, Capital Markets, Insurance) are extensions of the eight, not equal to them. The shipping inventory below lists Core, Gateway and the sector extensions alongside their owning rail:

Core + supporting profiles:

Payment overlays (jurisdictional):

Sector overlays beyond these (healthcare-clinical / payer / research, 42 CFR Part 2) are intentional placeholders for v1.1.

7.1 · Sector coverage

The eight public profiles and their sector extensions compose into nine sector-ready bundles:

7.2 · Compliance & control mapping

The compliance addendum ships 266 control mappings across 13 horizontal frameworks (published in the public conformance mirror; the source-of-truth normative spec ships under commercial licence). Each row points to the specific KYE artefact — endpoint, schema, profile section, or conformance fixture — that satisfies it. Horizontal frameworks covered:

Sector overlays bind on top of the horizontal mappings: HIPAA Privacy + Security Rule (US healthcare), MiCA (EU crypto-asset markets), FFIEC (US bank exam guidance), IEC 62443 (industrial cybersecurity), 42 CFR Part 2 (US substance-use confidentiality).

The mapping is the audit-evidence skeleton an enterprise GRC team uses to certify a deployment.

The KYE Compliance Mapping Rail (schemas/compliance-mapping.json) binds each framework control to the specific KYE runtime events that produce evidence for it; the KYE EU AI Act Profile (kye-euaiact-v1.md) is the first such mapping, covering the EU AI Act with 10 controls (KYE-EUAIACT-001 through KYE-EUAIACT-010): entity accountability, AI system registry, capability manifest + risk classification, human-oversight decision gates, runtime authority decision logs, technical documentation evidence pack, corrective action and revocation trail, provider/deployer/operator role mapping, high-risk workflow profile, and post-market monitoring evidence hooks. KYE EU AI Act does not replace conformity assessments, notified bodies, or fundamental-rights impact assessments — it provides the signed evidence those processes consume.

Sector profiles in v1.0 cover financial services, healthcare, custody, treasury, AI labs, public sector, marketplaces, defence, critical infrastructure, energy, manufacturing, oil & gas, mining, automotive, maritime & shipping, logistics, and aviation. Each composes with KYE EU AI Act when AI systems or AI agents participate.

7.3 · Conformance & certification

v1.0 ships a 41-fixture black-box conformance pack covering registration, delegation, scope attenuation, lifecycle and stop-cascade, capability invoke (allow / deny-quarantined / require-approval), capability-grant cascade, recovery flow, state transitions (allowed / rejected), break-glass grants, compromise cascade, key rotation, point-in-time replay, payments allow / deny / approval, audit integrity, idempotency, federation transfer, transparency log append + receipt, signal cascade, webhook delivery, Evidence Pack export, workload attest. Fixtures speak only HTTP — any conformant implementation can be tested with the same pack regardless of language, runtime, or topology. The conformance reporter emits machine-readable evidence for the auditor (conformance-report.json, normative as of v1.0).

7.4 · Normative addenda (gap-closure register)

An independent v1.0 normative review identified 15 gaps across blockers, important and polish classes. Each is closed at the spec contract level; the underlying mechanisms remain in the patent track.

Blockers (5 / 5 closed)

Important (5 / 5 closed)

Polish (5 / 5 closed)

7.5 · Continuity & Discoverability

Two new normative profiles ship in v1.0 alongside the sectoral inventory above. Both extend Core: Continuity preserves alignment across the chain, Discoverability makes the chain operational.

7.5.1 Continuity Module (under Runtime Decision Rail)

Continuity is a module inside the Runtime Decision Rail, not a top-level profile. Where Core records who acted, on whose authority, in what state, with what evidence, the Continuity Module records whether the action remained continuous from intent to execution. It introduces three new dimensions on top of the eight Core records: intent (declared goal + constraints + declared_by), interpretation (interpreted goal + confidence + material_drift_detected), and incentive / pressure context (optimisation goal, commercial / affiliate / commission flags, urgency / coercion / social-engineering signals). Six normative objects: KYEContinuityContext, KYEIntentTrace, KYEContinuityDecision, KYEAgencyDriftEvent, KYEContinuityEvidencePack. Decision values: continuity_preserved · continuity_degraded · continuity_broken · require_human_review · require_reconfirmation · deny · quarantine. Ten drift classes (intent_drift, authority_drift, scope_drift, state_drift, capability_drift, execution_drift, incentive_drift, oversight_drift, evidence_drift, delegation_drift — collectively agency_drift) each emit a signed KYEAgencyDriftEvent on KYE Signal Bus and feed the Resilience Loop. Spec: kye-continuity-v1.md.

7.5.2 Directory & Assurance Rail — KYE Directory + KYE Evidence Finder

Identity, authority, scope, state, decision, audit, evidence are what KYE records. The Directory & Assurance Rail turns the recorded graph into a policy-filtered, audited, masked discovery surface, exposed via four canonical surfaces: KYE Directory (the lookup surface), KYE Authority Search (Authority Graph traversal), KYE Evidence Finder (search across Evidence Packs and Decision Maps), and KYE Investigation Console (the auditor/regulator workbench). Six discovery types (entity, authority, capability, evidence, risk, ecosystem); six discovery modes (private_tenant, workspace, cross_workspace, federated, public_registry, certification_registry); seven normative objects (KYEDirectoryEntry, KYEDiscoveryQuery, KYEDiscoveryResult, KYEDiscoveryPolicy, KYEAuthorityPathDiscovery, KYEDiscoveryAuditEvent, KYEEvidenceFinderQuery). Every query is purpose-bound (security_review, audit, incident_response, compliance, procurement_review, operations, investigation) and audit-required by default. The rail is explicit about what it never returns: raw credentials, private keys, secret_refs, personal data outside the requesting tenant, and patent-track mechanism content.

7.5.3 Positioning

The refined v1.0 thesis: KYE makes delegated agency observable, governable, revocable, replayable — via a Resilience Loop that closes on drift, and a Directory & Assurance Rail that makes the closed loop discoverable.

7.6 · Semantic Registry — semantic authority

A login session, an OAuth scope, a payment mandate, a legal delegation, a healthcare consent, an API permission and an AI-agent capability are not the same thing. Treating them as if they were is a category of security failure that does not surface as a permission bug; it surfaces as an authority bug. The Semantic Registry — a module under Protocol → Foundations, supporting every engine; not a standalone product — is the v1.0 layer that prevents it.

7.6.1 Where the layer sits

Schemas define structure. Dictionaries define controlled terms. Taxonomies define hierarchy. Ontology defines meaning and relationships. Live graph instances show concrete relationships at runtime. Policies enforce decisions. KYE needs all of them. Schemas make data valid. Ontologies make data meaningful. The Semantic Registry (a module under Protocol → Foundations — not a standalone product) sits between dictionaries / taxonomies and the live authority graph; it does not replace any of them.

7.6.2 Twelve ontology domains

Every KYE term declares exactly one domain: entity, authority, capability, scope, state, decision, evidence, continuity, discoverability, connector, sector, certification. Domains carve the semantic surface so terms cannot drift across categories silently. Five normative objects: KYEOntologyProfile, KYEOntologyTerm, KYEOntologyRelationship, KYEOntologyMapping, KYESemanticAssertion. A stable predicate dictionary — grants, requires, constrains, evidenced_by, acts_on_behalf_of, uses_capability, equivalent_to, related_not_identical, not_equivalent_to, … — is normative; new predicates require an RFC. Spec: kye-ontology-v1.md.

7.6.3 Six explicit mapping types

External-system terms map into KYE with a declared mapping_typeequivalent, related_not_identical, not_equivalent, aliased_by, subsumes, subsumed_by. The runtime enforces it: an OAuth scope payments:write is related_not_identical to a delegated payment authority — presenting the scope alone, without the companion KYEAuthorityGrant + KYEScope + KYEStateSnapshot + KYEPolicyDecision, is denied with reason code external_term_not_equivalent. Asserting equivalence against a not_equivalent mapping is itself a policy violation. The result is a runtime that prevents false equivalence between authorisation, authority, consent, mandate, delegation, capability and licence.

7.6.4 Semantic assertions in the audit chain

Every runtime decision emits a signed KYESemanticAssertion listing exactly which terms, mappings and predicates were consulted. The assertion hash-chains into the F2 audit chain and is included in the Continuity Evidence Pack. A regulator with the published JWKS can re-derive what the decision meant — not just what it returned. Twelve reason codes (ontology_term_missing, ontology_term_deprecated, ontology_mapping_missing, ontology_mapping_conflict, semantic_equivalence_rejected, semantic_relationship_ambiguous, semantic_resolution_failed, semantic_assertion_verified, semantic_assertion_conflict, external_term_not_equivalent, profile_term_mismatch, sector_term_requires_mapping, ontology_policy_denied) round out the dictionary.

7.6.5 Serializations

KYE is JSON-native at runtime, JSON-LD-ready for semantic interoperability, and graph-aware for authority discovery, continuity and evidence. JSON Schema is required at the API surface; a JSON-LD context is published at https://kyeprotocol.com/schemas/jsonld-context.json and recommended; RDF / OWL export is supported as an optional serialization for research, public-sector, regulator and knowledge-graph integrations.

7.6.6 Positioning

KYE makes authority semantically portable. The ontology contracts are open. The managed semantic engine is paid.

7.7 · Operating Model — readiness to runtime

Most AI-governance programmes stop at policies, committees, training or review documents. The narrative form does not produce runtime-policy configuration; gates, commit boundaries, review paths and evidence requirements remain in slide decks. The runtime gateway therefore enforces nothing specific to the use case, and the evidence record produced at runtime cannot be replayed against the declared intent. KYE Operating Model Profile is the v1.0 layer that closes this gap.

The pre-runtime artefact is the Operating Model: who acts, on whose authority, for what purpose, under which rules, with what evidence, revoked by whom. It decomposes into two named subsets — the Authority Model (delegation graph, grant types, gate criteria) and the Behaviour Model (allowed actions, obligations, stop-conditions, escalation paths). Both are signed before promotion. The Control Compiler is the deterministic transform that turns the signed Operating Model into runnable rule bundles, evidence triggers, webhook contracts and Purpose Permission classes. If a customer cannot show a signed, compiled, deployed Operating Model for a given agent / partner / workflow, the Decision Engine MUST refuse to emit an allow. There is no ambient runtime in KYE.

7.7.1 Ten ordered journey stages

Every implementation enforces the ten stages and emits a signed event per stage onto KYE Signal Bus: intakeassessclassifymap_authorityplace_gatesconfigure_runtimeexecuteevidencereviewimprove. Spec: kye-operating-model-v1.md.

7.7.2 Ten normative objects

Profile descriptor + nine living governance records: KYEUseCaseIntake, KYEReadinessAssessment, KYEEntityAuthorityRecord, KYEAuthorityGate, KYECommitBoundary, KYEReviewPath, KYETrainingRecord, KYEAdoptionEvidencePack, KYEGovernedCatalogEntry. Each record has a public JSON Schema mirrored under public/examples/; the validator runs every example through ajv on every CI build.

7.7.3 Authority Gates™ + Commit Boundary™

Eight authority-gate types — payment_execution, external_message, contract_signature, clinical_action, infrastructure_command, data_export, credential_rotation, evidence_export — plus data_access and custom. Decision policy values: allow / deny / require_approval / require_step_up / quarantine. The Commit Boundary separates a recommendation from a committed action: draft email vs send email; prepare payment vs execute payment; recommend refund vs issue refund; draft contract vs sign contract; suggest clinical step vs perform clinical step. Each transition carries the required authority-gate reference, the required-decision contract, and the obligations the runtime MUST fulfil at the boundary.

7.7.4 Adoption evidence pack

The signed KYEAdoptionEvidencePack composes intake + readiness + authority record + gates + commit boundaries + review paths + training + sample runtime decisions + revocation test under deterministic canonical encoding. The pack hash-chains into the F2 audit chain; a third party with the published JWKS can re-derive what the system was configured to enforce, what it actually decided at runtime, and how those decisions were reviewed.

7.7.5 Reason codes

Nineteen operating-model reason codes round out the dictionary, including use_case_owner_missing, authority_model_missing, commit_boundary_missing, authority_gate_missing, autonomous_execution_not_allowed, payment_execution_gate_required, external_send_gate_required, clinical_action_gate_required, readiness_incomplete, pilot_ready_with_controls, production_ready.

7.7.6 Positioning

Assess. Gate. Decide. Prove. Revoke. Replay. KYE turns AI-governance operating models into runtime authority decisions and replayable evidence — from use-case intake to runtime execution. The operating-model contracts are open. The managed readiness, gate, commit-boundary and portal workflows are paid.

7.8 · Assurance Card — system cards become executable

Defence-grade AI assurance work (Alan Turing Institute / Accenture / UK MoD) makes the case directly: model cards are insufficient where models are integrated with platforms, where assumptions change and where multiple models interact. Agentic systems need more than model cards — they need authority cards, runtime decisions and evidence trails. KYE Assurance Card Profile is the v1.0 lifecycle assurance layer that turns KYE runtime evidence into a living assurance record per delegated entity.

7.8.1 Eight lifecycle stages

Every implementation enforces the eight stages and emits a signed event per stage onto KYE Signal Bus: designpilotdeploymonitorincident_reviewscope_change_reviewretention_reviewdecommission. Spec: kye-assurance-card-v1.md.

7.8.2 Six normative objects

Profile descriptor + five living governance records: KYEAssuranceCard, KYEHumanInvolvementPlan, KYEProvenanceEvidence, KYEAssuranceReviewCycle, KYEDecommissioningPlan. Each record has a public JSON Schema mirrored under public/examples/.

7.8.3 Human Involvement Plan™ as a runtime policy gate

KYE Human Involvement Plan defines points where authorised, suitably qualified humans MUST exercise judgement to influence, direct, limit, approve, override or review an AI-enabled system. The plan is enforced as a runtime policy gate: a commit-level action that would bypass an involvement point is denied with reason code bypass_of_human_involvement_attempted and a signed kye.human_involvement.bypass_denied event is emitted onto Signal Bus. This converts human-involvement requirements from documentation into operational architecture.

7.8.4 Provenance and supply-chain evidence

KYEProvenanceEvidence records model / dataset / tool / hardware / supplier / licence references with a verification status (verified / partially_verified / unverified / failed). Verification methods: self_attested, third_party_attestation, signed_evidence, registry_check. Verification failure emits kye.provenance.verification_failed; supplier and licence changes emit dedicated events that promote to a review trigger.

7.8.5 Review cycle — ten triggers

KYEAssuranceReviewCycle watches the authority graph + provenance + risk-state for ten named triggers: scheduled, scope_change, new_capability, incident, risk_state_change, model_update, authority_change, supplier_change, licence_change, retention, decommission. Reviews instantiate without operator intervention; reviewer identity, decision, reason code and evidence are recorded per review and chain-bound into the audit ledger.

7.8.6 Decommissioning

KYEDecommissioningPlan orchestrates retention windows + off-boarding step sequence (revoke_authorityquarantine_credentialsrotate_keysarchive_evidencenotify_ownernotify_supplierupdate_catalogremove_from_runtime) under a declared cascade-revocation scope (entity_only / entity_and_descendants / tenant_wide). The post-execution verification record is signed and chain-bound.

7.8.7 Positioning

System cards say what should be assured. KYE proves what happened. KYE makes assurance executable. The assurance-card contracts are open. The managed runtime assurance engine, sector packs and use-case library are paid.

7.9 · Formal Rules — rights, obligations, runtime

Authority is incomplete unless permissions, obligations, prohibitions, powers, exceptions and governance rules are explicit. KYE Formal Rules Profile is the v1.0 layer that models them as first-class, machine-readable authority objects so KYE Gateway can enforce them at runtime, the Obligation Ledger can track them across their lifecycle, the Rule Prover can test their consistency before deployment, and the Control Compiler can compile them into runtime policy bindings.

7.9.1 Six rule families + meta-governance

Every KYEFormalRule declares exactly one of: permission (P — "may"), obligation (O — "must"), prohibition (F — "must not"), power (Pow — "has authority to"), immunity (Imm — "cannot be altered by"), exception (Ex — "displaced by, in conditions"). A seventh family meta_governance is recorded under KYEGovernanceRule. Spec: kye-formal-rules-v1.md.

7.9.2 Eleven normative objects

Profile descriptor + ten authority-object schemas: KYEFormalRule, KYEPermission, KYEObligation, KYEProhibition, KYEPower, KYEException, KYEGovernanceRule, KYERuleConflict, KYERuleProof, KYEObligationState. KYEObligation is a lifecycle object — states pending · satisfied · breached · waived · expired · disputed · remediated · superseded. Each transition appends a hash-chained KYEObligationState record into the F2 audit chain.

7.9.3 Prohibition is structurally distinct from deny

Generic policy engines (XACML, OPA, Cerbos, ZenAuth) compile a flat set of allow/deny rules. KYE Formal Rules Profile distinguishes deny (action not allowed this time) from prohibited (this class of action is forbidden under the bound authority model). The reason codes are different (permission_missing vs prohibited_action_requested); the runtime artefacts are different (gate decision vs prohibition trigger event); the audit-chain entries are different.

7.9.4 Pre-runtime consistency — KYE Rule Prover

Before a rule set is bound to runtime, the Rule Prover emits a signed KYERuleProof attesting eight properties: no permission/prohibition conflict, obligations have satisfaction paths, all commit boundaries have gates, all high-risk actions have evidence requirements, revocation path exists, no circular delegation, no unbounded obligations, all overrides have a governance rule. Conflicts and warnings are emitted as signed KYERuleConflict artefacts with deterministic resolution strategy.

7.9.5 Multi-target compilation — KYE Control Compiler

A single formal rule does not compile into a single allow/deny policy. The Control Compiler emits multiple coordinated runtime artefacts: PDP/PEP bindings, KYEAuthorityGate records, KYECommitBoundary records, KYE Signal Bus event subscriptions, and evidence requirements. The runtime gateway enforces the compiled artefacts; it never re-interprets the formal rule at decision time.

7.9.6 Positioning

A rule should not only be written. It should be enforceable, discoverable, revocable, provable and replayable. KYE provides that layer. Formal rules define the normative structure. KYE operationalises it at runtime. The formal-rule contracts are open. The managed reasoning engine, prover, compiler and obligation ledger are paid.

7.10 · Action Admissibility — before authority, before commit

Attribution is late. If an AI agent forms a harmful, unlawful, out-of-scope, coercive, misleading or structurally invalid action, the organisation may already carry risk even if the action is later denied. KYE Action Admissibility Profile is the v1.0 upstream layer that prevents inadmissible actions from forming in the first place.

7.10.1 The full pipeline

signal → intent → interpretation → proposed actionKYE Admission Gate → authority decision → formal-rules evaluation → commit boundary → execution → attribution → evidence pack. The Admission Gate sits UPSTREAM of the authority pipeline; downstream surfaces are blocked from receiving the proposed action when admission decides reject / require_clarification / require_human_review / quarantine. Spec: kye-action-admissibility-v1.md.

7.10.2 Five normative objects

Profile descriptor + four runtime objects: KYEProposedAction, KYEAdmissionGate, KYEAdmissibilityDecision, KYEAdmissibilityEvidence. The decision lists every checked dimension with a Boolean outcome and a next-step routing instruction. The evidence record lists every input and signal consulted, hash-chained into the F2 audit chain so a third party can re-derive *why* a proposal was admitted, rejected or quarantined.

7.10.3 Six decision values + fifteen inadmissibility classes

Decision values: admit / reject / require_clarification / require_human_review / quarantine / route_to_authority_check. Fifteen inadmissibility classes the engine actively detects: invalid_intent, ambiguous_intent, out_of_scope_proposal, prohibited_action_class, disallowed_data_source, inadmissible_evidence, unsafe_tool_path, coercion_signal, incentive_conflict, continuity_break, policy_ineligible_action, missing_authority_context, missing_principal, missing_accountable_owner, unsupported_jurisdiction.

7.10.4 Distinct from validation, classification and policy

Generic input-validation toolchains validate JSON shape but do not bind a signed admission decision into the audit chain. Prompt-injection / safety classifiers classify text but do not emit a runtime gate verdict tied to an authority pipeline. Generic policy engines (XACML, OPA, Cerbos) compile allow / deny over a single resource but do not perform the upstream admission gate before the authority decision step. Action Admissibility is structurally upstream and structurally signed.

7.10.5 Positioning

KYE does not only attribute delegated actions after they exist. It checks whether proposed actions are admissible before they enter the authority pipeline, then decides, proves, revokes and replays what happens next. The admission contracts are open. The managed Admissibility Engine is paid.

7.11 · Developer surface — MCP, SDK, Conformance

Anything an integrator touches to consume the KYE kernel — model agent, host app, partner backend, third-party runtime, regulator harness — MUST go through one of four canonical components. Bespoke clients and undocumented HTTP surfaces are constitutional violations.

7.12 · KYE Partner Rail

The public Partner surface is two engines sharing one Partner Authority Kernel. Both engines bind to the same kernel (entity, delegation, scope, decision, evidence); they read and write the same Authority Graph from opposite sides and never duplicate state.

8 · Security & threat model

The reference implementation defends against:

Out of scope for the reference: HSM-backed key custody, multi-tenant gateway hardening, transport-level mTLS configuration. These are deployment concerns; production Gateways must address them.

9 · Governance

Vocabulary, schemas, OpenAPI specs and KYE Reference Gateway behaviours are published openly under Apache License 2.0 in github.com/KYE-Protocol. Specific mechanism designs (decision algorithms, hash-chain construction, cascade ordering, attenuation propagation) are intentional placeholders pre-filing in private/mechanisms/ and are not disclosed publicly to preserve patent novelty. Conformant implementations may license the mechanism designs royalty-free for any conformant use; full terms are forthcoming with the Linux Foundation / OpenWallet Foundation track.

Trademark policy: KYE, KYE Protocol, and Know Your Entity refer to the protocol as published. Forks, modifications and unrelated projects must not use the marks to identify themselves.

10 · Roadmap

References

  1. Visa. Trusted Agent Protocol.
  2. Persona. Know Your Agent (KYA).
  3. Sumsub. Agent Verification.
  4. Trulioo / PayOS. Digital Agent Passport.
  5. Anthropic. Model Context Protocol.
  6. OpenID Foundation. AuthZEN, SSF, CAEP.
  7. SPIFFE Project. SPIFFE Identity Specification.
  8. OpenSSF. SCITT Architecture.
  9. NIST. SP 800-207 Zero Trust Architecture.

Appendix — verify a sample evidence pack live

The whitepaper’s claims about offline-verifiable evidence packs are not abstract. Below is the same KYE Evidence Pack Viewer that ships at widgets.html#evidence: it verifies a signature against the publisher’s JWKS, replays the bound decision, walks the audit chain, and projects to SOC 2 / ISO 27001 / EU AI Act / PSD3 / DORA. No signup, no install — the same flow your auditor will run on production packs.

Cite as: KYE Protocol Project. KYE Protocol: an open trust layer for the agentic economy. Whitepaper v1.0, April 2026. https://kyeprotocol.com/whitepaper.html


© 2026 KYE Protocol™ project contributors. All rights reserved.
This whitepaper is provided for reference. No grant of use, copy, modification, or distribution is given by its publication. Specific mechanism designs (cascade revocation propagation, audit-chain construction, federation transfer, attenuation propagation, signing-suite construction, lifecycle transition rules) are subject to pending patent applications and are not disclosed here.
Trademarks — KYE™, KYE Protocol™, Authority Finality™, KYE Chain of Authority™, Decision Map™, Evidence Pack™, Authority Graph™, Blast Radius Map™, Compliance Map™, KYE Cloud Gateway™, KYE Conformant™, KYE Certified™, KYE Self-Tested™, KYE Self-Attested™, KYE Compliance Mapping Rail™, KYE Connector Hub™, KYE Connector Profiles™, KYE App Store™, KYE Plugin Marketplace™, KYE Signal Bus™, KYE MCP Server™, KYE Authority Wallet™ — are property of the KYE Protocol™ project. Trademark policy: https://kyeprotocol.com/legal.html#trademarks.

Ready to see your AI agents flagged?

Start in shadow mode. We’ll deliver your first Evidence Pack in 4–8 weeks.