<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-agtp-merchant-identity-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP-MERCHANT">AGTP Merchant Identity and Agentic Commerce Binding</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-agtp-merchant-identity-00"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="April" day="17"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>agentic commerce</keyword>
    <keyword>merchant identity</keyword>
    <keyword>agent payments</keyword>
    <keyword>AGTP</keyword>
    <abstract>
      <?line 70?>

<t>The Agent Transfer Protocol (AGTP) specifies the sending side of an
agentic transaction: agent identity, Authority-Scope enforcement, Budget-
Limit declaration, and a signed Attribution-Record on every method
invocation. The receiving side of a PURCHASE transaction -- the merchant
or service provider -- has no equivalent protocol-level identity or
verification mechanism. This is the merchant identity gap.</t>
      <t>This document specifies the AGTP Merchant Identity and Agentic Commerce
Binding. It defines the Merchant Manifest Document, a signed identity
record structurally parallel to the Agent Manifest Document; the Merchant
Birth Certificate, the genesis record from which a merchant's canonical
identifier is derived; Merchant Trust Tiers aligned with AGTP Trust Tier
semantics; and the protocol integration points at which merchant identity
is verified. These include the PURCHASE method handshake, the DISCOVER
method result surface, and the Attribution-Record. This document also
defines the Intent-Assertion header for portable, detached principal-
authorized intent, the Cart-Digest mechanism for multi-line-item
transactions, and the 455 Counterparty Unverified status code. Together
these mechanisms close the verification loop between agent and merchant
within AGTP's governance model.</t>
    </abstract>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="the-merchant-identity-gap">
        <name>The Merchant Identity Gap</name>
        <t>AGTP today provides strong guarantees for the sending side of an agent
transaction. A PURCHASE invocation carries a cryptographically derived
Agent-ID, a Principal-ID identifying the accountable human or
organization, an Authority-Scope declaration (including <tt>payments:
purchase</tt>), a Budget-Limit enforced at invocation time, and a signed
Attribution-Record retained for audit. The requesting agent's
governance context is fully expressed at the protocol layer.</t>
        <t>The receiving side has no equivalent. An AGTP PURCHASE currently
resolves to a network endpoint with no protocol-level assertion of the
receiving party's identity, lifecycle state, legal entity, payment
network acceptance, or dispute policy. An agent with <tt>payments:
purchase</tt> scope will transact with any endpoint its principal
(or the upstream orchestration logic) directs it toward. There is no
protocol-level signal distinguishing a verified merchant of record
from an endpoint that merely answers on the expected port.</t>
        <t>This gap has direct operational consequences as agent-driven commerce
scales:</t>
        <ul spacing="normal">
          <li>
            <t>Payment networks and card issuers extending protection to agent-
initiated transactions require verifiable identity on both parties
to the transaction, not just the agent.</t>
          </li>
          <li>
            <t>Dispute investigation requires a cryptographically linked record
of both the initiating agent and the merchant counterparty at the
time of the transaction.</t>
          </li>
          <li>
            <t>Merchants suspended for fraud, chargebacks, or regulatory action
have no mechanism to be removed from the agent-visible transaction
surface in the absence of a governed merchant directory.</t>
          </li>
          <li>
            <t>Agents cannot distinguish a merchant whose identity has been
verified from one that has merely published a service endpoint.</t>
          </li>
        </ul>
        <t>This document closes the gap by introducing a merchant-side identity
structure that mirrors the agent-side identity structure already
specified in <xref target="AGTP"/>.</t>
      </section>
      <section anchor="relationship-to-payment-networks">
        <name>Relationship to Payment Networks</name>
        <t>This specification is a transport-layer identity and verification
mechanism for merchant counterparties. It does not define payment
credential handling, tokenization, authorization messages to card
networks, or settlement. Those belong to payment-rail specifications
operated by issuers, networks, and acquirers.</t>
        <t>The relationship is complementary. Payment-network programs that
extend protection, fraud coverage, or dispute handling to agent-
initiated transactions need verifiable identity for both the agent
and the merchant. AGTP establishes verifiable agent identity through
the Agent Birth Certificate and Agent Manifest Document. This
document extends the same structural model to the merchant side,
producing an Attribution-Record that names both counterparties
cryptographically. Payment networks consume that record as an input
to their own authorization and dispute processes; they do not need
to speak AGTP to do so.</t>
      </section>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <t><strong>Structural parallelism.</strong> Merchant identity uses the same document
formats, trust tiers, lifecycle states, and governance zone semantics
as agent identity. A governance platform that registers agents
registers merchants through the same registry and the same
cryptographic machinery.</t>
        <t><strong>Verification at PURCHASE.</strong> Merchant identity is verified by the
requesting agent immediately before executing PURCHASE. The
verification result is recorded in the Attribution-Record. A
verification failure is a 455 Counterparty Unverified response, not
a protocol error.</t>
        <t><strong>Discovery surfaces both sides.</strong> The DISCOVER method defined in
<xref target="AGTP-DISCOVER"/> returns Agent Manifest Documents for agent
queries. This document extends DISCOVER to optionally return
Merchant Manifest Documents when the query intent targets a
transactional counterparty rather than a capability-providing agent.</t>
        <t><strong>Portable intent.</strong> The Intent-Assertion header carries a detached,
signed summary of principal-authorized purchase intent that can be
forwarded to non-AGTP counterparties (payment networks, card
issuers, acquirers) as standalone evidence without requiring those
counterparties to speak AGTP.</t>
        <t><strong>Payment-rail neutrality.</strong> Nothing in this specification binds the
merchant identity model to any particular card network, digital
wallet, or settlement system. Merchant Manifests declare accepted
payment network identifiers as an informational field; enforcement
remains the responsibility of the payment rail.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>
      <dl>
        <dt>Merchant:</dt>
        <dd>
          <t>A legal entity that offers goods or services for purchase and
serves as the receiving counterparty to an AGTP PURCHASE
invocation. A merchant is identified by a canonical Merchant-ID
and represented by a Merchant Manifest Document.</t>
        </dd>
        <dt>Merchant-ID:</dt>
        <dd>
          <t>A unique identifier for a specific merchant entity, derived from
the hash of the merchant's Birth Certificate. Carried in the
<tt>Merchant-ID</tt> request header on PURCHASE invocations and in the
Attribution-Record. Format: 256-bit hex-encoded value or
domain-anchored URI of the form <tt>agtp://merchant.example.tld/
merchant</tt>.</t>
        </dd>
        <dt>Merchant Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to a merchant
at registration time by a governance platform. The genesis record
from which the canonical Merchant-ID is derived. Structurally
parallel to the Agent Birth Certificate defined in <xref target="AGTP"/> Section
5.7. Fields include legal entity name, registered org domain,
accepted payment networks, merchant category code, dispute and
refund policy URIs, lifecycle state, and governance zone. Issued
once per merchant; permanently bound; never reissued.</t>
        </dd>
        <dt>Merchant Manifest Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document
returned when a merchant URI is resolved. Derived directly from
the merchant's Birth Certificate and current registry record.
Structurally parallel to the Agent Manifest Document defined in
<xref target="AGTP"/> Section 5.5. Contains identity, trust tier, lifecycle
state, accepted payment networks, dispute policy reference, and
governance zone. Never contains executable content.</t>
        </dd>
        <dt>Merchant Trust Tier:</dt>
        <dd>
          <t>A classification (1, 2, or 3) assigned to a merchant at
registration time, aligned with the Agent Trust Tier semantics
defined in <xref target="AGTP"/> Section 5.2. Tier 1 requires DNS-anchored
domain verification of the merchant's registered org domain and
a signed business-entity attestation from the governance platform.
Tier 2 is org-asserted without DNS verification. Tier 3 is
experimental and <strong>MUST NOT</strong> appear in production PURCHASE flows.</t>
        </dd>
        <dt>Intent-Assertion:</dt>
        <dd>
          <t>A detached, signed JWT-format <xref target="RFC7519"/> token that summarizes
principal-authorized purchase intent. Contains the principal ID,
agent ID, merchant ID, item or cart digest, amount ceiling,
currency, issuance timestamp, expiry, and a single-use nonce.
Carried in the <tt>Intent-Assertion</tt> request header and forwardable
to payment networks as standalone evidence of authenticated
principal intent.</t>
        </dd>
        <dt>Cart-Digest:</dt>
        <dd>
          <t>A cryptographic digest of a structured cart payload returned by a
QUOTE invocation. Referenced in a subsequent PURCHASE invocation
to bind the purchased cart to the quoted cart without requiring
retransmission of line-item detail. Format: hash algorithm prefix
followed by hex-encoded digest (e.g., <tt>sha256:3a9f2c1d...</tt>).</t>
        </dd>
        <dt>Counterparty Verification:</dt>
        <dd>
          <t>The process by which an agent, before executing PURCHASE,
retrieves the Merchant Manifest Document for the intended
merchant, verifies its signature and lifecycle state, and records
the verification result in the Attribution-Record.</t>
        </dd>
        <dt>MNS (Merchant Name Service):</dt>
        <dd>
          <t>The merchant-side analogue of the Agent Name Service defined in
<xref target="AGTP-DISCOVER"/>. An AGTP-aware server that maintains an indexed
registry of Merchant Manifest Documents and answers DISCOVER
queries targeted at merchant entities. An MNS <strong>MAY</strong> be
co-located with an ANS or operated separately. Acts as a Scope-
Enforcement Point for merchant discovery traffic.</t>
        </dd>
      </dl>
    </section>
    <section anchor="the-merchant-identity-model">
      <name>The Merchant Identity Model</name>
      <section anchor="merchant-birth-certificate">
        <name>Merchant Birth Certificate</name>
        <t>The Merchant Birth Certificate is the genesis record of a merchant's
existence in the AGTP governance fabric. It is issued by a governance
platform at merchant registration time through a process analogous to
Agent Birth Certificate issuance (<xref target="AGTP"/> Section 5.7).</t>
        <t>The required fields of a Merchant Birth Certificate are:</t>
        <figure>
          <name>Merchant Birth Certificate Schema</name>
          <sourcecode type="json"><![CDATA[
{
  "document_type": "merchant-birth-certificate",
  "schema_version": "1.0",
  "canonical_id": "7c2f9a3e1b8d4f6a...",
  "legal_entity_name": "Acme Commerce, Inc.",
  "org_domain": "acme.tld",
  "merchant_category_code": "5411",
  "registered_jurisdiction": "US-DE",
  "governance_zone": "zone:retail-verified",
  "accepted_payment_networks": ["visa", "mastercard", "amex", "discover"],
  "dispute_policy_uri": "agtp://acme.tld/merchant/dispute-policy",
  "refund_policy_uri": "agtp://acme.tld/merchant/refund-policy",
  "trust_tier": 1,
  "activated_at": "2026-03-15T12:00:00Z",
  "activating_principal": "agtp-platform-acme",
  "certificate_hash": "7c2f9a3e1b8d4f6a...",
  "signature": {
    "algorithm": "ES256",
    "key_id": "gov-platform-key-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode>
        </figure>
        <t>The <tt>canonical_id</tt> field <strong>MUST</strong> equal the <tt>certificate_hash</tt>, a
256-bit cryptographic hash computed over the canonicalized certificate
content excluding the <tt>signature</tt> field. This hash is the basis of the
merchant's Merchant-ID and is used wherever the merchant is identified
in AGTP wire-level structures.</t>
        <t>The <tt>merchant_category_code</tt> field <strong>SHOULD</strong> follow the ISO 18245
Merchant Category Code standard where applicable. Governance platforms
operating outside that classification <strong>MAY</strong> define alternate codes
provided they are documented in the governance zone definition.</t>
        <t>The <tt>accepted_payment_networks</tt> array is informational. It declares
which payment networks the merchant represents itself as accepting.
Payment-rail enforcement of this declaration is out of scope for this
document; the field supports pre-flight filtering by requesting agents
and ranking by Merchant Name Service implementations.</t>
      </section>
      <section anchor="merchant-trust-tiers">
        <name>Merchant Trust Tiers</name>
        <t>Merchant Trust Tiers align with the Agent Trust Tier semantics in
<xref target="AGTP"/> Section 5.2:</t>
        <table>
          <name>Merchant Trust Tier Summary</name>
          <thead>
            <tr>
              <th align="left">Tier</th>
              <th align="left">Verification</th>
              <th align="left">Org Domain</th>
              <th align="left">Registry Visible</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1 - Verified</td>
              <td align="left">DNS challenge per <xref target="RFC8555"/> plus business entity attestation</td>
              <td align="left">Required, verified</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">2 - Org-Asserted</td>
              <td align="left">None beyond self-declaration</td>
              <td align="left">Present, unverified</td>
              <td align="left">Yes, with warning</td>
            </tr>
            <tr>
              <td align="left">3 - Experimental</td>
              <td align="left">None</td>
              <td align="left">Optional</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
        <t>Trust Tier 1 merchant registration <strong>MUST</strong> include, in addition to
DNS ownership verification, a governance-platform-signed attestation
that the registering party has provided evidence of the claimed legal
entity's existence and standing. The form of that evidence
(incorporation document, tax identifier, equivalent jurisdictional
registration) is governance-platform-defined and <strong>MUST</strong> be
documented in the governance zone specification.</t>
        <t>Trust Tier 2 merchants <strong>MUST</strong> have their Merchant Manifest Document
include a <tt>trust_warning</tt> field with value <tt>"legal-entity-unverified"</tt>.
Requesting agents <strong>SHOULD</strong> surface this warning to principals before
executing a PURCHASE against a Tier 2 merchant, or <strong>MAY</strong> reject Tier
2 merchants entirely based on governance policy.</t>
        <t>Trust Tier 3 merchants <strong>MUST NOT</strong> appear in production PURCHASE
flows. They exist for development and integration testing only.</t>
      </section>
      <section anchor="merchant-lifecycle-states">
        <name>Merchant Lifecycle States</name>
        <t>Merchants occupy one of four lifecycle states mirroring the agent
lifecycle states in <xref target="AGTP"/> Section 5.8:</t>
        <table>
          <name>Merchant Lifecycle States</name>
          <thead>
            <tr>
              <th align="left">State</th>
              <th align="left">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Active</td>
              <td align="left">Merchant is operational and eligible to receive PURCHASE</td>
            </tr>
            <tr>
              <td align="left">Suspended</td>
              <td align="left">Temporarily blocked (fraud review, chargeback threshold, compliance hold)</td>
            </tr>
            <tr>
              <td align="left">Revoked</td>
              <td align="left">Permanently removed; canonical Merchant-ID retired</td>
            </tr>
            <tr>
              <td align="left">Deprecated</td>
              <td align="left">Business ceased operations; canonical Merchant-ID retired</td>
            </tr>
          </tbody>
        </table>
        <t>A merchant in any state other than Active <strong>MUST NOT</strong> be treated as
a valid counterparty by a requesting agent. The expected response to
a PURCHASE targeting a non-Active merchant is 455 Counterparty
Unverified.</t>
        <t>Governance platforms <strong>MUST</strong> update the merchant's Merchant Manifest
Document signature within 60 seconds of a lifecycle state transition
and <strong>MUST</strong> notify any Merchant Name Service instances indexing the
merchant within the same window.</t>
      </section>
      <section anchor="merchant-manifest-document">
        <name>Merchant Manifest Document</name>
        <t>The Merchant Manifest Document is the wire-level representation of
merchant identity, returned in response to resolution of a merchant
URI. It is derived from the Merchant Birth Certificate and current
registry record; it is never manually authored.</t>
        <figure>
          <name>Merchant Manifest Document Schema</name>
          <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-merchant-manifest",
  "schema_version": "1.0",
  "canonical_id": "7c2f9a3e1b8d4f6a...",
  "merchant_label": "acme-commerce",
  "legal_entity_name": "Acme Commerce, Inc.",
  "org_domain": "acme.tld",
  "merchant_category_code": "5411",
  "registered_jurisdiction": "US-DE",
  "governance_zone": "zone:retail-verified",
  "lifecycle_state": "Active",
  "trust_tier": 1,
  "accepted_payment_networks": ["visa", "mastercard", "amex", "discover"],
  "dispute_policy_uri": "agtp://acme.tld/merchant/dispute-policy",
  "refund_policy_uri": "agtp://acme.tld/merchant/refund-policy",
  "activated_at": "2026-03-15T12:00:00Z",
  "last_updated": "2026-04-10T09:12:44Z",
  "birth_certificate_hash": "7c2f9a3e1b8d4f6a...",
  "signature": {
    "algorithm": "ES256",
    "key_id": "gov-platform-key-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode>
        </figure>
        <t>Implementations <strong>MUST</strong> verify the signature against the governance
platform's published key before trusting any field. An unsigned or
invalid Merchant Manifest <strong>MUST</strong> be rejected with the same severity
as an unsigned Agent Manifest.</t>
        <t>The <tt>birth_certificate_hash</tt> field provides a cryptographic link from
the manifest back to the genesis record. Implementations performing
long-term audit reconstruction <strong>MAY</strong> use this hash to retrieve the
archived Birth Certificate from the governance platform.</t>
      </section>
      <section anchor="merchant-uri-forms">
        <name>Merchant URI Forms</name>
        <t>Merchant URIs follow the AGTP URI scheme defined in <xref target="AGTP"/> Section
5.1, using a reserved <tt>/merchant</tt> path component in place of
<tt>/agents</tt>:</t>
        <figure>
          <name>Merchant URI Forms</name>
          <artwork><![CDATA[
agtp://acme.tld/merchant
agtp://acme.tld/merchant/acme-commerce
]]></artwork>
        </figure>
        <t>The single-label form (<tt>agtp://acme.tld/merchant</tt>) resolves to the
organization's primary merchant record. The labeled form
(<tt>agtp://acme.tld/merchant/[merchant-label]</tt>) resolves to a specific
merchant record for organizations operating multiple merchant
identities under a single org domain (e.g., multi-brand retailers).</t>
        <t>Canonical-identifier URIs of the form
<tt>agtp://[canonical-id].merchant</tt> are also supported, analogous to the
canonical agent URI form.</t>
      </section>
    </section>
    <section anchor="counterparty-verification-at-purchase">
      <name>Counterparty Verification at PURCHASE</name>
      <section anchor="verification-requirement">
        <name>Verification Requirement</name>
        <t>An agent with <tt>payments:purchase</tt> in its Authority-Scope <strong>MUST</strong>
perform counterparty verification before executing PURCHASE against
any merchant. Counterparty verification consists of:</t>
        <ol spacing="normal" type="1"><li>
            <t>Resolving the merchant URI (from the intended PURCHASE target) to
retrieve the Merchant Manifest Document.</t>
          </li>
          <li>
            <t>Verifying the manifest's signature against the governance
platform's published key.</t>
          </li>
          <li>
            <t>Verifying the merchant's <tt>lifecycle_state</tt> is Active.</t>
          </li>
          <li>
            <t>Verifying the merchant's <tt>trust_tier</tt> meets or exceeds the
threshold declared in the agent's governance policy for the
current transaction amount.</t>
          </li>
          <li>
            <t>Computing the manifest fingerprint (SHA-256 hash of the canonical
manifest bytes) and carrying it in the <tt>Merchant-Manifest-
Fingerprint</tt> request header.</t>
          </li>
        </ol>
        <t>Any of these steps failing <strong>MUST</strong> result in the PURCHASE not being
sent. The requesting agent's runtime <strong>SHOULD</strong> surface the specific
verification failure to the principal or governance platform; it
<strong>MUST NOT</strong> silently fall back to an unverified transaction.</t>
      </section>
      <section anchor="verification-at-the-receiving-server">
        <name>Verification at the Receiving Server</name>
        <t>A receiving AGTP server that accepts PURCHASE invocations <strong>MUST</strong>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Require the <tt>Merchant-ID</tt> request header to be present.</t>
          </li>
          <li>
            <t>Require the <tt>Merchant-Manifest-Fingerprint</tt> request header to be
present and to match the fingerprint of the server's current
Merchant Manifest Document.</t>
          </li>
          <li>
            <t>Return 455 Counterparty Unverified if either header is absent,
if the Merchant-ID does not match the server's canonical ID, or
if the fingerprint does not match.</t>
          </li>
        </ol>
        <t>This ensures that the manifest verified by the requesting agent is
the same manifest the receiving server currently presents. An attack
in which a requesting agent is redirected to a different endpoint
than it verified is caught at the fingerprint check.</t>
      </section>
      <section anchor="purchase-request-example">
        <name>PURCHASE Request Example</name>
        <t>The following request illustrates a verified PURCHASE invocation
carrying merchant identity binding and a detached intent assertion:</t>
        <figure>
          <name>PURCHASE with Merchant Identity Binding</name>
          <artwork><![CDATA[
AGTP/1.0 PURCHASE
Agent-ID: agtp://agtp.traveler.tld/agents/trip-planner
Principal-ID: usr-chris-hood
Authority-Scope: payments:purchase merchant:verify intent:assert
Session-ID: sess-trip-2026-04
Task-ID: task-purch-0421
Merchant-ID: agtp://acme.tld/merchant/acme-commerce
Merchant-Manifest-Fingerprint: sha256:3a9f2c1d8b7e4a6f...
Intent-Assertion: eyJhbGciOiJFUzI1NiIsImtpZCI6InByaW4ta2V5LTAxIn0...
Cart-Digest: sha256:7c2f9a3e1b8d4f6a...
Budget-Limit: USD=850.00
Content-Type: application/agtp+json

{
  "method": "PURCHASE",
  "task_id": "task-purch-0421",
  "parameters": {
    "cart_quote_id": "qt-7f3a9c",
    "principal_id": "usr-chris-hood",
    "amount": {"value": 842.17, "currency": "USD"},
    "payment_method": "tok-amex-default",
    "confirm_immediately": true
  }
}
]]></artwork>
        </figure>
        <t>The merchant server validates the merchant headers, accepts the
purchase, and returns an Attribution-Record naming both
counterparties:</t>
        <figure>
          <name>PURCHASE Response with Dual-Party Attribution</name>
          <artwork><![CDATA[
AGTP/1.0 200 OK
Task-ID: task-purch-0421
Server-Agent-ID: agtp://acme.tld/merchant/acme-commerce
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-purch-0421",
  "result": {
    "order_id": "ORD-2026-0421-8847",
    "confirmation_code": "AQRT9X",
    "status": "confirmed",
    "amount_charged": {"value": 842.17, "currency": "USD"}
  },
  "attribution": {
    "agent_id": "agtp://agtp.traveler.tld/agents/trip-planner",
    "principal_id": "usr-chris-hood",
    "merchant_id": "agtp://acme.tld/merchant/acme-commerce",
    "merchant_fingerprint": "sha256:3a9f2c1d8b7e4a6f...",
    "intent_assertion_jti": "ia-4f7e1a2b",
    "method": "PURCHASE",
    "timestamp": "2026-04-15T14:22:18Z",
    "signature": {
      "algorithm": "ES256",
      "key_id": "merchant-key-acme-01",
      "value": "[base64-encoded-signature]"
    }
  }
}
]]></artwork>
        </figure>
        <t>The Attribution-Record now names the agent, the principal, and the
merchant, each cryptographically bound through their respective
Birth Certificate derivatives. This is the record consumed by
downstream audit, dispute resolution, and payment-network protection
programs.</t>
      </section>
    </section>
    <section anchor="the-intent-assertion-header">
      <name>The Intent-Assertion Header</name>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>The Intent-Assertion header carries a detached, signed representation
of principal-authorized purchase intent. It exists so that non-AGTP
counterparties -- payment networks, card issuers, acquiring banks,
dispute processors -- can verify principal intent without parsing a
full AGTP message or operating AGTP infrastructure.</t>
        <t>An Intent Assertion is a JWT <xref target="RFC7519"/> signed by the principal's
governance key (or a delegated signing key bound to the principal's
identity) carrying the minimum field set required to link a purchase
to an authenticated principal decision.</t>
      </section>
      <section anchor="intent-assertion-claims">
        <name>Intent Assertion Claims</name>
        <table>
          <name>Intent Assertion JWT Claims</name>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">iss</td>
              <td align="left">string</td>
              <td align="left">Issuing governance platform identifier</td>
            </tr>
            <tr>
              <td align="left">sub</td>
              <td align="left">string</td>
              <td align="left">Principal-ID of the authorizing principal</td>
            </tr>
            <tr>
              <td align="left">aud</td>
              <td align="left">string</td>
              <td align="left">Merchant-ID of the intended counterparty</td>
            </tr>
            <tr>
              <td align="left">agent_id</td>
              <td align="left">string</td>
              <td align="left">Agent-ID of the executing agent</td>
            </tr>
            <tr>
              <td align="left">item_digest</td>
              <td align="left">string</td>
              <td align="left">Hash of purchased item or cart digest</td>
            </tr>
            <tr>
              <td align="left">amount_ceiling</td>
              <td align="left">object</td>
              <td align="left">
                <tt>{value, currency}</tt> maximum authorized</td>
            </tr>
            <tr>
              <td align="left">nbf</td>
              <td align="left">integer</td>
              <td align="left">Not-before timestamp (seconds since epoch)</td>
            </tr>
            <tr>
              <td align="left">exp</td>
              <td align="left">integer</td>
              <td align="left">Expiry timestamp (seconds since epoch)</td>
            </tr>
            <tr>
              <td align="left">jti</td>
              <td align="left">string</td>
              <td align="left">Unique assertion identifier for anti-replay</td>
            </tr>
            <tr>
              <td align="left">iat</td>
              <td align="left">integer</td>
              <td align="left">Issued-at timestamp</td>
            </tr>
          </tbody>
        </table>
        <t>Implementations <strong>MUST</strong> reject Intent Assertions whose <tt>exp</tt> is in
the past, whose <tt>aud</tt> does not match the Merchant-ID in the PURCHASE
request, or whose <tt>agent_id</tt> does not match the Agent-ID in the
PURCHASE request. Assertions <strong>MUST</strong> be single-use: the <tt>jti</tt> is
recorded in the Attribution-Record and <strong>MUST NOT</strong> be accepted a
second time.</t>
        <t>Recommended validity period: 300 seconds. Intent Assertions are not
designed to persist; they cover the interval between principal
authorization and transaction execution.</t>
      </section>
      <section anchor="forwarding-to-payment-networks">
        <name>Forwarding to Payment Networks</name>
        <t>The Intent Assertion is structured as a standalone JWT precisely so
that it can be forwarded. A payment network receiving a merchant's
authorization request <strong>MAY</strong> require the merchant to forward the
Intent Assertion alongside the standard payment message. The payment
network verifies the signature against the issuing governance
platform's public key and treats a valid assertion as evidence of
authenticated principal intent for the purposes of that network's
authorization and dispute policies.</t>
        <t>The specific mechanism for forwarding the Intent Assertion to a
payment network, and the network's treatment of a valid assertion,
is out of scope for this document. What this specification
guarantees is that the assertion exists, is cryptographically
verifiable without AGTP, and is bound to the principal, agent, and
merchant named in the PURCHASE.</t>
      </section>
    </section>
    <section anchor="cart-context">
      <name>Cart Context</name>
      <section anchor="the-single-item-limitation">
        <name>The Single-Item Limitation</name>
        <t>The PURCHASE method as defined in <xref target="AGTP-METHODS"/> accepts a single
<tt>item</tt> parameter and a single <tt>amount</tt>. Real-world agentic commerce
transactions frequently involve multiple line items, tax, shipping,
and per-line merchant-of-record variation. This document defines a
Cart Context mechanism layered over the existing QUOTE and PURCHASE
methods to accommodate structured carts without modifying the base
method definitions.</t>
      </section>
      <section anchor="quote-with-cart-payload">
        <name>QUOTE with Cart Payload</name>
        <t>A requesting agent constructs a structured cart and submits it via
QUOTE. The merchant server returns a signed <tt>cart_digest</tt> binding
the quoted cart content to a unique quote identifier.</t>
        <figure>
          <name>QUOTE with Structured Cart</name>
          <artwork><![CDATA[
AGTP/1.0 QUOTE
Agent-ID: agtp://agtp.traveler.tld/agents/trip-planner
Principal-ID: usr-chris-hood
Authority-Scope: budget:query merchant:query
Merchant-ID: agtp://acme.tld/merchant/acme-commerce
Session-ID: sess-trip-2026-04
Task-ID: task-quote-0421
Content-Type: application/agtp+json

{
  "method": "QUOTE",
  "task_id": "task-quote-0421",
  "parameters": {
    "cart": {
      "lines": [
        {"sku": "FLIGHT-AA2847", "qty": 1, "unit_price": 487.00},
        {"sku": "HOTEL-MRTN-2N", "qty": 1, "unit_price": 298.00},
        {"sku": "CAR-COMPACT-3D", "qty": 1, "unit_price": 42.17}
      ],
      "currency": "USD",
      "tax": 15.00,
      "shipping": 0.00
    }
  }
}
]]></artwork>
        </figure>
        <t>The response contains the quote identifier and the signed cart
digest:</t>
        <figure>
          <name>QUOTE Response with Cart Digest</name>
          <sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-quote-0421",
  "result": {
    "quote_id": "qt-7f3a9c",
    "cart_digest": "sha256:7c2f9a3e1b8d4f6a...",
    "total": {"value": 842.17, "currency": "USD"},
    "quote_valid_until": "2026-04-15T14:52:18Z",
    "quote_signature": {
      "algorithm": "ES256",
      "key_id": "merchant-key-acme-01",
      "value": "[base64-encoded-signature]"
    }
  }
}
]]></sourcecode>
        </figure>
      </section>
      <section anchor="purchase-referencing-a-cart-digest">
        <name>PURCHASE Referencing a Cart Digest</name>
        <t>The subsequent PURCHASE invocation references the quote identifier
and carries the cart digest in the <tt>Cart-Digest</tt> header, binding the
purchase to the previously quoted cart without retransmission of
line-item detail. The merchant server <strong>MUST</strong> verify the digest
against its stored quote record and <strong>MUST</strong> reject the PURCHASE
with 409 Conflict if the cart digest does not match a valid,
unexpired quote.</t>
      </section>
    </section>
    <section anchor="discover-integration">
      <name>DISCOVER Integration</name>
      <section anchor="merchant-queries-via-discover">
        <name>Merchant Queries via DISCOVER</name>
        <t>The DISCOVER method defined in <xref target="AGTP-DISCOVER"/> is extended by this
document to optionally return Merchant Manifest Documents. A
requesting agent signals a merchant-oriented discovery query by
including the <tt>result_type</tt> parameter with value <tt>"merchant"</tt>:</t>
        <figure>
          <name>DISCOVER Query Targeting Merchants</name>
          <artwork><![CDATA[
AGTP/1.0 DISCOVER
Agent-ID: agtp://agtp.traveler.tld/agents/trip-planner
Principal-ID: usr-chris-hood
Authority-Scope: discovery:query merchant:query
Session-ID: sess-trip-2026-04
Task-ID: task-disc-merch-01
Content-Type: application/agtp+json

{
  "method": "DISCOVER",
  "task_id": "task-disc-merch-01",
  "parameters": {
    "intent": "Ski rental in Park City accepting Amex",
    "result_type": "merchant",
    "merchant_category_codes": ["7999", "5941"],
    "accepted_payment_networks": ["amex"],
    "trust_tier_min": 1,
    "governance_zone": "zone:retail-verified",
    "limit": 5
  }
}
]]></artwork>
        </figure>
        <t>The ANS or MNS server returns a ranked result set of Merchant
Manifest Documents matching the query constraints. Ranking follows
the same composite scoring model defined in <xref target="AGTP-DISCOVER"/>
Section 3.4, with the following adjustments for merchant queries:</t>
        <ul spacing="normal">
          <li>
            <t><tt>behavioral_trust_score</tt> is replaced by <tt>merchant_reliability_
score</tt>, a governance-platform-assigned score reflecting the
merchant's dispute rate, chargeback history, and fulfillment
track record within the governance zone.</t>
          </li>
          <li>
            <t><tt>capability_match_score</tt> is replaced by <tt>catalog_match_score</tt>,
a relevance score between the query intent and the merchant's
declared catalog categories and merchant category code.</t>
          </li>
        </ul>
        <t>Merchant reliability scoring methodology is governance-platform-
defined and <strong>MUST</strong> be documented in the governance zone
specification. The raw score <strong>MUST</strong> be present in the Merchant
Manifest Document and signed by the governance platform; it
<strong>MUST NOT</strong> be merchant-asserted.</t>
      </section>
      <section anchor="unified-discover-queries">
        <name>Unified DISCOVER Queries</name>
        <t>A requesting agent <strong>MAY</strong> issue a DISCOVER query with <tt>result_type:
"any"</tt> to receive a mixed result set containing both Agent Manifests
and Merchant Manifests. This is useful for workflows where the agent
does not know in advance whether the capability it needs is best
satisfied by a peer agent or by a merchant transaction (e.g., "find
a service that can produce a translated legal document" where the
answer might be either a translation agent or a document-services
merchant).</t>
        <t>Mixed result sets include a <tt>result_class</tt> field on each entry with
value <tt>"agent"</tt> or <tt>"merchant"</tt>, enabling the requesting agent to
route each result to the appropriate downstream handling.</t>
      </section>
    </section>
    <section anchor="counterparty-unverified">
      <name>455 Counterparty Unverified</name>
      <section anchor="definition">
        <name>Definition</name>
        <t>This document registers AGTP status code 455 Counterparty Unverified.
The status is returned in any of the following conditions:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>Merchant-ID</tt> request header is absent on a PURCHASE
invocation.</t>
          </li>
          <li>
            <t>The <tt>Merchant-Manifest-Fingerprint</tt> request header is absent or
does not match the receiving server's current manifest.</t>
          </li>
          <li>
            <t>The Merchant-ID does not match the receiving server's canonical
Merchant-ID.</t>
          </li>
          <li>
            <t>The agent's pre-flight counterparty verification failed (returned
by the agent's own runtime before a PURCHASE is sent on the
wire).</t>
          </li>
          <li>
            <t>The target merchant is in a non-Active lifecycle state.</t>
          </li>
          <li>
            <t>The Merchant Manifest Document signature is invalid.</t>
          </li>
        </ul>
        <t>The response body <strong>MUST</strong> identify the specific verification
failure and <strong>MUST</strong> include the governance-platform-signed reason
code. The requesting agent <strong>MUST NOT</strong> retry the PURCHASE without
re-running counterparty verification against a fresh Merchant
Manifest Document.</t>
        <t>Status code 455 is a governance signal, not a protocol error, and
<strong>MUST</strong> be logged by both parties. It parallels the role of 451
Scope Violation and 453 Zone Violation in the AGTP status code
space: the system caught a governance condition at the protocol
layer, before any state-modifying side effect.</t>
      </section>
      <section anchor="retry-semantics">
        <name>Retry Semantics</name>
        <t>A 455 response in the following categories is non-retryable without
remediation:</t>
        <ul spacing="normal">
          <li>
            <t>Merchant in Revoked or Deprecated lifecycle state.</t>
          </li>
          <li>
            <t>Invalid Merchant Manifest signature.</t>
          </li>
          <li>
            <t>Merchant-ID mismatch.</t>
          </li>
        </ul>
        <t>A 455 response in the following categories is retryable after a
governance-defined interval:</t>
        <ul spacing="normal">
          <li>
            <t>Merchant in Suspended state (retry after state transitions to
Active).</t>
          </li>
          <li>
            <t>Fingerprint mismatch due to a legitimate manifest update (retry
after re-fetching the current manifest).</t>
          </li>
        </ul>
        <t>The response body <strong>MUST</strong> declare retry-eligibility via a
<tt>retryable</tt> boolean field and, where retryable, <strong>MAY</strong> declare a
<tt>retry_after</tt> timestamp.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="merchant-identity-forgery">
        <name>Merchant Identity Forgery</name>
        <t>Threat: An attacker publishes a Merchant Manifest Document claiming
to represent a legitimate merchant under a domain the attacker does
not control.</t>
        <t>Mitigation: Trust Tier 1 registration requires DNS ownership
verification per <xref target="RFC8555"/>. The governance platform signs every
Merchant Manifest; requesting agents <strong>MUST</strong> verify the signature
against the governance platform's published key before trusting the
manifest. An unsigned manifest or one signed by an unrecognized
platform <strong>MUST</strong> be rejected. Requesting agents <strong>SHOULD</strong> maintain
a trust list of accepted governance platforms per governance zone.</t>
      </section>
      <section anchor="manifest-substitution-at-purchase">
        <name>Manifest Substitution at Purchase</name>
        <t>Threat: A requesting agent verifies Merchant Manifest A, but the
PURCHASE is received by an endpoint serving Merchant Manifest B.</t>
        <t>Mitigation: The <tt>Merchant-Manifest-Fingerprint</tt> header binds the
manifest the agent verified to the manifest the receiving server
presents. A mismatch produces 455 Counterparty Unverified. This
check is cryptographic and cannot be bypassed without compromising
the governance platform's signing key.</t>
      </section>
      <section anchor="intent-assertion-replay">
        <name>Intent Assertion Replay</name>
        <t>Threat: A captured Intent Assertion is replayed by an attacker to
authorize an unintended second purchase.</t>
        <t>Mitigation: Intent Assertions carry a unique <tt>jti</tt> and a short
<tt>exp</tt>. Receiving servers <strong>MUST</strong> record the <tt>jti</tt> in the
Attribution-Record and <strong>MUST</strong> reject any subsequent request
carrying a previously seen <tt>jti</tt>. The recommended maximum validity
is 300 seconds; implementations <strong>MAY</strong> apply shorter limits.
Governance platforms <strong>SHOULD</strong> maintain a zone-scoped cache of
consumed <tt>jti</tt> values for at least the maximum validity period.</t>
      </section>
      <section anchor="cart-digest-collision">
        <name>Cart-Digest Collision</name>
        <t>Threat: An attacker constructs a cart that produces the same digest
as a different, higher-value cart.</t>
        <t>Mitigation: The Cart-Digest algorithm <strong>MUST</strong> be a cryptographic
hash function resistant to collision attacks. SHA-256 is the
baseline requirement. The digest <strong>MUST</strong> be computed over a
canonical serialization of the cart payload to prevent ambiguity
between equivalent JSON representations.</t>
      </section>
      <section anchor="merchant-lifecycle-lag">
        <name>Merchant Lifecycle Lag</name>
        <t>Threat: A merchant is Revoked for fraud, but the Merchant Name
Service has not yet propagated the state change. A requesting agent
verifies the stale manifest and proceeds with PURCHASE.</t>
        <t>Mitigation: Governance platforms <strong>MUST</strong> propagate lifecycle state
changes to all indexing MNS servers within 60 seconds. MNS servers
<strong>MUST</strong> treat Revocation as urgent deregistration and <strong>MUST</strong>
remove the merchant from the result index before the next DISCOVER
request is processed. Requesting agents with strict assurance
requirements <strong>MAY</strong> set a maximum manifest age (e.g., re-fetch if
the manifest is older than 300 seconds) before accepting it for
PURCHASE.</t>
      </section>
      <section anchor="dispute-policy-uri-tampering">
        <name>Dispute Policy URI Tampering</name>
        <t>Threat: A merchant publishes a dispute policy URI that redirects to
a different policy after the PURCHASE is complete.</t>
        <t>Mitigation: The <tt>dispute_policy_uri</tt> field is part of the signed
Birth Certificate and is included in the signed Merchant Manifest.
Requesting agents <strong>SHOULD</strong> retrieve and hash the dispute policy
document content at verification time and include the hash in the
Attribution-Record. Any subsequent change to the policy content can
be detected by comparing the archived hash to the current content.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Merchant Manifest Documents contain legal entity information and
payment network acceptance declarations. This data is generally
considered public commercial information and does not trigger the
same privacy protections as agent or principal identity data.
However, Merchant Name Service query logs reveal which agents are
shopping for which kinds of goods and <strong>MUST</strong> be treated with the
same access controls and retention limits applied to DISCOVER query
logs under <xref target="AGTP-DISCOVER"/>.</t>
        <t>Intent Assertions contain principal identifiers, merchant
identifiers, and amount ceilings. These are transactionally
sensitive. Intent Assertions <strong>MUST</strong> be treated as confidential
transport data and <strong>MUST NOT</strong> be logged in forms accessible
outside the governance zone in which they were issued.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="status-code-registration">
        <name>Status Code Registration</name>
        <t>This document requests registration of the following status code in
the IANA Agent Transfer Protocol Status Codes registry established
by <xref target="AGTP"/> Section 8.3:</t>
        <table>
          <name>Status Code 455 Registration</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Definition</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">455</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">The merchant counterparty in a PURCHASE invocation failed identity verification: the Merchant-ID or Merchant-Manifest-Fingerprint is absent, does not match, or the merchant is in a non-Active lifecycle state. Governance signal; <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 7</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="header-field-registration">
        <name>Header Field Registration</name>
        <t>This document requests registration of the following header fields
in the IANA Agent Transfer Protocol Header Fields registry
established by <xref target="AGTP"/> Section 8.4:</t>
        <table>
          <name>Header Field Registrations</name>
          <thead>
            <tr>
              <th align="left">Header</th>
              <th align="left">Status</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Merchant-ID</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 4.1</td>
            </tr>
            <tr>
              <td align="left">Merchant-Manifest-Fingerprint</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 4.1</td>
            </tr>
            <tr>
              <td align="left">Intent-Assertion</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 5</td>
            </tr>
            <tr>
              <td align="left">Cart-Digest</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 6</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="authority-scope-domain-registration">
        <name>Authority-Scope Domain Registration</name>
        <t>This document requests the addition of the following domains to the
reserved Authority-Scope domain set defined in <xref target="AGTP"/> Appendix A:</t>
        <table>
          <name>Authority-Scope Domain Registrations</name>
          <thead>
            <tr>
              <th align="left">Domain</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">merchant</td>
              <td align="left">Merchant identity resolution and counterparty verification</td>
            </tr>
            <tr>
              <td align="left">intent</td>
              <td align="left">Intent Assertion issuance and validation</td>
            </tr>
          </tbody>
        </table>
        <t>Actions defined for these domains:</t>
        <ul spacing="normal">
          <li>
            <t><tt>merchant:query</tt> -- Resolving a Merchant URI and retrieving a
Merchant Manifest Document.</t>
          </li>
          <li>
            <t><tt>merchant:verify</tt> -- Performing counterparty verification against
a Merchant Manifest Document as part of PURCHASE pre-flight.</t>
          </li>
          <li>
            <t><tt>intent:assert</tt> -- Issuing an Intent Assertion JWT on behalf of
the principal.</t>
          </li>
        </ul>
      </section>
      <section anchor="document-type-registrations">
        <name>Document Type Registrations</name>
        <t>The following document types are defined for use with the
<tt>application/agtp+json</tt> Content-Type:</t>
        <table>
          <name>AGTP Document Type Registrations</name>
          <thead>
            <tr>
              <th align="left">Document Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">merchant-birth-certificate</td>
              <td align="left">Genesis record of a merchant entity</td>
              <td align="left">This document, Section 3.1</td>
            </tr>
            <tr>
              <td align="left">agtp-merchant-manifest</td>
              <td align="left">Wire-level merchant identity document</td>
              <td align="left">This document, Section 3.4</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="AGTP">
          <front>
            <title>Agent Transfer Protocol (AGTP)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-METHODS">
          <front>
            <title>AGTP Standard Extended Method Vocabulary</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-00"/>
        </reference>
        <reference anchor="AGTP-DISCOVER">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
      </references>
    </references>
    <?line 985?>

<section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="governance-platform-scope">
        <name>Governance Platform Scope</name>
        <t>A governance platform operating an AGTP registry <strong>MAY</strong> extend its
registry to cover both agents and merchants, or it <strong>MAY</strong> operate
separate agent and merchant registries under the same governance
zone. The registry schema for merchants is structurally parallel to
the agent registry schema, reducing implementation effort.</t>
      </section>
      <section anchor="mns-co-location">
        <name>MNS Co-location</name>
        <t>Merchant Name Service functionality <strong>MAY</strong> be co-located with an
existing Agent Name Service, particularly for governance zones
where the agent-to-merchant ratio is low. In this case, the DISCOVER
method serves both result types through the <tt>result_type</tt> parameter.
The same access control, rate limiting, and federation semantics
apply.</t>
      </section>
      <section anchor="payment-network-integration-path">
        <name>Payment Network Integration Path</name>
        <t>This specification is designed to be consumable by payment networks
without requiring those networks to implement AGTP. The Intent
Assertion is a standalone JWT verifiable with only the governance
platform's public key; the merchant identity attestation is a signed
JSON document verifiable with the same key. Payment networks wishing
to extend protection or dispute handling to agent-initiated
transactions <strong>MAY</strong> consume these artifacts as inputs to their
existing authorization and dispute message flows without protocol-
level integration with AGTP itself.</t>
        <t>The specific mapping of Intent Assertion claims to payment network
authorization message fields, and of Attribution-Record content to
dispute evidence formats, is expected to be defined bilaterally
between governance platforms and individual payment networks. Those
mappings are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author thanks the American Express Agentic Commerce Experiences
working group for public specification of the commercial requirements
that motivated this document. The structural parallelism between
agent identity and merchant identity in AGTP owes its clarity to the
Amex ACE five-service model: agent registration, account enablement,
intent intelligence, payment credentials, and cart context. This
document addresses the transport-layer identity gap that complements
the payment-rail work described there.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
