<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-agtp-identifiers-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP-IDENTIFIERS">AGTP Identifier Chain</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-agtp-identifiers-00"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="May" day="21"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>agent identity</keyword>
    <keyword>accountability</keyword>
    <keyword>audit chain</keyword>
    <keyword>chain of custody</keyword>
    <keyword>governance</keyword>
    <keyword>attribution</keyword>
    <keyword>transparency log</keyword>
    <abstract>
      <?line 96?>

<t>This document specifies the AGTP identifier chain: a layered model
of identifiers that together produce a tamper-evident chain of
custody across every action an AGTP agent takes. The chain is
composed of identifiers already established in the AGTP draft
family (Agent-ID, Owner-ID, Session-ID, Task-ID, and the
Attribution-Record envelope of base AGTP) together with a small
set of additional identifiers introduced by this document
(Request-ID, Response-ID, Action-ID, Evaluation-ID, Decision-ID,
Audit-ID). The Audit-ID is the cryptographic hash of an extended
Attribution-Record and provides the per-agent hash chain that
links every action an agent takes back to its Agent Genesis. This
document defines the identifiers, how they extend the existing
Attribution-Record envelope, the construction of the hash chain,
and the verification procedure by which a regulator, auditor, or
counterparty reconstructs the chain end to end. The identifier
chain is the regulatory backbone of AGTP. Without it, the protocol
can record that something happened but cannot prove who caused it,
what authorized it, or what was decided.</t>
    </abstract>
  </front>
  <middle>
    <?line 117?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="the-accountability-gap">
        <name>The Accountability Gap</name>
        <t>An agent that takes an action without a chain of custody is an
anonymous actor. Existing transport protocols (HTTP, gRPC, message
queues) record that a request occurred, that an action followed,
and that a log entry was written, but they cannot prove that the
specific agent that issued the request was the specific agent that
took the action, that the action was authorized by a specific
governance decision, or that the log entry was the original record
rather than a reconstruction.</t>
        <t>The accountability gap matters in three settings:</t>
        <ul spacing="normal">
          <li>
            <t>Regulatory examination under frameworks such as the EU AI Act
<xref target="EU-AI-ACT"/>, which requires that high-risk AI systems maintain
records sufficient to reconstruct the decision-making process.</t>
          </li>
          <li>
            <t>Commercial dispute resolution, where a counterparty asserts that
an agent took an action and the operator denies the binding.</t>
          </li>
          <li>
            <t>Incident response, where the operator needs to identify which
agent acted, which human is accountable, and what the governance
system decided at the moment of action.</t>
          </li>
        </ul>
        <t>AGTP closes the gap by treating the identifier chain as a
first-class protocol primitive rather than as application-level
metadata.</t>
      </section>
      <section anchor="a-layered-model-over-existing-primitives">
        <name>A Layered Model Over Existing Primitives</name>
        <t>The identifiers defined by this document are not new inventions.
The AGTP draft family already provides most of them. Agent-ID is
defined in <xref target="AGTP"/> and derived from the Agent Genesis per
<xref target="AGTP-LOG"/>. Owner-ID resolves to the principal recorded in the
Agent Genesis. Session-ID is defined in <xref target="AGTP"/> and given
session semantics by <xref target="AGTP-SESSION"/>. Task-ID is defined in
<xref target="AGTP"/> for workflow correlation. The Attribution-Record
envelope is defined in <xref target="AGTP"/> and already carries server
identity, timestamp, request hash, and response status as a
JWS-signed attestation on every response.</t>
        <t>What this document adds is the connective layer:</t>
        <ul spacing="normal">
          <li>
            <t>A small set of additional identifiers (Request-ID, Response-ID,
Action-ID, Evaluation-ID, Decision-ID) that extend the
Attribution-Record envelope to record the per-interaction and
governance-evaluation events that base AGTP does not yet
capture by themselves.</t>
          </li>
          <li>
            <t>The Audit-ID, defined as the cryptographic hash of the canonical
extended Attribution-Record. The Audit-ID is the identifier of
the audit record itself.</t>
          </li>
          <li>
            <t>The per-agent hash chain. Each Attribution-Record an agent emits
carries the Audit-ID of the agent's immediately preceding
Attribution-Record. The chain is the agent's accountability
trail.</t>
          </li>
        </ul>
        <t>This document does not introduce a new transparency log. The
identity-lifecycle transparency log defined in <xref target="AGTP-LOG"/>
records Agent Genesis issuance and lifecycle events; this document
operates against the per-response Attribution-Record envelope of
<xref target="AGTP"/>. The two are complementary records of different concerns.</t>
      </section>
      <section anchor="identifier-layers">
        <name>Identifier Layers</name>
        <t>The identifier chain is organized into four layers, plus the
Audit-ID that anchors them:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Persistent identifiers</strong> are established at agent provisioning
and remain stable for the agent's operational lifetime: Agent-ID
and Owner-ID.</t>
          </li>
          <li>
            <t><strong>Context identifiers</strong> group multiple interactions under a
shared operational context: Session-ID and Task-ID.</t>
          </li>
          <li>
            <t><strong>Per-interaction identifiers</strong> are minted at the moment of each
interaction and bind the request, the response, and the action
taken: Request-ID, Response-ID, and Action-ID.</t>
          </li>
          <li>
            <t><strong>Governance identifiers</strong> record the evaluation that authorized
the action and the specific verdict produced: Evaluation-ID and
Decision-ID.</t>
          </li>
        </ul>
        <t>The Audit-ID is the chain anchor that binds all of the above into
a single verifiable artifact at each action.</t>
        <t>The layer model is logical: it describes the role each identifier
plays in the accountability chain. The cryptographic binding that
makes the chain tamper-evident is established inside the extended
Attribution-Record JWS, where every identifier present is signed
together with the agent's preceding Audit-ID. An identifier that
appears in an Attribution-Record but cannot be linked to the
records it claims to depend on (an Action-ID without its
Evaluation-ID and Decision-ID, an Audit-ID whose
<tt>previous_audit_id</tt> references no known predecessor) is a chain
break and <bcp14>SHALL</bcp14> be treated as evidence of forgery or omission.</t>
      </section>
      <section anchor="relationship-to-the-agtp-draft-family">
        <name>Relationship to the AGTP Draft Family</name>
        <t>This document is the connective specification across the AGTP
draft family. It does not replace any existing draft.</t>
        <ul spacing="normal">
          <li>
            <t><xref target="AGTP"/> provides the Attribution-Record envelope, the Agent-ID,
Session-ID, and Task-ID headers, and the manifest signing
infrastructure on which Attribution-Records are signed.</t>
          </li>
          <li>
            <t><xref target="AGTP-TRUST"/> populates the Evaluation-ID record with the
trust tier, verification path, trust score, and dimensional
scoring defined there. Trust scoring is one set of dimensions
within a governance evaluation.</t>
          </li>
          <li>
            <t><xref target="AGTP-LOG"/> records identity-lifecycle events (Agent Genesis
issuance, revocation, suspension, reinstatement, deprecation).
Audit-IDs link to identity-lifecycle events when an agent's
identity state changes, but Audit-IDs themselves are not
committed to the AGTP-LOG transparency log.</t>
          </li>
          <li>
            <t><xref target="AGTP-CERT"/> carries the Agent-ID in the <tt>subject-agent-id</tt>
X.509 v3 extension. The Agent Certificate's TLS binding makes
the wire identity verifiable at the transport layer.</t>
          </li>
          <li>
            <t><xref target="AGTP-MERCHANT"/> already specifies that the Attribution-Record
on a PURCHASE response carries <tt>merchant_id</tt>,
<tt>merchant_fingerprint</tt>, and <tt>intent_assertion_jti</tt> fields. This
document specifies how those merchant-specific fields coexist
with the identifier chain fields in the same extended
Attribution-Record.</t>
          </li>
          <li>
            <t><xref target="AGTP-SESSION"/> introduces ESTABLISH semantics for Session-ID.
This document treats Session-ID as a context identifier within
the chain.</t>
          </li>
        </ul>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the following terms.</t>
      <dl>
        <dt>Identifier Chain:</dt>
        <dd>
          <t>The ordered set of identifiers defined by this document
(Agent-ID, Owner-ID, Session-ID, Task-ID, Request-ID,
Response-ID, Evaluation-ID, Action-ID, Decision-ID, Audit-ID)
that together constitute a verifiable record of an agent action.</t>
        </dd>
        <dt>Persistent Identifier:</dt>
        <dd>
          <t>An identifier whose value is established at agent provisioning
and remains stable for the agent's operational lifetime. Agent-ID
and Owner-ID are persistent identifiers.</t>
        </dd>
        <dt>Context Identifier:</dt>
        <dd>
          <t>An identifier that groups multiple per-interaction events under
a shared operational context. Session-ID and Task-ID are context
identifiers.</t>
        </dd>
        <dt>Per-Interaction Identifier:</dt>
        <dd>
          <t>An identifier minted at the moment of a specific interaction.
Request-ID, Response-ID, and Action-ID are per-interaction
identifiers.</t>
        </dd>
        <dt>Governance Identifier:</dt>
        <dd>
          <t>An identifier minted by a governance evaluation. Evaluation-ID
and Decision-ID are governance identifiers.</t>
        </dd>
        <dt>Audit-ID:</dt>
        <dd>
          <t>The cryptographic hash of the canonical extended
Attribution-Record, computed as specified in
<xref target="audit-id-construction"/>. The Audit-ID is the identifier of a
single audit record and the chain anchor that links the record
to the predecessor record in the agent's hash chain.</t>
        </dd>
        <dt>Extended Attribution-Record:</dt>
        <dd>
          <t>The base AGTP Attribution-Record JWS envelope, augmented with
the identifier-chain fields specified by this document. The
extension is additive; existing Attribution-Record consumers
remain conformant.</t>
        </dd>
        <dt>Chain Link:</dt>
        <dd>
          <t>A cryptographic binding between two identifiers such that the
successor identifier commits to the predecessor identifier. A
chain link is established by including the predecessor
identifier in the canonical input over which the successor
identifier is computed or signed.</t>
        </dd>
        <dt>Chain Break:</dt>
        <dd>
          <t>A condition in which an identifier in the chain cannot be linked
to its predecessor. A chain break voids the audit value of the
record and <bcp14>SHALL</bcp14> be treated as evidence of forgery or omission.</t>
        </dd>
      </dl>
    </section>
    <section anchor="stack-overview">
      <name>Identifier Stack Overview</name>
      <t>The identifier chain is layered. Each identifier captures
accountability for the moment it represents. The diagram below
shows the relationship.</t>
      <artwork><![CDATA[
Agent Genesis (signed document, per AGTP-LOG)
   │
   └──hash──►  Agent-ID (persistent, wire header)
                  │
                  └──recorded in Genesis──►  Owner-ID (persistent)
                                                  │
                                                  │  per session (AGTP-SESSION):
                                                  ▼
                                          Session-ID (context, wire header)
                                                  │
                                                  │  per task (AGTP):
                                                  ▼
                                          Task-ID (context, wire header)
                                                  │
                                                  │  per interaction:
                                                  ▼
            Request-ID (minted by caller, wire header)
                  │
                  ├──response──►  Response-ID (wire header)
                  │                  │
                  │                  ▼
                  │           Evaluation-ID (governance event)
                  │                  │
                  │                  └──verdict──►  Decision-ID
                  │                                    │
                  │                                    ▼
                  └────────────action────────────►  Action-ID
                                                       │
                                                       ▼
                  All of the above, plus the previous
                  Audit-ID for this agent, are signed
                  together as the Extended Attribution-Record:
                                                       │
                                                       └──hash──►  Audit-ID
                                                                      │
                                                                      └──wire header
                                                                          and chain link
]]></artwork>
      <t>The chain reads top to bottom. Agent-ID is the foundational
identifier from which the accountability chain originates. The
Audit-ID is the per-action hash that closes the chain and links
to the agent's previous action.</t>
    </section>
    <section anchor="persistent-identifiers">
      <name>Persistent Identifiers</name>
      <section anchor="agent-id">
        <name>Agent-ID</name>
        <t>Agent-ID is the foundational identifier of the chain. It is the
256-bit cryptographic hash of the agent's Agent Genesis document,
as defined by the Agent Identity Taxonomy in <xref target="AGTP-LOG"/>.
Agent-ID is permanent for the operational lifetime of the agent;
revocation produces a <tt>revoked</tt> state in the registry but does
not retire or reissue the identifier.</t>
        <t>Agent-ID <bcp14>MUST</bcp14> be:</t>
        <ul spacing="normal">
          <li>
            <t>Derived from the Agent Genesis via the procedure specified in
<xref target="AGTP-LOG"/>:
<tt>agent_id = sha256(canonical_json(agent_genesis))</tt>.</t>
          </li>
          <li>
            <t>Rendered on the wire as 64 lowercase hexadecimal characters.</t>
          </li>
          <li>
            <t>Carried in the <tt>Agent-ID</tt> request header on every AGTP request,
per <xref target="AGTP"/>. Responses carry the responding agent's identity
in the <tt>Server-ID</tt> header rather than echoing the requester's
<tt>Agent-ID</tt>.</t>
          </li>
          <li>
            <t>Resolvable to an Agent Identity Document by any AGTP-aware
infrastructure component, via the resolution mechanics
specified in <xref target="AGTP"/>.</t>
          </li>
        </ul>
        <t>Agent-ID identifies who the actor is throughout the agent's
operational lifetime. Every subsequent identifier in the chain
links back to Agent-ID. An action whose Agent-ID cannot be
resolved is an anonymous action and <bcp14>SHALL</bcp14> be refused by
AGTP-aware infrastructure.</t>
      </section>
      <section anchor="owner-id">
        <name>Owner-ID</name>
        <t>Owner-ID is the identifier of the human or organizational
principal accountable for the agent. Owner-ID is bound to
Agent-ID at provisioning and recorded in the Agent Genesis
document. The binding is asserted by the governance platform that
issued the Agent Genesis and is verifiable through the signature
on the Genesis document.</t>
        <t>Owner-ID <bcp14>MUST</bcp14> be:</t>
        <ul spacing="normal">
          <li>
            <t>Present in the Agent Genesis document as the <tt>owner_id</tt> field.</t>
          </li>
          <li>
            <t>Carried in the <tt>Owner-ID</tt> request header on every AGTP request,
alongside the <tt>Agent-ID</tt> header.</t>
          </li>
          <li>
            <t>Resolvable to an Owner Identity Document that records the legal
identity of the principal (a natural person, a registered
organization, or a legal entity recognized by the governance
platform's jurisdiction).</t>
          </li>
          <li>
            <t>Stable for the operational lifetime of the agent. Ownership
transfer requires reissuance of the Agent Genesis and produces
a new Agent-ID.</t>
          </li>
        </ul>
        <t>Owner-ID <bcp14>MAY</bcp14> use any identifier scheme the governance platform
recognizes: a national identity number where lawful, a registered
organization number, a DID, or a platform-issued identifier. The
identifier scheme <bcp14>MUST</bcp14> be declared in the Owner Identity Document
under the <tt>id_scheme</tt> field.</t>
        <t>An Agent-ID without a resolvable Owner-ID lacks an accountability
terminus and <bcp14>SHALL</bcp14> be treated as a Tier 3 (Experimental) agent
per <xref target="AGTP-TRUST"/>, regardless of any other trust signals it
carries.</t>
      </section>
      <section anchor="why-both-identifiers-are-required">
        <name>Why Both Identifiers Are Required</name>
        <t>Agent-ID answers the question "what acted." Owner-ID answers the
question "who is responsible." A regulatory examination that asks
"who is liable for this action" requires both. An incident
response that asks "which human do we contact" requires
Owner-ID. A counterparty that asks "is this agent who it claims
to be" requires Agent-ID.</t>
        <t>The two identifiers <bcp14>MUST</bcp14> appear together on every request. A
request carrying Agent-ID without Owner-ID is a malformed AGTP
request and <bcp14>SHALL</bcp14> be refused with status 400 Bad Request.</t>
      </section>
    </section>
    <section anchor="context-identifiers">
      <name>Context Identifiers</name>
      <section anchor="session-id">
        <name>Session-ID</name>
        <t>Session-ID identifies a logical context shared between two or
more AGTP participants under which multiple method invocations
are correlated. Session-ID is defined as a request header by
<xref target="AGTP"/> and given establishment semantics by <xref target="AGTP-SESSION"/>.</t>
        <t>For the purposes of the identifier chain:</t>
        <ul spacing="normal">
          <li>
            <t>Session-ID <bcp14>MAY</bcp14> be absent. Many agent interactions are
single-method exchanges that have no session context.</t>
          </li>
          <li>
            <t>When present, Session-ID <bcp14>MUST</bcp14> be carried on every request and
response within the session, per <xref target="AGTP-SESSION"/>.</t>
          </li>
          <li>
            <t>Session-ID <bcp14>MUST</bcp14> be included in the extended Attribution-Record
when present on the request that triggered the response.</t>
          </li>
        </ul>
        <t>A session collects multiple Request-ID, Response-ID, and
Action-ID triples under one operational context. The session is
not itself an action; it is the context within which actions
occur.</t>
      </section>
      <section anchor="task-id">
        <name>Task-ID</name>
        <t>Task-ID identifies a specific task or operation that spans
multiple requests, typically within a workflow that involves
multiple agents or services. Task-ID is defined as a request and
response header by <xref target="AGTP"/>.</t>
        <t>For the purposes of the identifier chain:</t>
        <ul spacing="normal">
          <li>
            <t>Task-ID <bcp14>MAY</bcp14> be absent. Many actions are not part of a
multi-request task.</t>
          </li>
          <li>
            <t>When present, Task-ID <bcp14>MUST</bcp14> be carried on every request and
response that participates in the task, per <xref target="AGTP"/>.</t>
          </li>
          <li>
            <t>Task-ID <bcp14>MUST</bcp14> be included in the extended Attribution-Record
when present on the request that triggered the response.</t>
          </li>
        </ul>
        <t>Task-ID and Session-ID are independent. A long session may
contain multiple discrete tasks. A single task may span multiple
sessions if the workflow requires it. The two identifiers <bcp14>MAY</bcp14>
both be present on the same request.</t>
      </section>
    </section>
    <section anchor="per-interaction-identifiers">
      <name>Per-Interaction Identifiers</name>
      <section anchor="request-id">
        <name>Request-ID</name>
        <t>Request-ID captures the initiation of a specific interaction.
When an agent issues a request to a tool, an API, another agent,
or a service, the caller <bcp14>MUST</bcp14> mint a Request-ID and include it
on the outbound request.</t>
        <t>Request-ID <bcp14>MUST</bcp14> be:</t>
        <ul spacing="normal">
          <li>
            <t>A UUIDv7 per <xref target="RFC9562"/> or a ULID rendered as 26 base32
characters, selected at the caller's discretion. Both schemes
provide monotonic ordering and high collision resistance.</t>
          </li>
          <li>
            <t>Minted by the calling agent, not by the server. Server-minted
identifiers break the causal chain because the caller cannot
prove it issued the request before the server received it.</t>
          </li>
          <li>
            <t>Carried in the <tt>Request-ID</tt> request header.</t>
          </li>
          <li>
            <t>Unique within the caller's identifier space for the lifetime
of the calling agent. Collisions across agents are tolerated;
collisions within an agent's own request space are a
conformance failure.</t>
          </li>
        </ul>
        <t>The Request-ID enables tracing an action back to its origin. An
audit trail that records an action but cannot identify the
request that initiated it cannot survive examination. Without
Request-ID, the record shows that something happened but not
what initiated it.</t>
      </section>
      <section anchor="response-id">
        <name>Response-ID</name>
        <t>Response-ID links the response to the request that generated it.
The responding agent <bcp14>MUST</bcp14> mint a Response-ID and include it on
the outbound response.</t>
        <t>Response-ID <bcp14>MUST</bcp14> be:</t>
        <ul spacing="normal">
          <li>
            <t>A UUIDv7 or ULID, with the same construction rules as
Request-ID.</t>
          </li>
          <li>
            <t>Minted by the responding agent.</t>
          </li>
          <li>
            <t>Carried in the <tt>Response-ID</tt> response header.</t>
          </li>
          <li>
            <t>Paired with the corresponding Request-ID by echoing the
request's <tt>Request-ID</tt> header on the response, following the
same echo convention <xref target="AGTP"/> uses for <tt>Task-ID</tt>. The
responding agent <bcp14>SHOULD</bcp14> echo <tt>Request-ID</tt> unchanged in the
response.</t>
          </li>
        </ul>
        <t>Without Response-ID, the audit trail can show that a request was
made and that an action followed, but cannot prove that the
specific response to the specific request was what drove the
action. The linkage between what the agent received and what it
did next requires both identifiers to be present.</t>
      </section>
      <section anchor="action-id">
        <name>Action-ID</name>
        <t>Action-ID captures the specific action taken. An agent may take
multiple actions within a session or task; each action <bcp14>MUST</bcp14> have
its own Action-ID to be separately traceable.</t>
        <t>Action-ID <bcp14>MUST</bcp14> be:</t>
        <ul spacing="normal">
          <li>
            <t>Minted by the agent at the moment of action.</t>
          </li>
          <li>
            <t>A UUIDv7 or ULID, with the same construction rules as
Request-ID.</t>
          </li>
          <li>
            <t>Carried as the <tt>action_id</tt> field in the extended
Attribution-Record. Action-ID <bcp14>MAY</bcp14> also be carried on the wire
as the <tt>Action-ID</tt> response header for client convenience.</t>
          </li>
          <li>
            <t>Co-located with the Request-ID that initiated the action and
the Response-ID that informed it inside the same extended
Attribution-Record JWS. The JWS signature binds all three
identifiers together as a single signed unit.</t>
          </li>
        </ul>
        <t>Action-ID <bcp14>MUST</bcp14> be present in the extended Attribution-Record for
any method that produces state change, including (but not limited
to) EXECUTE, DELEGATE, ESCALATE, CONFIRM, SUSPEND, PURCHASE, and
the identity-lifecycle methods that trigger AGTP-LOG events
(ACTIVATE, REVOKE, REINSTATE, DEPRECATE per <xref target="AGTP-LOG"/>).
Action-ID <bcp14>MAY</bcp14> be absent for cognitive methods (QUERY, DISCOVER,
DESCRIBE, SUMMARIZE, PLAN, PROPOSE) that return information
without recording an action in the accountability sense; the
Attribution-Record is still emitted but the <tt>action_id</tt> field is
omitted.</t>
      </section>
    </section>
    <section anchor="governance-identifiers">
      <name>Governance Identifiers</name>
      <section anchor="evaluation-id">
        <name>Evaluation-ID</name>
        <t>Evaluation-ID is the identifier for the governance evaluation
applied before an action proceeded. This is the record of the
evaluation event, distinct from the verdict that the evaluation
produced.</t>
        <t>Evaluation-ID <bcp14>MUST</bcp14> be:</t>
        <ul spacing="normal">
          <li>
            <t>Minted by the governance system at the moment the evaluation
begins.</t>
          </li>
          <li>
            <t>A UUIDv7 or ULID.</t>
          </li>
          <li>
            <t>Carried as the <tt>evaluation_id</tt> field in the extended
Attribution-Record.</t>
          </li>
          <li>
            <t>Resolvable to an Evaluation Record per
<xref target="evaluation-record"/> that captures the inputs evaluated, the
dimensional scores computed, the confidence level, and the
verdict produced.</t>
          </li>
        </ul>
        <section anchor="evaluation-record">
          <name>Evaluation Record</name>
          <t>The Evaluation Record is held by the governance platform that
performed the evaluation. The Evaluation Record <bcp14>SHALL</bcp14> contain:</t>
          <ul spacing="normal">
            <li>
              <t><tt>evaluation_id</tt> (this identifier).</t>
            </li>
            <li>
              <t><tt>agent_id</tt> (the agent being evaluated).</t>
            </li>
            <li>
              <t><tt>owner_id</tt> (the owner accountable for the agent).</t>
            </li>
            <li>
              <t><tt>request_id</tt> (the request that triggered the evaluation).</t>
            </li>
            <li>
              <t><tt>contract_id</tt> (the identifier of the governance contract or
policy in effect at the time of evaluation; the contract scheme
is operator-defined and tracked as an Open Item in this
revision).</t>
            </li>
            <li>
              <t><tt>inputs</tt> (a canonical representation of the inputs evaluated,
with PII redacted per the governance platform's policy).</t>
            </li>
            <li>
              <t><tt>dimension_scores</tt> (a map of dimension names to scores, per
<xref target="AGTP-TRUST"/>).</t>
            </li>
            <li>
              <t><tt>confidence</tt> (a scalar in the range 0.0 to 1.0 expressing the
evaluator's confidence in its dimensional measurements).</t>
            </li>
            <li>
              <t><tt>timestamp_start</tt> (RFC 3339 timestamp of evaluation
initiation).</t>
            </li>
            <li>
              <t><tt>timestamp_end</tt> (RFC 3339 timestamp of evaluation completion).</t>
            </li>
          </ul>
          <t>The Evaluation Record is signed by the governance platform's key
and stored in the governance platform's evaluation store. The
Attribution-Record references the Evaluation Record by
<tt>evaluation_id</tt>; the full Evaluation Record is retrievable
out-of-band via the governance platform's evaluation lookup
endpoint.</t>
          <t>An audit trail without Evaluation-IDs records what happened but
cannot prove that a governance evaluation occurred. Under the EU
AI Act and similar regimes, the absence of an Evaluation-ID for
a high-risk action is itself a compliance failure.</t>
        </section>
      </section>
      <section anchor="decision-id">
        <name>Decision-ID</name>
        <t>Decision-ID captures the governance verdict specifically. The
Evaluation-ID covers the full evaluation process; the
Decision-ID is the output of that process.</t>
        <t>Decision-ID <bcp14>MUST</bcp14> be:</t>
        <ul spacing="normal">
          <li>
            <t>Minted by the governance system at the moment the verdict is
produced.</t>
          </li>
          <li>
            <t>A UUIDv7 or ULID.</t>
          </li>
          <li>
            <t>Carried as the <tt>decision_id</tt> field in the extended
Attribution-Record.</t>
          </li>
          <li>
            <t>Linked to the Evaluation-ID that produced it via the
<tt>evaluation_id</tt> field in the Decision Record.</t>
          </li>
        </ul>
        <section anchor="decision-record">
          <name>Decision Record</name>
          <t>The Decision Record is held by the governance platform that
produced the verdict. The Decision Record <bcp14>SHALL</bcp14> contain:</t>
          <ul spacing="normal">
            <li>
              <t><tt>decision_id</tt> (this identifier).</t>
            </li>
            <li>
              <t><tt>evaluation_id</tt> (the evaluation that produced this decision).</t>
            </li>
            <li>
              <t><tt>verdict</tt> (one of <tt>permit</tt>, <tt>deny</tt>, <tt>permit-with-conditions</tt>,
<tt>defer</tt>).</t>
            </li>
            <li>
              <t><tt>reasoning</tt> (a structured record of the reasoning that
produced the verdict, in a format the governance platform
defines).</t>
            </li>
            <li>
              <t><tt>conditions</tt> (when verdict is <tt>permit-with-conditions</tt>, the
conditions under which the permit applies).</t>
            </li>
            <li>
              <t><tt>timestamp</tt> (RFC 3339 timestamp of verdict issuance).</t>
            </li>
            <li>
              <t><tt>valid_until</tt> (RFC 3339 timestamp after which the decision
<bcp14>MUST</bcp14> be re-evaluated; absent for one-shot decisions).</t>
            </li>
          </ul>
          <t>The Decision Record is signed by the governance platform's key
and stored in the governance platform's decision store. As with
Evaluation Records, the Attribution-Record references the
Decision Record by <tt>decision_id</tt>; the full record is retrievable
out-of-band.</t>
          <t>The Decision-ID is what makes the verdict independently
auditable. A regulator or attorney requesting the governance
decision for a specific action <bcp14>MUST</bcp14> be able to retrieve the
Decision-ID and read the full reasoning record that produced it.</t>
        </section>
        <section anchor="separation-of-evaluation-and-decision">
          <name>Separation of Evaluation and Decision</name>
          <t>Evaluation-ID and Decision-ID are separate identifiers because
the two concepts are auditable separately. A regulator may ask
"show me the inputs to the evaluation" (Evaluation Record) or
"show me the verdict and the reasoning" (Decision Record). The
governance platform <bcp14>MAY</bcp14> produce multiple Decision Records from a
single Evaluation Record (for example, when a deferred decision
is later resolved); each Decision Record references the same
Evaluation-ID via the <tt>evaluation_id</tt> field.</t>
        </section>
      </section>
    </section>
    <section anchor="audit-identifier-and-the-attribution-record-chain">
      <name>Audit Identifier and the Attribution-Record Chain</name>
      <section anchor="audit-id">
        <name>Audit-ID</name>
        <t>Audit-ID is the cryptographic hash of the canonical extended
Attribution-Record. It is the identifier of a single audit
record and the chain anchor that links the record to the
agent's preceding audit record.</t>
        <t>Audit-ID <bcp14>MUST</bcp14> be:</t>
        <ul spacing="normal">
          <li>
            <t>A 256-bit value rendered as 64 lowercase hexadecimal
characters.</t>
          </li>
          <li>
            <t>Computed as the SHA-256 hash of the canonical extended
Attribution-Record JWS, per <xref target="audit-id-construction"/>.</t>
          </li>
          <li>
            <t>Carried on the wire as the <tt>Audit-ID</tt> response header on every
response that carries an Attribution-Record.</t>
          </li>
          <li>
            <t>Included as the <tt>previous_audit_id</tt> field in the agent's next
emitted Attribution-Record, completing the chain link.</t>
          </li>
        </ul>
      </section>
      <section anchor="extension-to-the-base-attribution-record">
        <name>Extension to the Base Attribution-Record</name>
        <t>The base Attribution-Record envelope defined by <xref target="AGTP"/> is a
JWS-signed token carrying server identity, response timestamp,
request hash, and response status. This document extends the
Attribution-Record payload with the identifier-chain fields. The
extension is additive: existing Attribution-Record consumers
remain conformant, and the JWS signature continues to cover the
full extended payload.</t>
        <t>The extended Attribution-Record payload contains the following
identifier-chain fields:</t>
        <table anchor="extended-record-fields">
          <name>Identifier-Chain Fields in the Extended Attribution-Record</name>
          <thead>
            <tr>
              <th align="left">Field</th>
              <th align="left">Type</th>
              <th align="left">Required</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>agent_id</tt></td>
              <td align="left">string</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">Acting agent's 64-hex Agent-ID</td>
            </tr>
            <tr>
              <td align="left">
                <tt>owner_id</tt></td>
              <td align="left">string</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">Owner identifier per <xref target="owner-id"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>session_id</tt></td>
              <td align="left">string</td>
              <td align="left">conditional</td>
              <td align="left">Present when the request carried Session-ID</td>
            </tr>
            <tr>
              <td align="left">
                <tt>task_id</tt></td>
              <td align="left">string</td>
              <td align="left">conditional</td>
              <td align="left">Present when the request carried Task-ID</td>
            </tr>
            <tr>
              <td align="left">
                <tt>request_id</tt></td>
              <td align="left">string</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">Request-ID of the request being responded to</td>
            </tr>
            <tr>
              <td align="left">
                <tt>response_id</tt></td>
              <td align="left">string</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">Response-ID of this response</td>
            </tr>
            <tr>
              <td align="left">
                <tt>action_id</tt></td>
              <td align="left">string</td>
              <td align="left">conditional</td>
              <td align="left">Present for action-recording methods</td>
            </tr>
            <tr>
              <td align="left">
                <tt>evaluation_id</tt></td>
              <td align="left">string</td>
              <td align="left">conditional</td>
              <td align="left">Present when governance evaluation occurred</td>
            </tr>
            <tr>
              <td align="left">
                <tt>decision_id</tt></td>
              <td align="left">string</td>
              <td align="left">conditional</td>
              <td align="left">Present when governance decision was rendered</td>
            </tr>
            <tr>
              <td align="left">
                <tt>previous_audit_id</tt></td>
              <td align="left">string</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">The agent's preceding Audit-ID, or 64 zeros for the first record</td>
            </tr>
            <tr>
              <td align="left">
                <tt>audit_record_version</tt></td>
              <td align="left">string</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">This document's version: <tt>"1"</tt></td>
            </tr>
          </tbody>
        </table>
        <t>These fields coexist with merchant-specific fields specified by
<xref target="AGTP-MERCHANT"/> (<tt>merchant_id</tt>, <tt>merchant_fingerprint</tt>,
<tt>intent_assertion_jti</tt>), with the base Attribution-Record fields
from <xref target="AGTP"/>, and with any other companion-draft extensions to
the Attribution-Record payload.</t>
      </section>
      <section anchor="audit-id-construction">
        <name>Audit-ID Construction</name>
        <t>The Audit-ID is computed as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>The responding agent assembles the extended
Attribution-Record payload as a JSON object containing the
base AGTP fields, the identifier-chain fields from
<xref target="extended-record-fields"/>,
and any other companion-draft extensions applicable to the
response.</t>
          </li>
          <li>
            <t>The payload is signed using the responding agent's manifest
signing key per <xref target="AGTP"/>. The result is the JWS that the
<tt>Attribution-Record</tt> response header carries.</t>
          </li>
          <li>
            <t>The Audit-ID is computed as
<tt>audit_id = sha256(jws_compact_serialization)</tt>, where
<tt>jws_compact_serialization</tt> is the full JWS compact form
(header.payload.signature, base64url-encoded per <xref target="RFC7515"/>).</t>
          </li>
          <li>
            <t>The responding agent stores the Audit-ID in its local audit
store, indexed by <tt>agent_id</tt> and ordered by emission time.
The same Audit-ID becomes the <tt>previous_audit_id</tt> value in
the agent's next emitted Attribution-Record.</t>
          </li>
        </ol>
        <t>The hash covers the full signed JWS, not the JSON payload. This
ensures that any modification of the signature, the protected
header, or the payload invalidates the Audit-ID.</t>
      </section>
      <section anchor="the-per-agent-hash-chain">
        <name>The Per-Agent Hash Chain</name>
        <t>Each agent maintains a hash chain over its own emitted
Attribution-Records. The chain has the following properties:</t>
        <ul spacing="normal">
          <li>
            <t>The chain head is the first Attribution-Record the agent ever
emits. Its <tt>previous_audit_id</tt> is 64 hex zeros.</t>
          </li>
          <li>
            <t>Each subsequent Attribution-Record carries the Audit-ID of the
immediately preceding Attribution-Record this agent emitted in
its <tt>previous_audit_id</tt> field.</t>
          </li>
          <li>
            <t>Tampering with any record in the chain invalidates the
<tt>previous_audit_id</tt> chain link for every record that follows
it, and invalidates the JWS signature on the tampered record.</t>
          </li>
        </ul>
        <t>The chain is scoped per agent. An agent's chain is independent
of any other agent's chain. A verifier reconstructing one
agent's actions follows only that agent's chain.</t>
        <t>The agent is responsible for maintaining chain integrity. An
agent that emits an Attribution-Record without setting
<tt>previous_audit_id</tt> correctly produces a chain break and <bcp14>SHALL</bcp14>
have its Tier 1 verification status revoked per <xref target="AGTP-TRUST"/>.</t>
      </section>
      <section anchor="cross-agent-chain-linkage">
        <name>Cross-Agent Chain Linkage</name>
        <t>A single action sometimes references actions taken by other
agents. A delegation chain in which Agent C delegates to Agent A,
which delegates to Agent B, produces three distinct per-agent
chains. Each agent maintains its own chain; cross-agent
references link them where required.</t>
        <t>When the action recorded in an Attribution-Record depends on or
continues an action recorded by a different agent, the extended
Attribution-Record <bcp14>MUST</bcp14> include a <tt>prior_actions</tt> array. Each
entry is a tuple of the form:</t>
        <artwork><![CDATA[
{
  "agent_id": "<64 hex>",
  "audit_id": "<64 hex>"
}
]]></artwork>
        <t>A verifier traversing the chain <bcp14>MAY</bcp14> use <tt>prior_actions</tt> entries
to walk into other agents' chains. Resolution of a <tt>prior_actions</tt>
entry uses the standard Agent-ID resolution path: Agent-ID
resolves to the Agent Genesis per <xref target="AGTP-LOG"/>, the Genesis names
the governance platform that issued it, and the Audit-ID is
retrievable from that platform's audit infrastructure for that
agent. No additional wire identifier is required to locate the
referenced record.</t>
        <t>The combination of per-agent chains and <tt>prior_actions</tt> references
produces a verifiable global graph of action provenance. A
regulator examining an incident <bcp14>MAY</bcp14> traverse the graph from any
terminal Audit-ID back to the originating Agent Genesis through
as many agents as the action involved.</t>
      </section>
      <section anchor="field-population-rules">
        <name>Field Population Rules</name>
        <t>The following fields <bcp14>MAY</bcp14> be absent under specific conditions:</t>
        <ul spacing="normal">
          <li>
            <t><tt>evaluation_id</tt> and <tt>decision_id</tt> <bcp14>MAY</bcp14> be absent for actions
taken under standing authorization (a previously issued
<tt>permit-with-conditions</tt> decision still within its
<tt>valid_until</tt> window). In that case the extended
Attribution-Record <bcp14>MUST</bcp14> include a
<tt>standing_authorization_decision_id</tt> field pointing to the
Decision-ID that authorized the action.</t>
          </li>
          <li>
            <t><tt>action_id</tt> <bcp14>MAY</bcp14> be absent for cognitive methods that do not
record actions, as specified in <xref target="action-id"/>.</t>
          </li>
          <li>
            <t><tt>session_id</tt> <bcp14>MAY</bcp14> be absent when the request was not part of a
session.</t>
          </li>
          <li>
            <t><tt>task_id</tt> <bcp14>MAY</bcp14> be absent when the request was not part of a
multi-request task.</t>
          </li>
          <li>
            <t>All other fields <bcp14>MUST</bcp14> be present. A field that <bcp14>MUST</bcp14> be present
but is absent constitutes a chain break.</t>
          </li>
        </ul>
      </section>
      <section anchor="verification-procedure">
        <name>Verification Procedure</name>
        <t>A verifier reconstructs the chain by:</t>
        <ol spacing="normal" type="1"><li>
            <t>Retrieving the terminal Audit-ID from the agent's audit
store or from a counterparty's record of the
Attribution-Record it received.</t>
          </li>
          <li>
            <t>Fetching the full Attribution-Record JWS and verifying its
hash matches the Audit-ID.</t>
          </li>
          <li>
            <t>Verifying the JWS signature against the responding agent's
manifest signing key, per <xref target="AGTP"/>.</t>
          </li>
          <li>
            <t>Following <tt>previous_audit_id</tt> backwards through the agent's
chain, verifying each hash and each signature, until the
chain head is reached.</t>
          </li>
          <li>
            <t>When the Attribution-Record carries a <tt>prior_actions</tt> array,
resolving each <tt>{agent_id, audit_id}</tt> tuple via the standard
Agent-ID resolution path and verifying the referenced
Attribution-Record by the same procedure recursively.</t>
          </li>
          <li>
            <t>For each Attribution-Record, retrieving the referenced
Evaluation Record and Decision Record from the governance
platform and verifying each is signed by the appropriate
governance platform key.</t>
          </li>
          <li>
            <t>Confirming the Agent-ID resolves to a valid Agent Genesis
per <xref target="AGTP-LOG"/>, that the Owner-ID matches the Genesis's
<tt>owner_id</tt> field, and that the agent's identity state at the
time of each Attribution-Record was consistent with the
action recorded (the agent was not <tt>revoked</tt> or <tt>suspended</tt>
at the time of action).</t>
          </li>
          <li>
            <t>Confirming all timestamps are monotonically consistent
(Request-ID timestamp precedes Response-ID timestamp, which
precedes or is concurrent with Action-ID timestamp, with
Evaluation and Decision timestamps before Action-ID).</t>
          </li>
        </ol>
        <t>A verification failure at any step is a chain break and
invalidates the audit value of the record.</t>
      </section>
    </section>
    <section anchor="wire-format">
      <name>Wire Format</name>
      <t>The identifier chain materializes on the wire as a small set of
new request and response headers and as extensions to the
existing <tt>Attribution-Record</tt> envelope. Headers defined by other
AGTP drafts (Agent-ID, Owner-ID, Session-ID, Task-ID,
Server-ID, Attribution-Record) are referenced by this document
and not redefined here.</t>
      <section anchor="new-headers-defined-by-this-document">
        <name>New Headers Defined by This Document</name>
        <table>
          <name>New Headers Defined by AGTP-IDENTIFIERS</name>
          <thead>
            <tr>
              <th align="left">Header</th>
              <th align="left">Carried On</th>
              <th align="left">Required</th>
              <th align="left">Value</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Owner-ID</td>
              <td align="left">request</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">Owner identifier per <xref target="owner-id"/></td>
            </tr>
            <tr>
              <td align="left">Request-ID</td>
              <td align="left">request</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">UUIDv7 or ULID per <xref target="request-id"/></td>
            </tr>
            <tr>
              <td align="left">Request-ID</td>
              <td align="left">response</td>
              <td align="left">
                <strong><bcp14>SHOULD</bcp14></strong></td>
              <td align="left">Echo of the originating request's Request-ID</td>
            </tr>
            <tr>
              <td align="left">Response-ID</td>
              <td align="left">response</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
              <td align="left">UUIDv7 or ULID per <xref target="response-id"/></td>
            </tr>
            <tr>
              <td align="left">Audit-ID</td>
              <td align="left">response</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong> when Attribution-Record present</td>
              <td align="left">64 lowercase hex per <xref target="audit-id"/></td>
            </tr>
            <tr>
              <td align="left">Action-ID</td>
              <td align="left">response</td>
              <td align="left">
                <strong><bcp14>MAY</bcp14></strong></td>
              <td align="left">UUIDv7 or ULID; convenience echo of the <tt>action_id</tt> field in the Attribution-Record payload</td>
            </tr>
          </tbody>
        </table>
        <t>Action-ID, Evaluation-ID, and Decision-ID are primarily carried
as fields inside the extended Attribution-Record payload, not as
standalone wire headers. The Action-ID <bcp14>MAY</bcp14> appear as a
convenience header on the response for clients that need to
reference it without parsing the JWS.</t>
      </section>
      <section anchor="abnf-grammar">
        <name>ABNF Grammar</name>
        <t>The header values follow this grammar:</t>
        <sourcecode type="abnf"><![CDATA[
owner-id       = 1*256(ALPHA / DIGIT / "-" / "_" / ":" / ".")
request-id     = uuidv7 / ulid
response-id    = uuidv7 / ulid
audit-id       = 64HEXDIGLOWER
action-id      = uuidv7 / ulid

uuidv7         = 8HEXDIGLOWER "-" 4HEXDIGLOWER "-" "7" 3HEXDIGLOWER
                 "-" 4HEXDIGLOWER "-" 12HEXDIGLOWER
ulid           = 26BASE32

HEXDIGLOWER    = DIGIT / "a" / "b" / "c" / "d" / "e" / "f"
BASE32         = ALPHA / DIGIT
]]></sourcecode>
        <t>A header value that does not conform to this grammar <bcp14>SHALL</bcp14> be
treated as malformed and the request or response <bcp14>SHALL</bcp14> be
refused with status 400 Bad Request.</t>
      </section>
      <section anchor="echo-rules">
        <name>Echo Rules</name>
        <t>The responding agent <bcp14>SHOULD</bcp14> echo the request's <tt>Request-ID</tt>
unchanged in the response. This follows the echo convention
<xref target="AGTP"/> uses for <tt>Task-ID</tt> and avoids introducing a separate
correlation header. The responder's own identity is carried in
<tt>Server-ID</tt> per <xref target="AGTP"/>; the responder's per-interaction
identifier is carried in <tt>Response-ID</tt>.</t>
        <t>A response that omits <tt>Request-ID</tt> when responding to a request
that carried <tt>Request-ID</tt> produces an audit chain that cannot be
reconstructed without out-of-band correlation, and <bcp14>SHOULD</bcp14> be
treated as a chain break by infrastructure relying on the
identifier chain for accountability.</t>
      </section>
    </section>
    <section anchor="identifier-resolution-and-lookup">
      <name>Identifier Resolution and Lookup</name>
      <section anchor="resolution-targets">
        <name>Resolution Targets</name>
        <t>Each identifier resolves to a specific record. The resolution
target and store are summarized below.</t>
        <table>
          <name>Identifier Resolution Targets</name>
          <thead>
            <tr>
              <th align="left">Identifier</th>
              <th align="left">Resolves To</th>
              <th align="left">Store</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Agent-ID</td>
              <td align="left">Agent Identity Document</td>
              <td align="left">Governance platform registry; AGTP-LOG for lifecycle events</td>
            </tr>
            <tr>
              <td align="left">Owner-ID</td>
              <td align="left">Owner Identity Document</td>
              <td align="left">Governance platform</td>
            </tr>
            <tr>
              <td align="left">Session-ID</td>
              <td align="left">Session Context</td>
              <td align="left">Session participants and governance platform per <xref target="AGTP-SESSION"/></td>
            </tr>
            <tr>
              <td align="left">Task-ID</td>
              <td align="left">Task Context</td>
              <td align="left">Operator-defined</td>
            </tr>
            <tr>
              <td align="left">Request-ID</td>
              <td align="left">(no separate record; appears in Attribution-Record)</td>
              <td align="left">Caller's outbound log; responder's Attribution-Record</td>
            </tr>
            <tr>
              <td align="left">Response-ID</td>
              <td align="left">(no separate record; appears in Attribution-Record)</td>
              <td align="left">Responder's Attribution-Record</td>
            </tr>
            <tr>
              <td align="left">Action-ID</td>
              <td align="left">Extended Attribution-Record</td>
              <td align="left">Responding agent's audit store</td>
            </tr>
            <tr>
              <td align="left">Evaluation-ID</td>
              <td align="left">Evaluation Record</td>
              <td align="left">Governance platform's evaluation store</td>
            </tr>
            <tr>
              <td align="left">Decision-ID</td>
              <td align="left">Decision Record</td>
              <td align="left">Governance platform's decision store</td>
            </tr>
            <tr>
              <td align="left">Audit-ID</td>
              <td align="left">Extended Attribution-Record JWS</td>
              <td align="left">Responding agent's audit store; counterparty's received-record store</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="lookup-methods">
        <name>Lookup Methods</name>
        <t>The default lookup method is the responding agent's audit store,
which <bcp14>MUST</bcp14> be addressable by Audit-ID. The specific lookup
protocol is operator-defined and out of scope for this document;
implementations <bcp14>MAY</bcp14> expose an AGTP method for Audit-ID lookup,
expose a REST endpoint over HTTPS, or rely on out-of-band
retrieval. Future revisions of <xref target="AGTP-API"/> or this document
<bcp14>MAY</bcp14> standardize a lookup interface.</t>
        <t>Evaluation Records and Decision Records are stored by the
governance platform that produced them. Lookup is via the
governance platform's evaluation and decision endpoints (out of
scope for this document; defined by the governance platform).</t>
        <t>Agent-ID and Owner-ID resolve via the mechanisms defined in
<xref target="AGTP"/>. Identity-lifecycle events for Agent-ID are stored in
the AGTP-LOG transparency log per <xref target="AGTP-LOG"/>; the lookup is
via the AGTP-LOG protocol.</t>
      </section>
      <section anchor="caching">
        <name>Caching</name>
        <t>Persistent identifiers (Agent-ID, Owner-ID) <bcp14>MAY</bcp14> be cached
indefinitely by infrastructure components, refreshing on
revocation signals from the AGTP-LOG transparency log.</t>
        <t>Per-interaction and governance identifiers <bcp14>SHOULD</bcp14> be cached only
for the duration of the operation that references them. Caching
beyond the immediate operation is an operator policy concern and
is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="identifier-forgery">
        <name>Identifier Forgery</name>
        <t>The primary threat is forgery of any identifier in the chain.
The chain is resistant to forgery because:</t>
        <ul spacing="normal">
          <li>
            <t>Agent-ID is the hash of a signed Agent Genesis document.
Forging Agent-ID requires forging the Genesis signature.</t>
          </li>
          <li>
            <t>Owner-ID is bound to Agent-ID via the Genesis signature.
Forging Owner-ID requires forging Agent-ID.</t>
          </li>
          <li>
            <t>Per-interaction identifiers (Request-ID, Response-ID,
Action-ID) are committed inside the JWS-signed extended
Attribution-Record. Forging an after-the-fact identifier
requires forging the JWS signature.</t>
          </li>
          <li>
            <t>Governance identifiers (Evaluation-ID, Decision-ID) are
referenced inside the JWS-signed Attribution-Record and
produced by the governance platform's signed records.
Forging requires compromising the governance platform's key
or forging the JWS.</t>
          </li>
          <li>
            <t>Audit-ID is the SHA-256 hash of the canonical JWS. Forging
Audit-ID requires producing a colliding JWS, which is
computationally infeasible.</t>
          </li>
        </ul>
        <t>A verifier that retrieves an identifier from a source other
than the responding agent's audit store or a signed
Attribution-Record <bcp14>SHALL</bcp14> treat the identifier as unverified
until the originating record is retrieved and the signature
confirmed.</t>
      </section>
      <section anchor="chain-breaks">
        <name>Chain Breaks</name>
        <t>A chain break is the condition in which an identifier in the
chain cannot be linked to its predecessor. Chain breaks are
caused by:</t>
        <ul spacing="normal">
          <li>
            <t>Omission (the predecessor identifier was never minted).</t>
          </li>
          <li>
            <t>Tampering (the predecessor identifier was modified after
issuance).</t>
          </li>
          <li>
            <t>Substitution (a different identifier was inserted in place
of the original).</t>
          </li>
        </ul>
        <t>All three conditions <bcp14>MUST</bcp14> be treated as evidence of forgery or
omission. The audit record <bcp14>SHALL NOT</bcp14> be relied upon for
regulatory examination or counterparty dispute.</t>
      </section>
      <section anchor="replay">
        <name>Replay</name>
        <t>An attacker that captures an extended Attribution-Record <bcp14>MAY</bcp14>
attempt to replay it as if it were a new action. The chain
resists replay because:</t>
        <ul spacing="normal">
          <li>
            <t>The Attribution-Record carries a timestamp inside the
signed payload. Replay produces a stale timestamp that
verifiers can reject.</t>
          </li>
          <li>
            <t>The <tt>previous_audit_id</tt> field commits to a specific
predecessor. A replayed record carries the same
<tt>previous_audit_id</tt> as its original, which cannot match the
current chain head when the chain has progressed.</t>
          </li>
          <li>
            <t>The Audit-ID is deterministic over the JWS. A replayed
Attribution-Record produces the same Audit-ID as its
original, which the responding agent's audit store rejects
as a duplicate.</t>
          </li>
        </ul>
        <t>The responding agent <bcp14>MUST</bcp14> enforce strict append-only semantics
on its audit store. An audit store that permits insertion or
modification of past entries undermines the replay resistance
of the chain.</t>
      </section>
      <section anchor="agent-compromise">
        <name>Agent Compromise</name>
        <t>If the responding agent's manifest signing key is compromised,
an attacker can produce valid-looking Attribution-Records under
that agent's identity. The chain provides no protection against
this case; the threat is mitigated at the <xref target="AGTP-LOG"/> layer by
issuing a <tt>agent-genesis-revoked</tt> event that retires the
compromised agent.</t>
        <t>A verifier that finds an <tt>agent-genesis-revoked</tt> event for an
Agent-ID <bcp14>SHOULD</bcp14> treat all Attribution-Records emitted under
that Agent-ID after the revocation timestamp as suspect.
Attribution-Records emitted before revocation remain valid;
they were emitted by the agent in good standing at the time.</t>
      </section>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>Identifiers themselves carry no payload data. However, the
records they resolve to <bcp14>MAY</bcp14> contain personally identifiable
information (particularly in Evaluation Records, where <tt>inputs</tt>
may include user-submitted content).</t>
        <t>The governance platform that issues an identifier is
responsible for the privacy of the record it resolves to.
Specifically:</t>
        <ul spacing="normal">
          <li>
            <t>Owner-ID records <bcp14>MAY</bcp14> identify a natural person and <bcp14>MUST</bcp14> be
treated as personal data under applicable law (GDPR, CCPA,
and similar regimes).</t>
          </li>
          <li>
            <t>Evaluation Records' <tt>inputs</tt> field <bcp14>SHOULD</bcp14> be redacted to
remove PII before the record is committed to the evaluation
store. The governance platform <bcp14>MAY</bcp14> retain the unredacted
form under separate access controls.</t>
          </li>
          <li>
            <t>Request-IDs and Response-IDs themselves are not personal
data; the payloads they reference <bcp14>MAY</bcp14> be.</t>
          </li>
        </ul>
        <t>A verifier with regulatory authority <bcp14>MAY</bcp14> request the unredacted
form via the governance platform's out-of-band access
procedure. A verifier without such authority is bound by the
redacted form.</t>
      </section>
      <section anchor="identifier-reuse">
        <name>Identifier Reuse</name>
        <t>An identifier issued under one Agent-ID <bcp14>SHALL NOT</bcp14> be reused
under a different Agent-ID. The collision-resistant identifier
schemes (UUIDv7, ULID, SHA-256) make this statistically
improbable. Governance platforms <bcp14>MUST</bcp14> enforce this constraint
during identifier issuance.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The identifier chain produces a complete record of an agent's
actions, indexed by Agent-ID and Owner-ID. This is by design:
the chain is the audit record. However, the design has privacy
consequences that implementers <bcp14>MUST</bcp14> consider.</t>
      <section anchor="linkability">
        <name>Linkability</name>
        <t>The chain links every action an agent takes to a single
Agent-ID, which in turn links to a single Owner-ID. An
adversary with access to a responding agent's audit store or to
multiple Attribution-Records emitted by the same agent can
construct a behavioral profile.</t>
        <t>Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>Sensitive Owner-IDs (those identifying natural persons) <bcp14>MAY</bcp14>
be pseudonymized at the governance platform. The platform
retains the binding between pseudonym and natural person
under separate access controls.</t>
          </li>
          <li>
            <t>An owner that requires unlinkability across agent activities
<bcp14>MAY</bcp14> provision multiple Agent-IDs under separate Owner-IDs.
The governance platform <bcp14>MAY</bcp14> support this directly via the
Owner Identity Document.</t>
          </li>
        </ul>
      </section>
      <section anchor="right-to-erasure">
        <name>Right to Erasure</name>
        <t>GDPR Article 17 and similar provisions establish a right to
erasure of personal data. The append-only nature of the agent's
audit store creates tension with this right.</t>
        <t>A governance platform that operates in a jurisdiction with a
right to erasure <bcp14>MUST</bcp14> implement one of:</t>
        <ul spacing="normal">
          <li>
            <t>A redaction mechanism that nulls the personal data fields in
audit entries without removing the entries themselves,
preserving the chain.</t>
          </li>
          <li>
            <t>A revocation mechanism that marks the Owner-ID as revoked
and prevents future linkage, preserving the chain for past
entries under restricted access.</t>
          </li>
        </ul>
        <t>The specific mechanism is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="regulatory-mapping">
      <name>Regulatory Mapping</name>
      <t>The identifier chain is designed to satisfy the record-keeping
requirements of major AI regulatory regimes. This section is
informative.</t>
      <section anchor="eu-ai-act">
        <name>EU AI Act</name>
        <t>The EU AI Act <xref target="EU-AI-ACT"/> requires that high-risk AI systems
maintain records sufficient to reconstruct decisions. The chain
satisfies this through:</t>
        <ul spacing="normal">
          <li>
            <t>Agent-ID and Owner-ID identify the actor and the accountable
principal.</t>
          </li>
          <li>
            <t>Evaluation-ID and Decision-ID record the governance
evaluation and verdict required by Article 12 (logging) and
Article 14 (human oversight).</t>
          </li>
          <li>
            <t>Audit-ID provides the tamper-evident binding required by
Article 20 (record-keeping) and Article 26 (deployer
obligations).</t>
          </li>
        </ul>
        <t>A high-risk AI system that maintains the AGTP identifier chain
maintains the records the EU AI Act requires.</t>
      </section>
      <section anchor="soc-2-and-iso-42001">
        <name>SOC 2 and ISO 42001</name>
        <t>SOC 2 Type II audits require evidence that controls operate
effectively over time. ISO 42001 requires a management system
for AI with comparable evidentiary requirements. The chain
provides this evidence through cryptographically verifiable
records of:</t>
        <ul spacing="normal">
          <li>
            <t>Who acted (Agent-ID, Owner-ID).</t>
          </li>
          <li>
            <t>What authorized the action (Evaluation-ID, Decision-ID).</t>
          </li>
          <li>
            <t>What action was taken (Action-ID).</t>
          </li>
          <li>
            <t>When and in what order (timestamps and <tt>previous_audit_id</tt>).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests the following IANA actions.</t>
      <section anchor="agtp-header-field-registry-additions">
        <name>AGTP Header Field Registry Additions</name>
        <t>Registration of the following entries in the AGTP Header Field
Registry (established by <xref target="AGTP"/>):</t>
        <table>
          <thead>
            <tr>
              <th align="left">Header</th>
              <th align="left">Reference</th>
              <th align="left">Carried On</th>
              <th align="left">Required</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Owner-ID</td>
              <td align="left">
                <xref target="owner-id"/></td>
              <td align="left">request</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
            </tr>
            <tr>
              <td align="left">Request-ID</td>
              <td align="left">
                <xref target="request-id"/></td>
              <td align="left">request</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
            </tr>
            <tr>
              <td align="left">Request-ID</td>
              <td align="left">
                <xref target="request-id"/></td>
              <td align="left">response</td>
              <td align="left">
                <strong><bcp14>SHOULD</bcp14></strong> (echo)</td>
            </tr>
            <tr>
              <td align="left">Response-ID</td>
              <td align="left">
                <xref target="response-id"/></td>
              <td align="left">response</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong></td>
            </tr>
            <tr>
              <td align="left">Audit-ID</td>
              <td align="left">
                <xref target="audit-id"/></td>
              <td align="left">response</td>
              <td align="left">
                <strong><bcp14>MUST</bcp14></strong> with Attribution-Record</td>
            </tr>
            <tr>
              <td align="left">Action-ID</td>
              <td align="left">
                <xref target="action-id"/></td>
              <td align="left">response</td>
              <td align="left">
                <strong><bcp14>MAY</bcp14></strong></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-attribution-record-field-registry">
        <name>AGTP Attribution-Record Field Registry</name>
        <t>Establishment of an IANA registry: AGTP Attribution-Record
Fields, with initial registrations for the identifier-chain
fields specified in this document
(<xref target="extended-record-fields"/>),
the merchant-identity fields specified in <xref target="AGTP-MERCHANT"/>,
and the base fields specified in <xref target="AGTP"/>.</t>
        <dl>
          <dt>Registration Procedure</dt>
          <dd>
            <t>Specification Required</t>
          </dd>
        </dl>
      </section>
      <section anchor="agtp-verdict-registry">
        <name>AGTP Verdict Registry</name>
        <t>Establishment of an IANA registry: AGTP Decision Verdicts, with
initial registrations for <tt>permit</tt>, <tt>deny</tt>,
<tt>permit-with-conditions</tt>, and <tt>defer</tt>.</t>
        <dl>
          <dt>Registration Procedure</dt>
          <dd>
            <t>Specification Required</t>
          </dd>
        </dl>
      </section>
      <section anchor="agtp-identifier-scheme-registry">
        <name>AGTP Identifier Scheme Registry</name>
        <t>Establishment of an IANA registry: AGTP Identifier Schemes, with
initial registrations for <tt>uuidv7</tt>, <tt>ulid</tt>, <tt>sha256</tt>, and the
<tt>id_scheme</tt> values recognized for Owner-ID.</t>
        <dl>
          <dt>Registration Procedure</dt>
          <dd>
            <t>Specification Required</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="open-items">
      <name>Open Items</name>
      <t>The following items are out of scope for this revision and are
anticipated in future revisions:</t>
      <ul spacing="normal">
        <li>
          <t>Contract ID specification. Evaluation Records reference a
<tt>contract_id</tt> (the governance contract or policy in effect at
the time of evaluation). The contract ID scheme is referenced
but not defined here.</t>
        </li>
        <li>
          <t>Concrete redaction format for <tt>inputs</tt> in Evaluation Records.</t>
        </li>
        <li>
          <t>The Owner Identity Document format. This document specifies
what Owner-ID resolves to but does not define the document
structure.</t>
        </li>
        <li>
          <t>Cross-agent audit chain federation protocol. The wire format
for <tt>prior_actions</tt> references in the Attribution-Record
payload is specified; the federation protocol by which
governance platforms reconcile cross-agent chains and serve
remote audit lookups remains to be defined.</t>
        </li>
        <li>
          <t>Standing authorization expiry and re-evaluation triggers.</t>
        </li>
        <li>
          <t>Identifier scheme migration. The current document permits
UUIDv7 and ULID for per-interaction and governance
identifiers. A future revision may add or constrain schemes.</t>
        </li>
        <li>
          <t>Reconciliation of the retired Principal-ID header in
<xref target="AGTP"/> with the Owner-ID header introduced by this
document. A future revision of <xref target="AGTP"/> is expected to align
on Owner-ID as the wire header carrying owner identity.</t>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The identifier stack model was developed during the AGTP v07
revision cycle. Several reviewers and adjacent working groups
shaped the architecture this document records.</t>
      <t>Scott Courtney (GoDaddy / ANS) provided early review on the
identity model and surfaced concerns about dual-logging between
identity-lifecycle and per-action audit records that ultimately
drove the architectural separation between <xref target="AGTP-LOG"/> and the
per-agent Attribution-Record chain defined here.</t>
      <t>Philip Griffiths (Cloud Security Alliance ZTCPP / ONUG AOMC)
contributed feedback on zero-trust alignment that informed the
verification procedure and chain-break framing.</t>
      <t>The IETF WIMSE working group's engagement on
draft-klrc-aiagent-auth shaped the framing of agent-to-agent
authentication boundaries that this document's per-interaction
identifiers sit alongside. The authors of klrc-aiagent-auth
(Pieter Kasselman, Jeff Lombardo, Yaroslav Rosomakho, Brian
Campbell, Nick Steele) defined the adjacent problem space.</t>
      <t>The chain-of-custody framing draws on prior work in transparency
logs (<xref target="RFC9162"/>, <xref target="RFC9943"/>) and on the attestation model of
<xref target="RFC9334"/>. The Attribution-Record envelope on which this
document builds is defined in <xref target="AGTP"/>. The regulatory mapping
was informed by the record-keeping requirements of <xref target="EU-AI-ACT"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
        <reference anchor="AGTP">
          <front>
            <title>Agent Transfer Protocol (AGTP)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-07"/>
        </reference>
        <reference anchor="AGTP-LOG">
          <front>
            <title>AGTP Transparency Log Protocol</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-log-01"/>
        </reference>
        <reference anchor="AGTP-TRUST">
          <front>
            <title>AGTP Trust and Verification Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-trust-00"/>
        </reference>
        <reference anchor="AGTP-SESSION">
          <front>
            <title>AGTP Session Protocol</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-session-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9943">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="AGTP-API">
          <front>
            <title>AGTP API Contract Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-api-00"/>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-MERCHANT">
          <front>
            <title>AGTP Merchant Identity for Agentic Commerce</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-merchant-identity-01"/>
        </reference>
        <reference anchor="EU-AI-ACT" target="https://eur-lex.europa.eu/eli/reg/2024/1689/oj">
          <front>
            <title>Regulation (EU) 2024/1689 of the European Parliament and of the Council on artificial intelligence</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
