<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-agtp-merchant-identity-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP-MERCHANT">AGTP Merchant Identity and Agentic Commerce Binding</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-agtp-merchant-identity-01"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="April" day="22"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>agentic commerce</keyword>
    <keyword>merchant identity</keyword>
    <keyword>agent payments</keyword>
    <keyword>AGTP</keyword>
    <abstract>
      <?line 86?>

<t>The Agent Transfer Protocol (AGTP) specifies the sending side of an
agentic transaction: agent identity, Authority-Scope enforcement, Budget-
Limit declaration, and a signed Attribution-Record on every method
invocation. The receiving side of a PURCHASE transaction -- the merchant
or service provider -- has no equivalent protocol-level identity or
verification mechanism. This is the merchant identity gap.</t>
      <t>This document specifies the AGTP Merchant Identity and Agentic Commerce
Binding. It defines the Merchant Manifest Document, a signed identity
record structurally parallel to the Agent Manifest Document; the Merchant
Genesis, the origin document from which a merchant's canonical identifier
is derived; Merchant Trust Tiers aligned with AGTP Trust Tier semantics;
and the protocol integration points at which merchant identity is
verified. These include the PURCHASE method handshake, the DISCOVER
method result surface, and the Attribution-Record. This document also
defines the Intent-Assertion header for portable, detached principal-
authorized intent, the Cart-Digest mechanism for multi-line-item
transactions, and the 455 Counterparty Unverified status code. Together
these mechanisms close the verification loop between agent and merchant
within AGTP's governance model.</t>
      <t>Version 01 aligns the merchant identity model with AGTP v05. Merchant
Trust Tier 1 now supports three equivalent verification paths (<tt>dns-
anchored</tt>, <tt>log-anchored</tt>, <tt>hybrid</tt>) matching the base AGTP verification
paths, replacing v00's DNS-only Tier 1 requirement. Version 01 also
adopts the Agent Genesis taxonomy introduced in <xref target="AGTP-LOG"/>: the
merchant origin document is the Merchant Genesis, superseding the
"Merchant Birth Certificate" terminology in v00.</t>
    </abstract>
  </front>
  <middle>
    <?line 117?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="the-merchant-identity-gap">
        <name>The Merchant Identity Gap</name>
        <t>AGTP today provides strong guarantees for the sending side of an agent
transaction. A PURCHASE invocation carries a cryptographically derived
Agent-ID, a Principal-ID identifying the accountable human or
organization, an Authority-Scope declaration (including <tt>payments:
purchase</tt>), a Budget-Limit enforced at invocation time, and a signed
Attribution-Record retained for audit. The requesting agent's
governance context is fully expressed at the protocol layer.</t>
        <t>The receiving side has no equivalent. An AGTP PURCHASE currently
resolves to a network endpoint with no protocol-level assertion of the
receiving party's identity, lifecycle state, legal entity, payment
network acceptance, or dispute policy. An agent with <tt>payments:
purchase</tt> scope will transact with any endpoint its principal
(or the upstream orchestration logic) directs it toward. There is no
protocol-level signal distinguishing a verified merchant of record
from an endpoint that merely answers on the expected port.</t>
        <t>This gap has direct operational consequences as agent-driven commerce
scales:</t>
        <ul spacing="normal">
          <li>
            <t>Payment networks and card issuers extending protection to agent-
initiated transactions require verifiable identity on both parties
to the transaction, not just the agent.</t>
          </li>
          <li>
            <t>Dispute investigation requires a cryptographically linked record
of both the initiating agent and the merchant counterparty at the
time of the transaction.</t>
          </li>
          <li>
            <t>Merchants suspended for fraud, chargebacks, or regulatory action
have no mechanism to be removed from the agent-visible transaction
surface in the absence of a governed merchant directory.</t>
          </li>
          <li>
            <t>Agents cannot distinguish a merchant whose identity has been
verified from one that has merely published a service endpoint.</t>
          </li>
        </ul>
        <t>This document closes the gap by introducing a merchant-side identity
structure that mirrors the agent-side identity structure already
specified in <xref target="AGTP"/>.</t>
      </section>
      <section anchor="relationship-to-payment-networks">
        <name>Relationship to Payment Networks</name>
        <t>This specification is a transport-layer identity and verification
mechanism for merchant counterparties. It does not define payment
credential handling, tokenization, authorization messages to card
networks, or settlement. Those belong to payment-rail specifications
operated by issuers, networks, and acquirers.</t>
        <t>The relationship is complementary. Payment-network programs that
extend protection, fraud coverage, or dispute handling to agent-
initiated transactions need verifiable identity for both the agent
and the merchant. AGTP establishes verifiable agent identity through
the Agent Genesis and Agent Manifest Document (see <xref target="AGTP-LOG"/> for
the taxonomy introduced in AGTP v05). This document extends the
same structural model to the merchant side, producing an
Attribution-Record that names both counterparties cryptographically.
Payment networks consume that record as an input to their own
authorization and dispute processes; they do not need to speak AGTP
to do so.</t>
      </section>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <t><strong>Structural parallelism.</strong> Merchant identity uses the same document
formats, trust tiers, lifecycle states, and governance zone semantics
as agent identity. A governance platform that registers agents
registers merchants through the same registry and the same
cryptographic machinery.</t>
        <t><strong>Verification at PURCHASE.</strong> Merchant identity is verified by the
requesting agent immediately before executing PURCHASE. The
verification result is recorded in the Attribution-Record. A
verification failure is a 455 Counterparty Unverified response, not
a protocol error.</t>
        <t><strong>Discovery surfaces both sides.</strong> The DISCOVER method defined in
<xref target="AGTP-DISCOVER"/> returns Agent Manifest Documents for agent
queries. This document extends DISCOVER to optionally return
Merchant Manifest Documents when the query intent targets a
transactional counterparty rather than a capability-providing agent.</t>
        <t><strong>Portable intent.</strong> The Intent-Assertion header carries a detached,
signed summary of principal-authorized purchase intent that can be
forwarded to non-AGTP counterparties (payment networks, card
issuers, acquirers) as standalone evidence without requiring those
counterparties to speak AGTP.</t>
        <t><strong>Payment-rail neutrality.</strong> Nothing in this specification binds the
merchant identity model to any particular card network, digital
wallet, or settlement system. Merchant Manifests declare accepted
payment network identifiers as an informational field; enforcement
remains the responsibility of the payment rail.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>
      <dl>
        <dt>Merchant:</dt>
        <dd>
          <t>A legal entity that offers goods or services for purchase and
serves as the receiving counterparty to an AGTP PURCHASE
invocation. A merchant is identified by a canonical Merchant-ID
and represented by a Merchant Manifest Document.</t>
        </dd>
        <dt>Merchant-ID:</dt>
        <dd>
          <t>A unique identifier for a specific merchant entity, derived from
the hash of the Merchant Genesis. Carried in the <tt>Merchant-ID</tt>
request header on PURCHASE invocations and in the Attribution-
Record. Format: 256-bit hex-encoded value or domain-anchored URI
of the form <tt>agtp://merchant.example.tld/merchant</tt>.</t>
        </dd>
        <dt>Merchant Genesis:</dt>
        <dd>
          <t>The permanent, cryptographically signed origin document issued to a
merchant at registration time by a governance platform. The
Merchant Genesis is the origin record from which the canonical
Merchant-ID is derived. Structurally parallel to the Agent Genesis
defined in <xref target="AGTP-LOG"/> terminology (formerly termed "Agent Birth
Certificate" in AGTP drafts prior to v05). Fields include legal
entity name, registered org domain, accepted payment networks,
merchant category code, dispute and refund policy URIs, lifecycle
state, governance zone, and verification_path. Issued once per
merchant; permanently bound; never reissued. Supersedes the
"Merchant Birth Certificate" terminology in v00.</t>
        </dd>
        <dt>Merchant Manifest Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document
returned when a merchant URI is resolved. Derived directly from
the Merchant Genesis and current registry record. Structurally
parallel to the Agent Manifest Document defined in <xref target="AGTP"/> Section
5.5. Contains identity, trust tier, lifecycle state, accepted
payment networks, dispute policy reference, and governance zone.
Never contains executable content.</t>
        </dd>
        <dt>Merchant Trust Tier:</dt>
        <dd>
          <t>A classification (1, 2, or 3) assigned to a merchant at
registration time, aligned with the Agent Trust Tier semantics
defined in <xref target="AGTP"/> Section 5.2. Tier 1 requires one of three
equivalent verification paths (<tt>dns-anchored</tt>, <tt>log-anchored</tt>,
<tt>hybrid</tt>) per <xref target="AGTP"/> Section 5.2, plus a signed business-entity
attestation from the governance platform. Tier 2 is org-asserted
without cryptographic verification of organizational identity.
Tier 3 is experimental and <strong>MUST NOT</strong> appear in production
PURCHASE flows.</t>
        </dd>
        <dt>Intent-Assertion:</dt>
        <dd>
          <t>A detached, signed JWT-format <xref target="RFC7519"/> token that summarizes
principal-authorized purchase intent. Contains the principal ID,
agent ID, merchant ID, item or cart digest, amount ceiling,
currency, issuance timestamp, expiry, and a single-use nonce.
Carried in the <tt>Intent-Assertion</tt> request header and forwardable
to payment networks as standalone evidence of authenticated
principal intent.</t>
        </dd>
        <dt>Cart-Digest:</dt>
        <dd>
          <t>A cryptographic digest of a structured cart payload returned by a
QUOTE invocation. Referenced in a subsequent PURCHASE invocation
to bind the purchased cart to the quoted cart without requiring
retransmission of line-item detail. Format: hash algorithm prefix
followed by hex-encoded digest (e.g., <tt>sha256:3a9f2c1d...</tt>).</t>
        </dd>
        <dt>Counterparty Verification:</dt>
        <dd>
          <t>The process by which an agent, before executing PURCHASE,
retrieves the Merchant Manifest Document for the intended
merchant, verifies its signature and lifecycle state, and records
the verification result in the Attribution-Record.</t>
        </dd>
        <dt>MNS (Merchant Name Service):</dt>
        <dd>
          <t>The merchant-side analogue of the Agent Name Service defined in
<xref target="AGTP-DISCOVER"/>. An AGTP-aware server that maintains an indexed
registry of Merchant Manifest Documents and answers DISCOVER
queries targeted at merchant entities. An MNS <strong>MAY</strong> be
co-located with an ANS or operated separately. Acts as a Scope-
Enforcement Point for merchant discovery traffic.</t>
        </dd>
      </dl>
    </section>
    <section anchor="the-merchant-identity-model">
      <name>The Merchant Identity Model</name>
      <section anchor="merchant-genesis">
        <name>Merchant Genesis</name>
        <t>The Merchant Genesis is the origin record of a merchant's existence
in the AGTP governance fabric. It is issued by a governance platform
at merchant registration time through a process analogous to Agent
Genesis issuance (<xref target="AGTP"/> Section 5.7). Supersedes the "Merchant
Birth Certificate" terminology in v00; see <xref target="AGTP-LOG"/> for the
taxonomy adopted in v01.</t>
        <t>The required fields of a Merchant Genesis are:</t>
        <figure>
          <name>Merchant Genesis Schema</name>
          <sourcecode type="json"><![CDATA[
{
  "document_type": "merchant-genesis",
  "schema_version": "1.0",
  "canonical_id": "7c2f9a3e1b8d4f6a...",
  "legal_entity_name": "Acme Commerce, Inc.",
  "org_domain": "acme.tld",
  "merchant_category_code": "5411",
  "registered_jurisdiction": "US-DE",
  "governance_zone": "zone:retail-verified",
  "accepted_payment_networks": ["visa", "mastercard", "amex", "discover"],
  "dispute_policy_uri": "agtp://acme.tld/merchant/dispute-policy",
  "refund_policy_uri": "agtp://acme.tld/merchant/refund-policy",
  "trust_tier": 1,
  "verification_path": "dns-anchored",
  "activated_at": "2026-03-15T12:00:00Z",
  "activating_principal": "agtp-platform-acme",
  "genesis_hash": "7c2f9a3e1b8d4f6a...",
  "signature": {
    "algorithm": "ES256",
    "key_id": "gov-platform-key-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode>
        </figure>
        <t>The <tt>canonical_id</tt> field <strong>MUST</strong> equal the <tt>genesis_hash</tt>, a
256-bit cryptographic hash computed over the canonicalized genesis
content excluding the <tt>signature</tt> field. This hash is the basis of the
merchant's Merchant-ID and is used wherever the merchant is identified
in AGTP wire-level structures.</t>
        <t>The <tt>merchant_category_code</tt> field <strong>SHOULD</strong> follow the ISO 18245
Merchant Category Code standard where applicable. Governance platforms
operating outside that classification <strong>MAY</strong> define alternate codes
provided they are documented in the governance zone definition.</t>
        <t>The <tt>accepted_payment_networks</tt> array is informational. It declares
which payment networks the merchant represents itself as accepting.
Payment-rail enforcement of this declaration is out of scope for this
document; the field supports pre-flight filtering by requesting agents
and ranking by Merchant Name Service implementations.</t>
      </section>
      <section anchor="merchant-trust-tiers">
        <name>Merchant Trust Tiers</name>
        <t>Merchant Trust Tiers align with the Agent Trust Tier semantics in
<xref target="AGTP"/> Section 5.2, including the three equivalent verification
paths introduced in AGTP v05:</t>
        <table>
          <name>Merchant Trust Tier Summary</name>
          <thead>
            <tr>
              <th align="left">Tier</th>
              <th align="left">Verification Paths (any one sufficient)</th>
              <th align="left">Business Entity Attestation</th>
              <th align="left">Registry Visible</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1 - Verified</td>
              <td align="left">
                <tt>dns-anchored</tt> (<xref target="RFC8555"/>); OR <tt>log-anchored</tt> (<xref target="RFC9162"/> / <xref target="RFC9943"/>); OR <tt>hybrid</tt> (DNS + blockchain signature)</td>
              <td align="left">Required</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">2 - Org-Asserted</td>
              <td align="left">None beyond self-declaration</td>
              <td align="left">Not required</td>
              <td align="left">Yes, with warning</td>
            </tr>
            <tr>
              <td align="left">3 - Experimental</td>
              <td align="left">None</td>
              <td align="left">Not required</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
        <t>Trust Tier 1 merchant registration <strong>MUST</strong> satisfy two conditions:</t>
        <ol spacing="normal" type="1"><li>
            <t>One of the three verification paths defined in <xref target="AGTP"/> Section
5.2 (<tt>dns-anchored</tt>, <tt>log-anchored</tt>, or <tt>hybrid</tt>) <strong>MUST</strong> be
completed at registration time. The verification path used
<strong>MUST</strong> be recorded in the Merchant Genesis <tt>verification_path</tt>
field and surfaced in the Merchant Manifest Document.</t>
          </li>
          <li>
            <t>A governance-platform-signed attestation <strong>MUST</strong> record that the
registering party has provided evidence of the claimed legal
entity's existence and standing. The form of that evidence
(incorporation document, tax identifier, equivalent jurisdictional
registration) is governance-platform-defined and <strong>MUST</strong> be
documented in the governance zone specification. The business
entity attestation is an additional requirement for merchants
beyond the base AGTP verification paths, reflecting the elevated
accountability needs of agentic commerce.</t>
          </li>
        </ol>
        <t>Path-specific considerations for merchants:</t>
        <ul spacing="normal">
          <li>
            <t><tt>dns-anchored</tt> registration is appropriate for merchants that
operate a verified DNS presence under their registered org_domain.
This is the most common deployment pattern for established
commercial entities.</t>
          </li>
          <li>
            <t><tt>log-anchored</tt> registration enables merchants whose governance
platform participates in an AGTP transparency log per <xref target="AGTP-LOG"/>.
This path is particularly applicable to merchants operating without
a traditional DNS footprint, to marketplace-aggregated merchants
represented by platform governance, and to cross-jurisdictional
commerce where DNS ownership verification is impractical.</t>
          </li>
          <li>
            <t><tt>hybrid</tt> registration applies to merchants with both a verified
DNS presence and a blockchain-anchored identity per <xref target="AGTP-WEB3"/>.
Web3-native commerce deployments typically use this path.</t>
          </li>
        </ul>
        <t>Trust Tier 2 merchants <strong>MUST</strong> have their Merchant Manifest Document
include a <tt>trust_warning</tt> field with value <tt>"legal-entity-unverified"</tt>.
Requesting agents <strong>SHOULD</strong> surface this warning to principals before
executing a PURCHASE against a Tier 2 merchant, or <strong>MAY</strong> reject Tier
2 merchants entirely based on governance policy.</t>
        <t>Trust Tier 3 merchants <strong>MUST NOT</strong> appear in production PURCHASE
flows. They exist for development and integration testing only.</t>
      </section>
      <section anchor="merchant-lifecycle-states">
        <name>Merchant Lifecycle States</name>
        <t>Merchants occupy one of four lifecycle states mirroring the agent
lifecycle states in <xref target="AGTP"/> Section 5.8:</t>
        <table>
          <name>Merchant Lifecycle States</name>
          <thead>
            <tr>
              <th align="left">State</th>
              <th align="left">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Active</td>
              <td align="left">Merchant is operational and eligible to receive PURCHASE</td>
            </tr>
            <tr>
              <td align="left">Suspended</td>
              <td align="left">Temporarily blocked (fraud review, chargeback threshold, compliance hold)</td>
            </tr>
            <tr>
              <td align="left">Revoked</td>
              <td align="left">Permanently removed; canonical Merchant-ID retired</td>
            </tr>
            <tr>
              <td align="left">Deprecated</td>
              <td align="left">Business ceased operations; canonical Merchant-ID retired</td>
            </tr>
          </tbody>
        </table>
        <t>A merchant in any state other than Active <strong>MUST NOT</strong> be treated as
a valid counterparty by a requesting agent. The expected response to
a PURCHASE targeting a non-Active merchant is 455 Counterparty
Unverified.</t>
        <t>Governance platforms <strong>MUST</strong> update the merchant's Merchant Manifest
Document signature within 60 seconds of a lifecycle state transition
and <strong>MUST</strong> notify any Merchant Name Service instances indexing the
merchant within the same window.</t>
      </section>
      <section anchor="merchant-manifest-document">
        <name>Merchant Manifest Document</name>
        <t>The Merchant Manifest Document is the wire-level representation of
merchant identity, returned in response to resolution of a merchant
URI. It is derived from the Merchant Genesis and current registry
record; it is never manually authored.</t>
        <figure>
          <name>Merchant Manifest Document Schema</name>
          <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-merchant-manifest",
  "schema_version": "1.0",
  "canonical_id": "7c2f9a3e1b8d4f6a...",
  "merchant_label": "acme-commerce",
  "legal_entity_name": "Acme Commerce, Inc.",
  "org_domain": "acme.tld",
  "merchant_category_code": "5411",
  "registered_jurisdiction": "US-DE",
  "governance_zone": "zone:retail-verified",
  "lifecycle_state": "Active",
  "trust_tier": 1,
  "verification_path": "dns-anchored",
  "accepted_payment_networks": ["visa", "mastercard", "amex", "discover"],
  "dispute_policy_uri": "agtp://acme.tld/merchant/dispute-policy",
  "refund_policy_uri": "agtp://acme.tld/merchant/refund-policy",
  "activated_at": "2026-03-15T12:00:00Z",
  "last_updated": "2026-04-10T09:12:44Z",
  "genesis_hash": "7c2f9a3e1b8d4f6a...",
  "signature": {
    "algorithm": "ES256",
    "key_id": "gov-platform-key-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode>
        </figure>
        <t>Implementations <strong>MUST</strong> verify the signature against the governance
platform's published key before trusting any field. An unsigned or
invalid Merchant Manifest <strong>MUST</strong> be rejected with the same severity
as an unsigned Agent Manifest.</t>
        <t>The <tt>genesis_hash</tt> field provides a cryptographic link from the
manifest back to the Merchant Genesis. Implementations performing
long-term audit reconstruction <strong>MAY</strong> use this hash to retrieve the
archived Merchant Genesis from the governance platform.</t>
      </section>
      <section anchor="merchant-uri-forms">
        <name>Merchant URI Forms</name>
        <t>Merchant URIs follow the AGTP URI scheme defined in <xref target="AGTP"/> Section
5.1, using a reserved <tt>/merchant</tt> path component in place of
<tt>/agents</tt>:</t>
        <figure>
          <name>Merchant URI Forms</name>
          <artwork><![CDATA[
agtp://acme.tld/merchant
agtp://acme.tld/merchant/acme-commerce
]]></artwork>
        </figure>
        <t>The single-label form (<tt>agtp://acme.tld/merchant</tt>) resolves to the
organization's primary merchant record. The labeled form
(<tt>agtp://acme.tld/merchant/[merchant-label]</tt>) resolves to a specific
merchant record for organizations operating multiple merchant
identities under a single org domain (e.g., multi-brand retailers).</t>
        <t>Canonical-identifier URIs of the form
<tt>agtp://[canonical-id].merchant</tt> are also supported, analogous to the
canonical agent URI form.</t>
      </section>
    </section>
    <section anchor="counterparty-verification-at-purchase">
      <name>Counterparty Verification at PURCHASE</name>
      <section anchor="verification-requirement">
        <name>Verification Requirement</name>
        <t>An agent with <tt>payments:purchase</tt> in its Authority-Scope <strong>MUST</strong>
perform counterparty verification before executing PURCHASE against
any merchant. Counterparty verification consists of:</t>
        <ol spacing="normal" type="1"><li>
            <t>Resolving the merchant URI (from the intended PURCHASE target) to
retrieve the Merchant Manifest Document.</t>
          </li>
          <li>
            <t>Verifying the manifest's signature against the governance
platform's published key.</t>
          </li>
          <li>
            <t>Verifying the merchant's <tt>lifecycle_state</tt> is Active.</t>
          </li>
          <li>
            <t>Verifying the merchant's <tt>trust_tier</tt> meets or exceeds the
threshold declared in the agent's governance policy for the
current transaction amount.</t>
          </li>
          <li>
            <t>Computing the manifest fingerprint (SHA-256 hash of the canonical
manifest bytes) and carrying it in the <tt>Merchant-Manifest-
Fingerprint</tt> request header.</t>
          </li>
        </ol>
        <t>Any of these steps failing <strong>MUST</strong> result in the PURCHASE not being
sent. The requesting agent's runtime <strong>SHOULD</strong> surface the specific
verification failure to the principal or governance platform; it
<strong>MUST NOT</strong> silently fall back to an unverified transaction.</t>
      </section>
      <section anchor="verification-at-the-receiving-server">
        <name>Verification at the Receiving Server</name>
        <t>A receiving AGTP server that accepts PURCHASE invocations <strong>MUST</strong>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Require the <tt>Merchant-ID</tt> request header to be present.</t>
          </li>
          <li>
            <t>Require the <tt>Merchant-Manifest-Fingerprint</tt> request header to be
present and to match the fingerprint of the server's current
Merchant Manifest Document.</t>
          </li>
          <li>
            <t>Return 455 Counterparty Unverified if either header is absent,
if the Merchant-ID does not match the server's canonical ID, or
if the fingerprint does not match.</t>
          </li>
        </ol>
        <t>This ensures that the manifest verified by the requesting agent is
the same manifest the receiving server currently presents. An attack
in which a requesting agent is redirected to a different endpoint
than it verified is caught at the fingerprint check.</t>
      </section>
      <section anchor="purchase-request-example">
        <name>PURCHASE Request Example</name>
        <t>The following request illustrates a verified PURCHASE invocation
carrying merchant identity binding and a detached intent assertion:</t>
        <figure>
          <name>PURCHASE with Merchant Identity Binding</name>
          <artwork><![CDATA[
AGTP/1.0 PURCHASE
Agent-ID: agtp://agtp.traveler.tld/agents/trip-planner
Principal-ID: usr-chris-hood
Authority-Scope: payments:purchase merchant:verify intent:assert
Session-ID: sess-trip-2026-04
Task-ID: task-purch-0421
Merchant-ID: agtp://acme.tld/merchant/acme-commerce
Merchant-Manifest-Fingerprint: sha256:3a9f2c1d8b7e4a6f...
Intent-Assertion: eyJhbGciOiJFUzI1NiIsImtpZCI6InByaW4ta2V5LTAxIn0...
Cart-Digest: sha256:7c2f9a3e1b8d4f6a...
Budget-Limit: USD=850.00
Content-Type: application/agtp+json

{
  "method": "PURCHASE",
  "task_id": "task-purch-0421",
  "parameters": {
    "cart_quote_id": "qt-7f3a9c",
    "principal_id": "usr-chris-hood",
    "amount": {"value": 842.17, "currency": "USD"},
    "payment_method": "tok-amex-default",
    "confirm_immediately": true
  }
}
]]></artwork>
        </figure>
        <t>The merchant server validates the merchant headers, accepts the
purchase, and returns an Attribution-Record naming both
counterparties:</t>
        <figure>
          <name>PURCHASE Response with Dual-Party Attribution</name>
          <artwork><![CDATA[
AGTP/1.0 200 OK
Task-ID: task-purch-0421
Server-Agent-ID: agtp://acme.tld/merchant/acme-commerce
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-purch-0421",
  "result": {
    "order_id": "ORD-2026-0421-8847",
    "confirmation_code": "AQRT9X",
    "status": "confirmed",
    "amount_charged": {"value": 842.17, "currency": "USD"}
  },
  "attribution": {
    "agent_id": "agtp://agtp.traveler.tld/agents/trip-planner",
    "principal_id": "usr-chris-hood",
    "merchant_id": "agtp://acme.tld/merchant/acme-commerce",
    "merchant_fingerprint": "sha256:3a9f2c1d8b7e4a6f...",
    "intent_assertion_jti": "ia-4f7e1a2b",
    "method": "PURCHASE",
    "timestamp": "2026-04-15T14:22:18Z",
    "signature": {
      "algorithm": "ES256",
      "key_id": "merchant-key-acme-01",
      "value": "[base64-encoded-signature]"
    }
  }
}
]]></artwork>
        </figure>
        <t>The Attribution-Record now names the agent, the principal, and the
merchant, each cryptographically bound through their respective
Genesis derivatives. This is the record consumed by downstream audit,
dispute resolution, and payment-network protection programs.</t>
      </section>
    </section>
    <section anchor="the-intent-assertion-header">
      <name>The Intent-Assertion Header</name>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>The Intent-Assertion header carries a detached, signed representation
of principal-authorized purchase intent. It exists so that non-AGTP
counterparties -- payment networks, card issuers, acquiring banks,
dispute processors -- can verify principal intent without parsing a
full AGTP message or operating AGTP infrastructure.</t>
        <t>An Intent Assertion is a JWT <xref target="RFC7519"/> signed by the principal's
governance key (or a delegated signing key bound to the principal's
identity) carrying the minimum field set required to link a purchase
to an authenticated principal decision.</t>
      </section>
      <section anchor="intent-assertion-claims">
        <name>Intent Assertion Claims</name>
        <table>
          <name>Intent Assertion JWT Claims</name>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">iss</td>
              <td align="left">string</td>
              <td align="left">Issuing governance platform identifier</td>
            </tr>
            <tr>
              <td align="left">sub</td>
              <td align="left">string</td>
              <td align="left">Principal-ID of the authorizing principal</td>
            </tr>
            <tr>
              <td align="left">aud</td>
              <td align="left">string</td>
              <td align="left">Merchant-ID of the intended counterparty</td>
            </tr>
            <tr>
              <td align="left">agent_id</td>
              <td align="left">string</td>
              <td align="left">Agent-ID of the executing agent</td>
            </tr>
            <tr>
              <td align="left">item_digest</td>
              <td align="left">string</td>
              <td align="left">Hash of purchased item or cart digest</td>
            </tr>
            <tr>
              <td align="left">amount_ceiling</td>
              <td align="left">object</td>
              <td align="left">
                <tt>{value, currency}</tt> maximum authorized</td>
            </tr>
            <tr>
              <td align="left">nbf</td>
              <td align="left">integer</td>
              <td align="left">Not-before timestamp (seconds since epoch)</td>
            </tr>
            <tr>
              <td align="left">exp</td>
              <td align="left">integer</td>
              <td align="left">Expiry timestamp (seconds since epoch)</td>
            </tr>
            <tr>
              <td align="left">jti</td>
              <td align="left">string</td>
              <td align="left">Unique assertion identifier for anti-replay</td>
            </tr>
            <tr>
              <td align="left">iat</td>
              <td align="left">integer</td>
              <td align="left">Issued-at timestamp</td>
            </tr>
          </tbody>
        </table>
        <t>Implementations <strong>MUST</strong> reject Intent Assertions whose <tt>exp</tt> is in
the past, whose <tt>aud</tt> does not match the Merchant-ID in the PURCHASE
request, or whose <tt>agent_id</tt> does not match the Agent-ID in the
PURCHASE request. Assertions <strong>MUST</strong> be single-use: the <tt>jti</tt> is
recorded in the Attribution-Record and <strong>MUST NOT</strong> be accepted a
second time.</t>
        <t>Recommended validity period: 300 seconds. Intent Assertions are not
designed to persist; they cover the interval between principal
authorization and transaction execution.</t>
      </section>
      <section anchor="forwarding-to-payment-networks">
        <name>Forwarding to Payment Networks</name>
        <t>The Intent Assertion is structured as a standalone JWT precisely so
that it can be forwarded. A payment network receiving a merchant's
authorization request <strong>MAY</strong> require the merchant to forward the
Intent Assertion alongside the standard payment message. The payment
network verifies the signature against the issuing governance
platform's public key and treats a valid assertion as evidence of
authenticated principal intent for the purposes of that network's
authorization and dispute policies.</t>
        <t>The specific mechanism for forwarding the Intent Assertion to a
payment network, and the network's treatment of a valid assertion,
is out of scope for this document. What this specification
guarantees is that the assertion exists, is cryptographically
verifiable without AGTP, and is bound to the principal, agent, and
merchant named in the PURCHASE.</t>
      </section>
    </section>
    <section anchor="cart-context">
      <name>Cart Context</name>
      <section anchor="the-single-item-limitation">
        <name>The Single-Item Limitation</name>
        <t>The PURCHASE method as defined in <xref target="AGTP-METHODS"/> accepts a single
<tt>item</tt> parameter and a single <tt>amount</tt>. Real-world agentic commerce
transactions frequently involve multiple line items, tax, shipping,
and per-line merchant-of-record variation. This document defines a
Cart Context mechanism layered over the existing QUOTE and PURCHASE
methods to accommodate structured carts without modifying the base
method definitions.</t>
      </section>
      <section anchor="quote-with-cart-payload">
        <name>QUOTE with Cart Payload</name>
        <t>A requesting agent constructs a structured cart and submits it via
QUOTE. The merchant server returns a signed <tt>cart_digest</tt> binding
the quoted cart content to a unique quote identifier.</t>
        <figure>
          <name>QUOTE with Structured Cart</name>
          <artwork><![CDATA[
AGTP/1.0 QUOTE
Agent-ID: agtp://agtp.traveler.tld/agents/trip-planner
Principal-ID: usr-chris-hood
Authority-Scope: budget:query merchant:query
Merchant-ID: agtp://acme.tld/merchant/acme-commerce
Session-ID: sess-trip-2026-04
Task-ID: task-quote-0421
Content-Type: application/agtp+json

{
  "method": "QUOTE",
  "task_id": "task-quote-0421",
  "parameters": {
    "cart": {
      "lines": [
        {"sku": "FLIGHT-AA2847", "qty": 1, "unit_price": 487.00},
        {"sku": "HOTEL-MRTN-2N", "qty": 1, "unit_price": 298.00},
        {"sku": "CAR-COMPACT-3D", "qty": 1, "unit_price": 42.17}
      ],
      "currency": "USD",
      "tax": 15.00,
      "shipping": 0.00
    }
  }
}
]]></artwork>
        </figure>
        <t>The response contains the quote identifier and the signed cart
digest:</t>
        <figure>
          <name>QUOTE Response with Cart Digest</name>
          <sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-quote-0421",
  "result": {
    "quote_id": "qt-7f3a9c",
    "cart_digest": "sha256:7c2f9a3e1b8d4f6a...",
    "total": {"value": 842.17, "currency": "USD"},
    "quote_valid_until": "2026-04-15T14:52:18Z",
    "quote_signature": {
      "algorithm": "ES256",
      "key_id": "merchant-key-acme-01",
      "value": "[base64-encoded-signature]"
    }
  }
}
]]></sourcecode>
        </figure>
      </section>
      <section anchor="purchase-referencing-a-cart-digest">
        <name>PURCHASE Referencing a Cart Digest</name>
        <t>The subsequent PURCHASE invocation references the quote identifier
and carries the cart digest in the <tt>Cart-Digest</tt> header, binding the
purchase to the previously quoted cart without retransmission of
line-item detail. The merchant server <strong>MUST</strong> verify the digest
against its stored quote record and <strong>MUST</strong> reject the PURCHASE
with 409 Conflict if the cart digest does not match a valid,
unexpired quote.</t>
      </section>
    </section>
    <section anchor="discover-integration">
      <name>DISCOVER Integration</name>
      <section anchor="merchant-queries-via-discover">
        <name>Merchant Queries via DISCOVER</name>
        <t>The DISCOVER method defined in <xref target="AGTP-DISCOVER"/> is extended by this
document to optionally return Merchant Manifest Documents. A
requesting agent signals a merchant-oriented discovery query by
including the <tt>result_type</tt> parameter with value <tt>"merchant"</tt>:</t>
        <figure>
          <name>DISCOVER Query Targeting Merchants</name>
          <artwork><![CDATA[
AGTP/1.0 DISCOVER
Agent-ID: agtp://agtp.traveler.tld/agents/trip-planner
Principal-ID: usr-chris-hood
Authority-Scope: discovery:query merchant:query
Session-ID: sess-trip-2026-04
Task-ID: task-disc-merch-01
Content-Type: application/agtp+json

{
  "method": "DISCOVER",
  "task_id": "task-disc-merch-01",
  "parameters": {
    "intent": "Ski rental in Park City accepting Amex",
    "result_type": "merchant",
    "merchant_category_codes": ["7999", "5941"],
    "accepted_payment_networks": ["amex"],
    "trust_tier_min": 1,
    "governance_zone": "zone:retail-verified",
    "limit": 5
  }
}
]]></artwork>
        </figure>
        <t>The ANS or MNS server returns a ranked result set of Merchant
Manifest Documents matching the query constraints. Ranking follows
the same composite scoring model defined in <xref target="AGTP-DISCOVER"/>
Section 3.4, with the following adjustments for merchant queries:</t>
        <ul spacing="normal">
          <li>
            <t><tt>behavioral_trust_score</tt> is replaced by <tt>merchant_reliability_
score</tt>, a governance-platform-assigned score reflecting the
merchant's dispute rate, chargeback history, and fulfillment
track record within the governance zone.</t>
          </li>
          <li>
            <t><tt>capability_match_score</tt> is replaced by <tt>catalog_match_score</tt>,
a relevance score between the query intent and the merchant's
declared catalog categories and merchant category code.</t>
          </li>
        </ul>
        <t>Merchant reliability scoring methodology is governance-platform-
defined and <strong>MUST</strong> be documented in the governance zone
specification. The raw score <strong>MUST</strong> be present in the Merchant
Manifest Document and signed by the governance platform; it
<strong>MUST NOT</strong> be merchant-asserted.</t>
      </section>
      <section anchor="unified-discover-queries">
        <name>Unified DISCOVER Queries</name>
        <t>A requesting agent <strong>MAY</strong> issue a DISCOVER query with <tt>result_type:
"any"</tt> to receive a mixed result set containing both Agent Manifests
and Merchant Manifests. This is useful for workflows where the agent
does not know in advance whether the capability it needs is best
satisfied by a peer agent or by a merchant transaction (e.g., "find
a service that can produce a translated legal document" where the
answer might be either a translation agent or a document-services
merchant).</t>
        <t>Mixed result sets include a <tt>result_class</tt> field on each entry with
value <tt>"agent"</tt> or <tt>"merchant"</tt>, enabling the requesting agent to
route each result to the appropriate downstream handling.</t>
      </section>
    </section>
    <section anchor="counterparty-unverified">
      <name>455 Counterparty Unverified</name>
      <section anchor="definition">
        <name>Definition</name>
        <t>This document registers AGTP status code 455 Counterparty Unverified.
The status is returned in any of the following conditions:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>Merchant-ID</tt> request header is absent on a PURCHASE
invocation.</t>
          </li>
          <li>
            <t>The <tt>Merchant-Manifest-Fingerprint</tt> request header is absent or
does not match the receiving server's current manifest.</t>
          </li>
          <li>
            <t>The Merchant-ID does not match the receiving server's canonical
Merchant-ID.</t>
          </li>
          <li>
            <t>The agent's pre-flight counterparty verification failed (returned
by the agent's own runtime before a PURCHASE is sent on the
wire).</t>
          </li>
          <li>
            <t>The target merchant is in a non-Active lifecycle state.</t>
          </li>
          <li>
            <t>The Merchant Manifest Document signature is invalid.</t>
          </li>
        </ul>
        <t>The response body <strong>MUST</strong> identify the specific verification
failure and <strong>MUST</strong> include the governance-platform-signed reason
code. The requesting agent <strong>MUST NOT</strong> retry the PURCHASE without
re-running counterparty verification against a fresh Merchant
Manifest Document.</t>
        <t>Status code 455 is a governance signal, not a protocol error, and
<strong>MUST</strong> be logged by both parties. It parallels the role of 451
Scope Violation and 453 Zone Violation in the AGTP status code
space: the system caught a governance condition at the protocol
layer, before any state-modifying side effect.</t>
      </section>
      <section anchor="retry-semantics">
        <name>Retry Semantics</name>
        <t>A 455 response in the following categories is non-retryable without
remediation:</t>
        <ul spacing="normal">
          <li>
            <t>Merchant in Revoked or Deprecated lifecycle state.</t>
          </li>
          <li>
            <t>Invalid Merchant Manifest signature.</t>
          </li>
          <li>
            <t>Merchant-ID mismatch.</t>
          </li>
        </ul>
        <t>A 455 response in the following categories is retryable after a
governance-defined interval:</t>
        <ul spacing="normal">
          <li>
            <t>Merchant in Suspended state (retry after state transitions to
Active).</t>
          </li>
          <li>
            <t>Fingerprint mismatch due to a legitimate manifest update (retry
after re-fetching the current manifest).</t>
          </li>
        </ul>
        <t>The response body <strong>MUST</strong> declare retry-eligibility via a
<tt>retryable</tt> boolean field and, where retryable, <strong>MAY</strong> declare a
<tt>retry_after</tt> timestamp.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="merchant-identity-forgery">
        <name>Merchant Identity Forgery</name>
        <t>Threat: An attacker publishes a Merchant Manifest Document claiming
to represent a legitimate merchant without having completed any of
the Trust Tier 1 verification paths.</t>
        <t>Mitigation: Trust Tier 1 registration requires one of the three
verification paths defined in <xref target="AGTP"/> Section 5.2 (<tt>dns-anchored</tt>
per <xref target="RFC8555"/>, <tt>log-anchored</tt> per <xref target="RFC9162"/> / <xref target="RFC9943"/>, or
<tt>hybrid</tt>) plus a governance-platform-signed business entity
attestation. The governance platform signs every Merchant Manifest;
requesting agents <strong>MUST</strong> verify the signature against the
governance platform's published key before trusting the manifest.
An unsigned manifest or one signed by an unrecognized platform
<strong>MUST</strong> be rejected. Requesting agents <strong>SHOULD</strong> maintain a trust
list of accepted governance platforms per governance zone.</t>
        <t>For <tt>dns-anchored</tt> merchants, an attacker who does not control the
claimed domain cannot complete the ACME challenge. For <tt>log-anchored</tt>
merchants, an attacker cannot forge a transparency log inclusion
proof without compromising the log operator. For <tt>hybrid</tt> merchants,
both DNS and blockchain signature controls must be defeated. The
verification path in use is recorded in the Merchant Genesis and
surfaced in the Manifest, enabling requesting agents to apply
path-appropriate verification during PURCHASE handshake.</t>
      </section>
      <section anchor="manifest-substitution-at-purchase">
        <name>Manifest Substitution at Purchase</name>
        <t>Threat: A requesting agent verifies Merchant Manifest A, but the
PURCHASE is received by an endpoint serving Merchant Manifest B.</t>
        <t>Mitigation: The <tt>Merchant-Manifest-Fingerprint</tt> header binds the
manifest the agent verified to the manifest the receiving server
presents. A mismatch produces 455 Counterparty Unverified. This
check is cryptographic and cannot be bypassed without compromising
the governance platform's signing key.</t>
      </section>
      <section anchor="intent-assertion-replay">
        <name>Intent Assertion Replay</name>
        <t>Threat: A captured Intent Assertion is replayed by an attacker to
authorize an unintended second purchase.</t>
        <t>Mitigation: Intent Assertions carry a unique <tt>jti</tt> and a short
<tt>exp</tt>. Receiving servers <strong>MUST</strong> record the <tt>jti</tt> in the
Attribution-Record and <strong>MUST</strong> reject any subsequent request
carrying a previously seen <tt>jti</tt>. The recommended maximum validity
is 300 seconds; implementations <strong>MAY</strong> apply shorter limits.
Governance platforms <strong>SHOULD</strong> maintain a zone-scoped cache of
consumed <tt>jti</tt> values for at least the maximum validity period.</t>
      </section>
      <section anchor="cart-digest-collision">
        <name>Cart-Digest Collision</name>
        <t>Threat: An attacker constructs a cart that produces the same digest
as a different, higher-value cart.</t>
        <t>Mitigation: The Cart-Digest algorithm <strong>MUST</strong> be a cryptographic
hash function resistant to collision attacks. SHA-256 is the
baseline requirement. The digest <strong>MUST</strong> be computed over a
canonical serialization of the cart payload to prevent ambiguity
between equivalent JSON representations.</t>
      </section>
      <section anchor="merchant-lifecycle-lag">
        <name>Merchant Lifecycle Lag</name>
        <t>Threat: A merchant is Revoked for fraud, but the Merchant Name
Service has not yet propagated the state change. A requesting agent
verifies the stale manifest and proceeds with PURCHASE.</t>
        <t>Mitigation: Governance platforms <strong>MUST</strong> propagate lifecycle state
changes to all indexing MNS servers within 60 seconds. MNS servers
<strong>MUST</strong> treat Revocation as urgent deregistration and <strong>MUST</strong>
remove the merchant from the result index before the next DISCOVER
request is processed. Requesting agents with strict assurance
requirements <strong>MAY</strong> set a maximum manifest age (e.g., re-fetch if
the manifest is older than 300 seconds) before accepting it for
PURCHASE.</t>
      </section>
      <section anchor="dispute-policy-uri-tampering">
        <name>Dispute Policy URI Tampering</name>
        <t>Threat: A merchant publishes a dispute policy URI that redirects to
a different policy after the PURCHASE is complete.</t>
        <t>Mitigation: The <tt>dispute_policy_uri</tt> field is part of the signed
Merchant Genesis and is included in the signed Merchant Manifest.
Requesting agents <strong>SHOULD</strong> retrieve and hash the dispute policy
document content at verification time and include the hash in the
Attribution-Record. Any subsequent change to the policy content can
be detected by comparing the archived hash to the current content.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Merchant Manifest Documents contain legal entity information and
payment network acceptance declarations. This data is generally
considered public commercial information and does not trigger the
same privacy protections as agent or principal identity data.
However, Merchant Name Service query logs reveal which agents are
shopping for which kinds of goods and <strong>MUST</strong> be treated with the
same access controls and retention limits applied to DISCOVER query
logs under <xref target="AGTP-DISCOVER"/>.</t>
        <t>Intent Assertions contain principal identifiers, merchant
identifiers, and amount ceilings. These are transactionally
sensitive. Intent Assertions <strong>MUST</strong> be treated as confidential
transport data and <strong>MUST NOT</strong> be logged in forms accessible
outside the governance zone in which they were issued.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="status-code-registration">
        <name>Status Code Registration</name>
        <t>This document requests registration of the following status code in
the IANA Agent Transfer Protocol Status Codes registry established
by <xref target="AGTP"/> Section 8.3:</t>
        <table>
          <name>Status Code 455 Registration</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Definition</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">455</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">The merchant counterparty in a PURCHASE invocation failed identity verification: the Merchant-ID or Merchant-Manifest-Fingerprint is absent, does not match, or the merchant is in a non-Active lifecycle state. Governance signal; <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 7</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="header-field-registration">
        <name>Header Field Registration</name>
        <t>This document requests registration of the following header fields
in the IANA Agent Transfer Protocol Header Fields registry
established by <xref target="AGTP"/> Section 8.4:</t>
        <table>
          <name>Header Field Registrations</name>
          <thead>
            <tr>
              <th align="left">Header</th>
              <th align="left">Status</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Merchant-ID</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 4.1</td>
            </tr>
            <tr>
              <td align="left">Merchant-Manifest-Fingerprint</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 4.1</td>
            </tr>
            <tr>
              <td align="left">Intent-Assertion</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 5</td>
            </tr>
            <tr>
              <td align="left">Cart-Digest</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 6</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="authority-scope-domain-registration">
        <name>Authority-Scope Domain Registration</name>
        <t>This document requests the addition of the following domains to the
reserved Authority-Scope domain set defined in <xref target="AGTP"/> Appendix A:</t>
        <table>
          <name>Authority-Scope Domain Registrations</name>
          <thead>
            <tr>
              <th align="left">Domain</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">merchant</td>
              <td align="left">Merchant identity resolution and counterparty verification</td>
            </tr>
            <tr>
              <td align="left">intent</td>
              <td align="left">Intent Assertion issuance and validation</td>
            </tr>
          </tbody>
        </table>
        <t>Actions defined for these domains:</t>
        <ul spacing="normal">
          <li>
            <t><tt>merchant:query</tt> -- Resolving a Merchant URI and retrieving a
Merchant Manifest Document.</t>
          </li>
          <li>
            <t><tt>merchant:verify</tt> -- Performing counterparty verification against
a Merchant Manifest Document as part of PURCHASE pre-flight.</t>
          </li>
          <li>
            <t><tt>intent:assert</tt> -- Issuing an Intent Assertion JWT on behalf of
the principal.</t>
          </li>
        </ul>
      </section>
      <section anchor="document-type-registrations">
        <name>Document Type Registrations</name>
        <t>The following document types are defined for use with the
<tt>application/agtp+json</tt> Content-Type:</t>
        <table>
          <name>AGTP Document Type Registrations</name>
          <thead>
            <tr>
              <th align="left">Document Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">merchant-genesis</td>
              <td align="left">Origin record of a merchant entity</td>
              <td align="left">This document, Section 3.1</td>
            </tr>
            <tr>
              <td align="left">agtp-merchant-manifest</td>
              <td align="left">Wire-level merchant identity document</td>
              <td align="left">This document, Section 3.4</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="AGTP">
          <front>
            <title>Agent Transfer Protocol (AGTP)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-05"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9943">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-METHODS">
          <front>
            <title>AGTP Standard Extended Method Vocabulary</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-00"/>
        </reference>
        <reference anchor="AGTP-DISCOVER">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="AGTP-LOG">
          <front>
            <title>AGTP Transparency Log Protocol</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-log-00"/>
        </reference>
        <reference anchor="AGTP-WEB3">
          <front>
            <title>AGTP Web3 Bridge Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
        </reference>
      </references>
    </references>
    <?line 1058?>

<section anchor="changes-from-v00">
      <name>Changes from v00</name>
      <t>Version 01 aligns the Merchant Identity draft with base AGTP v05 and
adopts the Agent Genesis identity taxonomy introduced in <xref target="AGTP-LOG"/>.</t>
      <t>Substantive changes:</t>
      <ol spacing="normal" type="1"><li>
          <t>Base AGTP reference updated from <tt>draft-hood-independent-agtp-04</tt>
to <tt>draft-hood-independent-agtp-05</tt>.</t>
        </li>
        <li>
          <t>Merchant Trust Tier 1 now supports three equivalent verification
paths matching the base AGTP verification paths: <tt>dns-anchored</tt>
(RFC 8555 ACME challenge), <tt>log-anchored</tt> (transparency log
inclusion per RFC 9162 with RFC 9943 SCITT receipts), and <tt>hybrid</tt>
(DNS control combined with blockchain address signature). The v00
DNS-only Tier 1 requirement is replaced by a multi-path model.
Path-specific merchant deployment profiles are documented, including
DNS-footprint-less merchants, marketplace-aggregated merchants, and
cross-jurisdictional commerce arrangements.</t>
        </li>
        <li>
          <t>The business entity attestation requirement is retained as an
additional Tier 1 requirement for merchants, reflecting the
elevated accountability needs of agentic commerce. This requirement
is independent of and additive to the verification path.</t>
        </li>
        <li>
          <t>"Merchant Birth Certificate" is renamed to "Merchant Genesis,"
adopting the Agent Genesis taxonomy introduced in <xref target="AGTP-LOG"/>.
The origin record's schema <tt>document_type</tt> value changes from
<tt>merchant-birth-certificate</tt> to <tt>merchant-genesis</tt>. The cross-
reference field <tt>birth_certificate_hash</tt> in the Merchant Manifest
Document is renamed <tt>genesis_hash</tt>.</t>
        </li>
        <li>
          <t>Both the Merchant Genesis and the Merchant Manifest Document now
carry a <tt>verification_path</tt> field declaring which of the three
Tier 1 paths was used at registration time. Requesting agents
<strong>MAY</strong> apply path-specific verification logic during the PURCHASE
handshake.</t>
        </li>
        <li>
          <t>Threat model updated: the Merchant Identity Forgery mitigation is
rewritten to cover all three verification paths. Each path's
attacker-resistance properties are noted.</t>
        </li>
        <li>
          <t>The <tt>org_domain</tt> field remains present in the Merchant Genesis
schema. For <tt>log-anchored</tt> merchants operating without a DNS
presence, the field <strong>MAY</strong> be omitted or populated with a log-
scoped identifier per the governance platform's conventions;
specification of non-DNS org_domain forms for merchants is deferred
to a future revision.</t>
        </li>
      </ol>
      <t>Version 01 does not change the wire format of the PURCHASE handshake,
the Intent-Assertion header, the Cart-Digest mechanism, or the 455
status code semantics. Implementations built against v00 require
changes only in the registration and identity-verification paths, not
in the transaction flow.</t>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="governance-platform-scope">
        <name>Governance Platform Scope</name>
        <t>A governance platform operating an AGTP registry <strong>MAY</strong> extend its
registry to cover both agents and merchants, or it <strong>MAY</strong> operate
separate agent and merchant registries under the same governance
zone. The registry schema for merchants is structurally parallel to
the agent registry schema, reducing implementation effort.</t>
      </section>
      <section anchor="mns-co-location">
        <name>MNS Co-location</name>
        <t>Merchant Name Service functionality <strong>MAY</strong> be co-located with an
existing Agent Name Service, particularly for governance zones
where the agent-to-merchant ratio is low. In this case, the DISCOVER
method serves both result types through the <tt>result_type</tt> parameter.
The same access control, rate limiting, and federation semantics
apply.</t>
      </section>
      <section anchor="payment-network-integration-path">
        <name>Payment Network Integration Path</name>
        <t>This specification is designed to be consumable by payment networks
without requiring those networks to implement AGTP. The Intent
Assertion is a standalone JWT verifiable with only the governance
platform's public key; the merchant identity attestation is a signed
JSON document verifiable with the same key. Payment networks wishing
to extend protection or dispute handling to agent-initiated
transactions <strong>MAY</strong> consume these artifacts as inputs to their
existing authorization and dispute message flows without protocol-
level integration with AGTP itself.</t>
        <t>The specific mapping of Intent Assertion claims to payment network
authorization message fields, and of Attribution-Record content to
dispute evidence formats, is expected to be defined bilaterally
between governance platforms and individual payment networks. Those
mappings are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author thanks the American Express Agentic Commerce Experiences
working group for public specification of the commercial requirements
that motivated this document. The structural parallelism between
agent identity and merchant identity in AGTP owes its clarity to the
Amex ACE five-service model: agent registration, account enablement,
intent intelligence, payment credentials, and cart context. This
document addresses the transport-layer identity gap that complements
the payment-rail work described there.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
