Replies: 2 comments
-
|
Great proposal. The assertion-based model and pluggable anchor architecture align well with what we've been building at InsumerAPI. We provide on-chain verification across 31 EVM chains (Ethereum, Base, Polygon, Arbitrum, etc.) through a single REST endpoint ( In the context of this extension, InsumerAPI could function as a verification provider for token-based trust signals. For example, a merchant could issue loyalty or membership tokens on-chain, and an AI agent could verify a customer's holdings at checkout via our API before applying a discount, fitting naturally into the We already have an MCP server (16 tools, published to the Official MCP Registry), a LangChain integration, and an OpenAPI spec, so agent integration is straightforward. Happy to collaborate on how on-chain token verification could map to the assertion vocabulary and trust framework model here. Specifically re: Open Question #1, we'd suggest adding assertions like |
Beta Was this translation helpful? Give feedback.
-
|
Strong proposal. The assertion-based model is the right architecture for merchant verification. I want to raise a related problem from the other direction: agent verification. Your proposal answers "Can I trust this merchant?" for the agent. The inverse question is equally important: "Can I trust this agent?" for the merchant. As agentic commerce scales, merchants will receive requests from thousands of agents with varying levels of reliability. A merchant needs to distinguish between an agent with a proven track record of completing transactions cleanly and one that was created yesterday, has no history, and is accessing data it didn't declare it would need. We've built an open spec for this called MCP-T (Model Context Protocol, Trust Extension) that approaches agent trust with a similar philosophy to what you're proposing for merchants: Shared design principles:
Where MCP-T adds to the picture:
v0.2.0 additions particularly relevant to commerce:
The two extensions would work together naturally. A merchant's UCP profile could express both: "I require enhanced business verification for my own credibility" (your extension) AND "I require agents with composite >= 600 and behavioral_fidelity >= 700 to reach checkout" (MCP-T). Integration guide for UCP: MCP-T + UCP Integration Guide Full spec (CC-BY-4.0): https://github.com/Percival-Labs/mcp-t Re: your Open Question #7 (how should platforms express verification requirements to merchants), MCP-T's threshold model in the UCP profile extension might be a useful pattern. Happy to discuss further. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I have been thinking about how best to leverage UCP as it would help facilitate agentic commerce between buyers and sellers. One core foundation I feel is still lacking in e-commerce as a whole is: as a buyer, how do I trust that I am buying from a reputable merchant/brand/etc.?
Today, trust signals are fragmented—marketplaces have their own seller verification badges, payment processors do their own KYB checks, and none of this information flows to the buyer or their agent in a standardized way. When an AI agent is shopping on my behalf, it has no protocol-level way to answer "should I trust this merchant?"
I believe UCP is well-positioned to solve this with a Business Verification extension, and I'd like to propose one for discussion.
Summary
This proposal introduces a Business Verification Extension for UCP that enables platforms and AI agents to evaluate merchant legitimacy through standardized trust signals. The extension provides:
Problem Statement
As agentic commerce grows, AI agents need to make autonomous purchasing decisions on behalf of users. A critical question these agents must answer is: "Can I trust this merchant?"
Current approaches have limitations:
Proposed Solution
A comprehensive Business Verification extension with the following components:
1. Assertion-Based Trust Model
Instead of transmitting PII, the protocol transmits assertions (verified facts):
{ "assertions": [ "legal_entity_exists", "registration_valid", "registration_jurisdiction:US", "address_verified", "principals_verified", "operational_years:3+" ] }Core Assertions:
legal_entity_existsregistration_validaddress_verifiedwebsite_verifiedemail_verifiedphone_verifiedprincipals_verifiedParameterized Assertions:
registration_jurisdiction:US,operational_years:3+,compliance:pci_dssCustom Assertions: Provider-specific using reverse-domain naming (e.g.,
com.dnb.paydex:80+)2. Trust Framework & Assurance Levels
Verifications operate under explicit trust frameworks with defined assurance levels:
{ "trust_framework": "dev.ucp.kyb_v1", "assurance_level": "enhanced" }Proposed
dev.ucp.kyb_v1Levels:legal_entity_exists,website_verifiedregistration_valid,address_verifiedprincipals_verified3. Verification Providers
Third-party providers issue verification credentials:
{ "provider": { "id": "com.trustplatform", "name": "TrustPlatform Inc.", "did": "did:web:trustplatform.example.com" } }Platforms decide which providers they trust, similar to payment handlers.
4. Optional Cryptographic Credentials
SD-JWT Verifiable Credentials provide cryptographic proof of assertions:
5. Optional Immutable Anchoring
For high-trust scenarios, verification can be anchored to immutable stores:
Proposed Anchor Types:
hedera_hcsethereumbitcoin_otssignature_onlyAnchors can include Merkle proofs for batched verification scenarios.
Example
Checkout Response with Business Verification:
{ "id": "chk_abc123", "status": "ready_for_complete", "business_verification": { "status": "verified", "trust_framework": "dev.ucp.kyb_v1", "assurance_level": "enhanced", "provider": { "id": "com.trustplatform", "name": "TrustPlatform Inc." }, "assertions": [ "legal_entity_exists", "registration_valid", "registration_jurisdiction:US", "address_verified", "website_verified", "principals_verified", "operational_years:3+" ], "verified_at": "2024-01-15T10:30:00Z", "expires_at": "2025-01-15T10:30:00Z" } }Design Principles
Relationship to Existing Standards
trust_framework+assurance_levelpattern; focuses on entity (not individual) verificationorg.gleif.lei:verified)Use Cases
Open Questions
dev.ucp.kyb_v1requirements, or allow providers to define frameworks?I would love to get feedback on the overall potential architecture and how this might fit into existing UCP capabilities.
If there's interest, I'm happy to collaborate on developing a detailed specification.
Beta Was this translation helpful? Give feedback.
All reactions