Skip to content

UNIKEY PROTOCOL

The Missing Authority Layer
of the Internet

The Missing Authority Layer of the Internet

The internet was built to move information.
It was never built to prove authority.

They verify the agent. UniKey verifies the action.

THE PROBLEM

Identity Is Not Authorization

Every credential, password, token, and session ever created is a patch on the internet’s original omission. A stolen credential can pass identity checks designed to verify who is acting  not whether the action is authorized.

“Was this action explicitly authorized — before it executed?”

$28B

Card-not-present fraud
projected 2026

$23B

Account takeover fraud,
US 2023

97%

of Orgs saw AI-facilitated
attacks rise in 2025

THE SOLUTION

The Authorization Layer.
Positioned Between Identity and Execution.

LAYER 1

Identity & Agent Trust

Is this a known, trusted agent?

  • Visa Trusted Agent Protocol
  • Cloudflare Web Bot Auth
  • Google Agent Payments Protocol
  • Agentic Commerce Protocol

LAYER 2

UniKey Authorization

Was this specific action explicitly authorized before it executed?

  • Trust Packets
  • Authorization Certificates
  • Authority Anchors
  • Authorization Ledgers

LAYER 3

Payment Execution

How do payments move securely?

  • Stripe Shared Payment Tokens
  • Visa Network
  • Mastercard
  • Network Tokenization

They verify the agent. UniKey verifies the action.

CORE ARCHITECTURE

Four Cryptographic Primitives.
One Authority Layer.

01

Authority Anchors

Who holds the authority to act?

Any person, device, or enterprise system that establishes cryptographic authority through domain-based keys, leveraging globally deployed DNS-based key distribution. Authority is expressed through domain-based keys and independently verifiable by counterparties.

02

Trust Packets

Was this action authorized before execution?

Per-action authorization proofs — self-contained, cryptographically signed, non-replayable, and verified in milliseconds via DNS-based key lookup. Every digital action carries one before execution. Verification is deterministic — any ambiguity or failure results in rejection.

03

Authorization Certificates

What is the tamper-evident record?

Hash-chained records of complete multi-party transaction sequences. Each Trust Packet incorporates a cryptographic hash of all preceding packets. Modify any step and the entire chain breaks. All public keys embedded, enabling self-contained verification.

04

Authorization Ledgers

Where is the permanent record?

Distributed, append-only records of Authorization Certificates. Each party can maintain an independently verifiable record without relying on UniKey-operated central infrastructure or shared consensus infrastructure. Permanent audit infrastructure by default.

 

FULL DEPLOYMENT OUTCOMES

What Changes

When the Authorization Layer Exists

Fraud

Scalable credential-based fraud structurally eliminated

Attackers require a valid Trust Packet signed by a key that never leaves the device. Stolen credentials cannot produce one. Fraud cannot scale.

$442B

Global fraud losses 2025
(INTERPOL)

AI Economy

The agentic internet bottleneck resolved

AI agents cannot currently act freely across the internet,  no authorization infrastructure exists for them. UniKey is that infrastructure. The constraint is removed.

$15.7T

AI economic impact projected by 2030 (PwC)

Data Breaches

Credential theft removed as a breach vector

No credential in transit means no credential to intercept, store, or steal. The attack surface that accounts for 80%+ of breaches no longer exists.

$9.4M

Average cost of a data breach, US 2024 (IBM)

THE CASE

The Most Significant Cybersecurity Advance
Since the Advent of SSL

80%+

OF ALL DATA BREACHES ORIGINATE FROM STOLEN CREDENTIALS

UniKey removes credentials from the transaction entirely.

Not better credential protection.

Not stronger encryption of credentials in transit.

No credential. No theft. No breach vector.

Source: Verizon Data Breach Investigations Report 2024

FOUNDING PARTNERS

Sending is Free.
Verification is Where Value is Exchanged.

Sending

Free for all participants

Any entity can send Trust Packets at no cost. Founding partners receive preferential terms on the commercial layer.

Verification

Infrastructure operators

Payment networks, carriers, SASE platforms, and enterprise gateways operate verification endpoints.

Licensing

ARM-style open standard

The protocol is open. Licensing fees apply to the ecosystem — payment rails, device manufacturers, global telecoms.

Active conversations with:

AI Agent Platforms
Payment Networks
Telecommunications Carriers
Device Manufacturers
Enterprise Security Platforms

Discuss Founding Partner Status

OPEN STANDARD

Explore the Specifications

UniKey is a fully specified open standard. All RFC specifications are publicly available for evaluation on GitHub.
Submitted to NIST NCCoE AI Agent Identity and Authorization framework as a recommended solution.

LAYER 1   •  CORE

RFC-1000

Master Index

LAYER 2   •  PROTOCOL

RFC-2001

Trust Packet Format & Canonicalization

LAYER 3   •  DISCOVERY

RFC-3001

Verifier DNS Hardening Algorithm

LAYER 4   •  DEVICE AUTHORITY

RFC-1300

Device & OS Integration Model

LAYER 5   •  AUTHORIZATION

RFC-5003

Authorization Flow & Verification Architecture

LAYER 6   •  DELEGATION

RFC-1200

Delegation Profile

Intellectual Property & Patents

UniKey is protected by an international portfolio of issued and pending patents covering:

• Distributed cryptographic authorization
• Replay resistance mechanisms
• DNS-based key validation
• Trust Packet architecture
• Cross-domain authority verification

The portfolio includes over 100 granted
and pending patents across multiple jurisdictions.

BUSINESS MODEL

Global Verification Services

The Visa Parallel

Visa does not move money. Visa verifies transactions and licenses the network.
UniKey does not authorize actions. UniKey licenses the protocol to those who do.

Verification Fees

Per-Action Revenue

Every Trust Packet verified by a network operator generates a micro-fee. At agentic commerce scale — billions of agent actions daily — this is a metered infrastructure revenue model with no natural ceiling.

Licensing Fees

Protocol Royalties

Payment networks, telecoms, device manufacturers, and enterprise platforms license the UniKey protocol to operate verification endpoints. ARM-style: open standard, licensed ecosystem.

Ledger Services

Data Intelligence

Authorization Ledgers generate real-time authorization intelligence as a byproduct of every transaction. Fraud detection, compliance reporting, and audit services built on the ledger.

Sending Trust Packets is free. Verification is where value is exchanged.
Every agentic transaction. Every device provisioning. Every enterprise API call.

CYBERSECURITY PRODUCTS

Authorization Intelligence

From Ledger Data

Every UniKey transaction produces an Authorization Certificate. Aggregated across billions of transactions, the Authorization Ledger becomes a real-time map of what was authorized, by whom, through which authority chain — generated as a byproduct of normal operation, not as a separate data collection exercise.

Fraud Detection

Real-time anomaly detection

Ledger patterns reveal authorization anomalies – agents acting outside delegated scope, unusual authority chains, replay attempts – before damage occurs.

Compliance Reporting

Automated audit trails

Every regulated transaction has a tamper-evident Authorization Certificate. Compliance reports generated automatically from ledger data. No manual reconstruction.

Threat Intelligence

Cross-network pattern analysis

Authorization patterns across the global network reveal coordinated attack signatures invisible to any single operator. Network-level threat intelligence sold as a service.

Risk Scoring

Authority chain risk models

ML models trained on authorization ledger data produce real-time risk scores for agent actions, provisioning events, and enterprise API calls before execution.

The ledger is not a product that must be built. It is a byproduct of every transaction –
intelligence that accumulates automatically as the network grows.

DISTRIBUTED AUTHORITY

Authority is Not Granted from a Center

THE OLD MODEL

Central authority
grants permission.

  • One server decides what is authorized
  • Compromise the center – compromise everything
  • Every action waits for permission from above
  • Single point of failure. Single point of control.

UNIKEY MODEL

Authority lives
at the edges.

  • Every domain, every device, every agent holds its own authority anchor
  • Verification is peer-to-peer against DNS – no center required
  • No UniKey server grants permission. UniKey coordinates the proof.
  • 5 billion authority anchors. No single point of failure

“The internet was built to move information. It was never built to prove authority.
UniKey is the distributed authority layer the internet was always missing.”

UNIKEY PROTOCOL

The Distributed Authority Layer
The Internet was Always Missing

They verify the agent. UniKey verifies the action.