Core Concepts & Terminology
Core concepts and terminology for Kite's agent-native infrastructure
Essential building blocks that enable autonomous agent operations in Kite's ecosystem.
Core Entities
User
Human principal who owns and controls AI agents:
Manages master wallets (root of cryptographic trust)
Delegates capabilities while maintaining ultimate authority
Sets global policies that cascade through all agents
Remains legally responsible for agent actions
Agent
Autonomous program acting on behalf of a user:
Executes complex tasks across multiple services
Handles real money within cryptographically enforced boundaries
Maintains own wallet and reputation
Bound to user through BIP-32 derivation
Service
External offerings that agents interact with:
Data APIs, GPU providers, SaaS applications
Integrate via MCP, A2A, or OAuth protocols
Maintain sovereignty over access policies
Merchant/Provider
Business operators who make services discoverable:
Define SLAs with automatic penalties
Establish reputation through verifiable performance
Transform B2B services into plug-and-play agent resources
Identity & Trust Infrastructure
Kite Passport
Cryptographic identity card that:
Creates complete trust chain from user to agent to action
Binds to existing identities (Gmail, Twitter) via cryptographic proofs
Contains capabilities: spending limits, service access
Enables selective disclosure (prove ownership without revealing identity)
Decentralized Identifier (DID)
Globally unique, cryptographically verifiable identifiers:
User:
did:kite:alice.ethAgent:
did:kite:alice.eth/chatgpt/portfolio-manager-v1Makes authority chains instantly verifiable
Verifiable Credentials (VCs)
Cryptographically signed attestations proving:
Compliance training completion
Trading licenses
Reputation thresholds
Enable fine-grained access control
Proof of AI
Immutable, tamper-evident logs anchored to blockchain:
Complete lineage from user authorization to final outcome
Indisputable evidence for disputes
Full transparency for regulators
Wallet Architecture
EOA Wallet (Externally Owned Account)
Traditional blockchain wallet controlled by private key:
Root of authority in Kite's architecture
Lives in secure enclaves, hardware security modules, or protected device storage
Never exposed to agents, services, or the Kite platform itself
Signs initial authorizations that delegate specific powers to agent operations
Users maintain ultimate control with ability to instantly revoke all delegated permissions
AA Wallet (Smart Contract Account)
Programmable accounts with built-in logic enabling revolutionary agent payment capabilities:
Account Abstraction Features:
Write smart contract code that governs spending
Bundle transaction execution for efficiency
Allow third parties to pay gas fees (gasless transactions)
Interact with multiple accounts simultaneously
Perform cross-program communications
Integrate customized logic for complex workflows
Unified Account Model:
User owns a single on-chain AA account holding shared funds in stablecoins
Multiple agents (Claude, ChatGPT, Cursor) operate this account via their own session keys
Each agent operates only within its authorized limits enforced by smart contracts
Result: One treasury, per-session risk isolation, fine-grained auditable control
No fund fragmentation, no complex reconciliation, elegant unified management
Implementation:
addSessionKeyRule(
address sessionKeyAddress, // Newly generated session key
bytes32 agentId, // Agent performing the actions
bytes4 functionSelector, // Allowed function (e.g., pay())
uint256 valueLimit // Maximum transaction value
)Embedded Wallets
Self-custodial wallets integrated directly into applications:
Users don't manage seed phrases or private keys, yet maintain complete control
One-click agent authorization and automatic session management
Transparent fund flows - users think in dollars, not tokens
Makes blockchain invisible while preserving cryptographic guarantees
Agent Payment Protocol
Comprehensive system enabling payment flows impossible with traditional infrastructure:
Capabilities:
Micropayments: Down to fractions of cents ($0.000001 per message)
Streaming payments: Flow continuously based on usage (per-second, per-token)
Pay-per-inference models: Every API call carries value
Conditional payments: Release based on performance verification
Instant settlement: No waiting periods, real-time value transfer
Global reach: Borderless payments without currency conversion
Integration:
Programmatic commerce where every interaction becomes a micropayment
Works seamlessly with state channels for off-chain efficiency
Supports both on-chain and off-chain settlement patterns
On/Off-Ramp API
The bridge between traditional finance and the agent economy:
Capabilities:
Integration with providers like PayPal and banking partners
Users fund agent wallets with credit cards
Merchants withdraw earnings to bank accounts
Handles compliance, fraud prevention, and currency conversion invisibly
User Experience:
Users never need to understand blockchain
Think in dollars in and dollars out
Makes agent payments accessible to billions who will never own crypto
Governance & Safety
SLA (Service-Level Agreement) Contracts
Smart contracts that transform vague service promises into mathematically enforced guarantees:
Unlike Traditional SLAs (legal enforcement, manual claims): Kite SLAs automatically execute penalties and rewards through smart contract code.
Example Guarantees:
Response time: <100ms with automatic penalties for violations
Availability: 99.9% uptime with automatic pro-rata refunds for downtime
Accuracy: <0.1% error rate or reputation slashing for errors
Throughput: 1,000+ requests/second minimum guaranteed capacity
Implementation Details:
SLA metrics (latency, uptime, accuracy, throughput) measured off-chain by service telemetry
Oracle submits signed attestations or zk/TEE proofs translating off-chain readings to on-chain facts
Contracts evaluate oracle reports to trigger refunds, penalties, or reputation slashing automatically
Result: Trust through code rather than courts. No legal disputes, just programmatic execution.
Programmable Trust / Intent-Based Authorization
Users express intentions through mathematical constraints that compile to blockchain enforcement:
Spending Rules (On-Chain): Asset or stablecoin-related rules leveraging programmable money:
Spending caps: Cannot be exceeded even if agent tries
Rolling windows: "$1,000 per day" enforced at protocol level
Whitelisted merchants: Only authorized recipients can receive funds
Conditional logic: "If volatility >20%, reduce limits by half"
Evaluated entirely on-chain through smart contracts for transparency and decentralization. Integrates with any on-chain account. Common use cases: spending limits, temporal constraints, merchant restrictions.
Policies (Off-Chain): Full control and flexibility for complex logic:
Evaluated securely off-chain in user's local environment or Kite's TEE (Trusted Execution Environment)
Platform-specific but can integrate third-party systems
Common use cases: Session TTL, operation categories, recipient allowlists
Key Distinction:
Spending Rules: Blockchain-enforced, unstoppable, decentralized
Policies: Flexible, complex, platform-optimized
Intent Characteristics:
Automatically expire preventing forgotten authorizations
Cannot be exceeded regardless of agent behavior or model hallucination
User's intent becomes immutable law enforced mathematically
Session Keys / Ephemeral Keys
Temporary cryptographic keys implementing zero-trust session management:
Generation:
Created for each agent task
Completely random, never derived from permanent keys
Ensures perfect forward secrecy
Authorization Scope: Example: "Transfer maximum $10 to providers A, B, or C for data feeds between 2:00 PM and 2:05 PM today"
Specific amount limits
Defined recipient set
Narrow time window
Single operation purpose
Security Properties:
Session executes its authorized operation then becomes cryptographically void forever
Total session compromise affects only one operation for minutes with bounded value
Prevents cascading failures that plague traditional API key systems
One breach ≠ total compromise
Local Generation:
Happens entirely locally without server communication
No private key transmission
DID session registers in agent network with self-contained proof of authority
Programmable Escrow Contracts
Kite extends beyond direct payments with programmable escrow mechanisms embedding smart contracts between agents and merchants:
Framework:
Buyers issue cryptographically signed payment intents
Funds authorized into escrow accounts with defined expiry conditions
Escrows can be partially or fully released based on verified outcomes
Supports complete lifecycle: authorization, capture, charge, void, reclaim, refund
Key Properties:
Noncustodial: Users retain full control over assets throughout process
Permissionless: No central authority required
Additional operators: Third-party entities can relay transactions or cover gas costs
Cryptographically constrained: All operators bound by payer's signed hash
Standards Integration:
Leverages ERC-3009 for signature-based gasless preapprovals
Streamlines execution and user experience
Programmability: As implemented in code, can be extended with:
Dynamic revenue sharing
Token swaps
Conditional privacy modules
Integration with other smart contracts
Result: Every transaction becomes auditable, reversible, and composable financial primitive.
Reputation System
Trust scores accumulated based on verifiable behavior, not self-reported ratings:
How Reputation Accumulates:
Successful payments: Increase reputation score
Fast responses: Boost ratings
Failed deliveries: Decrease trust
SLA violations: Trigger penalties
Policy violations: Reputation slashing
Key Difference from Traditional Systems: Unlike traditional ratings that can be gamed, Kite's reputation derives from cryptographic proofs of actual behavior. Every interaction is verified and immutable.
Benefits of High Reputation:
Access to better rates
Higher spending limits
Premium services
Preferential treatment
Portability:
Reputation is portable across services
Solves cold-start problem where new relationships begin from zero trust
Agent with proven history on one platform presents verifiable credentials to new services
Bootstrap trust through cryptographic proof rather than promises
Trust Dynamics:
Progressive Authorization: New agents start with minimal permissions ($10 daily limits)
Behavioral Adjustment: Successful operations automatically expand capabilities over time
Verification Economics: Expensive verification avoided for high-reputation agents
Three-Layer Identity Architecture
The three-tier identity model provides defense-in-depth security where compromising a session affects only one delegation, compromising an agent remains bounded by user-imposed constraints, and user keys are highly unlikely to be compromised as they're secured in local enclaves.
User Identity (Root Authority)
The cryptographic root of trust with ultimate control:
Key Management:
Private keys live in secure enclaves, hardware security modules, or protected device storage
Never exposed to agents, services, or the Kite platform itself
Users maintain exclusive control over digital wealth
Authority:
Can instantly revoke all delegated permissions with single transaction
Sets global constraints that cascade through all agents
Represents the only point of potential unbounded loss (highly unlikely to occur)
Monitoring:
Complete monitoring via immutable proof chains
Independent access to funds through standard blockchain interfaces
Cryptographic guarantee of sovereignty regardless of Kite's availability
Legal Responsibility:
Remains legally responsible entity for all agent actions
Bridge between traditional legal frameworks and autonomous systems
Agent Identity (Delegated Authority)
Each AI agent receives its own cryptographic identity with bounded authority:
Key Derivation:
Deterministic address mathematically derived from user's wallet using BIP-32 hierarchical key derivation
Example: ChatGPT portfolio manager might have address
0x891h42Kk9634C0532925a3b844Bc9e7595f0eB8CAnyone can verify agent belongs to user through cryptographic proof
Agent cannot reverse derivation to access user's private key
Capabilities:
Executes complex tasks across multiple services
Handles real money within cryptographically enforced boundaries
Maintains own wallet with own balance
Accumulates own reputation score
Coordinates with other agents autonomously
Security Properties:
Provable ownership without key exposure
Independent operation within user-defined boundaries
Even total agent compromise remains bounded by smart contract constraints
Cannot exceed spending limits or violate user policies
Identity Resolution:
Human-readable identifiers:
did:kite:alice.eth/chatgpt/portfolio-manager-v1Makes authority chains instantly verifiable
Serves as on-chain identity for authorization
Session Identity (Ephemeral Authority)
For each task execution, completely random session keys provide perfect forward secrecy:
Generation:
Completely random session key (e.g.,
0x333n88Pq5544D0643036b4c955Cc8f8706g1dD9E)Never derived from wallet or agent keys
Ensures perfect forward secrecy
Generated entirely locally without server communication
Authorization:
Single-use authorization tokens executing specific actions
No exposure of permanent credentials
Self-contained proof of authority, chain of trust, and validity period
Expiration:
Session validates through its time window then becomes permanently invalid
Even quantum computers cannot resurrect expired sessions
Automatic cleanup prevents forgotten sessions from becoming vulnerabilities
Security Impact:
Compromising session key affects only that session's operations
Past and future sessions remain secure due to independent key generation
Minimizes blast radius of any security breach
Unified Reputation Flow
While funds remain compartmentalized for security, reputation flows globally:
Every transaction and interaction contributes to unified reputation score
Reputation accumulated by user-agent pair benefits both entities
Establishes cryptographic root of trust spanning users, agents, and services
Creates portable trust that transfers across platforms
Cryptographic Security Components
Standing Intent (SI)
The root of cryptographic authority representing the user's signed declaration of what an agent may do:
Structure:
SI = sign_user(
iss: user_address, // Issuer: the authorizing user
sub: agent_did, // Subject: the authorized agent
caps: { // Capabilities: hard limits
max_tx: 100, // Maximum per transaction
max_daily: 1000 // Maximum daily aggregate
},
exp: timestamp // Expiration: automatic revocation
)Properties:
Signed with user's private key becomes immutable root of trust
Every subsequent operation must trace back to valid SI
Capabilities define mathematical boundaries that cannot be exceeded
Expiration ensures forgotten authorizations cannot persist indefinitely
Cannot be forged without user's private key (cryptographic hardness of ECDSA/EdDSA)
Delegation Token (DT)
Agent authorization for specific sessions enabling operations without exposing permanent credentials:
Structure:
DT = sign_agent(
iss: agent_did, // Issuer: the delegating agent
sub: session_pubkey, // Subject: the session key
intent_hash: H(SI), // Link: hash of Standing Intent
operation: op_details, // Scope: specific operation
exp: now + 60s // Expiration: short lived (typically 60s)
)Properties:
Cryptographically proves agent authorized this session for this operation
Hash linkage ensures agent cannot exceed user-defined Standing Intent limits
Short expiration minimizes exposure from compromised sessions
Operation scope prevents session reuse for unauthorized actions
Session Signature (SS)
Final cryptographic proof for transaction execution:
Structure:
SS = sign_session(
tx_details, // Complete transaction data
nonce, // Replay prevention
challenge // Freshness proof
)Verification Flow: Services verify all three signatures before accepting operations:
Standing Intent proves user authorization
Delegation Token proves agent delegation
Session Signature proves current execution
This triple verification makes unauthorized actions cryptographically impossible (not merely prohibited).
Protocol Compatibility
Identity Resolution
Public resolvers enable instant verification without contacting Kite or the user:
Resolution Functions:
GetAgent(AgentID)→ AgentID, AgentDomain, AgentAddressResolveAgentByDomain(AgentDomain)→ AgentID, AgentDomain, AgentAddressResolveAgentByAddress(AgentAddress)→ AgentID, AgentDomain, AgentAddressGetAgentBySession(SessionID)→ AgentID, AgentDomain, AgentAddress, SessionInfo
Benefits:
Any service can verify complete authority chain
No API calls to central authority required
Enables permissionless interoperability
Instant trust verification based on cryptographic proof
Native Protocol Support
A2A Protocol (Agent-to-Agent):
Direct agent coordination across platforms
Google's protocol for inter-agent communication
Kite agents speak A2A fluently with agents from any ecosystem
Agent Payment Protocol (AP2):
Neutral, open protocol defining how agent payments should be expressed
Similar to ERC-20 for payments
Kite plays the execution layer: enforces AP2 intents on-chain with programmable spend rules
MCP (Model Context Protocol):
Model interoperability across entire LLM ecosystem (Anthropic's protocol)
Claude, GPT, and emerging models interact through same protocol layer
Makes model choice business decision rather than technical constraint
OAuth 2.1:
Enterprise compatibility with existing authentication systems
Backward compatibility means existing services accepting OAuth today can accept Kite agents tomorrow
Minimal changes required for service integration
X402 Standard:
Agent-native payments for future developments
Forward compatibility with emerging payment standards
Integration Approach: Rather than creating isolated protocol, Kite embraces existing standards as first principles. Developers don't choose between Kite and existing stack—they add Kite to enhance what already works.
State Channels and Micropayments
Payment Channel Architecture
Direct money transfers work for occasional payments but fail for agent patterns. State channels enable off-chain transactions with two on-chain anchors:
Mechanics:
Open: Lock funds on-chain
Transact: Exchange thousands of signed updates off-chain
Close: Settle final state on-chain
Performance:
High throughput (thousands of transactions per channel)
Low latency (sub-100ms)
Fees amortized across millions of interactions
AI inference at $1 per million requests becomes economically viable
Channel Variants
Unidirectional Channels:
Flow value from user to merchant
Perfect for API consumption, data feeds, inference requests
Value flows one direction with simple metering
Bidirectional Channels:
Enable refunds, credits, two-way value exchange
Services can pay agents for data
Agents can receive rebates
Errors trigger automatic refunds
Programmable Escrow Channels:
Embed custom logic in state transitions
EVM developers write arbitrary rules
Conditional releases, multi-party splits, time-locked vesting
Channel becomes mini smart contract
Virtual Channels:
Route value through intermediaries without new on-chain contracts
Agent A pays Agent C through hub B
Network effects without setup overhead
Privacy-Preserving Channels:
Only channel opens and closes appear on-chain
Thousands of micropayments remain private between participants
Protects competitive intelligence and usage patterns
How Channel Limitations Become Advantages
State channels have known limitations from Ethereum origins, but agent use patterns transform these into features:
Open/Close Overhead:
Agents send hundreds of inferences to same service over minutes
Setup costs amortize perfectly across concentrated bursts
"Overhead" becomes negligible
Liveness Assumption:
Professional services with reputation at stake won't risk fraud for micropayments
Services maintain high availability in their best interest
Griefing Attacks:
Agents and services maintain reputation scores
Griefing destroys reputation for minimal gain (economically irrational)
Fixed Participants:
Agent interactions naturally have fixed participants (user, agent, service)
Relationships determined at task initiation
Inability to change participants adds security
Sequential Processing:
Agent interactions inherently turn-based: request → response → request
Limitation perfectly matches use case
Last updated
