Skip to content

UNIKEY PROTOCOL

The Missing Authority Layer
of the Internet

The Missing Authority Layer of the Internet

The internet was built to move information.
It was never built to prove authority.

They verify the agent. UniKey verifies the action.

THE PROBLEM

Identity Is Not Authorization

Every credential, password, token, and session ever created is a patch on the internet’s original omission. A stolen credential can pass identity checks designed to verify who is acting  not whether the action is authorized.

“Was this action explicitly authorized — before it executed?”

$28B

Card-not-present fraud
projected 2026

$23B

Account takeover fraud,
US 2023

97%

of Orgs saw AI-facilitated
attacks rise in 2025

THE SOLUTION

The Authorization Layer.
Positioned Between Identity and Execution.

LAYER 1

Identity & Agent Trust

Is this a known, trusted agent?

  • Visa Trusted Agent Protocol
  • Cloudflare Web Bot Auth
  • Google Agent Payments Protocol
  • Agentic Commerce Protocol

LAYER 2

UniKey Authorization

Was this specific action explicitly authorized before it executed?

  • Trust Packets
  • Authorization Certificates
  • Authority Anchors
  • Authorization Ledgers

LAYER 3

Payment Execution

How do payments move securely?

  • Stripe Shared Payment Tokens
  • Visa Network
  • Mastercard
  • Network Tokenization

They verify the agent. UniKey verifies the action.

CORE ARCHITECTURE

Four Cryptographic Primitives.
One Authority Layer.

01

Authority Anchors

Who holds the authority to act?

Any person, device, or enterprise system that establishes cryptographic authority through domain-based keys, leveraging globally deployed DNS-based key distribution. Authority is expressed through domain-based keys and independently verifiable by counterparties.

02

Trust Packets

Was this action authorized before execution?

Per-action authorization proofs — self-contained, cryptographically signed, non-replayable, and verified in milliseconds via DNS-based key lookup. Every digital action carries one before execution. Verification is deterministic — any ambiguity or failure results in rejection.

03

Authorization Certificates

What is the tamper-evident record?

Hash-chained records of complete multi-party transaction sequences. Each Trust Packet incorporates a cryptographic hash of all preceding packets. Modify any step and the entire chain breaks. All public keys embedded, enabling self-contained verification.

04

Authorization Ledgers

Where is the permanent record?

Distributed, append-only records of Authorization Certificates. Each party can maintain an independently verifiable record without relying on UniKey-operated central infrastructure or shared consensus infrastructure. Permanent audit infrastructure by default.

 

FULL DEPLOYMENT OUTCOMES

What Changes

When the Authorization Layer Exists

Fraud

Scalable credential-based fraud structurally eliminated

Attackers require a valid Trust Packet signed by a key that never leaves the device. Stolen credentials cannot produce one. Fraud cannot scale.

$442B

Global fraud losses 2025
(INTERPOL)

AI Economy

The agentic internet bottleneck resolved

AI agents cannot currently act freely across the internet,  no authorization infrastructure exists for them. UniKey is that infrastructure. The constraint is removed.

$15.7T

AI economic impact projected by 2030 (PwC)

Data Breaches

Credential theft removed as a breach vector

No credential in transit means no credential to intercept, store, or steal. The attack surface that accounts for 80%+ of breaches no longer exists.

$9.4M

Average cost of a data breach, US 2024 (IBM)

THE CASE

The Most Significant Cybersecurity Advance
Since the Advent of SSL

80%+

OF ALL DATA BREACHES ORIGINATE FROM STOLEN CREDENTIALS

UniKey removes credentials from the transaction entirely.

Not better credential protection.

Not stronger encryption of credentials in transit.

No credential. No theft. No breach vector.

Source: Verizon Data Breach Investigations Report 2024

FOUNDING PARTNERS

Sending is Free.
Verification is Where Value is Exchanged.

Sending

Free for all participants

Any entity can send Trust Packets at no cost. Founding partners receive preferential terms on the commercial layer.

Verification

Infrastructure operators

Payment networks, carriers, SASE platforms, and enterprise gateways operate verification endpoints.

Licensing

ARM-style open standard

The protocol is open. Licensing fees apply to the ecosystem — payment rails, device manufacturers, global telecoms.

Active conversations with:

AI Agent Platforms
Payment Networks
Telecommunications Carriers
Device Manufacturers
Enterprise Security Platforms

Discuss Founding Partner Status

OPEN STANDARD

Explore the Specifications

UniKey is a fully specified open standard. All RFC specifications are publicly available for evaluation on GitHub.
Submitted to NIST NCCoE AI Agent Identity and Authorization framework as a recommended solution.

LAYER 1   •  CORE

RFC-1000

Master Index

LAYER 2   •  PROTOCOL

RFC-2001

Trust Packet Format & Canonicalization

LAYER 3   •  DISCOVERY

RFC-3001

Verifier DNS Hardening Algorithm

LAYER 4   •  DEVICE AUTHORITY

RFC-1300

Device & OS Integration Model

LAYER 5   •  AUTHORIZATION

RFC-5003

Authorization Flow & Verification Architecture

LAYER 6   •  DELEGATION

RFC-1200

Delegation Profile

Intellectual Property & Patents

UniKey is protected by an international portfolio of issued and pending patents covering:

• Distributed cryptographic authorization
• Replay resistance mechanisms
• DNS-based key validation
• Trust Packet architecture
• Cross-domain authority verification

The portfolio includes over 100 granted
and pending patents across multiple jurisdictions.

BUSINESS MODEL

Global Verification Services

The Visa Parallel

Visa does not move money. Visa verifies transactions and licenses the network.
UniKey does not authorize actions. UniKey licenses the protocol to those who do.

Verification Fees

Per-Action Revenue

Every Trust Packet verified by a network operator generates a micro-fee. At agentic commerce scale — billions of agent actions daily — this is a metered infrastructure revenue model with no natural ceiling.

Licensing Fees

Protocol Royalties

Payment networks, telecoms, device manufacturers, and enterprise platforms license the UniKey protocol to operate verification endpoints. ARM-style: open standard, licensed ecosystem.

Ledger Services

Data Intelligence

Authorization Ledgers generate real-time authorization intelligence as a byproduct of every transaction. Fraud detection, compliance reporting, and audit services built on the ledger.

Sending Trust Packets is free. Verification is where value is exchanged.
Every agentic transaction. Every device provisioning. Every enterprise API call.

CYBERSECURITY PRODUCTS

Authorization Intelligence

From Ledger Data

Every UniKey transaction produces an Authorization Certificate. Aggregated across billions of transactions, the Authorization Ledger becomes a real-time map of what was authorized, by whom, through which authority chain — generated as a byproduct of normal operation, not as a separate data collection exercise.

Fraud Detection

Real-time anomaly detection

Ledger patterns reveal authorization anomalies – agents acting outside delegated scope, unusual authority chains, replay attempts – before damage occurs.

Compliance Reporting

Automated audit trails

Every regulated transaction has a tamper-evident Authorization Certificate. Compliance reports generated automatically from ledger data. No manual reconstruction.

Threat Intelligence

Cross-network pattern analysis

Authorization patterns across the global network reveal coordinated attack signatures invisible to any single operator. Network-level threat intelligence sold as a service.

Risk Scoring

Authority chain risk models

ML models trained on authorization ledger data produce real-time risk scores for agent actions, provisioning events, and enterprise API calls before execution.

The ledger is not a product that must be built. It is a byproduct of every transaction –
intelligence that accumulates automatically as the network grows.

DISTRIBUTED AUTHORITY

Authority is Not Granted from a Center

THE OLD MODEL

Central authority
grants permission.

  • One server decides what is authorized
  • Compromise the center – compromise everything
  • Every action waits for permission from above
  • Single point of failure. Single point of control.

UNIKEY MODEL

Authority lives
at the edges.

  • Every domain, every device, every agent holds its own authority anchor
  • Verification is peer-to-peer against DNS – no center required
  • No UniKey server grants permission. UniKey coordinates the proof.
  • 5 billion authority anchors. No single point of failure

“The internet was built to move information. It was never built to prove authority.
UniKey is the distributed authority layer the internet was always missing.”

FOR BUYERS, PARTNERS, AND ACQUIRERS RESEARCHING UNIKEY

FAQ

UniKey — Frequently Asked Questions

UniKey is the distributed authorization layer the internet was always missing. It is a device-bound cryptographic network that verifies authority before a digital action is executed — across payments, APIs, autonomous agents, and any system that today relies on credentials, tokens, or sessions to decide whether something should happen.

The framing that travels: “They verify the agent. UniKey verifies the action.”

Identity systems prove who is acting. UniKey proves the specific action was authorized. That distinction is the entire category.

The internet was built to move information. It was never built to prove authority.

Every credential, password, token, and session ever issued is a patch on that original omission. Possession of a credential is treated as equivalent to permission — but in remote environments, that assumption breaks down. Credentials are stolen. Sessions are hijacked. Tokens are replayed. Once compromised, they can be reused at scale.

This is why fraud scales. It is also why the agentic internet has stalled: AI agents cannot be trusted to act autonomously across domains, because no infrastructure exists to verify that any specific action was actually authorized.

UniKey closes the gap by requiring cryptographically verifiable authority before execution. A stolen credential cannot produce a Trust Packet. A replayed token cannot produce a Trust Packet. The compromise boundary shifts from remote credential theft — which scales — to physical device or key compromise, which does not.

UniKey is not a competitor to identity systems, fraud detection products, or settlement networks. It operates at a layer those products do not address.

  • Identity systems (Visa Trusted Agent Protocol, Cloudflare Web Bot Auth, OAuth, PKI) verify who is acting. UniKey composes with them — it asks the next question: was this specific action authorized?
  • Fraud detection systems analyze transactions after they execute and assign risk scores. UniKey prevents unauthorized actions from executing in the first place. Fraud is not detected; it ceases to be possible at scale.
  • Settlement systems (Visa, Stripe, blockchain, real-time payment rails) move value once an action is approved. UniKey strengthens the authorization signal those systems receive. It does not replace them. It is rail-neutral and execution-agnostic.

The most useful analogy: blockchain decentralized settlement by distributing ledger state. UniKey decentralizes authority. Same structural ambition, different layer of the trust stack.

Yes. The foundation is in place:

  • Six published RFC-style specifications defining the protocol — RFC-1000 (Master Index), RFC-2001 (Trust Packet Format), RFC-3001 (DNS Hardening Algorithm), RFC-1300 (Device & OS Integration), RFC-5003 (Authorization Flow & Verification Architecture), RFC-1200 (Delegation Profile). All publicly available on GitHub.
  • 100+ patents granted and pending across multiple jurisdictions, covering distributed cryptographic authorization, replay-resistance mechanisms, DNS-based key validation, the Trust Packet architecture, and cross-domain authority verification.
  • Reference libraries that construct, sign, verify, and chain Trust Packets — running over the global DKIM and DNS infrastructure that has been deployed and operationally hardened for over fifteen years.
  • NIST NCCoE submission in progress, positioning UniKey as a recommended solution within the AI Agent Identity and Authorization framework.
  • Independent threat-model review completed by Black Duck Software, with findings incorporated into the architecture.

The HTTPS-native implementation of the protocol — for high-throughput synchronous use cases — is the next major engineering milestone, and is the natural focus of the partner or acquirer who scales the architecture.

UniKey is structured as an open standard with a licensed verification ecosystem — the ARM model applied to authorization infrastructure. Sending Trust Packets is free. Verification is where value is exchanged.

Active conversations span five categories:

  • AI agent platforms — the infrastructure that lets agents act autonomously across domains
  • Payment networks (Visa, Mastercard, Amex, Discover) — where network-level adoption propagates the fraud-elimination benefit to ~80M merchants without merchant-side integration
  • Telecommunications carriers — natural verification operators given existing trust relationships with billions of devices
  • Device manufacturers (Apple, Samsung, Google) — where every device becomes a magic wand: the cryptographic origin point for authorized actions across every connected service. The biggest leap in what a phone can do for the user since the App Store.
  • Enterprise security platforms — Cisco, Cloudflare, and others operating verification at scale across global edge or cloud infrastructure

Each category is a different commercial path with a different business model. The asset is structured to license to all of them.

UniKey inherits its security from the most widely deployed cryptographic infrastructure on the internet: DKIM signing and DNS-distributed public keys — the same primitives that secure legitimate email at scale. The protocol does not introduce new cryptography. It applies battle-tested primitives to a new architectural problem.

Three failure surfaces, each with bounded blast radius:

  • DNS attacks (poisoning, spoofing, path-based interception). UniKey RFC-3001 defines a hardened DNS validation algorithm that treats DNS as probabilistic, not authoritative. Verifiers must query at least three independent DNS resolvers across different network paths and require bitwise-identical key payloads from all of them. Any inconsistency triggers immediate rejection. TTL anomalies (sudden drops from 3600 to 60, for example) are treated as poisoning indicators. DNSSEC validation is additive but not substitutive. The system fails closed on every ambiguity. A single compromised resolver cannot produce a trusted key.
  • Cached-key divergence. Verifiers maintain a cache of validated keys bound to specific (domain, selector) pairs. When a freshly fetched key differs from the cached key for the same pair, the verifier triggers a divergence-handling routine — re-validating across multiple resolver paths, evaluating TTL anomalies, and flushing the cache when signature failures cluster within a short window. The cached key is never trusted in preference to fresh verification; divergence triggers heightened scrutiny rather than silent acceptance.
  • Verifier compromise. Verifiers do not hold any signing keys. A compromised verifier can lie about validation results but cannot forge Trust Packets that other verifiers would accept. Recovery is to revoke the compromised verifier from the trust hierarchy.
  • Device-resident credential extraction. The cryptographic credential lives in the device’s Secure Enclave (Apple, Samsung, Qualcomm hardware roots of trust). Extraction is prohibitively expensive even with physical possession. If a Secure Enclave is compromised, the issuer revokes the device’s authority anchor — bounded blast radius of one user, not the network.

Keys carry explicit validity periods (90 days maximum for high-assurance deployments) with no-gap rotation. Successor keys must be published in DNS before predecessors expire.

The residual risk is the same risk every cryptographic system on the internet carries: the underlying primitives are believed secure but not provably so. That risk is shared by TLS, SSH, certificate transparency, and every modern trust system. UniKey operates inside that broader ecosystem, not separately from it.

The business model is patterned directly on Visa.

Visa does not move money. Visa verifies transactions and licenses the network. UniKey does not authorize actions. UniKey licenses the protocol to those who do.

Three revenue streams:

  • Verification fees. Every Trust Packet verified by a network operator generates a micro-fee. At agentic-commerce scale — billions of agent actions daily — this is metered infrastructure revenue with no natural ceiling.
  • Licensing fees. Payment networks, telecoms, device manufacturers, and enterprise platforms license the protocol to operate their own verification endpoints. ARM-style: open standard, licensed ecosystem.
  • Authorization intelligence. Every transaction produces an Authorization Certificate. Aggregated across billions of transactions, the resulting Authorization Ledger becomes a real-time map of what was authorized and by whom — sold as fraud detection, compliance reporting, threat intelligence, and risk-scoring services. Generated as a byproduct of normal operation, not as a separate data collection exercise.

Sending is free. Verification is where value is exchanged.

UniKey is structured as an ARM-style asset — specification, patent foundation, and reference libraries — that an acquirer or licensee operationalizes against their existing infrastructure.

For an acquirer, the natural path is to acquire the IP foundation, the protocol specifications, and the reference libraries, then operate verification at scale using existing infrastructure (CA systems, edge networks, payment rails). The acquirer becomes both the operator of the verification network and the licensor of the protocol to other parties.

For a payment network licensee, the network adopts UniKey at the network layer. Adoption propagates through existing PSP relationships to the merchant base without merchant-side integration. License terms are flat-fee annual at scale, comparable to architectural licensing in other infrastructure categories.

For a device manufacturer licensee, the model is per-device royalty, comparable to ARM’s IP licensing rates ($0.30–$1.00 per device historically), with credential provisioning integrated into existing Secure Enclave workflows.

For a founding partner in any category, preferential terms are available on the commercial layer in exchange for early commitment to the standard.

For acquisition, licensing, founding-partner discussions, or partnership inquiries: [email protected]

For technical specifications and the full RFC series: github.com/Swoop-Now/unikey-spec

For the white paper, patent portfolio, and additional resources: unikeyid.com

UniKey is operated by Swoop In Technologies LLC.

UNIKEY PROTOCOL

The Distributed Authority Layer
The Internet was Always Missing

They verify the agent. UniKey verifies the action.