European Patent Application Filed Read the Specification →
AGTS Protocol Operational

Governance for a
Sovereign Future.

Cryptographic evidence of every autonomous decision — committed before execution, immutable after finalization, independently verifiable by anyone.

Pre-action proof EP 25 000 039.5 EP25209644 Works with any AI system
Initialize Scroll
🔒 obligationsign.com/dashboard
AGTS Governance Dashboard — 12-panel situational awareness cockpit
Mission Control
12-panel situational awareness. Trust dial. Risk radar. Merkle tree. Decision stream. Gate-by-gate governance replay.
Start Free Trial

01 — Core Framework

Analytical Architecture

Protocol_Registry: AGTS v1 [LIVE]
01
policy

Semantic Validity

G1 validates decision entropy. Scattered, uncertain reasoning is detected and blocked before the decision can reach execution. Coherence is mandatory, not aspirational.

Gate Specification arrow_forward
02
account_balance

Financial Integrity

G2 validates compliance against regulatory threshold. Every financial commitment is gated on demonstrated alignment with applicable standards. No partial credit.

Gate Specification arrow_forward
03
rocket_launch

Operational Agility

G3 monitors energy expenditure. Runaway computational costs, resource abuse, or excessive optimization cycles are caught and blocked before they materialise as institutional risk.

Gate Specification arrow_forward

02 — The Governance Loop

Five Gates. Three Leaves.
One Permanent Record.

Every AGTS governance cycle produces three canonical leaves: an authorization record, an execution trace, and a variance record. Together they answer the only question that matters: did the system do what it was authorized to do?

G1

Semantic Validity

H ≥ 0.40

Validates decision entropy against threshold. High-entropy decisions — scattered, uncertain reasoning — are blocked before execution.

G2

Financial Validity

C ≥ 0.40

Validates compliance score against regulatory threshold. Every financial commitment is gated on demonstrated alignment with applicable standards.

G3

Operational Validity

E ≤ 0.60

Monitors energy expenditure of the decision process. Runaway computational costs, resource abuse, or excessive optimization cycles are caught and blocked.

G4

Policy Admission

ALL PASS

Combines individual gate verdicts into a single pass/fail determination. All gates must pass — no partial credit, no weighted averages, no exceptions.

G5

Cryptographic Finalization

Ed25519 · MERKLE

Ed25519 signature and Merkle tree admission. The governance decision becomes a permanent, independently verifiable leaf in the append-only transparency log.

Commit
All gates pass → receipt signed → leaf admitted → execution authorised
Quarantine
Partial evidence → held for human review → escalation required
Refuse
Gate fails → execution blocked → proof of refusal recorded

03 — Security Architecture

Separation of Power by Design.

No single actor can both authorise an action and suppress the evidence of that action. AGTS splits authority across four independent layers — each controlled by a different entity, each independently auditable.

shield_lock

Sovereign Authority

Hardware-backed signing on GrapheneOS Pixel / Titan M2 StrongBox. Without the counter-signature, the leaf is not admitted.

how_to_vote

Validator Quorum

3-of-4 Byzantine fault-tolerant quorum. Validators attest that the bundle is well-formed and gate-complete — they cannot change gate outcomes.

visibility

Independent Witnesses

External parties verify the log's append-only consistency. History cannot be rewritten without witnesses detecting the inconsistency.

G5_Finalization: MERKLE_ACTIVE
LEAF_ID: 882X-01
HASH: 0xA3F2...9E01
STATUS: FINALIZED
DEPTH: 14,201
Merkle Root
Ed25519 · Append-Only
Canonical Leaves

Every leaf is a governance decision, permanently verifiable by anyone with a SHA-256 implementation.

Days Chain Depth

Unbroken chain of governance decisions, each cryptographically linked to its predecessor.

4
Validator Quorum

Byzantine fault-tolerant. 3-of-4 quorum certificate required per leaf.

0
Other Pre-Commit Proofs

Every other system records what happened after execution. AGTS proves authorisation existed before.

04 — Protocol Architecture

The Accountability Protocol.

Just as TCP/IP provided a common language for computers to communicate, AGTS provides a common language for autonomous systems to be governed and audited.

Protocol Standardises Layer Controls
TCP/IPPacket transmissionNetwork transportHow computers communicate
HTTPDocument transferWeb contentHow content moves
SWIFTFinancial messagingBank instructionsHow banks coordinate
Visa / MCCard authorisationConsumer paymentsHow merchants get paid
AGTS Governance obligations AI commitment verification Who authorised what, when, with what evidence
The Great Inversion

TCP/IP inverted telecommunications: centralized circuit-switched networks became decentralized packet-switched networks. AGTS performs a similar inversion — separating execution from governance and making authorization independently verifiable.

Air Traffic Control

AGTS provides accountability infrastructure for autonomous systems, much like air traffic control ensures safe operation of aircraft. A clearinghouse recording obligations between autonomous systems.

Read the full protocol comparison arrow_forward

05 — Certificate Transparency + Machine Governance

The Transparency Mesh.

Built on Certificate Transparency (RFC 6962). Log, Validators, Monitors — each independently operated, each cryptographically bound, whispering to form consensus across jurisdictions.

Quorum Health 0/4
Validators Active 0
Monitors Online 0
Sovereign Authority ONLINE
Gossip Latency 0ms

Node Registry

Sovereignty Layer
Sovereign Authority
GrapheneOS Pixel · Titan M2
Hardware-backed ECDSA
Transparency Log
log.obligationsign.com
Append-only Merkle tree
RFC 6962 · STH emission
Validator Quorum · 3-of-4 BFT
VAL-A · Customer
US
VAL-B · Auditor
EU (Brussels)
VAL-C · Regulator
US
VAL-D · Independent
UK
Monitor Witnesses
Monitor · STH Verifier
Polls log · Verifies inclusion
Gossip Mesh
Peer-to-peer STH exchange
Quorum: 3-of-4 BFT
Fault Tolerance: 1
Regions: US · EU · UK
US EU UK SOVEREIGN AUTHORITY GrapheneOS · Titan M2 · StrongBox TRANSPARENCY LOG log.obligationsign.com RFC 6962 · Append-only Merkle tree VAL-A Customer US VAL-B Auditor EU · Brussels VAL-C Regulator US VAL-D Independent UK Monitor Witness Monitor Witness Monitor Gossip LEAF LEAF LEAF LEAF SEAL STH STH GOSSIP GOSSIP
Sovereign Authority
Validators
Monitors
Quorum: 3-of-4 BFT
Jurisdictions: US · EU · UK
Sovereignty Layer

Hardware-backed ECDSA on GrapheneOS Pixel with Titan M2 StrongBox. The Sovereign Authority counter-signs every governance envelope. Without the seal, the leaf is not admitted to the log. The private key never leaves the secure element.

Validator Whisper Mesh

Four validators — Customer, Auditor, Regulator, Independent — each with their own ECDSA key pair, each in a different jurisdiction. 3-of-4 BFT quorum required, with mandatory representation from at least one regulator and one auditor.

Monitor Gossip Protocol

Independent monitor workers poll the transparency log, verify Signed Tree Heads, sample inclusion proofs, and gossip with peers. If the log equivocates — presents different views to different parties — the monitors detect it.

Clearinghouse Lifecycle

From Obligation to Proof.

Every governance decision follows the same deterministic path — ten stages, each producing a named, hashable, independently verifiable artifact.

01 CONNECT node_id 02 MEASURE MEASUREMENT_LEAF_V1 03 GATES G1–G5 PLUGIN_RESULT_V1 04 PROOF BUNDLE PROOF_BUNDLE_V1 05 QUORUM VOTE_V1 → CERTIFICATE_V1 06 ENVELOPE GOVERNANCE_ENVELOPE_V1 07 SOVEREIGN SEAL authority_signature 08 LOG (LEAF 1) LEAF_V1 → STH_V1 09 CLOSED LOOP EXECUTION_TRACE + VARIANCE 10 VERIFY 5-gate re-evaluation 11 REPLAY Deterministic state replay CREATION COMMITMENT G1 Semantic · G2 Financial · G3 Operational G4 Policy Admission · G5 Cryptographic 3-of-4 BFT · ECDSA P-256 Leaf 2: EXECUTION_TRACE_V1 Leaf 3: VARIANCE_RECORD_V1 PASS → ADMIT → EXECUTED REVIEW → QUARANTINE → WITHHELD BLOCK → REFUSE → STOPPED AGTS_RESOLUTION_EVENT_V1 NODE_ID MEASUREMENT GATE_RESULTS BUNDLE CERTIFICATE ENVELOPE SEALED STH LEAF 1+2+3 PROOF

06 — Federated Infrastructure

No Central Server.
No Single Point of Failure.

Every worker runs at the edge. Validators, monitors, and logs are independently operated across jurisdictions. L3 deploys dedicated infrastructure. L4 adds required witness quorums and cross-institution governance — the protocol is the same, the infrastructure is theirs.

Edge Workers 0 active
Jurisdictions 0
Decision Latency 0ms
Central Server NONE
Federated Infrastructure Map World map showing AGTS deployment across three jurisdictions (US, EU, UK) for L1–L2 shared platform, with L3 dedicated and L4 client-operated nodes in additional regions. Sovereign Authority shown as mobile, hardware-backed. ENVELOPE VOTE LEAF SEAL STH BUNDLE GOSSIP CERTIFICATE WITNESS US Log · Protocol · Validator · Monitor EU Auditor · Monitor UK Independent · Monitor L3 Dedicated log · Authority L4 Networked · Witness quorum L4 Networked · Client-operated SOVEREIGN Mobile · Hardware-backed LEAF · STH ENVELOPE VOTE Shared Platform (L1–L2) L3 Dedicated L4 Networked Sovereign Authority ENVELOPE LEAF VOTE SEAL STH BUNDLE GOSSIP CERTIFICATE WITNESS

Shared Platform · L1–L2

Runtime Edge Workers
Jurisdictions US · EU · UK
Workers Log · Protocol · Validators · Monitors
Decision Latency < 100ms
Central Server None

Dedicated · L3 Transparent

Transparency Log Dedicated Merkle tree
Sovereign Authority Dedicated
External Monitors Independent verification
SLA 99.95%

Networked · L4

Infrastructure Client-operated
Witness Quorum Required (not optional)
Monitor Network Independent · External
Cross-institution Mesh-wide governance
SLA 99.99%

Same protocol. Same gates. Same cryptographic guarantees. L3 and L4 deploy their own infrastructure — the governance standard is shared.

07 — Beyond Logging

A Governance Operating System.
Not a Dashboard.

Cockpit · Mission Control

12-panel situational awareness.

Trust dial, risk radar, 3D validator topology, live decision stream, gate evaluation grid, Merkle tree panel — all updating in real time from live governance decisions.

Deterministic Replay

Two replay systems. One for events. One for state.

Play back at 1x, 2x, 4x, or 8x speed. Step through trust scores and gate outcomes at any point in history. Time-travel debugging for governance.

Risk Radar

Five axes. Three observables. Real-time risk surface.

Maps H, C, E, Gate Consensus, and Validator Quorum onto a live spider chart. When any axis contracts, you see it before it becomes a problem.

Plugin Architecture

Three domain gates. Infinite extensibility.

Semantic (G1), Financial (G2), and Operational (G3) are domain-specific plugins — each providing its own evidence while inheriting the full governance pipeline.

Start Governing
Your AI Today.

72-hour trial. 5 canonical leaves. Full Cockpit access. No credit card required. Every trial leaf is cryptographically identical to a production leaf in the same shared log.

Vendor-agnostic Air-gap deployable ISO/IEC 42001 NIST AI RMF