A layered framework for building verifiable, self-sovereign digital interactions — from ephemeral transactions to enduring relationships, governed by cryptographic trust.
Every digital interaction rests on a stack of interdependent layers — from foundational policy through governance and technology to trust and relationship.
KEL event logs and ACDC credential chains. Gaps reduce confidence scores.dip. The cryptographic constitution of each identity.dip: scope boundaries, time limits, action types, escalation triggers, mandatory human-in-the-loop checkpoints.| Layer | Rate of Change | Primary Actor | KERI Primitive | Failure Mode |
|---|---|---|---|---|
| 05 — Interaction | Per-exchange | Both parties | ixn | Context mismatch, scope creep |
| 04 — Trust | Progressive | Verifier | ACDC chain | Fidelity degradation, confidence erosion |
| 03 — Technology | On rotation | Infrastructure | icp, rot | Key compromise, witness failure |
| 02 — Governance | Periodic | Human Conductor | dip, rules | Authority gap, escalation failure |
| 01 — Policy | Infrequent | Foundation | ADR | Regulatory non-compliance |
Digital relationships evolve through distinct phases — each requiring different trust, governance, and technical infrastructure. Click any stage to explore its KERI mechanics.
AID and capability credentials to discovery registries. Watchers monitor for new identifiers matching requirements.ACDC claims, the other verifies against the issuer's KEL and trust chain.dip events establish delegated AIDs with scoped authority and time-limited windows.TEL checks. Revoked or expired credentials immediately halt operations.rot events cycle cryptographic keys. Pre-rotation means next keys are already committed — rotation is instant and non-disruptive.TEL updates. Verifiers immediately aware credentials are no longer valid.dip are revoked with drt. Agent authority terminated, outstanding operations wound down per governance rules.| Stage | Trust Level | Credential Flow | Governance | Reversibility |
|---|---|---|---|---|
| Discovering | None | Outbound publish | Minimal | Full |
| Co-Creating | Emerging | Bilateral exchange | Light | High |
| Proposing | Threshold | Terms codification | Moderate | Moderate |
| Using | Established | Continuous verify | Active | Low |
| Updating | Maintained | Refresh & reissue | Periodic | Moderate |
| Archiving | Residual | Revocation | Wind-down | Irreversible |
Tiered identity architecture connecting individual AIDs to organisational networks — from direct relationships to shared attribute communities and infrastructure dependables.
dip event.icp, rot, ixn, dip, drt.Core governance artefacts encoding choices, standards, and architectural boundaries — from identity decisions to business process rules.
AID inception rules, AuthN binding policies, access control, and directory resolution governance.icp event. The KEL is the single source of truth. This creates a uniform trust substrate across all selfdriven domains.ixn event.dip events. Includes scope parameters: allowed actions, time window, interaction limits, escalation triggers.drt. Scope violations cryptographically detectable. No self-elevation.icp and rot event.Four interconnected policy domains governing every aspect of digital interaction. Policies are the most stable layer, changing infrequently but forming the foundation everything rests upon.
Ed25519. Exchange: X25519. Hash: SHA-512 derivation, SHA-256 digests. Encryption: AES-256-GCM rest, TLS 1.3 transit. No legacy.links/meta pagination. Every mutation needs KERI-signed token + passkey assertion. Rate limiting per-AID.| Level | Name | Authority | Oversight | Example |
|---|---|---|---|---|
| L1 | Assistive | Read-only, suggest | Continuous | Data retrieval, reports |
| L2 | Supervised | Execute with approval | Per-action | Draft comms, form filling |
| L3 | Bounded | Within rules | Exception-based | Routine transactions |
| L4 | Autonomous | Self-directed in scope | Periodic | Service monitoring |
| L5 | Strategic | Cross-domain | Outcome-based | Multi-agent orchestration |