Contracts can be renegotiated. Cryptographic constraints cannot.
VAC enforces human oversight, scope constraints, and purpose-bound authority mathematically — in the delegation chain, not in the contract.
Verified Authority Chain

Securing the link between human intent and agent action

VAC is OAuth for AI agents. Just as OAuth lets users delegate authority to apps without sharing passwords, VAC lets humans delegate authority to AI agents without losing accountability. Every agent action — through any depth of delegation, across organisational boundaries, into physical systems — traces through a cryptographic chain back to a verified human.

558
Patent claims filed
10
IP filings
4
Biometric modalities
Delegation depth
🔐 Try Live Demo 🎛 Control Loop SDK Docs
The Problem

Agent security without human attribution is incomplete

Current approaches to AI agent security focus on securing the agent — its credentials, permissions, and deployment environment. They answer “Is this agent authorised?” but not the more fundamental question: “Is the human who authorised this agent actually present and verified right now?”

Current State

Agent operates under credentials. Credentials prove possession, not identity. Shared credentials, stolen tokens, and abandoned sessions all grant the same access as the legitimate user.

In multi-agent chains, the link to the authorising human is lost within 1–2 levels of delegation. By the third agent, there is no mechanism to verify human authority.

The “someone used my login” defence is irrefutable.

With VAC Protocol

Human performs multi-modal biometric verification. A Verified Authority Token (VAT) carries that verification through the entire agent chain — coordinator to specialist to sub-agent.

At every action point, any system can verify the chain traces back to a biometrically-verified human. Trust can only narrow, never expand. Authority can be revoked instantly.

Non-repudiation is cryptographic. You cannot deny your own biometrics.

How It Works

Verified Authority Token (VAT) propagation

When a biometrically-verified human authorises an operation, the system generates a VAT — a JWT-compatible Ed25519-signed token encoding verified identity, trust score, authorised scope, delegation depth, and validity period. The token propagates through the agent chain with strict narrowing rules.

👤
Verified Human
Biometric auth
VAT Created
Full scope
Coordinator
Derived VAT
Specialist
Narrowed scope
Action
VAT verified
Scope narrows

Each delegation restricts scope via set intersection. No agent acquires permissions exceeding its parent.

Trust decreases

Trust score can only decrease with delegation depth. Deeper chains carry inherently lower trust.

Time shortens

Validity period inherits from parent and can only shorten. Expiry cascades through the chain.

Re-verification

Sensitive actions trigger biometric re-verification of the root human before proceeding.

Instant revocation

Root human ends session or trust drops — all derived VATs in all chains immediately invalidated.

Provenance trail

Every action linked to its VAT, delegation chain, jurisdiction, and verified human. Tamper-evident and legally admissible.

Extended Capabilities

From digital agents to physical systems, communities, and coalitions

The VAC Protocol extends beyond digital agent chains into regulated industries, physical systems, collective governance, and multinational operations. 558 patent claims across 12 filings — VAC Protocol (285 claims) and Athena (173 claims).

🔒

Biometric Agent Authorisation

Five graduated trust levels from Observe to Delegate. Every agent action gated by biometric verification of the authorising human. Continuous trust scoring replaces binary authentication.

Claims 1–112
🔗

Trust Propagation via VAT

Verified Authority Tokens carry human attribution through arbitrarily deep delegation chains. Organisational hierarchies, multi-party authorisation, and cross-org agent trust.

Claims 113–167
📋

Regulatory Provenance Chains

CDR-style metadata retention for AI agent operations. Jurisdictional context, infrastructure context, and verification level recorded at every delegation point. Tamper-evident audit trails.

Claims 168–196
🌐

Global Data Sovereignty

Automated cross-border compliance detection across GDPR, LGPD, PIPL, CCPA, and 10+ frameworks. Regulatory divergence identification, data residency enforcement, and change propagation.

Claims 197–207
🤝

Collective Governance

Community-level decision-making for AI agent authorisation. Consensus-based, role-weighted, culturally-scoped governance. Supports Te Mana Raraunga, CARE Principles, and OCAP for Indigenous data sovereignty.

Claims 208–217
🛫

Physical System Authority

Verified human authority over drones, robots, autonomous vehicles, and industrial systems. Kinetic scope constraints — geofence, altitude, speed, force limits — enforced cryptographically. Swarm coordination.

Claims 218–222
🏴

Coalition Governance

Multi-national agent interoperability with national caveats, rules of engagement as scope constraints, and coalition trust graphs. Designed for NATO, AUKUS, Five Eyes, and UN operations.

Claims 223–232
🔄

Continuous Validity Monitoring

Collective authority as a continuously validated state. Governance-model-aware cascade logic, severity-classified authority changes, forensic gap provenance, and structured reconstitution.

Claims 233–237

Intelligent Orchestration

Natural language problem-to-agent-team recommendation. Dual-purpose biometric capture embeds security in user experience. Vouch-as-collaboration-invitation and automated collaboration discovery.

Claims 238–241
Architecture

Four layers of verified authority

Layer 1: Identity
Multi-modal biometric verification combining facial geometry, voice pattern, behavioural biometrics, and device-contextual signals. Single-gesture authentication completes in under 5 seconds. Continuous trust scoring replaces binary authentication.
Layer 2: Delegation
Agent delegation framework with trust-level-gated permissions. Verified Authority Token (VAT) carries biometric provenance through arbitrarily deep multi-agent chains. Organisational trust hierarchies, multi-party authorisation, and cross-organisational agent trust verification.
Layer 3: Provenance
Regulatory compliance provenance chains recording jurisdictional context, infrastructure context, and verification level at every delegation point. Global data sovereignty intelligence with automated cross-border compliance. Tamper-evident, monotonically growing audit trails.
Layer 4: Governance
Collective governance for community-level agent authorisation. Physical system authority for drones, robots, and autonomous vehicles. Multi-national coalition governance with national caveats and rules of engagement. Continuous validity monitoring and intelligent orchestration.
Standards Alignment

Extending existing frameworks

The VAC Protocol is not a replacement for existing security controls. It is the missing layer that completes them by adding biometric human attribution.

FrameworkCurrent scopeVAC extension
NIST SP 800-63-4 Digital identity; password/token authentication Multi-modal biometric verification; continuous trust scoring
NIST SP 800-207 Zero trust architecture Verify the human behind the agent, not just the agent’s credential
NIST AI RMF Accountability and traceability for AI systems Cryptographic mechanism: every agent action traceable to a verified human
NIST AI 600-1 GenAI risk profile; information security Biometric attribution addresses GenAI-specific identity and non-repudiation risks
OWASP Agentic Top 10 Identity abuse; cascading failures Biometric binding prevents identity abuse; trust narrowing limits cascading failure
EU AI Act Human oversight for high-risk AI Verifiable human oversight: biometric proof of human presence and authorisation
ISO/IEC 27001 Information security management Legally admissible audit trails with biometric non-repudiation
FIDO2 / WebAuthn Passwordless; device-bound credentials Extends beyond device binding to continuous biometric human presence verification
Intellectual Property

558 claims across twelve filings

Provisional Patent
21 Feb 2026
AU 2026901425 — Claims 1–112. Multi-modal biometric verification, continuous trust scoring, agent delegation chains, single-gesture authentication, duress detection, biometrically-gated agent authorisation with five graduated trust levels.
Supplementary #1
22 Feb 2026
AU 2026901428 — Claims 113–134. Zero-knowledge proofs, blockchain oracle integration, biometric aging adaptation, agent resource allocation, unified trust graphs.
Supplementary #2
24 Feb 2026
AU 2026901474 — Claims 135–167. Verified contributor authority, organisational trust hierarchies, multi-party biometric authorisation, agent chain trust propagation via VAT, attribution maturity model, conformance testing framework.
Supplementary #3
26 Feb 2026
AU 2026901553 — Claims 168–241. Regulatory compliance provenance chains, global data sovereignty intelligence, collective governance and Indigenous data sovereignty, physical system authority, multi-national coalition governance, continuous validity monitoring, intelligent agent orchestration.
Supplementary #4
27 Feb 2026
AU 2026901601 — Claims 242–271. Purpose-bound authority with task-complete automatic revocation, dynamic scope escalation with biometric human-in-the-loop approval, progressive scope reduction, cross-organisational escalation governance.
Supplementary #5
27 Feb 2026
AU 2026901604 — Claims 272–285. Human Provenance Bridge for agent communication protocols (MCP, A2A, OAuth 2.1, SPIFFE, DIDs), cross-protocol revocation propagation, graduated disclosure, agentic commerce provenance, jurisdiction-aware compliance.
Athena — Provisional
3 Mar 2026
AU 2026901730 — Claims 1–65. Self-improving strategic methodology, enterprise portfolio strategy, continuous IP management, jurisdiction-aware patent intelligence, exit-aware product development.
Athena Supp #1
7 Mar 2026
AU 2026901851 — Claims 66–90. Trust Graph Engine, multi-model trust ranking (SignalRank algorithm), per-user personalisation, streaming cross-model comparison.
Athena Supp #2
8 Mar 2026
AU 2026901870 — Claims 91–141. Reasoning Path Index, SignalRank 6-component formula, streaming comparison, training data detection flywheel, agent team orchestration.
Athena Supp #3
8 Mar 2026
AU 2026901871 — Claims 142–173. Layered infrastructure architecture, N-model comparative analysis, variable participation iteration, cross-layer trust propagation.
Total Portfolio
Combined portfolio: 558 claims across 12 filings. VAC Protocol (316 claims, 7 filings): identity verification, agent delegation, trust propagation, regulatory provenance, data sovereignty, collective governance, physical systems, coalition operations. Athena/SignalRank (242 claims, 5 filings): self-improving methodology, multi-model trust ranking, reasoning path indexing, per-user personalisation, training data detection, agent team orchestration.

Assignee

Violet Shores Pty Ltd

ACN 154 978 122

Australia

Priority & Status

Priority date: 21 February 2026

Status: Provisional (12-month PCT window)

Inventor: Roberto Zagarella

Download Whitepaper v5 (PDF) Testing Framework v5 (PDF) SignalRank Live

Get Involved

Standards engagement & collaboration

The VAC Protocol is being developed as an open standard for biometric human-to-agent attribution. We welcome engagement from standards bodies, AI agent platform developers, enterprise security teams, and regulatory agencies.

NIST AI Agent Standards Initiative

Violet Shores is an active participant in the NIST AI Agent Standards Initiative, contributing across multiple workstreams on agent identity, security, and human attribution.

Standards & regulatory submissions: submissions@vacprotocol.org

Contact

General enquiries: hello@vacprotocol.org

Developer support & SDK: developers@vacprotocol.org

Security & vulnerability disclosure: security@vacprotocol.org

Press & media: press@vacprotocol.org