Agency Protocol creates transparent, verifiable promises with real stakes and consequences.
Select industry domain:
Critical Diagnostic Reporting Promise
Verified by: Automated EHR Timestamps & Physician Confirmation
We (Hospital Imaging Department) promise that the finalized radiologist's report for your [specific critical diagnostic scan, e.g., 'CT angiogram for suspected PE'] performed on [date] will be available in your EHR and communicated to your referring physician within [e.g., 2 hours] of scan completion.
"Radiologist's report for CT angiogram (PE protocol) was finalized and available in EHR within 1h 45m of scan completion, well within the 2-hour promise."
Ex-Ante Evidence (Demonstrating Capability):
Departmental policy on critical turnaround times; Radiologist board certifications (3rd-party); EHR system reliability audits.
Ex-Post Evidence (Verifying Fulfillment):
Scan completion timestamp (automated); Report finalization timestamp in EHR (automated); Referring physician EHR access log (automated).
Verified by: SWIFT Network Confirmations & Security Audits
We (Financial Institution) promise that your initiated wire transfer of [amount] [currency] to [beneficiary details] on [date] will be securely processed and funds credited to the beneficiary bank within [e.g., 4 business hours], with confirmation provided to you.
Financefinance/banking/wire_transfer99% Kept
230 audits
500 credits
Merit: 99%
Assessment: Promise Kept
May 19, 2025
"Wire transfer [TXN_ID] processed securely and SWIFT confirmation MT103 received from beneficiary bank within 3.5 business hours. Client notified."
Ex-Ante Evidence (Demonstrating Capability):
Published SLA for wire transfers; Regulatory compliance statements; SOC 2 Type II security certification (3rd-party).
We (SaaS Company) promise that our primary authentication API endpoint (`/auth/v2/login`) will maintain an availability of at least 99.95% and a P90 latency of less than [e.g., 200ms], measured over any continuous 24-hour period.
We (Educational Institution) promise that any student who successfully completes [Course ID: XYZ101 - Intro to Quantum Computing] will be able to correctly solve [a 3-qubit Grover's algorithm problem] on a final standardized assessment under controlled conditions.
"93% of students who completed XYZ101 successfully solved the standardized Grover's algorithm problem, demonstrating achievement of the key learning outcome."
Ex-Ante Evidence (Demonstrating Capability):
Detailed syllabus with learning outcomes; Program accreditation (3rd-party); Instructor qualifications (verified 3rd-party for credentials).
Assessor: External Accreditation Board & Industry Panel
Assessor Merit: 94%
Timely & Accurate Court Filing Promise
Verified by: Court E-Filing System & Client Confirmation
We (Law Firm) promise that the [Brief in Opposition to Summary Judgment] for [Case Name/Number] will be filed with the [U.S. District Court for the Northern District of California] no later than [2 business days] prior to the court-mandated deadline of [Date], and a conformed copy provided to you (the client) within [1 business day] of filing.
Legallegal/litigation/court_filings99% Kept
150 filings
200 credits
Merit: 99%
Assessment: Promise Kept
May 10, 2025
"Brief in Opposition for Case [Case Name/Number] was e-filed on [Date - 3 days prior], and a conformed copy was emailed to client the same day."
Ex-Ante Evidence (Demonstrating Capability):
Engagement letter detailing service standards; Lawyer's bar certification (3rd-party); Firm's internal deadline management policy.
Ex-Post Evidence (Verifying Fulfillment):
Court's electronic filing receipt with timestamp (3rd-party automated); Email delivery receipt to client (automated); Client acknowledgment (user-observed).
Verified by: Repository Verification & Community Audit
We (Research Lab) promise that all primary data, metadata, and analysis code supporting findings in our accepted manuscript '[Manuscript Title]' (Journal: [Journal Name]) will be deposited into [Zenodo repository] and publicly accessible with a DOI within [30 days] of the manuscript's official online publication.
"Dataset and code for '[Manuscript Title]' were deposited in Zenodo (DOI: [Actual DOI]) on [Date - 25 days post-pub], meeting the 30-day promise."
Ex-Ante Evidence (Demonstrating Capability):
Data Management Plan (funder requirement - 3rd party); Journal open data policy (3rd-party); Study pre-registration (OSF - 3rd party).
Ex-Post Evidence (Verifying Fulfillment):
Live DOI link to dataset/code in Zenodo (3rd-party automated); Repository deposition timestamp (3rd-party automated); Independent download and code execution check (community/peer-verified).
Assessor: Journal Data Editor & Open Science Foundation
Assessor Merit: 93%
Critical System Compliance Promise
Verified by: Independent Inspector Certification
We (Construction Co.) promise the [Fire Sprinkler System for Floors 1-5] of [Project Name] will be installed, tested, and certified compliant with [NFPA 13] by an independent, certified fire safety inspector by [Target Date].
"Fire Sprinkler System for Floors 1-5 passed all tests and received compliance certification from [Inspector Name] (Cert #123) on [Date - 2 days before target]."
Signed compliance certificate from independent inspector (3rd-party); Witnessed system test reports (corroborated by 3rd-party inspector); As-built drawings.
Assessor: Lead Architect & Client Representative
Assessor Merit: 94%
Design Standard Compliance Promise
Verified by: Third-Party Design Review & Simulation Data
We (Engineering Firm) promise the final structural design package for [Bridge Abutment Alpha] on [Project ID] will, upon delivery by [Date], include verifiable calculations demonstrating full compliance with [AASHTO LRFD Bridge Design Specs, 9th Ed.] for all specified load cases.
"Design package for Bridge Abutment Alpha delivered on [Date] with calculation reports and FEA simulations demonstrating full AASHTO LRFD compliance for all specified load cases, independently verified."
Ex-Ante Evidence (Demonstrating Capability):
Firm's ISO 9001 certification (3rd-party); Lead engineers' P.Eng licenses (3rd-party); Software validation records.
Ex-Post Evidence (Verifying Fulfillment):
Delivered design package with compliance matrix; Simulation result files (automated from design tools); Positive third-party design review certificate (3rd-party).
We (MDR Provider) promise that for any endpoint under active monitoring, if a ransomware execution successfully encrypts >[100 files], we will provide an RCA report and evidence of containment actions initiated within [4 hours] of initial successful encryption.
"During a simulated ransomware event (Red Team exercise), MDR provider detected encryption, initiated host isolation within 25 minutes, and delivered a preliminary RCA within 3 hours."
Ex-Ante Evidence (Demonstrating Capability):
SLA document; EDR technology certs (3rd-party); SOC 2 Type II report (3rd-party).
Ex-Post Evidence (Verifying Fulfillment):
Timestamped EDR/SIEM alerts of encryption (automated provider); Logs of containment actions (automated provider); Delivered RCA report; Client-side corroboration logs (user-automated).
We (Consulting Firm) promise to deliver the 'Phase 1 Market Analysis Report' for [Client Project] by [Date], including a validated list of at least [20] potential new market segments ranked by [size, growth rate, competitive intensity], with data sources cited.
How does Agency Protocol differ from Web3 and blockchain solutions?
?
Agency Protocol can work with or without blockchain technology depending on the implementation needs.
While Agency Protocol can utilize blockchain for certain use cases, it is infrastructure-agnostic and focuses on the social architecture of trust rather than technical implementation. It can operate on centralized servers, decentralized networks, or hybrid approaches depending on the specific application needs.
How does the system prevent manipulation or gaming?
?
Multiple mechanisms work together to ensure credibility and prevent gaming of the system.
Agency Protocol uses several mechanisms: domain-specific merit prevents inappropriate influence across domains; batch processing and anonymity controls protect against collusion; manipulation detection algorithms prevent circular dependencies; and "skin in the game" through staked credits creates real consequences for dishonesty.
Is Agency Protocol open source?
?
Agency Protocol is designed to be an open standard that anyone can implement.
Yes, Agency Protocol is designed as an open standard with reference implementations available under permissive open source licenses. Organizations can implement the protocol in ways that suit their specific needs while maintaining compatibility with the broader ecosystem.
Start Making Better Promises Today
Join our community of professionals building trust and reputation with verifiable commitments.