Agentic Boundary Tokenization · Patent 64/056,353

A cryptographic boundary between AI agents and the commerce they touch.

ABT
Foundational
ABT-C
Commerce
Live
ABT-C
Commerce
Consumer-side encryption for AI agent purchases. Per-tier projections, registry-routed refunds, retention enforced by the device.
Live · CinematicCard
View walkthrough →
ABT-I
Identity
Filed
ABT-I
Identity
Selective attribute disclosure with cross-relying-party correlation prevention. Disclose only what's needed, never the underlying record.
Filed · Patent pending
View walkthrough →
ABT-W
Warrants
Filed
ABT-W
Judicial authorization
Randomized routing to judicial panels. Identity-blind decision tier. Adversarial argument cryptographically required for access.
Filed · Patent pending
View walkthrough →
ABT-V
Voting
Filed
ABT-V
Voting records
Bilateral tier separation between voter identity and ballot content. No party can unilaterally reconstruct any voter-ballot pair.
Filed · Patent pending
View walkthrough →
ABT-G
Records
Filed
ABT-G
Government records
Dual lifecycle: permanent institutional signing for public records, retention-bound encryption for citizen personal data. One infrastructure.
Filed · Patent pending
View walkthrough →
ABT-M
Medical
Filed
ABT-M
Healthcare records
Provider-patient bubble architecture with cross-bubble re-authorization. Patient retains key custody across care transitions.
Filed · Patent pending
View walkthrough →
ABT-S
Spending
Filed
ABT-S
Spending records
Time-delayed public disclosure with cryptographically-committed unlock timestamps. Sensitive procurement becomes public on schedule.
Filed · Patent pending
View walkthrough →
ABT-E
Education
Filed
ABT-E
Educational records
Permanent institutional signing of credentials. Student-controlled per-disclosure projection. No cross-verifier correlation.
Filed · Patent pending
View walkthrough →
ABT-L
Evidence
Filed
ABT-L
Legal evidence custody
Chained custody transition records. Role-scoped tier access from collecting officer through court. Tamper-evident across the pipeline.
Filed · Patent pending
View walkthrough →
ABT-D
Device
Filed
ABT-D
Device-layer privacy
Enclave-to-application callback across the secure hardware boundary. Manufacturer attestation chain. Per-data-category retention.
Filed · Patent pending
View walkthrough →
Hover any variant · ten domains · one architecture
The protocol

One cryptographic architecture. Ten domains.

Agentic Boundary Tokenization places the cryptographic boundary at the consumer device, not at the merchant or platform. AI agents transact; the protocol witnesses; no party owns the receipt chain unilaterally.

The foundational specification governs the architectural mechanism. Each variant — commerce, identity, voting, judicial authorization, medical, government records, spending, education, evidence, device — is a domain embodiment that inherits the foundational structure and specifies its actor mappings, tier composition, and per-tier projections.

The inventive property: each tier authority's cryptographic capability does not enable access to information beyond their tier's authored projection because such information is not in their ciphertext. Access levels are in the data structure. There is no policy layer to override.

A reference implementation is live at cinematiccard.com. The full specification is filed under U.S. Provisional Patent 64/056,353 and free to implement.

Referencecinematiccard.com
Verified28+ scenarios
Variants10 domains
Patent64/056,353
FiledMay 4, 2026
LicenseFree
How the protocol works

Three parties. No single point of trust.

The cryptographic envelope is constructed at the consumer device. The merchant receives ciphertext and a callback URL. The registry observes but does not route. Plaintext never traverses the network.

— I.

First-party-side encryption

The consumer's device holds the persistent cryptographic key in hardware-backed secure storage. Personal data is encrypted at the device endpoint before any ciphertext leaves the device. The merchant never holds the plaintext.

— II.

Callback-mediated key release

When the merchant needs to process the transaction, it requests the per-transaction key from the device through an authenticated callback. The device releases the key — never plaintext — during the negotiated retention window. After retention, releases stop.

— III.

Registry-routed restoration

Post-retention restoration — for a refund, a dispute, an investigation — requires structural participation by all three parties. The registry observes, countersigns, and extends a permanent hash-chained log. No party can restore unilaterally.

Architecture

ABT is not in competition with the protocols.

ACP, AP2, and UCP govern the channel — how agents discover merchants, form mandates, and execute payments. ABT governs what happens to PII inside those transactions. They are orthogonal layers that stack.

Layer
What it governs
Examples
ABT relationship
Channel
How agents discover merchants and communicate intent
A2A /.well-known/agent.json, UCP /.well-known/ucp
ABT operates below the channel. Discovery files declare ABT support as a capability flag.
Mandate
How agents form, sign, and execute purchase agreements
AP2 IntentMandate → CartMandate → PaymentMandate
A PaymentMandate can carry abt_consumer_pubkey. When present, the merchant routes to the ABT-C path instead of standard checkout.
Tools
How AI assistants call merchant capabilities as structured functions
UCP MCP tools/call: search_catalog, create_checkout_session
create_checkout_session accepts abt_consumer_pubkey. When provided, routes to ABT-C v2 checkout.
Transaction boundary
What happens to PII inside the transaction — who can see it, when, under what conditions
Stripe SPT, Apple Pay agents, Visa Trusted Agent
ABT-C v2 governs this layer. Consumer-side encryption, per-tier key derivation, retention-enforced destruction. The channel protocols do not address this.

Technical primitives

ABT vs. everything else

Capability ABT What ABT adds Standard Encryption
Visa · Mastercard · Apple Pay · Stripe
Policy-Based Privacy
Encrypted envelope with permission tiers Cryptographic tier boundaries — each party receives only their authorized projection
User-controlled tokenization — no other party holds the key Consumer holds the only key — no merchant or platform can access without consumer action
Per-tier data projection (authored out, not redacted) Data authored out at construction — not filtered after the fact
Cryptographic enforcement — not vendor trust or policy Ed25519 signatures + HKDF key derivation — enforced by math, not vendor promise Partial
Hash-chained tamper-evident receipt log Every event signed and chained — independently verifiable by consumer, merchant, and registry
Plaintext never leaves the first party Envelope encrypted before any ciphertext crosses a trust boundary
Forward-only tier activation (no retroactive modification) New authorities added to future envelopes only — past records are structurally immutable
Three-party structural restoration — no single point of control Key recovery requires consumer + merchant + registry — no single party can act unilaterally

Who this is for

Cryptography researchers studying envelope encryption, tier-bounded ciphertext, deterministic key derivation, and signed receipt chains in multi-domain consumer-controlled data management.

Privacy researchers studying architectural privacy enforcement, unlinkability, purpose limitation, retention through cessation, and consumer-controlled key custody.

Consumer protection advocates seeking architectural alternatives to policy-based privacy enforcement. Cryptographic structural enforcement, not vendor trust.

Policy researchers examining cryptographic enforcement of storage limitation (GDPR Article 5(1)(e)), data minimization (GDPR Article 5(1)(c)), and consumer protection requirements.

Standards bodies evaluating consumer-side alternatives to merchant-side and platform-issued authorization frameworks including ACP, AP2, Stripe SPT, Apple Pay agents, Visa Trusted Agent, and Mastercard Verifiable Intent.

The protocol is filed.
The implementation is live.
Privacy Meets Architecture.

ABT-C specification → See it live at CinematicCard Apply for a build
hash0x4f3a · ABT-C envelope · merchant cinematiccard.com · cosigned 9c2b hash0x8d12 · ABT-I attestation · per-disclosure key b3f7 · verified hash0xa901 · ABT-C refund · registry countersig 2e44 · witness 3a91 hash0x551c · ABT-W decision · panel 0x7f · routed identity-blind hash0xb2e0 · ABT-V envelope · VITK·BCTK independent · tally hash0xe49a · ABT-C envelope · per-tx-key released · zeroed hash0x4f3a · ABT-C envelope · merchant cinematiccard.com · cosigned 9c2b hash0x8d12 · ABT-I attestation · per-disclosure key b3f7 · verified hash0xa901 · ABT-C refund · registry countersig 2e44 · witness 3a91 hash0x551c · ABT-W decision · panel 0x7f · routed identity-blind hash0xb2e0 · ABT-V envelope · VITK·BCTK independent · tally hash0xe49a · ABT-C envelope · per-tx-key released · zeroed