identities.ai

/ Use Case

Identity for the
physical agent economy.

As AI agents transition from software assistants to embodied actors, the trust model must reach into the silicon. Ratify secures the interaction between agents and the physical systems they actuate—from drones and robots to IoT gateways and critical infrastructure.

Constraint-Bound Authorization

Ratify certificates support first-class constraints like geo-circles, time windows, and speed limits. An embedded system or drone can be authorized to act ONLY within specific physical bounds and timeframes, enforced cryptographically at the edge.

Hardware-Rooted Identity

The protocol is designed for the silicon layer. Delegation certificates can be bound to Secure Elements (SE), TPMs, or TEEs on the device, ensuring that authorization is physically tied to the hardware and cannot be exported or spoofed.

Offline-First Verification

IoT and embedded systems often operate in environments with intermittent connectivity. Ratify verifiers are stateless and lightweight, allowing for sub-millisecond, on-device verification without a cloud round-trip.

SPEC §9.1

/ HARDWARE-AWARE SCOPES

iot:commandEmbedded control
robot:actuateMotor authority
gate:openPhysical access
sensor:readTelemetry auth

Ratify is designed for high-performance embedded targets. Reference implementations in C-ABI compatible Go and Rust ensure the protocol runs on RTOS and bare-metal environments.

/ Get started

Ready to stop trusting AI
and start verifying it?

We are currently in private alpha, working with select design partners to establish the identity layer for the agent economy.

1

Enterprises

Secure your agent interactions across voice, video, and API.

2

Platforms

Provide verifiable identity to every agent on your platform.

Or email hello@identities.ai