IDCanopy·Strategy
IDCanopy · Strategy · 2026-04

Know Your Agent.
The trust layer for regulated agentic commerce.

Payments rails have an agent-identity story. Regulated commerce doesn't. IDCanopy builds the consent, creditworthiness and audit-grade receipt layer that every regulated regime will need — CCD2 first, then PSD3, IDD, MiFID II, and every regime the next decade of compliance produces.

First vertical
CCD2 (Nov 2026)
Live deadline
20 Nov 2026
Tier commitment
MCP-I L2 from day 1
Standards posture
DIF · OpenID · EBA
The concept layer

Where KYC asks one question, KYA asks four.

KYC verifies a human. KYA verifies the software agent that acts on their behalf. Agentic commerce works without KYA in free retail; regulated commerce doesn't. These four questions define the layer. Click each to expand.

+
01 · Identity

Who operates this agent?

A legal entity, registered service, accountable owner.
Operators pass IDCanopy KYB-grade onboarding. Operator DID + Agent Issuer Certificate issued. Registry lookup at every transaction. Agents without a registered operator cannot transact through the layer.
+
02 · Provenance

What model, version, build?

Reproducible, auditable, pinned to a transaction.
Agent declaration at registration: model family, version, capabilities, hosting, key custodian. Version captured in every KYA receipt. Regulator audit traces a disputed transaction to the exact agent build.
+
03 · Authority

What mandate from the principal?

Scope, ceiling, expiry — cryptographically verifiable.
Mandate is a W3C Verifiable Credential issued by the principal to the agent's DID. Scope fields: counterparties, categories, per-transaction and per-period ceilings, allowed regimes, human-confirmation flag. Revocation via StatusList2021.
+
04 · Envelope

What is it allowed to do?

Enforcement at the action point, not the intent point.
Behavioural envelope enforced at counterparty call-time. Scope match, period spend, freshness of action assertion, revocation status all checked before any regime-specific engine fires. Bad intent that doesn't breach scope is still a question for the operator's CoC.

What KYA is

A layer above payment. A receipt primitive that answers the four questions cryptographically. The compliance scaffold regulated regimes will increasingly demand of any agent-mediated transaction.

What KYA is not

Not a substitute for KYC of the principal. Not an agent reputation score. Not a payment protocol. Not an LLM safety layer. KYA attests the result of the agent's action, not its reasoning.

Delegation mechanics

Four actors. Three trust hops. One compliance receipt.

Authority moves through a verifiable chain — principal mandates agent, agent acts at counterparty, counterparty calls IDCanopy, decision engine fires. Click each actor to see their role and the attestation they carry.

👤
Actor 01
Principal
🤖
Actor 02
Agent
🏦
Actor 03
Counterparty
🛡
Actor 04
IDCanopy KYA
issues mandate VC
initiates action
verification call

IDCanopy — the verification + consent layer

Receives the agent's payload from the counterparty, verifies the mandate chain, fires the regime-specific human-in-the-loop gate where required, runs the compliance engine (bureau check, suitability, disclosure rendering), and mints a cryptographic receipt that survives a regulator audit.

Mandate verification Regime engine Receipt issuance Operator registry Revocation checks

Seven checks before any regime engine fires

01
Mandate signature valid
02
Mandate not revoked
03
Mandate not expired
04
Scope match (CP + amount + category)
05
Period ceiling not breached
06
Action assertion fresh + nonce unused
07
Operator registered + in good standing
Regime-conditional gate

Human-in-the-loop consent for high-stakes regimes

For CCD2 credit, IDD insurance, MiFID II suitability and any regime requiring "specific consent by the consumer": a push to the principal's wallet renders the regime-specific disclosure (SECCI, IPID, suitability summary) and the principal taps confirm before the regime engine fires. Generic agentic checkout cannot enforce this. We can — and that is what makes the receipt regulator-grade.

The cryptographic primitive

Anatomy of a KYA receipt.

A W3C Verifiable Credential issued by IDCanopy per transaction. BBS+ signed for selective disclosure. One receipt carries mandate proof, regime compliance, decision evidence, and a revocation handle. Regulators bookmark one URL.

Shape

// KYA Receipt — W3C VC with BBS+ proof { "@context": [...], "type": ["VerifiableCredential", "KYAReceipt"], "issuer": "did:web:idcanopy.com", "id": "urn:kya:8c3...", "credentialSubject": { "agent": { did, operator, version, tier }, "mandate": { credentialId, scopeHash }, "transaction": { counterparty, amount, regime }, "consent": { receiptId, humanConfirmed: true, confirmedAt }, "decision": { outcome, evidenceIds, reasoningChainHash } }, "credentialStatus": { statusList, idx }, "proof": { type: "BbsBlsSignature2020", ...} }
Selective disclosure: a regulator can verify consent.humanConfirmed = true without seeing the principal DID. GDPR data-minimisation by construction.
agent.didAgent identity — resolves to a registered operator. L1 agents can be rejected by policy for high-stakes regimes.
agent.tierMCP-I level (L1/L2/L3). Counterparty policy can require L2+ for regulated transactions.
mandate.credentialIdPointer to the principal→agent mandate VC. Resolvable; revocation status checked via StatusList2021.
mandate.scopeHashHash of the scope clause that matched this transaction. Proves which clause authorised it without disclosing the full mandate.
transaction.regimeccd2_credit · psd3_payment · idd_insurance · mifid_suitability · procurement · subscription
consent.humanConfirmedTrue if the regime-conditional human-in-the-loop gate fired. The line between "agent-delegated transaction" and "specific consent by the consumer".
consent.receiptIdPointer to the regime-specific receipt (SECCI ack, suitability assessment, IPID ack). One layer of indirection, any number of regimes.
decision.outcomeRegime-specific result. For CCD2: granted / denied / conditional. For IDD: product suitability outcome. For MiFID: suitability decision.
decision.reasoningChainHashHash over the full reasoning evidence required by the regime's audit framework (bureau inputs, weighting, model, thresholds).
credentialStatusStatusList2021 entry. Counterparty or regulator can revalidate at any future point without calling IDCanopy directly.
proof (BBS+)BBS+ 2023 cryptosuite → any verifier checks only the claims they need. Privacy-preserving audit.
Where we sit

Above payment protocols. Below regime engines. In the gap the market has not filled.

Four payment-side protocols launched in Q1 2026. None of them cover disclosure, specific consent, creditworthiness or suitability. IDCanopy stays neutral on the rail and owns the compliance layer above.

Actor
Agent — AI software with a DID and a mandate VC
Agent operator registered in IDCanopy's operator registry. MCP-I L2 by default.
IDCanopy
KYA + regime compliance layer
Mandate verification · human-in-the-loop consent · regime engines · cryptographic receipt · audit infrastructure.
Payment protocols · protocol-agnostic adapters
AP2 · Agent Pay · TAP · ACP
All four handle payment authorisation + agent identity at the rail. None handle disclosure or creditworthiness. We adapt to each; we own the layer above.
Google AP2
Open standard · mandate VC · DID-based
Agent Pay
Mastercard · tokenised mandate
Visa TAP
Visa · registry-based
Stripe ACP
OpenAI · lightweight · session-scoped
Rails + bureaux
Card networks · banks · credit bureaux · wallets
Existing orchestration. Bureau adapters already operated by IDCanopy — carry forward unchanged.
Standards bodies to shape: DIF Trusted AI Agents WG · W3C Credentials CG · OpenID Foundation · EBA + ECB
MCP-I tier choice

L2 from day 1. L3 hooks designed in.

Vouched's MCP-I framework (donated to DIF, March 2026) defines three tiers for agent identity. Picking the right tier is a one-shot decision — too low and regulated regimes reject us, too high and we chase a governance framework that doesn't exist yet.

Tier L1

OIDC / JWT

Bearer-token agent authentication. Fine for consumer retail; cannot prove a delegation chain. Regulated regimes reject it.

  • Agent-to-service auth
  • No mandate cryptography
  • No delegation chain
  • Incompatible with VC-based rails
Tier L2

DID + VC delegation

Agents carry DIDs. Mandates are Verifiable Credentials. Delegation chain cryptographically verifiable, end to end. Interoperable with AP2, OpenID4VP, EUDI Wallet.

  • DID-based agent identity
  • Mandate VC + StatusList2021
  • BBS+ selective disclosure
  • Meets CCD2 + IDD + MiFID audit needs
  • Compatible with EUDI Wallet ARF v1.5
Tier L3

Enterprise lifecycle

Adds key rotation, attestation lifecycle, formal accreditation, external audit bodies. Governance framework forming at DIF now — not stable for v1.

  • Full HSM lifecycle
  • External accreditation
  • Periodic re-attestation
  • Governance body oversight

L3 hooks — already in the architecture

Operator registry has version + lifecycle fields ready for accreditation events. Agent attestations are structured for external auditor verification. HSM-backed key infrastructure supports lifecycle events. Audit log captures everything an L3 audit body would want. When DIF crystallises L3, our migration is configuration, not rebuild.

Reusability

Six primitives. Every vertical.

Mandate VC · disclosure rendering · human-in-the-loop gate · regime engine · receipt · revocation. Build the infrastructure once, add a regime template per vertical. No architectural change. This is what makes "the next decade of compliance primitives" concrete, not hand-waving.

Active

BNPL / consumer credit

CCD2 · Directive (EU) 2023/2225
Live deadline 20 Nov 2026

First vertical. CCD2 consent layer is the reference deployment. Per-purchase specific consent + creditworthiness + audit-grade receipt.

Next

Insurance distribution

IDD · existing regime
Expansion vertical · v1.2

IPID disclosure, suitability, demands-and-needs test. Agent-mediated comparison + bind use case crystallising fast.

Pilot

B2B procurement agents

SOX-style controls · CSRD spend reporting
Pilot via existing IDCanopy enterprise clients

Internal delegation: employee → agent under policy. Purchase approval ceilings, CSRD category tagging, SOX-compatible audit trail.

Future

Travel + commerce agents

PSD3 SCA · consumer rights
PSD3 transposition mid-2028

Adapter-ready in v1.1. Mandate-based SCA exemption schema designed to align with expected EBA guidance.

Future

Subscription management

EU subscription transparency (proposal)
Pilot when directive lands

Agent-led signup with explicit renewal + cancellation mandate ceilings. Auto-renewal dark-pattern alignment.

Partner

Investment robo-agents

MiFID II suitability
v2 · partner play with PFM platforms

Suitability assessment as a regime template. Reasoning-chain requirements fit the KYA receipt model natively.

Each new vertical adds: regime template + regime engine adapter + reasoning-chain templates. The rest is already built.
Forcing function

CCD2 as the first forcing function

KYA is a horizontal pattern — disclosure, specific consent, a human-in-the-loop gate where the regime demands it, a regime-specific decision step, and a cryptographic receipt that survives audit. Reusability across verticals only holds if the first regime is a hard one. Directive (EU) 2023/2225 (CCD2) is the hard one. Application date 20 November 2026 [Directive (EU) 2023/2225, Art. 48; OJEU 30 Oct 2023], live enforcement teeth under Directive 2020/1828, and — critically — silent on who or what initiates the transaction. The obligations hold whether a human clicks, an agent routes, or a wallet presents. That is why CCD2 is the forcing function for KYA, not just the first regime KYA happens to cover. What follows is the regime walked through as the design constraint for a KYA-ready orchestration layer. Primary-source citations at first mention.

1. Scope — CCD2 closes the BNPL-shaped hole in CCD1

CCD1 (2008/48/EC) carved out short-term, low-value, no-interest credit. BNPL grew into that exemption. CCD2 closes it [Directive (EU) 2023/2225, Recitals 15–16, Art. 2]. In scope: BNPL Pay-in-3 / 4 and 6 / 12 / 24-month plans; consumer credit €200–€100,000 (CCD1 capped at €75,000); revolving, credit cards with deferral, overdraft; P2P consumer lending and crowdfunding credit; consumer leasing with purchase option or acquisition obligation. Pure operational leasing stays out [Art. 2(2)(d)]. The "large online supplier, no-interest, no-fee credit" CCD1 carve-out is materially narrowed [Art. 2(2)(h)].

Design implication. Multi-product scope, not BNPL-only. A layer that reasons only about BNPL rebuilds within twelve months. The v1 consent envelope carries a product_mode field — BNPL, instalment credit, leasing with purchase option, revolving, overdraft, P2P — from the first commit, with per-mode policy bands. One orchestration layer serves six verticals (see §07), not six products.

2. The obligation quartet — what creditors and merchants owe

Pre-contractual disclosure (Arts. 10–12). The updated SECCI on durable medium, sufficiently in advance, with CCD2 APR, schedule, total cost, warnings, withdrawal right, and data-protection information. Digital delivery is permitted. Adequate explanation (Art. 12) requires explaining the agreement in enough depth for the consumer to judge appropriateness.

Creditworthiness (Art. 18). The centre of gravity. Assessment must rest on relevant, sufficient, proportionate information, verified where necessary through independently verifiable documentation. Pure behavioural scoring is specifically insufficient. If assessment is negative, the creditor shall not grant the credit; Art. 18(6) creates liability for granting credit the consumer could not plausibly repay. Automated adverse decisions carry human-review rights (GDPR Art. 22). Re-assessment is mandatory on material changes.

Consent (Art. 18 read with GDPR Arts. 6, 9). Specific to the assessment at hand — blanket authorisation does not satisfy CCD2. Freely given; bundling creditworthiness consent with marketing consent is prohibited. Each fresh assessment implies a fresh consent object. The consumer retains the right to know what was accessed, from where, with what consequence, and to contest.

Enforcement (Arts. 37–46 + Directive 2020/1828). BaFin, FMA, ACPR, Banca d'Italia gain supervisory powers. BaFin precedent under CCD1 sits in the €250k–€5M band for material violations. Contract-voiding and interest reclaim are available to consumers. CCD2 breaches are representative-action-eligible under 2020/1828 — a new vector most BNPL legal teams are underweight on.

Design implication. Each obligation maps to receipt fields. Disclosure → consent.secciAcknowledged, consent.withdrawalRightNotified. Creditworthiness → decision.article18Applied, decision.evidenceIds, decision.reasoningChainHash. Consent → consent.receiptId, consent.humanConfirmed, consent.confirmedAt. Enforcement → cryptographic proof, revocation.statusListUrl, public verify-receipt endpoint. The receipt is the evidence base a regulator, counterparty, or plaintiff queries directly.

3. Transposition — commercial uncertainty is the buying trigger

As of April 2026: France transposed September 2025 [Ordonnance n° 2025-…, Journal Officiel]. Germany passed 17 April 2026 [Bundestag, Verbraucherkreditrichtlinien-Umsetzungsgesetz; Bundesrat expected May]. Austria, Italy drafting through Q2/Q3 2026. Spain, Netherlands, Belgium in draft or consultation. Application is 20 November 2026 across all of them.

Cross-border merchants face a window where the application date is fixed but national rulebooks are not. That asymmetry is the buying trigger. Waiting for clarity means the penalty surface goes live in the first enforcing market before the vendor has shipped.

Design implication. National rules are configuration, not code. SECCI templates, product-band thresholds, consent-copy phrasing, bureau permissible-purpose language, and open-banking consent scope vary by market. Market is an envelope dimension from day one — tenant_hierarchy resolves to a market, market resolves to a rulebook — exactly like product_mode resolves to a policy band.

4. Proportionality — the Art. 18 policy surface

Art. 18 requires depth proportionate to the nature, value, duration, and consumer risk of the credit. A €50 Pay-in-3 does not need what a €5,000 24-month loan needs — but neither runs on nothing. Proportionality is a policy decision, not a runtime judgment. Bureau-only may satisfy Art. 18 for a clean-file, micro-ticket, short-duration case; it will not satisfy a larger, longer, thin-file, or stacking-prone one. The regime demands a written product-band policy [NEEDS SOURCE for any national-authority prescription of specific thresholds; principle comes from Art. 18, not regulator-set numbers].

Design implication. The layer's value is not the bureau call or the open-banking call. It is the policy engine that selects the right evidence provider for the product band, the consent object that binds the selection to the consumer's specific authorisation, and the receipt that proves both were correct at the decision moment. Consent, policy, evidence-provider selection, receipt — the Orchestration Layer shape.

5. EUDI wallets — additive, not substitutive, by the deadline

Regulation (EU) 2024/1183 (eIDAS2) obliges member states to offer a European Digital Identity Wallet. Germany launches 2 January 2027 in production; others pilot through 2026–2027. A 2026-compliant CCD2 flow cannot assume a wallet is present. Wallets become baseline through 2027–2028 as issuance matures.

Design implication. Wallet mode is additive. The evidence-provider abstraction that routes to bureau and open-banking today accepts future EUDI/QEAA credentials as a provider upgrade — same session API, same receipt format, stronger provenance underneath — without re-contracting with PSPs, aggregators, or merchants. This makes "ship by the deadline and absorb wallets as they arrive" an engineering claim, not a roadmap hedge.

6. Agents — the first regime where who-initiates stops mattering

The directive assumes the consumer is the actor and does not mention agents. A conservative reading: an agent cannot receive SECCI and give specific consent on behalf of a consumer for CCD2 purposes. Art. 5 specifies the consumer receives the information; Art. 10's "in good time before the consumer is bound" implies human reading time; recital language on "informed decisions" has historically been read as human cognition.

That does not kill agentic commerce for regulated credit — it shapes it. The workable flow is agent-prepared, human-confirmed: the agent assembles the transaction, presents SECCI for fresh specific human confirmation in the wallet or equivalent durable-medium channel, then triggers creditworthiness and receipt. One cryptographic artefact captures agent identity, operator identity, mandate scope, human confirmation, and decision reasoning.

The regulation requires the human-in-the-loop gate that separates regulated KYA from generic agentic checkout. KYA is a v1.1 commercial line, but the v1 receipt must be agent-consumable unchanged so an MCP tool in 2027 reads it without reissue.

Primary sources. Directive (EU) 2023/2225 (EUR-Lex CELEX 32023L2225); German transposition (Bundestag, 17 April 2026); French Ordonnance n° 2025-…, Journal Officiel; forthcoming EBA guidelines on creditworthiness assessment. Nothing in this section is legal advice.

Product modes

Where the KYA pattern ships first: verticals under a 20 Nov 2026 deadline

KYA is a horizontal trust layer. It ships in verticals. A regulatory deadline decides which vertical ships first. CCD2's 20 November 2026 application date [Directive (EU) 2023/2225, Art. 48] forces four product modes into the same compliance envelope at the same moment. One orchestration layer, four product modes — this is what the KYA pattern looks like when the regulation lands.

These are verticals where the KYA pattern ships first because a regulatory deadline forces the buy — not market segments picked for growth. CCD2 is the first forcing function; IDD, MiFID II suitability, PSD3 agent mandates, and EU AI Act deployer obligations follow on their own clocks. All four share one orchestration layer, one consent envelope, one receipt schema — they differ in product mode, evidence depth, buyer persona, and commercial band.

Vertical 1 — Buy-now-pay-later (BNPL)

Scope. Short-term deferred-payment credit where the consumer owes more than 40 days after delivery, regardless of interest [Art. 2, closing CCD1 Art. 2(2)(f)]. Pay-in-3, Pay-in-4, 6 / 12 / 24-month BNPL, whether the provider is the creditor or the merchant grants credit directly.

Who feels the deadline first. The long tail of EU-local and niche BNPL providers. Tier-1 players have been building since 2023 and reach 20 November 2026 with some compliance stack, however uneven. The long tail either builds in-house under time pressure without primitives or buys a layer designed against the directive. Merchants carrying BNPL in checkout share the exposure — the "which of us is liable" question between merchant and BNPL provider is genuinely unclear in many contracts.

Why they cannot wait. Application date is locked; national rulebooks are moving (Germany transposed 17 April 2026, France September 2025, Austria and Italy drafting through Q2/Q3 2026). Waiting for clarity means missing the deadline in the first market that enforces.

What breaks. Supervisory penalties under national law (BaFin precedent sits in the €250k–€5M band for material violations). Contract-voiding and interest reclaim. Representative-action exposure under Directive 2020/1828. Public-enforcement reputational damage.

KYA pattern fit. Highest-volume product mode in v1. Bureau-default with policy-triggered open-banking access for higher-assurance flows — thin files, large tickets, stacking signals, adverse bureau data — inside a single consent envelope.

Vertical 2 — Instalment credit

Scope. Consumer credit agreements €200 up to €100,000 (CCD2 raises the ceiling from €75,000) [Art. 2]. Practical KYA-layer band: €1,000–€5,000 over 3–24 months — the range where point-of-purchase instalment financing is live at electronics retailers, home-improvement, automotive aftermarket, travel, and health.

Who feels the deadline first. Point-of-sale lenders, consumer-finance arms of banks, and PSPs whose merchant book carries instalment financing. The buyer is often not the BNPL product manager — it is the consumer-finance PM or credit-product PM. Different budget, different risk committee, same underlying regime.

Why they cannot wait. Art. 18 bites harder at larger tickets and longer durations. Proportionality supports bureau-only for micro-ticket clean-file cases; it does not support it for a €3,000 18-month agreement. Verified income evidence — policy-triggered open-banking access ahead of wider EUDI/QEAA — is the defensible default. Building that plumbing per-merchant against the deadline reliably misses a November go-live.

What breaks. BNPL enforcement surface plus sharper Art. 18(6) liability on individual decisions. A €5,000 18-month credit granted to a consumer who could not plausibly repay is a clean private-right-of-action claim. Class-action surface under 2020/1828 for systemic under-assessment. Supervisory attention tracks ticket size.

KYA pattern fit. Same orchestration layer as BNPL. Different product mode, different policy band — open-banking-first or bureau-plus-open-banking-on-trigger under the Art. 18 matrix. BNPL and instalment credit are one platform, two buyer-facing tracks. We do not collapse them. Collapsing them into a single "consumer credit" sell routes past the PM who signs, in both directions.

Vertical 3 — Consumer leasing with purchase option

Scope. Leasing agreements with acquisition obligation or end-of-term purchase option [Art. 2(2)(d)]. Operational leases without acquisition obligation remain out; a KYA layer should not route those through CCD2 unless local counsel marks them in.

Who feels the deadline first. Consumer-leasing operators — automotive lease-to-own and lease-with-option, furniture, consumer electronics subscription-to-own, specialist asset lessors. Longer sales cycles than BNPL, smaller buyer populations, richer existing affordability practice. The question is not whether they assess — it is whether their assessment, consent capture, and receipt documentation are CCD2-shaped under the new regime.

Why they cannot wait. Thinner vendor tooling than BNPL. The market does not yet have a CCD2-aware consent-and-receipt layer built against leasing-specific SECCI and product-mode semantics; internal builds compete against the rest of the roadmap. Deadline is the same 20 November 2026.

What breaks. Contract-voidability is sharper because individual lease values are higher. Class-action exposure through 2020/1828. Supervisors concentrate attention where ticket sizes are visible.

KYA pattern fit — narrow-scope, design-partner framing. Declared in v1 as a separate product_mode with its own policy band and SECCI template, open-banking-heavy by default. Explicitly narrow-scope, design-partner, not mass-market. Validation runs parallel to the anchor BNPL deployment. Strong design-partner signal moves leasing into 2026 shipping scope; empty signal demotes gracefully to v1.1 roadmap. The architecture accommodates either outcome because product mode is a configuration dimension.

Vertical 4 — Revolving, overdraft, credit cards, P2P

Revolving credit facilities, credit cards with deferral features, overdraft, P2P consumer lending, and credit via crowdfunding service providers are all in CCD2 scope [Art. 2 expansions]. They are continuous-obligation products, not per-transaction products — different consent shape (initial assessment plus mandatory re-assessment on material change), different rhythm of audit evidence. KYA primitives apply; envelope logic does not match BNPL or instalment credit. We name the scope so compliance readers know we see it; v1.1 or later, once per-transaction modes are proven in production.

The common thread

Every vertical above buys the same primitives under a different regime template: a mandate (direct consumer consent, or an agent-mandate the human confirms at the decision moment); disclosure rendering (SECCI for CCD2; IPID for insurance; suitability summary for MiFID II); a human-in-the-loop confirmation where the regime requires it; evidence-provider selection driven by a product-band policy; a signed receipt with provenance fields a regulator, counterparty, or plaintiff can verify; revocation and audit infrastructure treating every receipt as independently verifiable.

The deadline is not why this layer is worth building. The deadline is why it gets bought first. The pattern — regulated trust where both humans and agents initiate transactions — is why the same layer still matters on 21 November 2026.

The moat

The operator registry is the network effect.

Anyone can spin up an agent. Only operators who pass IDCanopy's KYB-grade registration can transact through the layer. Counterparties get assurance every agent reaching them is accountable to a real legal entity. First-mover advantage compounds fast on both sides of the network.

Registered operators ↔ accepting counterparties

IDCanopy
OP·01
OP·02
OP·03
OP·04
CP·α
CP·β
CP·γ
CP·δ
Operator (KYB-verified) Counterparty (receipt-accepting)

How the network effect compounds

  • 50+ operators registered → counterparties accept IDCanopy receipts as a baseline trust signal
  • 500+ counterparties accepting → operators have a strong reason to register with IDCanopy specifically
  • Once both sides exist → the network is hard to dislodge, same pattern as identity orchestration today
  • Switching costs lock both sides — receipt-URN references embedded in transactional records are a hard artifact to migrate away from
12–18 month window to lock the registry before Sumsub, Trulioo or Signicat assemble their version. First-mover advantage is time-bounded and real.
Liability framework

The procurement Q&A, answered.

Counterparty general counsel asks: if an agent transacts through your layer and something goes wrong, who pays? This is the matrix.

ScenarioPrimary liabilityIDCanopy exposure
Agent acts within mandate, principal disputes as buyer's remorsePrincipalNone — receipt proves authorisation
Agent acts outside mandate, our layer correctly rejectsNoneNone — system worked
Agent acts outside mandate, our layer fails to reject (bug)IDCanopy (per SLA)Capped per DPA
Mandate forgedWallet providerNone
Mandate revoked but agent's cached copy presentsOperatorNone — status list honoured
Bureau returns wrong decisionBureauNone
Reasoning chain insufficient under regime auditCounterparty (creditor/insurer)Capped — we provide compliant template
GDPR breach in our infrastructureIDCanopyCapped per DPA
What we own
SLA (uptime, latency) · verification correctness · receipt cryptographic integrity · GDPR controller obligations · regime template correctness.
What we do NOT own
Consumer credit risk · bureau data accuracy · counterparty goods/services · agent operator behaviour · wallet compromise.
Insurance posture
E&O to €5m per incident. Operators carry own E&O tied to transaction volume.
Regulatory horizon

PSD3 alignment from day 1.

PSD3 (Directive + PSR Regulation) is in trilogue early 2026. Expected adoption late 2026, transposition mid-2028. IDCanopy's KYA layer must be PSD3-aware — not retrofit.

Q1 2026
PSD3 trilogue
EP + Council + Commission final text
Nov 2026
CCD2 enforcement
First KYA-dependent regime live
Late 2026
PSD3 adoption
EBA guidance on agentic payments expected
Mid-2028
PSD3 transposition
Member-state SCA + mandate framework live

SCA updates

Mandate-based exemptions formalised. Our receipt format is designed to satisfy the expected exemption schema.

Open finance

Bureau orchestration extends to open-finance sources. Our adapter pattern already supports.

Mandate framework formalisation

Schema may diverge from our VC mandate — track ECB/EBA drafts and align before finalisation.

Agent-initiated payments

EBA guidance expected late 2026. Position our receipt as the reference; engage EBA during consultation windows now.

Liability allocation

Sharper PSP/ASPSP/consumer split. SLA + DPA to be updated at PSD3 transposition.

Dark-pattern prohibition

Reinforces the specific-consent requirement that already drives our human-in-the-loop gate design. Already aligned.

Strategic value

Why KYA is a strategy lever, not just a product.

A general KYA strategy stands on its own architectural merit, independently of any single client deal. Five compounding claims — each with concrete actions behind it.

01

Compounding asset

Defined product layer with first-mover positioning, working reference deployment (CCD2 reference deployment), standards-body engagement — components that compound across whatever commercial path follows.

02

Positioning shift

From "KYC vendor" to "trust infrastructure for the agentic economy". Category creation, not just product addition.

03

Content wedge

Five-piece thought-leadership series built into the strategy: concept, mandates-as-login, regulated KYA, operator registry, adapter playbook. Content-OS friendly.

04

Standards influence

DIF · OpenID · EBA consultations. Regulator positioning, counterparty trust.

05

Defensibility

Operator registry as the network effect. 12–18 month window before Sumsub, Trulioo or Signicat assemble their version. Time-bounded, real.

Next steps

Externally validate · engage standards · ship the reference.

External verification pass on open questions. DIF Trusted AI Agents WG + OpenID + EBA consultations. Operator registry MVP on its own delivery timeline. Five-piece content series on idcanopy.com. Per-vertical playbooks as opportunities crystallise.

Continue the conversation

Reach IDCanopy directly.

Partnership discussions on KYA / KYARA, Namirial-anchored deployments, scoping a regulated agentic-commerce engagement, or extending the architecture into a vertical use case — open the conversation with IDCanopy.