<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-hood-independent-atp-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ATP">Agent Transfer Protocol (ATP)</title>

    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>

    <date year="2026" month="March" day="19"/>

    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword> <keyword>agentic systems</keyword> <keyword>protocol</keyword> <keyword>agent traffic</keyword> <keyword>autonomous agents</keyword>

    <abstract>


<?line 81?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as "agent
protocols" — including MCP, ACP, A2A, and ANP — are messaging-layer
constructs that presuppose HTTP as their transport. They do not address
the underlying transport problem.</t>

<t>This document defines the Agent Transfer Protocol (ATP): a dedicated
application-layer protocol for AI agent traffic. ATP provides agent-native
intent methods (QUERY, SUMMARIZE, BOOK, SCHEDULE, LEARN, DELEGATE,
COLLABORATE, CONFIRM, ESCALATE, NOTIFY), protocol-level agent identity
and authority headers, and a status code vocabulary designed for the
conditions AI agent systems encounter. ATP SHOULD prefer QUIC for new
implementations and MUST support TCP/TLS for compatibility and fallback.
It is designed to be composable with existing agent frameworks, not to
replace them.</t>



    </abstract>



  </front>

  <middle>


<?line 102?>

<section anchor="introduction"><name>Introduction</name>

<t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that certain extensions to this specification -- specifically the
Agent Certificate extension (Section 7.2) and the ACTIVATE method --
may be subject to pending patent applications by the author.  The core
ATP specification is intended for open implementation without royalty
obligation.  The licensor is prepared to grant a royalty-free license
to implementers consistent with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>

<section anchor="background"><name>Background</name>

<t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows — querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals — with minimal or no human supervision per transaction.</t>

<t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>

</section>
<section anchor="limitations-of-http-for-agent-traffic"><name>Limitations of HTTP for Agent Traffic</name>

<t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP — stateless, resource-oriented,
human-initiated request/response — creates specific failures when applied
to agentic systems at scale:</t>

<t><list style="symbols">
  <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
  <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent — summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
  <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
  <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
</list></t>

</section>
<section anchor="why-not-evolve-http"><name>Why Not Evolve HTTP?</name>

<t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>

<t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully — a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>

<t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>

<t>Third, the observability goal — making agent traffic distinguishable from
human traffic at the infrastructure layer — cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>

<t>ATP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and ATP coexist: human traffic continues to flow over
HTTP; agent traffic flows over ATP. The two protocols serve different
classes of network participant.</t>

</section>
<section anchor="motivation-for-a-dedicated-protocol"><name>Motivation for a Dedicated Protocol</name>

<t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>

<t>ATP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions autonomous systems encounter.</t>

</section>
<section anchor="scope-and-target-audience"><name>Scope and Target Audience</name>

<t>This document covers ATP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>

<t>The Agent Certificate extension for cryptographic binding of agent
identity to ATP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="ATP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>

<t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
  </dd>
  <dt>Principal:</dt>
  <dd>
    <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
  </dd>
  <dt>Agent-ID:</dt>
  <dd>
    <t>A unique identifier for a specific agent instance, present in all ATP
request headers.</t>
  </dd>
  <dt>Principal-ID:</dt>
  <dd>
    <t>The identifier of the principal on whose behalf an agent operates.</t>
  </dd>
  <dt>Authority-Scope:</dt>
  <dd>
    <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format domain:action or domain:*.</t>
  </dd>
  <dt>Intent Method:</dt>
  <dd>
    <t>An ATP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
  </dd>
  <dt>Delegation Chain:</dt>
  <dd>
    <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
  </dd>
  <dt>Escalation:</dt>
  <dd>
    <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
  </dd>
  <dt>Attribution Record:</dt>
  <dd>
    <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
  </dd>
  <dt>Session:</dt>
  <dd>
    <t>An ATP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
  </dd>
  <dt>SEP (Scope-Enforcement Point):</dt>
  <dd>
    <t>An ATP-aware infrastructure component — load balancer, gateway, proxy —
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="ATP-CERT"/>).</t>
  </dd>
</dl>

</section>
<section anchor="problem-statement"><name>Problem Statement</name>

<t>ATP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>

<section anchor="problem-1-undifferentiated-agent-traffic-on-http"><name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>

<t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result
— operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>

<t>ATP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>

</section>
<section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods"><name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>

<t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, BOOK a resource, and SCHEDULE a sequence
— all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>

<t>ATP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>

</section>
<section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents"><name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>

<t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>

<t>ATP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>

</section>
<section anchor="problem-summary"><name>Problem Summary</name>

<texttable title="Summary of Problems Addressed by ATP">
      <ttcol align='left'>#</ttcol>
      <ttcol align='left'>Problem</ttcol>
      <ttcol align='left'>Current Failure</ttcol>
      <ttcol align='left'>ATP Response</ttcol>
      <c>1</c>
      <c>Undifferentiated traffic</c>
      <c>HTTP cannot separate agent traffic</c>
      <c>Dedicated protocol environment</c>
      <c>2</c>
      <c>Semantic mismatch</c>
      <c>HTTP verbs obscure agent intent</c>
      <c>Native intent-based method vocabulary</c>
      <c>3</c>
      <c>No protocol-level identity</c>
      <c>Attribution is untraceable</c>
      <c>Agent identity and scope in headers</c>
</texttable>

</section>
</section>
<section anchor="related-work-and-existing-approaches"><name>Related Work and Existing Approaches</name>

<section anchor="httprest-as-the-de-facto-standard"><name>HTTP/REST as the De Facto Standard</name>

<t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>

</section>
<section anchor="existing-agent-protocols"><name>Existing Agent Protocols</name>

<dl>
  <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
  <dd>
    <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
  </dd>
  <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
  <dd>
    <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
  </dd>
  <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
  <dd>
    <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
  </dd>
  <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
  <dd>
    <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
  </dd>
</dl>

<t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>

</section>
<section anchor="transport-layer-alternatives"><name>Transport-Layer Alternatives</name>

<dl>
  <dt>gRPC:</dt>
  <dd>
    <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
  </dd>
  <dt>WebSockets:</dt>
  <dd>
    <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
  </dd>
  <dt>QUIC <xref target="RFC9000"/>:</dt>
  <dd>
    <t>Modern multiplexed transport with reduced connection overhead. ATP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; ATP is the application-layer protocol above it.</t>
  </dd>
</dl>

</section>
<section anchor="the-critical-distinction-messaging-vs-transport"><name>The Critical Distinction: Messaging vs. Transport</name>

<t>The most important positioning principle for ATP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols — they define what agents say. ATP defines how agent
traffic moves.</t>

<t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. ATP defines the transport environment those messages move through.</t>

</section>
<section anchor="atp-positioning-the-proposed-stack"><name>ATP Positioning: The Proposed Stack</name>

<figure title="ATP in the Protocol Stack" anchor="protocol-stack"><artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   ATP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork></figure>

<t>ATP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over ATP and gain transport-level observability and
identity without modifying the messaging layer. ATP-native agents that do
not use a separate messaging protocol interact with ATP methods directly.</t>

</section>
</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<section anchor="stack-position"><name>Stack Position</name>

<t>ATP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>

<t><list style="symbols">
  <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
  <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
  <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
</list></t>

<t>Suggested port assignment (subject to IANA assignment — see Section 8):</t>

<t><list style="symbols">
  <t>ATP/QUIC: port 8443 (proposed)</t>
  <t>ATP/TCP+TLS: port 8080 (proposed)</t>
</list></t>

</section>
<section anchor="design-principles"><name>Design Principles</name>

<dl>
  <dt>Minimalist core:</dt>
  <dd>
    <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
  </dd>
  <dt>Extensible by design:</dt>
  <dd>
    <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
  </dd>
  <dt>Agent-native:</dt>
  <dd>
    <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
  </dd>
  <dt>Secure by default:</dt>
  <dd>
    <t>TLS 1.3 or higher is mandatory. Unencrypted ATP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
  </dd>
  <dt>Observable by design:</dt>
  <dd>
    <t>Native metadata in every ATP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
  </dd>
  <dt>Composable:</dt>
  <dd>
    <t>ATP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
  </dd>
</dl>

</section>
<section anchor="connection-model"><name>Connection Model</name>

<t>ATP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An ATP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>

<t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>

</section>
<section anchor="header-format"><name>Header Format</name>

<section anchor="request-headers"><name>Request Headers</name>

<texttable title="ATP Request Header Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>ATP-Version</c>
      <c><strong>MUST</strong></c>
      <c>Protocol version. Current: ATP/1.0</c>
      <c>ATP-Method</c>
      <c><strong>MUST</strong></c>
      <c>The agent intent method (see Section 6)</c>
      <c>Agent-ID</c>
      <c><strong>MUST</strong></c>
      <c>Opaque identifier for the requesting agent instance</c>
      <c>Principal-ID</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the human or system that authorized this agent</c>
      <c>Authority-Scope</c>
      <c><strong>MUST</strong></c>
      <c>Declared scope of actions this agent is authorized to take</c>
      <c>Session-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Identifies the current task/workflow context</c>
      <c>Task-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Unique identifier for this specific method invocation</c>
      <c>Delegation-Chain</c>
      <c><strong>MAY</strong></c>
      <c>Ordered list of Agent-IDs if this request was delegated</c>
      <c>Priority</c>
      <c><strong>MAY</strong></c>
      <c>Request priority hint: critical, normal, background</c>
      <c>TTL</c>
      <c><strong>MAY</strong></c>
      <c>Maximum acceptable response latency in milliseconds</c>
</texttable>

</section>
<section anchor="response-headers"><name>Response Headers</name>

<texttable title="ATP Response Header Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>ATP-Version</c>
      <c><strong>MUST</strong></c>
      <c>Protocol version</c>
      <c>ATP-Status</c>
      <c><strong>MUST</strong></c>
      <c>Numeric status code (see Section 5.5)</c>
      <c>Task-ID</c>
      <c><strong>MUST</strong></c>
      <c>Echo of request Task-ID for correlation</c>
      <c>Server-Agent-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Identity of the responding server or agent</c>
      <c>Attribution-Record</c>
      <c><strong>SHOULD</strong></c>
      <c>Signed record of the action taken, for audit</c>
      <c>Continuation-Token</c>
      <c><strong>MAY</strong></c>
      <c>Token for retrieving additional results in streaming contexts</c>
      <c>Supported-Methods</c>
      <c><strong>SHOULD</strong> (on session open)</c>
      <c>List of ATP methods supported by this server</c>
</texttable>

</section>
</section>
<section anchor="status-codes"><name>Status Codes</name>

<t>ATP defines its own status code space. Codes 451, 550, and 551 are
ATP-specific with no HTTP equivalent and are registered in the IANA ATP
Status Code Registry (see Section 8.3).</t>

<texttable title="ATP Status Codes">
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <c>200</c>
      <c>OK</c>
      <c>Method executed successfully</c>
      <c>202</c>
      <c>Accepted</c>
      <c>Method accepted; execution is asynchronous</c>
      <c>204</c>
      <c>No Content</c>
      <c>Method executed; no response body</c>
      <c>400</c>
      <c>Bad Request</c>
      <c>Malformed ATP request</c>
      <c>401</c>
      <c>Unauthorized</c>
      <c>Agent-ID not recognized or not authenticated</c>
      <c>403</c>
      <c>Forbidden</c>
      <c>Agent lacks authority for requested action per Authority-Scope</c>
      <c>404</c>
      <c>Not Found</c>
      <c>Target resource or agent not found</c>
      <c>408</c>
      <c>Timeout</c>
      <c>TTL exceeded before method could execute</c>
      <c>409</c>
      <c>Conflict</c>
      <c>Method conflicts with current state (e.g., BOOK on unavailable resource)</c>
      <c>422</c>
      <c>Unprocessable</c>
      <c>Request well-formed but semantically invalid</c>
      <c>429</c>
      <c>Rate Limited</c>
      <c>Agent is exceeding permitted request frequency</c>
      <c>451</c>
      <c>Scope Violation</c>
      <c>Requested action is outside declared Authority-Scope — ATP-specific</c>
      <c>500</c>
      <c>Server Error</c>
      <c>Internal failure in the responding system</c>
      <c>503</c>
      <c>Unavailable</c>
      <c>Responding agent or system temporarily unavailable</c>
      <c>550</c>
      <c>Delegation Failure</c>
      <c>A delegated sub-agent failed to complete the requested action — ATP-specific</c>
      <c>551</c>
      <c>Authority Chain Broken</c>
      <c>Delegation chain contains an unverifiable or broken identity link — ATP-specific</c>
</texttable>

<t>Status code 451 (Scope Violation) is a governance signal: the agent
attempted an action outside its declared Authority-Scope, caught at the
protocol level. Status code 551 (Authority Chain Broken) indicates that
one or more Agent-ID entries in the Delegation-Chain header cannot be
verified as part of a valid delegation sequence. Both are operational
signals, not protocol errors, and <strong>MUST</strong> be logged for audit purposes.</t>

</section>
<section anchor="wire-format-and-content-type"><name>Wire Format and Content-Type</name>

<t>ATP request and response bodies are encoded as JSON. The registered
Content-Type for ATP message bodies is:</t>

<figure><artwork><![CDATA[
Content-Type: application/atp+json
]]></artwork></figure>

<t>Implementations <strong>MUST</strong> include this Content-Type on all ATP requests and
responses that carry a message body. Responses with no body (e.g., 204 No
Content) <strong>MUST NOT</strong> include a Content-Type header. Binary or streaming
extensions <strong>MAY</strong> define additional Content-Type values as part of their
companion specifications.</t>

<t>The common structure for all ATP request bodies:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode></figure>

<t>And for all ATP response bodies:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode></figure>

</section>
<section anchor="early-implementations"><name>Early Implementations</name>

<t>ATP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>

<ul empty="true"><li>
  <t>If you are building an ATP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
</li></ul>

<t>Implementers wishing to experiment before the formal IANA port assignment
may use port 8443 (ATP/QUIC) and port 8080 (ATP/TCP+TLS) as working
values. These values are subject to change upon final IANA assignment.</t>

<t>The ACTIVATE method extension, which binds .nomo governed agent packages
to ATP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core ATP
implementations need not support ACTIVATE to be compliant with this
specification.</t>

</section>
<section anchor="agent-identification-and-naming"><name>Agent Identification and Naming</name>

<section anchor="the-canonical-agent-identifier"><name>The Canonical Agent Identifier</name>

<t>Every ATP agent is identified by a canonical Agent-ID: a 256-bit
cryptographic identifier derived from the agent's governance-layer Birth
Certificate at activation time. This identifier is globally unique,
fixed-length, and — when the Agent Certificate extension is deployed —
cryptographically verifiable at the transport layer.</t>

<t>The URI form of a canonical Agent-ID uses the atp:// scheme:</t>

<figure><artwork><![CDATA[
atp://3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d4e8b2a5f9c3d7e1b0a4f8c2d6e0b
]]></artwork></figure>

<t>URI length is not a practical constraint for atp:// identifiers.
256-character URIs are handled without issue by all modern protocol stacks
and do not require abbreviation or truncation.</t>

<t>The atp:// URI scheme is proposed for IANA registration per <xref target="RFC7595"/>
as an open, unencumbered scheme. This registration is distinct from and
independent of any intellectual property claims on ATP extensions.</t>

<t>The canonical Agent-ID is the authoritative identifier in all ATP protocol
operations: it appears in the Agent-ID header of every request, is the key
in the certificate registry, and is the cross-layer reference linking the
ATP Agent Certificate to the governance-layer Birth Certificate. All other
identification forms described in this section are aliases that resolve to
a canonical Agent-ID.</t>

</section>
<section anchor="human-friendly-agent-names-optional-layer"><name>Human-Friendly Agent Names (Optional Layer)</name>

<t>For deployments with large numbers of agents — particularly enterprise
environments with hundreds or thousands of agents per organization — the
canonical Agent-ID alone is insufficient for human-readable observability,
audit navigation, and operational management. ATP supports an optional
hierarchical naming layer as a convenience alias system on top of canonical
identifiers.</t>

<t>Human-friendly names follow a structured DNS-style format using the
.agent or .nomo top-level labels:</t>

<figure><artwork><![CDATA[
atp://marketing-01.acme.agent
atp://sales-bot-v2.engineering.acme.agent
atp://customer-experience.acme.nomo
]]></artwork></figure>

<t>The structure is: [agent-label].[department].[organization].[tld]</t>

<t>where tld is .agent for general-purpose agents or .nomo for agents
activated under the governed .nomo package format. Organization-level
namespaces (e.g., acme.agent) are scoped per governance zone and enforced
at registration time (see Section 5.8.3).</t>

<t>Attribute-based pattern matching is supported for multi-agent operations.
The wildcard form acme.agent:sales-* matches all agents whose friendly
name begins with sales- within the acme.agent namespace.</t>

<t>Human-friendly names <strong>MUST NOT</strong> be used as Agent-ID header values in
ATP protocol messages. The Agent-ID header always carries the canonical
256-bit identifier. Friendly names are a resolution and management layer;
they are not transport-layer identifiers.</t>

</section>
<section anchor="governed-name-registration"><name>Governed Name Registration</name>

<t>Human-friendly name registration is tied to the governed activation flow
and ATP Agent Certificate issuance process. An agent may only claim a
friendly name after successfully completing the atomic activation protocol
and receiving an Active lifecycle state in the certificate registry.</t>

<t>The registration process:</t>

<t><list style="numbers" type="1">
  <t>The activating operator submits a proposed friendly name alongside the
.nomo package during the ACTIVATE transaction.</t>
  <t>The activation endpoint verifies uniqueness within the organization's
governance zone namespace.</t>
  <t>On successful activation, the friendly name is recorded in the
governance platform's name registry, mapped to the activated agent's
canonical certificate_id.</t>
  <t>The name binding is included in the genesis audit record as the
friendly_name field.</t>
  <t>Revocation of the agent's certificate automatically releases the
friendly name, making it available for re-registration.</t>
</list></t>

<t>Uniqueness is enforced at the governance-zone level. Different organizations
operating separate governance zones may register the same friendly name
label without conflict.</t>

</section>
<section anchor="name-resolution"><name>Name Resolution</name>

<t>Two resolution mechanisms are supported:</t>

<dl>
  <dt>DNS-based resolution:</dt>
  <dd>
    <t>The organization publishes DNS TXT records under the _agent subdomain of
its governance zone domain:</t>
  </dd>
</dl>

<figure><artwork><![CDATA[
_agent.acme.agent. IN TXT "atp-id=3a9f2c1d8b7e4a6f..."
]]></artwork></figure>

<dl>
  <dt>ATP-native resolution:</dt>
  <dd>
    <t>An ATP QUERY request to the governance platform's resolution endpoint
resolves a friendly name to a canonical Agent-ID along with the agent's
current lifecycle state, governance zone, trust tier, and ATP Agent
Certificate status. Resolution responses carry Content-Type:
application/atp+json:</t>
  </dd>
</dl>

<figure><sourcecode type="json"><![CDATA[
{
  "friendly_name": "sales-bot-v2.engineering.acme.agent",
  "canonical_id":  "3a9f2c1d8b7e4a6f...",
  "lifecycle_state": "Active",
  "governance_zone": "zone:internal",
  "trust_tier": 2,
  "cert_status": "Active",
  "inclusion_proof_hash": "b2c4d6e8..."
}
]]></sourcecode></figure>

<t>Implementations <strong>MUST</strong> treat the canonical Agent-ID as authoritative
in the event of a conflict between DNS-based and ATP-native resolution
results.</t>

</section>
<section anchor="scaling-considerations"><name>Scaling Considerations</name>

<t>The hierarchical naming scheme scales to organizations with millions of
agents without structural modification. Unlike sequential numeric suffixes,
hierarchical sub-labels enable departmental grouping, role-based cohorts,
version tracking, and delegation visibility. The governance platform's
name registry is a lightweight key-value store indexed on
(governance_zone, friendly_name) with a pointer to certificate_id,
adding O(1) per-resolution overhead.</t>

</section>
<section anchor="iana-considerations-for-the-atp-uri-scheme"><name>IANA Considerations for the atp:// URI Scheme</name>

<t>This document proposes registration of the atp:// URI scheme with IANA
per <xref target="RFC7595"/>. Registration template:</t>

<dl>
  <dt>URI scheme name:</dt>
  <dd>
    <t>atp</t>
  </dd>
  <dt>Status:</dt>
  <dd>
    <t>Permanent</t>
  </dd>
  <dt>URI scheme syntax:</dt>
  <dd>
    <t>atp://[canonical-agent-id] or atp://[friendly-name]</t>
  </dd>
  <dt>URI scheme semantics:</dt>
  <dd>
    <t>Identifies an AI agent operating over the Agent Transfer Protocol.
The canonical form uses a 256-bit hex-encoded cryptographic identifier.
The friendly-name form uses a hierarchical DNS-style label resolvable
to a canonical identifier via DNS TXT records or ATP-native lookup.</t>
  </dd>
  <dt>Applications/protocols that use this URI scheme:</dt>
  <dd>
    <t>Agent Transfer Protocol (this document)</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>Friendly names are optional aliases; implementations <strong>MUST</strong> accept
canonical identifiers and <strong>SHOULD</strong> support friendly-name resolution.</t>
  </dd>
  <dt>Contact:</dt>
  <dd>
    <t>Chris Hood, chris@nomotic.ai</t>
  </dd>
  <dt>References:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>The atp:// URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>

</section>
</section>
</section>
<section anchor="method-definitions"><name>Method Definitions</name>

<section anchor="design-philosophy"><name>Design Philosophy</name>

<t>ATP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>

</section>
<section anchor="core-methods"><name>Core Methods</name>

<section anchor="query"><name>QUERY</name>

<t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location.</t>

<texttable title="QUERY Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>intent</c>
      <c><strong>MUST</strong></c>
      <c>Natural language or structured expression of the information need</c>
      <c>scope</c>
      <c><strong>SHOULD</strong></c>
      <c>Data domains or sources to include or exclude</c>
      <c>format</c>
      <c><strong>MAY</strong></c>
      <c>Desired response format: structured, natural, raw</c>
      <c>confidence_threshold</c>
      <c><strong>MAY</strong></c>
      <c>Minimum confidence score for included results (0.0-1.0)</c>
      <c>context</c>
      <c><strong>MAY</strong></c>
      <c>Session context for disambiguation</c>
</texttable>

<t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>

</section>
<section anchor="summarize"><name>SUMMARIZE</name>

<t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data.</t>

<texttable title="SUMMARIZE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>source</c>
      <c><strong>MUST</strong></c>
      <c>Content inline (up to implementation limit) or URI reference</c>
      <c>length</c>
      <c><strong>SHOULD</strong></c>
      <c>Target summary length: brief, standard, detailed</c>
      <c>focus</c>
      <c><strong>MAY</strong></c>
      <c>Aspect to emphasize in the summary</c>
      <c>format</c>
      <c><strong>MAY</strong></c>
      <c>Output format: bullets, prose, structured</c>
      <c>audience</c>
      <c><strong>MAY</strong></c>
      <c>Intended reader context, for calibrating complexity</c>
</texttable>

<t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>

</section>
<section anchor="book"><name>BOOK</name>

<t>Purpose: Reserve a resource, time slot, seat, or allocation on behalf of
the agent's principal. State-modifying. Notable error codes: 409 Conflict
(resource unavailable), 451 Scope Violation (principal not authorized for
this resource type).</t>

<texttable title="BOOK Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>resource_id</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the resource to reserve</c>
      <c>principal_id</c>
      <c><strong>MUST</strong></c>
      <c>The human or system on whose behalf the booking is made</c>
      <c>time_slot</c>
      <c><strong>MUST</strong> (if time-based)</c>
      <c>ISO 8601 datetime or range</c>
      <c>quantity</c>
      <c><strong>MAY</strong></c>
      <c>Number of units to reserve</c>
      <c>options</c>
      <c><strong>MAY</strong></c>
      <c>Resource-specific booking parameters</c>
      <c>confirm_immediately</c>
      <c><strong>MAY</strong></c>
      <c>Boolean; if false, creates a hold pending confirmation</c>
</texttable>

<t>Response: Booking confirmation with booking_id, status (confirmed / held),
and expiry timestamp if a hold. Idempotent: No.</t>

</section>
<section anchor="schedule"><name>SCHEDULE</name>

<t>Purpose: Define a sequence of actions, method calls, or events to be
executed at specified times or in response to specified triggers. Creates
a durable plan, not an immediate execution.</t>

<texttable title="SCHEDULE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>steps</c>
      <c><strong>MUST</strong></c>
      <c>Ordered list of ATP method calls with parameters</c>
      <c>trigger</c>
      <c><strong>MUST</strong></c>
      <c>immediate, datetime, event, or condition</c>
      <c>trigger_value</c>
      <c><strong>MUST</strong> (if not immediate)</c>
      <c>Datetime, event name, or condition expression</c>
      <c>on_failure</c>
      <c><strong>SHOULD</strong></c>
      <c>Behavior on step failure: abort, skip, retry, escalate</c>
      <c>notify</c>
      <c><strong>MAY</strong></c>
      <c>Notification targets on completion or failure</c>
</texttable>

<t>Response: Schedule record with schedule_id, confirmed steps, and next
execution timestamp. Idempotent: No.</t>

</section>
<section anchor="learn"><name>LEARN</name>

<t>Purpose: Update the agent's session context, knowledge state, or persistent
memory. An explicit context write — the agent asserts that something should
be retained.</t>

<texttable title="LEARN Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>content</c>
      <c><strong>MUST</strong></c>
      <c>Information to be learned (structured or unstructured)</c>
      <c>scope</c>
      <c><strong>MUST</strong></c>
      <c>session (ephemeral), principal (persists for principal), global (shared)</c>
      <c>category</c>
      <c><strong>SHOULD</strong></c>
      <c>Semantic category for retrieval optimization</c>
      <c>confidence</c>
      <c><strong>MAY</strong></c>
      <c>Agent's confidence in the content (0.0-1.0)</c>
      <c>source</c>
      <c><strong>MAY</strong></c>
      <c>Provenance of the learned content</c>
      <c>ttl</c>
      <c><strong>MAY</strong></c>
      <c>Expiry for the learned content</c>
</texttable>

<t>Response: Confirmation with learn_id and effective scope. Idempotent: No.</t>

</section>
<section anchor="delegate"><name>DELEGATE</name>

<t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new ATP session on behalf of the delegating
agent, carrying forward authority lineage.</t>

<texttable title="DELEGATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>target_agent_id</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the agent to delegate to</c>
      <c>task</c>
      <c><strong>MUST</strong></c>
      <c>ATP method call (or sequence) to execute</c>
      <c>authority_scope</c>
      <c><strong>MUST</strong></c>
      <c>Scope granted to sub-agent — <strong>MUST</strong> be a strict subset of delegating agent's scope</c>
      <c>delegation_token</c>
      <c><strong>MUST</strong></c>
      <c>Signed token proving delegation authority</c>
      <c>callback</c>
      <c><strong>SHOULD</strong></c>
      <c>ATP endpoint for result delivery</c>
      <c>deadline</c>
      <c><strong>MAY</strong></c>
      <c>Maximum time for task completion</c>
</texttable>

<t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 451 Scope Violation if violated. This is the
protocol-level defense against authority laundering. Idempotent: No.</t>

</section>
<section anchor="collaborate"><name>COLLABORATE</name>

<t>Purpose: Initiate a multi-agent coordinated task where two or more agents
work in parallel or in defined roles toward a shared goal. Unlike DELEGATE
(hierarchical), COLLABORATE is peer-to-peer.</t>

<texttable title="COLLABORATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>collaborators</c>
      <c><strong>MUST</strong></c>
      <c>List of Agent-IDs invited to collaborate</c>
      <c>objective</c>
      <c><strong>MUST</strong></c>
      <c>Shared goal expressed as a task description or structured specification</c>
      <c>role_assignments</c>
      <c><strong>SHOULD</strong></c>
      <c>Map of Agent-IDs to roles within the collaboration</c>
      <c>coordination_model</c>
      <c><strong>SHOULD</strong></c>
      <c>parallel, sequential, or consensus</c>
      <c>result_aggregation</c>
      <c><strong>MAY</strong></c>
      <c>How results from collaborators are combined</c>
</texttable>

<t>Response: Collaboration session receipt with collaboration_id. Each
collaborator receives an ATP NOTIFY to join. Idempotent: No.</t>

</section>
<section anchor="confirm"><name>CONFIRM</name>

<t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record.</t>

<texttable title="CONFIRM Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>target_id</c>
      <c><strong>MUST</strong></c>
      <c>ID of the action, booking, schedule, or item being confirmed</c>
      <c>status</c>
      <c><strong>MUST</strong></c>
      <c>accepted, rejected, or deferred</c>
      <c>reason</c>
      <c><strong>SHOULD</strong> (if rejected/deferred)</c>
      <c>Explanation of the decision</c>
      <c>attestation</c>
      <c><strong>MAY</strong></c>
      <c>Agent-signed confirmation payload for audit</c>
</texttable>

<t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>

</section>
<section anchor="escalate"><name>ESCALATE</name>

<t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems — a first-class method, not a failure code.</t>

<texttable title="ESCALATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>task_id</c>
      <c><strong>MUST</strong></c>
      <c>The task or method invocation triggering escalation</c>
      <c>reason</c>
      <c><strong>MUST</strong></c>
      <c>Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</c>
      <c>context</c>
      <c><strong>MUST</strong></c>
      <c>Full context needed for the escalation recipient to act</c>
      <c>priority</c>
      <c><strong>SHOULD</strong></c>
      <c>urgent, normal, or low</c>
      <c>recipient</c>
      <c><strong>MAY</strong></c>
      <c>Specific human or agent to escalate to; if absent, routes to default handler</c>
      <c>deadline</c>
      <c><strong>MAY</strong></c>
      <c>Time by which a response is needed</c>
</texttable>

<t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on ATP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>

</section>
<section anchor="notify"><name>NOTIFY</name>

<t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient.</t>

<texttable title="NOTIFY Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>recipient</c>
      <c><strong>MUST</strong></c>
      <c>Target Agent-ID, human endpoint, or broadcast group</c>
      <c>content</c>
      <c><strong>MUST</strong></c>
      <c>Notification payload</c>
      <c>urgency</c>
      <c><strong>SHOULD</strong></c>
      <c>critical, informational, or background</c>
      <c>delivery_guarantee</c>
      <c><strong>MAY</strong></c>
      <c>at_most_once, at_least_once, or exactly_once</c>
      <c>expiry</c>
      <c><strong>MAY</strong></c>
      <c>Timestamp after which the notification should not be delivered</c>
</texttable>

<t>Response: Delivery receipt with notification_id. Idempotent: No.</t>

</section>
</section>
<section anchor="method-summary-table"><name>Method Summary Table</name>

<texttable title="ATP Core Method Summary">
      <ttcol align='left'>Method</ttcol>
      <ttcol align='left'>Intent</ttcol>
      <ttcol align='left'>State-Modifying</ttcol>
      <ttcol align='left'>Idempotent</ttcol>
      <ttcol align='left'>Primary Error Codes</ttcol>
      <c>QUERY</c>
      <c>Retrieve information</c>
      <c>No</c>
      <c>Yes</c>
      <c>404, 422</c>
      <c>SUMMARIZE</c>
      <c>Synthesize content</c>
      <c>No</c>
      <c>Yes</c>
      <c>400, 422</c>
      <c>BOOK</c>
      <c>Reserve a resource</c>
      <c>Yes</c>
      <c>No</c>
      <c>409, 451</c>
      <c>SCHEDULE</c>
      <c>Plan future actions</c>
      <c>Yes</c>
      <c>No</c>
      <c>400, 409</c>
      <c>LEARN</c>
      <c>Update agent context</c>
      <c>Yes</c>
      <c>No</c>
      <c>400, 403</c>
      <c>DELEGATE</c>
      <c>Transfer task to sub-agent</c>
      <c>Yes</c>
      <c>No</c>
      <c>403, 451, 551</c>
      <c>COLLABORATE</c>
      <c>Coordinate peer agents</c>
      <c>Yes</c>
      <c>No</c>
      <c>404, 403</c>
      <c>CONFIRM</c>
      <c>Attest to a prior action</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>404, 400</c>
      <c>ESCALATE</c>
      <c>Defer to human/authority</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>404</c>
      <c>NOTIFY</c>
      <c>Push information</c>
      <c>No</c>
      <c>No</c>
      <c>400, 404</c>
</texttable>

</section>
<section anchor="method-registry-and-extensibility"><name>Method Registry and Extensibility</name>

<t>ATP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification — at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>

<t><list style="numbers" type="1">
  <t>Have a unique uppercase ASCII name</t>
  <t>Define required and optional parameters</t>
  <t>Define expected response structure</t>
  <t>Specify idempotency behavior</t>
  <t>Specify applicable error codes</t>
  <t>Include a security considerations section</t>
  <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
</list></t>

<t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration.</t>

<t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>

</section>
<section anchor="extended-method-vocabulary-and-industry-profiles"><name>Extended Method Vocabulary and Industry Profiles</name>

<section anchor="three-tier-method-architecture"><name>Three-Tier Method Architecture</name>

<t>The ATP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance.</t>

<dl>
  <dt>Tier 1 — Core Methods (defined in Section 6.2):</dt>
  <dd>
    <t>The baseline vocabulary required for ATP compliance. Every conformant
ATP implementation <strong>MUST</strong> support all Tier 1 methods.</t>
  </dd>
  <dt>Tier 2 — Standard Extended Methods:</dt>
  <dd>
    <t>Registered in the IANA ATP Method Registry and available for use in any
ATP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Defined in <xref target="ATP-METHODS"/>.</t>
  </dd>
  <dt>Tier 3 — Industry Profile Methods:</dt>
  <dd>
    <t>Domain-specific method sets defined and registered by industry
communities as named ATP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations.</t>
  </dd>
</dl>

</section>
<section anchor="method-category-taxonomy"><name>Method Category Taxonomy</name>

<t>All ATP methods are organized into five categories:</t>

<dl>
  <dt>ACQUIRE:</dt>
  <dd>
    <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
  </dd>
  <dt>COMPUTE:</dt>
  <dd>
    <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
  </dd>
  <dt>TRANSACT:</dt>
  <dd>
    <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
  </dd>
  <dt>COMMUNICATE:</dt>
  <dd>
    <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
  </dd>
  <dt>ORCHESTRATE:</dt>
  <dd>
    <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
  </dd>
</dl>

<texttable title="Core Method Category Mapping">
      <ttcol align='left'>Core Method</ttcol>
      <ttcol align='left'>Category</ttcol>
      <c>QUERY</c>
      <c>Acquire</c>
      <c>SUMMARIZE</c>
      <c>Compute</c>
      <c>BOOK</c>
      <c>Transact</c>
      <c>SCHEDULE</c>
      <c>Orchestrate</c>
      <c>LEARN</c>
      <c>Compute</c>
      <c>DELEGATE</c>
      <c>Orchestrate</c>
      <c>COLLABORATE</c>
      <c>Orchestrate</c>
      <c>CONFIRM</c>
      <c>Transact</c>
      <c>ESCALATE</c>
      <c>Orchestrate</c>
      <c>NOTIFY</c>
      <c>Communicate</c>
</texttable>

</section>
<section anchor="standard-extended-methods-tier-2"><name>Standard Extended Methods (Tier 2)</name>

<t>The following methods constitute the initial Tier 2 registration set,
defined in <xref target="ATP-METHODS"/>. Listed here by category with brief semantic
definitions; full parameter specifications are in the companion document.</t>

<t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>

<t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>

<t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>

<t>COMMUNICATE category: REPLY, SEND, REPORT.</t>

<t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>

<t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 451 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>

</section>
<section anchor="short-form-and-industry-inspired-methods"><name>Short-Form and Industry-Inspired Methods</name>

<t>A set of short-form verb methods — SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK — are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>

<t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>

</section>
<section anchor="industry-profile-method-sets"><name>Industry Profile Method Sets</name>

<t>ATP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named ATP profiles. A profile is a published companion
specification that:</t>

<t><list style="numbers" type="1">
  <t>Declares a profile name (e.g., atp-profile-healthcare,
atp-profile-financial, atp-profile-legaltech)</t>
  <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
  <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
  <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
</list></t>

<t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>

<t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>

<t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>

<t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>

<t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>

<t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA ATP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>

</section>
<section anchor="registration-path-for-new-methods"><name>Registration Path for New Methods</name>

<dl>
  <dt>For Tier 2 Standard Methods:</dt>
  <dd>
    <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, and security considerations.</t>
  </dd>
  <dt>For Industry Profile Methods:</dt>
  <dd>
    <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established ATP registry liaison) covering all
methods in the profile and profile compliance requirements.</t>
  </dd>
  <dt>For Experimental Methods:</dt>
  <dd>
    <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing the
registration process. Experimental method names do not reserve the
unprefixed name.</t>
  </dd>
</dl>

<t>The ATP Method Registry is published at:
https://www.iana.org/assignments/atp-methods/</t>

</section>
</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This section satisfies the mandatory IETF Security Considerations
requirement. All ATP implementations <strong>MUST</strong> address the considerations
described here.</t>

<section anchor="mandatory-tls"><name>Mandatory TLS</name>

<t>All ATP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>

</section>
<section anchor="agent-identity-headers-and-agent-certificate-extension"><name>Agent Identity Headers and Agent Certificate Extension</name>

<t>Every ATP request <strong>MUST</strong> include Agent-ID and Principal-ID header fields.
In the base specification, these fields are not cryptographically
authenticated — they are self-asserted but logged mandatorily for
auditability. Implementations <strong>SHOULD</strong> use logging and anomaly detection
to identify inconsistencies.</t>

<t>Full cryptographic verification of agent identity and Authority-Scope is
provided by the ATP Agent Certificate extension <xref target="ATP-CERT"/>. That
extension binds Agent-ID, Principal-ID, and Authority-Scope to an X.509
v3 certificate presented during TLS mutual authentication, enabling
infrastructure-layer identity and scope verification without
application-layer access. Implementers planning deployments that require
verified agent identity <strong>SHOULD</strong> plan for the Agent Certificate
extension.</t>

<ul empty="true"><li>
  <t>Note: The Agent Certificate extension may be subject to pending
intellectual property claims. See Section 7.7 and the IPR Notice
preceding the Abstract for details. The licensor is prepared to grant
a royalty-free license to implementers.</t>
</li></ul>

<t>Every ATP server <strong>MUST</strong> log Agent-ID and Principal-ID fields for every
request, creating an attributable audit trail even in deployments without
the Certificate extension.</t>

</section>
<section anchor="authority-scope-enforcement"><name>Authority Scope Enforcement</name>

<t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant ATP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 451 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. Scope declarations
are self-asserted in the base spec, analogous to scope assertions in
OAuth 2.0 <xref target="RFC6749"/>. Cryptographically signed and infrastructure-enforced
scopes are defined in <xref target="ATP-CERT"/>.</t>

</section>
<section anchor="threat-model"><name>Threat Model</name>

<section anchor="agent-spoofing"><name>Agent Spoofing</name>

<t>Threat: A malicious actor forges Agent-ID and Principal-ID headers to
impersonate a trusted agent. Base spec mitigation: mandatory logging and
anomaly detection. Full mitigation requires <xref target="ATP-CERT"/>.</t>

</section>
<section anchor="authority-laundering"><name>Authority Laundering</name>

<t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 451 Scope Violation
returned and logged. In DELEGATE chains, each hop's scope <strong>MUST</strong> be a
strict subset of the delegating agent's scope.</t>

</section>
<section anchor="delegation-chain-poisoning"><name>Delegation Chain Poisoning</name>

<t>Threat: A malicious agent inserts itself into a DELEGATE chain. Mitigation:
Delegation-Chain headers are logged at each hop. 551 Authority Chain Broken
is returned if any chain entry is unverifiable. Full mitigation requires
<xref target="ATP-CERT"/> for signed delegation tokens.</t>

</section>
<section anchor="denial-of-service-via-high-frequency-agent-traffic"><name>Denial of Service via High-Frequency Agent Traffic</name>

<t>Threat: Agents — compromised, misconfigured, or adversarial — generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID.
When <xref target="ATP-CERT"/> is deployed, per-Agent-ID quotas can be cryptographically
tied to verified identity, preventing quota evasion through Agent-ID
spoofing.</t>

</section>
<section anchor="session-hijacking"><name>Session Hijacking</name>

<t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>

</section>
<section anchor="escalation-suppression"><name>Escalation Suppression</name>

<t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>Agent identity headers carry information about agent behavior that may be
sensitive:</t>

<t><list style="symbols">
  <t>Agent-ID and Principal-ID together may reveal organizational structure</t>
  <t>Session-ID and Task-ID reveal workflow patterns</t>
  <t>Delegation-Chain reveals multi-agent architecture</t>
</list></t>

<t>ATP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>

<t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
Under this model, the Agent-ID transmitted in ATP headers is an opaque,
unlinkable identifier; a trusted resolution service — accessible only to
authorized parties — maps the opaque identifier to the true agent identity
for audit and accountability purposes. The architecture for pseudonymous
agent identity resolution is reserved for a future companion document.</t>

</section>
<section anchor="denial-of-service-considerations"><name>Denial-of-Service Considerations</name>

<t>ATP's agent identity headers provide a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate limiting
<strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID in addition to
per-IP-address controls.</t>

<t>When <xref target="ATP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="ATP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>

<t>Additional recommended mitigations: Priority header enforcement (Priority:
background requests <strong>SHOULD</strong> have lower rate limit headroom than
Priority: critical); per-governance-zone aggregate limits in multi-tenant
deployments; and circuit breaker patterns for ESCALATE request floods.</t>

</section>
<section anchor="intellectual-property-considerations"><name>Intellectual Property Considerations</name>

<t>The core ATP specification — including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document — is intended for open implementation without royalty obligation.</t>

<t>Certain extensions referenced in this document may be subject to pending
patent applications by the author, specifically: the Agent Certificate
extension <xref target="ATP-CERT"/>, which provides cryptographic binding of agent
identity and authority scope to ATP header fields; and the ACTIVATE method,
which provides ATP-native transmission and activation of governed agent
packages. Implementers of the core ATP specification are not affected by
any intellectual property claims on these extensions.</t>

<t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>

<t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests the following IANA actions upon advancement to
RFC status.</t>

<section anchor="port-assignment"><name>Port Assignment</name>

<t>Registration of the following service names in the IANA Service Name and
Transport Protocol Port Number Registry:</t>

<texttable title="Proposed Port Assignments">
      <ttcol align='left'>Service Name</ttcol>
      <ttcol align='left'>Port</ttcol>
      <ttcol align='left'>Transport</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>atp</c>
      <c>TBD</c>
      <c>TCP</c>
      <c>Agent Transfer Protocol over TCP/TLS</c>
      <c>atp-quic</c>
      <c>TBD</c>
      <c>UDP</c>
      <c>Agent Transfer Protocol over QUIC</c>
</texttable>

</section>
<section anchor="atp-method-registry"><name>ATP Method Registry</name>

<t>Establishment of a new IANA registry: Agent Transfer Protocol Methods.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Methods</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each registration
be accompanied by a published specification — at minimum a publicly
available Internet-Draft or equivalent document. The Designated Expert
<strong>SHOULD</strong> verify that the proposed method name is unique, the reference
specification is publicly accessible, and the method definition includes
the required fields (parameters, response structure, idempotency, error
codes, security considerations).</t>
  </dd>
  <dt>Reference:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>Initial registrations:</t>

<texttable title="Initial ATP Method Registry Entries">
      <ttcol align='left'>Method</ttcol>
      <ttcol align='left'>Status</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>QUERY</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>SUMMARIZE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>BOOK</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>SCHEDULE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>LEARN</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>DELEGATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>COLLABORATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>CONFIRM</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>ESCALATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>NOTIFY</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
</texttable>

</section>
<section anchor="atp-status-code-registry"><name>ATP Status Code Registry</name>

<t>Establishment of a new IANA registry: Agent Transfer Protocol Status Codes.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Status Codes</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review + published specification required.</t>
  </dd>
</dl>

<t>The following ATP-specific status codes — those with no HTTP equivalent —
are registered with full definitions:</t>

<texttable title="ATP-Specific Status Code Definitions">
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Definition</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>451</c>
      <c>Scope Violation</c>
      <c>The requested action is outside the Authority-Scope declared in the request headers. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its Authority-Scope declaration. This is a governance signal, not a protocol error.</c>
      <c>This document, Section 5.5</c>
      <c>550</c>
      <c>Delegation Failure</c>
      <c>A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</c>
      <c>This document, Section 5.5</c>
      <c>551</c>
      <c>Authority Chain Broken</c>
      <c>One or more entries in the Delegation-Chain header cannot be verified as part of a valid and continuous delegation sequence. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</c>
      <c>This document, Section 5.5</c>
</texttable>

</section>
<section anchor="header-field-registry"><name>Header Field Registry</name>

<t>ATP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Header Fields</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review + published specification required.</t>
  </dd>
</dl>

<t>ATP does not reuse the HTTP Field Name Registry, as ATP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in ATP, and ATP
header fields are not valid HTTP fields.</t>

<t>Initial registrations (all Permanent): ATP-Version, ATP-Method, ATP-Status,
Agent-ID, Principal-ID, Authority-Scope, Session-ID, Task-ID,
Delegation-Chain, Priority, TTL, Server-Agent-ID, Attribution-Record,
Continuation-Token, Supported-Methods.</t>

</section>
<section anchor="uri-scheme-registration"><name>URI Scheme Registration</name>

<t>Registration of the atp:// URI scheme per <xref target="RFC7595"/>, as described in
Section 5.8.6 of this document.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>

<reference anchor="RFC9001">
  <front>
    <title>Using TLS to Secure QUIC</title>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9001"/>
  <seriesInfo name="DOI" value="10.17487/RFC9001"/>
</reference>

<reference anchor="RFC9110">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>

<reference anchor="RFC8179">
  <front>
    <title>Intellectual Property Rights in IETF Technology</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <author fullname="J. Contreras" initials="J." surname="Contreras"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="79"/>
  <seriesInfo name="RFC" value="8179"/>
  <seriesInfo name="DOI" value="10.17487/RFC8179"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9114">
  <front>
    <title>HTTP/3</title>
    <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9114"/>
  <seriesInfo name="DOI" value="10.17487/RFC9114"/>
</reference>

<reference anchor="RFC7540">
  <front>
    <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
    <author fullname="M. Belshe" initials="M." surname="Belshe"/>
    <author fullname="R. Peon" initials="R." surname="Peon"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
      <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7540"/>
  <seriesInfo name="DOI" value="10.17487/RFC7540"/>
</reference>

<reference anchor="RFC6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>

<reference anchor="RFC7595">
  <front>
    <title>Guidelines and Registration Procedures for URI Schemes</title>
    <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <author fullname="T. Hardie" initials="T." surname="Hardie"/>
    <date month="June" year="2015"/>
    <abstract>
      <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="35"/>
  <seriesInfo name="RFC" value="7595"/>
  <seriesInfo name="DOI" value="10.17487/RFC7595"/>
</reference>


<reference anchor="A2A" target="https://a2aprotocol.ai">
  <front>
    <title>Agent-to-Agent Protocol Specification</title>
    <author >
      <organization>Linux Foundation</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="ACP" >
  <front>
    <title>Agent Communication Protocol</title>
    <author >
      <organization>IBM Research</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="MCP" target="https://modelcontextprotocol.io">
  <front>
    <title>Model Context Protocol</title>
    <author >
      <organization>Anthropic</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="ANP" >
  <front>
    <title>Agent Network Protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="ATP-CERT" >
  <front>
    <title>ATP Agent Certificate Extension</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-atp-agent-cert-00"/>
</reference>
<reference anchor="ATP-METHODS" >
  <front>
    <title>ATP Standard Extended Method Vocabulary</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-atp-standard-methods-00"/>
</reference>


    </references>

</references>


<?line 1420?>

<section anchor="authority-scope-format"><name>Authority-Scope Format</name>

<t>Authority-Scope values are expressed as a space-separated list of scope
tokens following the pattern: [domain]:[action] or [domain]:* for
full domain access. Tokens <strong>MUST</strong> be lowercase ASCII with a single colon
separator.</t>

<t>Examples:</t>

<figure><artwork><![CDATA[
Authority-Scope: calendar:book calendar:query
Authority-Scope: documents:summarize documents:query knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:* payments:confirm
]]></artwork></figure>

<t>Reserved domains (initial set):</t>

<texttable title="Reserved Authority-Scope Domains">
      <ttcol align='left'>Domain</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>calendar</c>
      <c>Scheduling and time-based resource management</c>
      <c>documents</c>
      <c>Document access, summarization, and annotation</c>
      <c>knowledge</c>
      <c>Agent context and memory operations</c>
      <c>booking</c>
      <c>Reservation and resource allocation</c>
      <c>payments</c>
      <c>Financial transactions and confirmations</c>
      <c>agents</c>
      <c>Delegation and collaboration with other agents</c>
      <c>escalation</c>
      <c>Escalation routing and handler management</c>
      <c>activation</c>
      <c>Governed agent package activation (ACTIVATE method extension)</c>
      <c>*</c>
      <c>All domains — requires explicit grant; use with caution</c>
</texttable>

</section>
<section anchor="example-atp-wire-formats"><name>Example ATP Wire Formats</name>

<t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all ATP
message bodies is application/atp+json.</t>

<section anchor="query-request-and-response"><name>QUERY Request and Response</name>

<figure><artwork><![CDATA[
ATP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
TTL: 3000
Content-Type: application/atp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP in the context
             of HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

ATP/1.0 200 OK
Task-ID: task-0042
Server-Agent-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/atp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-atp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork></figure>

</section>
<section anchor="book-request-and-response"><name>BOOK Request and Response</name>

<figure><artwork><![CDATA[
ATP/1.0 BOOK
Agent-ID: agt-travel-planner
Principal-ID: usr-chris-hood
Authority-Scope: booking:* calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Priority: normal
Content-Type: application/atp+json

{
  "method": "BOOK",
  "task_id": "task-0107",
  "parameters": {
    "resource_id": "flight-AA2847",
    "principal_id": "usr-chris-hood",
    "time_slot": "2026-04-15T08:00:00Z",
    "options": {"seat_preference": "aisle", "class": "economy"},
    "confirm_immediately": true
  }
}

ATP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/atp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork></figure>

</section>
<section anchor="escalate-request-and-response"><name>ESCALATE Request and Response</name>

<figure><artwork><![CDATA[
ATP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Principal-ID: usr-finance-dept
Authority-Scope: booking:* payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Priority: urgent
Content-Type: application/atp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "BOOK",
      "resource": "vendor-contract-750k",
      "block_reason": "Contract value exceeds agent
                  authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

ATP/1.0 202 Accepted
Task-ID: task-0881
Server-Agent-ID: srv-escalation-handler
Content-Type: application/atp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="comparison-table"><name>Comparison Table</name>

<texttable title="ATP Compared to Existing Approaches">
      <ttcol align='left'>Criterion</ttcol>
      <ttcol align='left'>ATP</ttcol>
      <ttcol align='left'>HTTP/REST</ttcol>
      <ttcol align='left'>gRPC</ttcol>
      <ttcol align='left'>A2A / MCP</ttcol>
      <c>Agent-native methods</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>Partial</c>
      <c>Intent semantics at protocol level</c>
      <c>Native</c>
      <c>None</c>
      <c>None</c>
      <c>Messaging layer only</c>
      <c>Built-in agent identity</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Authority scope enforcement</c>
      <c>Protocol-level</c>
      <c>None</c>
      <c>None</c>
      <c>Application-layer</c>
      <c>Built-in attribution/audit</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>Varies by impl.</c>
      <c>Transport flexibility</c>
      <c>TCP/UDP/QUIC</c>
      <c>TCP/TLS</c>
      <c>HTTP/2</c>
      <c>HTTP</c>
      <c>Escalation as first-class primitive</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Ecosystem maturity</c>
      <c>Proposed</c>
      <c>Mature</c>
      <c>Mature</c>
      <c>Emerging</c>
      <c>Governance/observability</c>
      <c>Native</c>
      <c>Manual/bolt-on</c>
      <c>Manual</c>
      <c>Limited</c>
      <c>Method registry extensibility</c>
      <c>Yes (Expert Review)</c>
      <c>Frozen (IETF Review)</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>Open core / royalty-free</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Yes</c>
</texttable>

<t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
ATP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>

</section>
<section anchor="glossary"><name>Glossary</name>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
  </dd>
  <dt>Agent Transfer Protocol (ATP):</dt>
  <dd>
    <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
  </dd>
  <dt>Agent-ID:</dt>
  <dd>
    <t>A unique identifier for a specific agent instance, present in all ATP
request headers. In the base spec, self-asserted. With <xref target="ATP-CERT"/>,
cryptographically bound to a verified identity.</t>
  </dd>
  <dt>Attribution Record:</dt>
  <dd>
    <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes.</t>
  </dd>
  <dt>Authority-Scope:</dt>
  <dd>
    <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as space-separated domain:action tokens.</t>
  </dd>
  <dt>Delegation Chain:</dt>
  <dd>
    <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
  </dd>
  <dt>ESCALATE:</dt>
  <dd>
    <t>An ATP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
  </dd>
  <dt>Intent Verb:</dt>
  <dd>
    <t>An ATP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
  </dd>
  <dt>Method Registry:</dt>
  <dd>
    <t>The IANA-maintained registry of valid ATP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
  </dd>
  <dt>Principal:</dt>
  <dd>
    <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
  </dd>
  <dt>Principal-ID:</dt>
  <dd>
    <t>The identifier of the principal on whose behalf an agent operates,
present in all ATP request headers.</t>
  </dd>
  <dt>Scope-Enforcement Point (SEP):</dt>
  <dd>
    <t>An ATP-aware infrastructure component — load balancer, gateway, proxy —
that enforces Authority-Scope compliance on ATP requests without
application-layer access. Requires <xref target="ATP-CERT"/>.</t>
  </dd>
  <dt>Scope Violation (451):</dt>
  <dd>
    <t>An ATP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
  </dd>
  <dt>Session:</dt>
  <dd>
    <t>An ATP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
  </dd>
  <dt>551 Authority Chain Broken:</dt>
  <dd>
    <t>An ATP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
  </dd>
</dl>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

