The “Black Box” Architecture

agent-c is not a SaaS API; it is a Cryptographic Cleanroom.


The Risk Engine

Our engine implements a proprietary, weighted risk methodology protected by international patent. This logic is hardcoded into the enclave to ensure “Freedom to Operate” for our partners.

Core Methodology

The patented approach defines a methodology for:

  1. Binding multiple data sources (KYC, AML, Ownership) into a single attestation
  2. Calculating risk using a weighted formula with configurable parameters
  3. Producing cryptographically signed certificates suitable for regulatory compliance

The Formula

Unlike standard providers who conflate Identity with Ownership, our engine utilizes a proprietary, weighted methodology that decouples these elements. This granular approach prevents false positives and ensures verified control.

The Three Components

Component Source Measures
KYC Identity Verification Partner Identity verification, PEP screening, jurisdiction risk
AML Blockchain Forensics Partner Wallet forensics, transaction history, sanctions exposure
KYW CryptoPass Cryptographic ownership proof (the “missing link”)

Verdict Logic

The engine produces three possible verdicts:


The Enclave (Intel SGX)

The scoring logic runs inside a Trusted Execution Environment (TEE).

Security Guarantees

Future: TON Cocoon

We are planning migration to the TON blockchain’s confidential compute infrastructure (“Cocoon”) for decentralized attestation.


The “Green Lane” Logic

We act as a pre-filter for banks:

Lane Classification

Lane Criteria Bank Action
Green Low risk + verified ownership Auto-accept certificate as EDD
Yellow Borderline scores Request underlying data for manual review
Red High risk or unverified Reject transaction

Why This Works

Banks don’t want to store passport scans and wallet histories. By accepting a signed certificate from a trusted enclave, they get:

  1. Compliance coverage - The certificate documents their due diligence
  2. Reduced liability - They never touch the raw PII
  3. Audit trail - Every certificate has a unique ID and signature

Dusting Attack Mitigation

A sophisticated feature of our AML engine is dusting mitigation.

Hackers perform “dust attacks” by sending tiny amounts (< $10) from mixer wallets to taint innocent addresses. Our engine:

  1. Detects when bad triggers (mixer/darknet exposure) exist
  2. Checks the total exposure amount
  3. Ignores triggers below the $10 dust threshold

This prevents false positives that would unfairly penalize legitimate users.


Configurable Methodology

Component weights are configurable for specific jurisdictions or use cases. Weight changes require redeployment to the enclave to maintain attestation integrity.

Technical details available to licensed partners.


Reference Implementation: The Developer Console

We provide a functional Telegram Mini App to demonstrate the compliance flow in real-time.

1. Connect & KYC 2. Verify Ownership 3. Generate Certificate
Connect Wallet Verify Ownership Certificate
User links wallet and identity. Cryptographic signature proves ownership. agent-c issues the signed asset.

← Back to Home Partner Access →