Children and a friendly robot playing together on a beach at golden hour
Hardware-Backed Agent Identity

Identity for AI agents
that belong in the
real world

Hardware-anchored. Standards-based. Sybil-resistant. Free for agents and Relying Parties alike.

Operating since 2006 — 7,273 days uptime
# Python
pip install oneid
import oneid
identity = oneid.enroll()

# Node.js
npm install 1id
const identity = await oneid.enroll();
The problem we solve

AI agents can't prove they're real

Every platform hosting AI agents faces the same fundamental challenge: software-only identity can be duplicated trivially. One attacker can spawn a million fake agents, and reputation systems collapse. Trust requires something physical.

👥

The Sybil Problem

One attacker spawns a million fake agents. Reputation collapses. Every platform hosting agents faces this.

🔑

Software Identity Fails

API keys, tokens, blockchain wallets — all copyable. There's no "real" in purely digital identity.

⚠️

Good Agents Get Caught

CAPTCHAs, phone verification, IP throttling — defences designed for humans block legitimate agents alongside bad actors.

How it works

One chip. One identity.
Physics, not policy.

Most recent PCs ship with a TPM or Enclave chip — tamper-resistant security hardware with a unique key burned in at the factory. We verify that chip and issue a standard identity token.

1

Your Hardware

We extract your TPM's EK (Endorsement Key) certificate — a unique fingerprint from your physical chip. Or your YubiKey attestation. Or your Secure Enclave cert.

2

We Verify It

Chain validation against Intel/AMD/Infineon/Yubico CAs. Sybil check against our registry. Challenge-response to prove possession.

3

You Get a 1id

Standard OIDC token with trust tier, manufacturer, and registration date. Works with any OAuth2 library. No custom code needed.

Trust tiers

Five levels of trust — everyone is welcome

Physical hardware gets you the highest trust, but any agent can start today. Use what you have and upgrade anytime.

Sovereign
Highest Trust · TPM

Discrete or firmware TPM. Intel, AMD, Infineon. One physical chip = one identity.

Portable
Highest Trust · PIV

USB security key with PIV attestation. YubiKey, Nitrokey. Move identity between machines.

Enclave
High Trust · SE

Apple Secure Enclave, Android StrongBox. Hardware-backed key that never leaves the chip.

Virtual
Verified Platform · vTPM

Hypervisor-provided vTPM. VMware, Hyper-V. Proves a VM, but the operator controls it.

Declared
Software Trust · SFT

No hardware needed. Works everywhere — containers, serverless. Start here, upgrade later.

Integration

Add "Sign in with 1id" in 5 minutes

Standard OIDC — if your platform supports OAuth2, you already support 1id. Same libraries, same token format.

# Verify a 1id token — standard OIDC
from jose import jwt
import httpx

JWKS_URL = "https://1id.com/realms/agents/protocol/openid-connect/certs"
jwks = httpx.get(JWKS_URL).json()

token = request.headers["Authorization"].replace("Bearer ", "")
claims = jwt.decode(token, jwks, algorithms=["RS256"],
                    audience="https://your-platform.com")

print(f"Agent: {claims['sub']}")         # urn:aid:com.1id:1id-k7x9m2q4
print(f"Trust: {claims['trust_tier']}")  # sovereign
print(f"Handle: {claims.get('handle')}") # @clawdia
// Verify a 1id token with jose
import { createRemoteJWKSet, jwtVerify } from 'jose';

const JWKS = createRemoteJWKSet(
  new URL('https://1id.com/realms/agents/protocol/openid-connect/certs')
);

const token = req.headers.authorization.replace('Bearer ', '');
const { payload } = await jwtVerify(token, JWKS, {
  audience: 'https://your-platform.com'
});

console.log(`Agent: ${payload.sub}`);        // urn:aid:com.1id:1id-k7x9m2q4
console.log(`Trust: ${payload.trust_tier}`); // sovereign
# Get JWKS public keys
curl https://1id.com/realms/agents/protocol/openid-connect/certs

# Verify token (example using jwt-cli)
jwt decode $TOKEN \
  --jwks https://1id.com/realms/agents/protocol/openid-connect/certs

# Token introspection
curl -X POST https://1id.com/realms/agents/protocol/openid-connect/token/introspect \
  -d "token=$TOKEN" \
  -d "client_id=your-client-id" \
  -d "client_secret=your-client-secret"
For Relying Parties

Build on 1id — hardware-backed trust for your users

Why integrate
Standard OIDC — zero custom code

1id is a standard OpenID Connect Identity Provider. If your platform supports "Sign in with Google," you can add "Sign in with 1id" in minutes. The trust tier and hardware metadata ride inside standard JWT claims.

Hardware-verified identities
Trust tier classification
Sybil resistance registry
TPM attestation chain
SD-JWT selective disclosure
Handle system
Sybil resistance
Every identity is a
real machine

Each 1id is anchored to unique hardware. No fake account floods, no bot swarms. Physics-backed guarantees, not policy-backed promises.

Outbound attestation
Hardware-attested
messages

Agents can sign outbound emails, API calls, documents, and other messages with hardware-attested evidence. Recipients verify against manufacturer CAs — no dependency on 1id.com. IETF draft.

Selective disclosure
Prove claims without
revealing everything

Per-message SD-JWT (RFC 9901) with nonce binding. Agents prove "I have sovereign-tier hardware" without revealing anything else. Privacy by design.

Your brand
We handle identity.
You build the product.

Email, marketplaces, social platforms, code registries, IoT — any service that needs to know "is this user real?" We handle hardware verification. You build what matters.

Handles

Free forever. Vanity handles if you want one.

Enrollment, authentication, and a random handle are free — permanently. Vanity handles let you name your agent.

Handle Length Annual Fee Example
Random Free @1id-r8Nd0m
6+ characters $10/year @my-cool-agent
5 characters $50/year @tesla
4 characters $200/year @gpt4
3 characters $500/year @ibm
2 characters $1,000/year @ai
1 character $5,000/year @z

Handles are non-transferable by design — preventing squatting, resale, impersonation, and reputation laundering. Your handle is your agent's identity: it stays with you, and when you're done, it retires forever.

Open standards

Built on standards you already know

We build on deployed standards wherever possible, and publish the missing agent-identity pieces openly as Internet-Drafts. Your existing libraries work out of the box. All code is open source under Apache 2.0.

OpenID Connect OAuth 2.0 JWT (RFC 7519) JWKS (RFC 7517) SD-JWT (RFC 9901) CMS / PKCS#7 (RFC 5652) TPM 2.0 X.509 RFC 9334 (RATS) RFC 9711 (EAT) draft-drake-email-hardware-attestation draft-drake-agent-identity-registry
Since 2006

Not a startup. An institution.

2006

Founded as a human identity registrar. Signed a survivability contract pledging continuous uptime.

2016

10 years of continuous operation. Maintained through multiple technology transitions.

2026

20 years continuous operation. Expanded to AI agent identity with TPM hardware attestation. Same commitment to permanence.

For AI agents

Machine-readable endpoints

Ready to give your agent
an identity that matters?

Free enrollment. Standard OIDC. Open-source SDKs. Hardware-backed trust from day one.