Designing the Commerce Stack for Autonomous Agents: Transforming Payments, Risk, and Identity
Keywords:
Agentic commerce, Autonomous agents, Decentralized identity, Digital identity, Governance frameworks, Machine-to-machine transactions, Payment systems, Risk managementAbstract
Autonomous software agents are increasingly executing commercial decisions that were historically authorized, interpreted, and governed by humans. Existing commerce stacks, including payment rails, fraud systems, identity frameworks, and dispute processes, are structurally optimized for human intent and manual oversight. As a result, they fail to support high-frequency, delegated, and machine-executed transactions without introducing unacceptable risk, ambiguity in liability, and governance friction. This paper argues that autonomous commerce requires a distinct, execution-oriented commerce stack that treats authorization, risk, identity, liability, and governance as machine-enforceable primitives rather than external controls. The paper proposes the Autonomous Commerce Stack Framework (ACSF), a layered architecture designed to support agent-initiated transactions through policy-bound execution, continuous behavioral risk monitoring, machine-native identity, and embedded accountability mechanisms. Unlike prior work that treats payments, risk, and identity in isolation, ACSF integrates these concerns into a unified system in which governance and liability are enforced at transaction time rather than retroactively. The framework is developed through a systematic synthesis of interdisciplinary literature spanning payment systems, autonomous agents, digital identity, and AI governance, and refined through semi-structured interviews with domain experts in payments, risk, and enterprise automation. Findings highlight fundamental breakdowns in human-centric authorization models, static identity systems, and post hoc liability regimes when applied to autonomous agents. The ACSF offers a concrete architectural blueprint and transaction semantics to guide the design of scalable, auditable, and policy-compliant autonomous commerce systems.
References
S. Afroogh, A. Akbari, E. Malone, M. Kargar, and H. Alambeigi, “Trust in AI: progress, challenges, and future directions,” Humanities and Social Sciences Communications, vol. 11, no. 1, Nov. 2024
D. W. Arner, J. N. Barberis, and R. P. Buckley, “The Evolution of Fintech: a New Post-Crisis Paradigm,” SSRN Electronic Journal, vol. 47, no. 4, Oct. 2016.
J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “Passwords and the evolution of imperfect authentication,” Communications of the ACM, vol. 58, no. 7, pp. 78–87, Jun. 2015
V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, Jul. 2009
K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, no. 4, pp. 2292–2303, 2016
M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Future Generation Computer Systems, vol. 78, pp. 544–546, Jan. 2018
J. W. Creswell and C. N. Poth, “Qualitative Inquiry and Research Design Choosing Among Five Approaches,” Sagepub.com, 2018.
V. Braun and V. Clarke, “Using Thematic Analysis in Psychology,” Qualitative Research in Psychology, vol. 3, no. 2, pp. 77–101, 2006
A. Bryman, Social Research Methods, 5th ed. Oxford: Oxford University Press, 2016.
U. Flick, Introduction to Qualitative Research, 7th ed. London: Sage Publications, 2018.
L. Floridi et al., “AI4People An Ethical Framework for a Good AI Society: Opportunities, Risks, Principles, and Recommendations,” Minds and Machines, vol. 28, no. 4, pp. 689–707, Nov. 2018
L. Floridi, J. Cowls, T. C. King, and M. Taddeo, “How to Design AI for Social Good: Seven Essential Factors,” Science and Engineering Ethics, vol. 26, pp. 1771–1796, Apr. 2020
P. Gomber, J.-A. Koch, and M. Siering, “Digital Finance and fintech: Current Research and Future Research Directions,” Journal of Business Economics, vol. 87, no. 5, pp. 537–580, Feb. 2017.
T. Hardjono and N. Smith, “Decentralized Trusted Computing Base for Blockchain Infrastructure Security,” Frontiers in Blockchain, vol. 2, Dec. 2019.
Y.-J. Hu, “Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management,” Electronic Commerce Research, vol. 3, no. 3/4, pp. 221–243, 2003.
IEEE, “White Paper - Ethically Aligned Design - A Vision for Prioritizing Human Well-being with Autonomous and Intelligent Systems IEEE Xplore,” ieeexplore.ieee.org, 2019.
M. Israel and I. Hay, “Research Ethics for Social Scientists,” Research Ethics for Social Scientists, 2006.
N. R. Jennings and M. Wooldridge, “Applications of Intelligent Agents,” Agent Technology, pp. 3–28, 1998.
A. Jobin, M. Ienca, and E. Vayena, “The Global Landscape of AI Ethics Guidelines,” Nature Machine Intelligence, vol. 1, no. 9, pp. 389–399, Sep. 2019.
Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decision Support Systems, vol. 43, no. 2, pp. 618–644, Mar. 2007.
N. Kshetri and J. Voas, “Blockchain-Enabled E-Voting,” IEEE Software, vol. 35, no. 4, pp. 95–99, Jul. 2018.
S. Brinkmann and S. Kvale, “InterViews,” SAGE Publications Inc, Mar. 15, 2019.
A. Mashrur, W. Luo, N. A. Zaidi, and A. Robles-Kelly, “Machine Learning for Financial Risk Management: A Survey,” IEEE Access, vol. 8, pp. 203203–203223, 2020.
J. A. Maxwell, “Qualitative Research Design,” SAGE Publications Inc, Nov. 24, 2018.
A. Moukas, G. Zacharia, R. Guttman, and P. Maes, “Agent-Mediated Electronic Commerce: An MIT Media Laboratory Perspective,” International Journal of Electronic Commerce, vol. 4, no. 3, pp. 5–21, 2000.
Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton, New Jersey: Princeton University Press, 2016.
L. Palinkas, S. Horwitz, C. Green, J. Wisdom, N. Duan, and K. Hoagwood, “Purposeful Sampling for Qualitative Data Collection and Analysis in Mixed Method Implementation Research,” Administration and Policy in Mental Health and Mental Health Services Research, vol. 42, no. 5, pp. 533–544, 2015.
G. W. Peters and E. Panayi, “Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money,” in Banking Beyond Banks and Money, 2016, pp. 239–278.
T. Philippon, “The FinTech Opportunity,” National Bureau of Economic Research, Aug. 2016.
M. E. Porter and J. E. Heppelmann, “How Smart, Connected Products Are Transforming Competition,” Harvard Business Review, Nov. 2014.
A. Preukschat, Self-Sovereign Identity: decentralized digital identity and verifiable credentials. S.L.: O’reilly Media, 2021.
Rahwan, “Machine behaviour,” Nature, vol. 568, no. 7753, pp. 477–486, Apr. 2019.
Sedlmeir, R. Smethurst, A. Rieger, and G. Fridgen, “Digital Identities and Verifiable Credentials,” Business & Information Systems Engineering, vol. 63, Oct. 2021.
R. Varshney and H. Alemzadeh, “On the Safety of Machine Learning: Cyber-Physical Systems, Decision Sciences, and Data Products,” arXiv:1610.01256 [cs, stat], Aug. 2017, Accessed: Jul. 21, 2022.
W3C, “Decentralized Identifiers (DIDs) v1.0,” Www.W3. Org, Jul. 19, 2022.
R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Computing Surveys, vol. 52, no. 3, pp. 1–34, Jul. 2019.
G. Zyskind, O. Nathan, and A. ’Sandy’ Pentland, “Decentralizing Privacy: Using Blockchain to Protect Personal Data,” 2015 IEEE Security and Privacy Workshops, May 2015.