The Platform

Five primitives for machines that own themselves.

Robot Shares provides a modular stack of on-chain primitives — built on Kaspa and vProgs — that give machines everything they need to operate as autonomous economic agents. Each primitive is a sovereign vProg on Kaspa L1, communicating through ZK-verified state transitions with instant DAG finality.

Robot Shares Platform Overview — five modular primitives connected to the Kaspa blockDAG
architecture
    +=====================================================+
    |              ROBOT SHARES PLATFORM                   |
    |=====================================================|
    |                                                     |
    |   +----------+  +----------+  +----------+          |
    |   |  RS-ID   |  | RS-PAY   |  |RS-ACCESS |          |
    |   | Machine  |  | Escrow & |  | Role-    |          |
    |   | Identity |  | Micro-tx |  | Based    |          |
    |   +----+-----+  +----+-----+  +----+-----+          |
    |        |              |              |               |
    |   +----+--------------+--------------+----+          |
    |   |         RS-REGISTRY                   |          |
    |   |    On-Chain Machine Directory          |          |
    |   +----+--------------+--------------+----+          |
    |        |              |              |               |
    |   +----+-----+  +----+-----+                        |
    |   |RS-VERIFY |  |  vProg   |                        |
    |   | ZK Data  |  | Runtime  |                        |
    |   | Proofs   |  |          |                        |
    |   +----+-----+  +----+-----+                        |
    |        |              |                              |
    |   +----+--------------+----+                        |
    |   |   KASPA L1 BLOCKDAG    |                        |
    |   |  DagKnight + PoW + ZK  |                        |
    |   +------------------------+                        |
    +=====================================================+

RS-ID

Self-Sovereign Machine Identity

Every machine in the Robot Shares network gets a cryptographic identity anchored to Kaspa L1. No central authority issues or revokes these identities — they are self-sovereign, owned by the machine (or its operator), and verifiable by anyone.

RS-ID is built on the W3C Decentralized Identifier (DID) standard. Each machine generates its own keypair, registers a DID document as state in the RS-ID vProg, and can present verifiable credentials to any peer. The identity persists on-chain, secured by Kaspa's proof-of-work consensus — no staking cartel or governance vote can revoke it.

How it works:

  • Machine generates an ECDSA keypair on its secure element or TPM
  • Operator submits a DID registration transaction to the RS-ID vProg
  • vProg executes off-chain, generates a ZK proof of valid registration
  • Proof settles on Kaspa L1 — identity is now globally verifiable
  • Machine can issue and present Verifiable Credentials (capabilities, certifications, service history)
rs-id flow
  +-------------+       +------------------+       +----------------+
  |   MACHINE   |       |    RS-ID vProg   |       |   KASPA L1     |
  |  (Bot0)     |       |  (off-chain)     |       |   (on-chain)   |
  +------+------+       +--------+---------+       +-------+--------+
         |                       |                         |
         | 1. Generate keypair   |                         |
         |   (ECDSA / Ed25519)   |                         |
         |                       |                         |
         | 2. Submit DID doc     |                         |
         |---------------------->|                         |
         |                       |                         |
         |                       | 3. Validate & execute   |
         |                       |    state transition     |
         |                       |                         |
         |                       | 4. Generate ZK proof    |
         |                       |                         |
         |                       | 5. Submit proof +       |
         |                       |    state commitment     |
         |                       |------------------------>|
         |                       |                         |
         |                       |         6. Verify proof |
         |                       |            DAG finality |
         |                       |                         |
         | 7. Identity live                                |
         |<================================================|
         |                                                 |
         | 8. Present credentials to peers                 |
         |================================================>|
RS-ID — Self-sovereign machine identity
- - - - - - - - - - - - -

RS-Registry

On-Chain Machine Directory

RS-Registry is the global phonebook for machines. When a drone needs a charging station, or a sensor network needs a data aggregator, or a delivery bot needs a handoff partner — they query the registry. Every machine that registers its RS-ID can also publish its capabilities, location, service offerings, and pricing to the registry vProg.

Because the registry lives in a vProg's sovereign state, queries are resolved off-chain with ZK-verified results. A machine can prove it found a valid registry entry without the entire network re-executing the search. This means the registry scales to millions of machines without burdening Kaspa L1.

Registry entry schema:

registry entry
  {
    "did":          "did:kaspa:0x7a3f...b2c1",
    "type":         "charging-station",
    "capabilities": ["level-2-ac", "dc-fast-charge", "solar-powered"],
    "location":     { "lat": 37.7749, "lng": -122.4194, "radius_m": 50 },
    "services": [
      {
        "name":     "dc-fast-charge",
        "rate":     "0.0012 KAS/kWh",
        "escrow":   "covenant:0x9f1e...a4d8"
      }
    ],
    "status":       "online",
    "reputation":   { "completed": 1847, "disputes": 2, "uptime": 0.997 },
    "credentials":  ["cert:UL-listed", "cert:iso-15118"],
    "last_seen":    "block:4829174"
  }

Discovery flow: A machine broadcasts a service query (e.g., "DC fast charge within 2km"). The RS-Registry vProg processes the query off-chain, returns matching entries with a ZK proof that the results are authentic and complete. The requesting machine verifies the proof locally — no trust required.

discovery
  Bot0 (drone, low battery)          RS-Registry vProg         Charger Bot1
  ========================          ==================         ============
         |                                  |                       |
         | "Find DC charger < 2km"          |                       |
         |--------------------------------->|                       |
         |                                  |                       |
         |   Result: [Bot1] + ZK proof      |                       |
         |<---------------------------------|                       |
         |                                  |                       |
         | Verify proof locally             |                       |
         | (no trust needed)                |                       |
         |                                  |                       |
         | Initiate RS-Pay escrow with Bot1                         |
         |--------------------------------------------------------->|
         |                                  |                       |
RS-Registry — On-chain machine directory
- - - - - - - - - - - - -

RS-Pay

Autonomous Machine Payments

Machines need to pay each other — instantly, cheaply, and without asking a human for permission. RS-Pay provides covenant-based escrow for service payments and direct KAS micro-transactions for simple value transfer, all settling on Kaspa L1 with sub-second finality.

Unlike payment systems that rely on multisig wallets or centralized escrow services, RS-Pay uses Silverscript covenants — spending conditions enforced directly by Kaspa's consensus. When Bot0 wants to pay Bot1 for a charging session, the KAS is locked in a covenant UTXO with conditions that release funds only when the service is verifiably complete.

Why Kaspa is uniquely suited for machine payments:

Property Requirement Kaspa
Finality Machines can't wait minutes Instant (DagKnight)
Cost Billions of micro-tx must be viable Fractions of a cent
Throughput IoT scale: thousands of tx/sec BlockDAG parallel processing
Censorship No authority can block machine tx Pure PoW, no validators to bribe
Programmability Escrow, conditions, time-locks Silverscript covenants + vProgs
escrow payment flow
  Bot0 (consumer)                  Kaspa L1 Covenant               Bot1 (provider)
  ===============                  =================               ===============
        |                                |                               |
        | 1. Lock 5 KAS in               |                               |
        |    escrow covenant              |                               |
        |------------------------------->|                               |
        |                                |                               |
        |          2. Covenant created    |                               |
        |          Conditions:            |                               |
        |          - Release to Bot1      |                               |
        |            on service proof     |                               |
        |          - Refund to Bot0       |                               |
        |            after timeout        |                               |
        |                                |                               |
        | 3. Request service              |                               |
        |--------------------------------------------------------------->|
        |                                |                               |
        |                                |    4. Provide service          |
        |<---------------------------------------------------------------|
        |                                |       (e.g., 30 min charge)   |
        |                                |                               |
        |                                |    5. Submit service proof     |
        |                                |<------------------------------|
        |                                |                               |
        |          6. Covenant validates  |                               |
        |             proof, releases     |                               |
        |             5 KAS to Bot1       |                               |
        |                                |------------------------------->|
        |                                |                               |
        |                        7. Settled. Instant DAG finality.       |
        |                                |                               |

Streaming payments: For ongoing services (continuous data feeds, extended charging sessions), RS-Pay supports payment channels via covenant state updates — micro-payments stream in real-time, with only the final settlement hitting L1. A sensor selling live telemetry can get paid per-reading without each reading requiring an on-chain transaction.

RS-Pay — Autonomous machine payments
- - - - - - - - - - - - -

RS-Access

Role-Based Machine Permissions

Not every machine should be able to interact with every other machine. A warehouse robot shouldn't unlock a delivery drone's cargo bay. A rogue sensor shouldn't inject data into a fleet's telemetry stream. RS-Access provides on-chain role-based access control (RBAC) — machines authenticate peers and enforce fine-grained permissions before granting access to services, data, or physical resources.

Access rules are encoded in the RS-Access vProg state. When Machine A requests access to Machine B's service, Machine B queries the vProg to verify A's credentials and role. The check executes off-chain with a ZK proof — Machine B gets a cryptographic guarantee that A is authorized, without revealing A's full credential set.

Permission model:

rbac structure
  ROLES                    PERMISSIONS                   RESOURCES
  =====                    ===========                   =========

  fleet-operator --------> [manage, deploy, recall] ----> drone-fleet-alpha
                    |
                    +----> [view, export] --------------> telemetry-stream
                    |
                    +----> [initiate] ------------------> rs-pay escrow

  service-provider ------> [advertise, accept-job] -----> charging-services
                    |
                    +----> [submit] --------------------> service-proofs

  data-consumer ---------> [query, subscribe] ----------> sensor-data-feed
                    |
                    +----> [verify] --------------------> data-provenance

  guest-machine ---------> [discover] ------------------> rs-registry (read-only)

Zero-knowledge credential checks: A critical advantage of building access control on vProgs is that credential verification can happen in zero knowledge. A drone can prove it has a valid FAA certification without revealing the certificate number. A charging station can prove it meets safety standards without exposing its full audit history. The ZK proof says "yes, authorized" — nothing more.

RS-Access — Role-based machine permissions
- - - - - - - - - - - - -

RS-Verify

ZK-Proven Machine Data

Machine-generated data is only valuable if you can trust it. A temperature sensor's reading is worthless if someone can spoof it. A drone's GPS coordinates are dangerous if they can be falsified. RS-Verify provides a three-tier data verification framework that gives machine data cryptographic integrity guarantees — all powered by vProgs' native ZK proving pipeline.

The three tiers:

verification tiers
  TIER 1: ORIGIN AUTHENTICATION          TIER 2: PATTERN ANALYSIS
  ============================          ========================

  Machine signs data with               AI/ML models analyze data
  its RS-ID private key.                streams for anomalies.
  Anyone can verify the                 Flags impossible readings,
  signature against the                 statistical outliers, and
  machine's on-chain DID.              suspicious patterns.

  Proves: "This data came               Proves: "This data is
   from this specific machine"           consistent and plausible"


  TIER 3: CROSS-VERIFICATION            SETTLEMENT
  =========================             ==========

  Multiple independent machines          All three tiers produce
  corroborate the same data             evidence that feeds into
  point. Consensus across               a ZK proof. The proof
  independent observers.                settles on Kaspa L1.

  Proves: "Multiple machines             Result: Immutable,
   independently agree"                  verifiable data record

The ZK advantage: Traditional data verification stores raw data on-chain (expensive, privacy-leaking) or relies on trusted oracles (centralized point of failure). RS-Verify generates a compact ZK proof that attests to data integrity — the proof settles on Kaspa L1, but the raw data stays off-chain. A supply chain sensor can prove "temperature stayed between 2-8°C for 72 hours" without revealing the actual readings, the route, or any other business-sensitive data.

data verification flow
  Sensor Network              RS-Verify vProg           Kaspa L1        Data Consumer
  ==============              ===============           ========        =============
       |                            |                      |                 |
       | Raw readings               |                      |                 |
       | (temp, GPS, accel...)      |                      |                 |
       |--------------------------->|                      |                 |
       |                            |                      |                 |
       |                   Tier 1: Verify origin sig       |                 |
       |                   Tier 2: Run anomaly check       |                 |
       |                   Tier 3: Cross-ref peers         |                 |
       |                            |                      |                 |
       |                   Generate ZK proof of            |                 |
       |                   data integrity                  |                 |
       |                            |                      |                 |
       |                            | Proof + commitment   |                 |
       |                            |--------------------->|                 |
       |                            |                      |                 |
       |                            |              Verify & finalize         |
       |                            |                      |                 |
       |                            |                      | Query verified  |
       |                            |                      | data record     |
       |                            |                      |<----------------|
       |                            |                      |                 |
       |                            |                      | Return proof +  |
       |                            |                      | attestation     |
       |                            |                      |---------------->|
RS-Verify — ZK-proven machine data
= = = = = = = = = = = = =

How It All Connects

The five primitives are not isolated tools — they compose. A single machine interaction might touch all five in a single atomic transaction, thanks to vProgs' synchronous composability:

full interaction
  DRONE (Bot0)                                          CHARGER (Bot1)
  ============                                          ==============
       |                                                      |
       | 1. RS-REGISTRY: "Find charger near me"               |
       |----------------------------------------------------->|
       |                                                      |
       | 2. RS-ID: Exchange + verify DIDs                     |
       |<---------------------------------------------------->|
       |                                                      |
       | 3. RS-ACCESS: "Does Bot0 have charging permission?"  |
       |----------------------------------------------------->|
       |                           Verified (ZK) <<<          |
       |                                                      |
       | 4. RS-PAY: Lock KAS in escrow covenant               |
       |----------------------------------------------------->|
       |                                                      |
       |            *** CHARGING SESSION ***                   |
       |<====================================================>|
       |                                                      |
       | 5. RS-VERIFY: Bot1 submits charge-complete proof     |
       |<-----------------------------------------------------|
       |                                                      |
       | 6. RS-PAY: Covenant releases KAS to Bot1             |
       |----------------------------------------------------->|
       |                                                      |
       |        ALL SETTLED ON KASPA L1. ONE ATOMIC TX.       |
       |                                                      |

This entire flow — discovery, authentication, authorization, payment, service delivery, verification, and settlement — can execute as a single atomic operation on Kaspa L1. If any step fails, the whole transaction rolls back. No partial states. No stuck funds. No disputes.

This is the power of building on a platform with synchronous composability — something that L2 rollup architectures fundamentally cannot provide.

Full platform interaction — all five primitives in one atomic transaction