Skip to main content

Abstract

This specification defines a card-delegation extension to the x402 protocol that enables payment settlement through on-chain credit burns, with automatic card-funded credit top-ups when the subscriber’s balance is insufficient. While standard x402 settles payments via EIP-3009 ERC-20 token transfers and the smart accounts extension uses ERC-4337 UserOperations with crypto-funded ordering, this extension allows the ordering step to be funded via Stripe PaymentIntents backed by pre-authorized card delegations. The scheme identifier is: nvm:card-delegation The extension is designed to be fully compatible with existing x402 clients and servers, requiring only the addition of the nvm:card-delegation extension payload.
Version: 0.1
Status: Draft
Last Updated: February 2026

1. Introduction

1.1 Background

The x402 protocol standardizes HTTP-native payments where:
  1. A client requests a protected resource
  2. The server responds with HTTP 402 and payment requirements
  3. The client builds and signs a payment authorization
  4. The client retries the request with the payment payload
  5. A facilitator verifies and settles the payment
Standard x402 implementations use EIP-3009 signatures to authorize ERC-20 token transfers, and the smart accounts extension uses ERC-4337 UserOperations for programmable on-chain settlement. Both approaches require clients to hold cryptocurrency and interact with blockchain infrastructure.

1.2 Motivation

Many real-world payment scenarios involve users and organizations that prefer or require traditional payment methods:
  • Enterprise adoption --- organizations with existing credit card infrastructure should not need crypto wallets to consume AI services
  • Regulatory compliance --- some jurisdictions require fiat-denominated billing and traditional payment rails
  • User experience --- end users are familiar with credit card payments and may not want to manage blockchain wallets
  • Budgetary controls --- organizations need spending limits, approval workflows, and reconciliation against traditional accounting systems
  • Instant onboarding --- new users can start consuming services immediately with an existing payment card, without acquiring tokens
This extension enables these use cases by funding on-chain credit purchases via Stripe PaymentIntents, authorized through pre-established card delegations managed by the facilitator. Settlement itself uses the same on-chain credit burn mechanism as the smart accounts extension.

1.3 Design Goals

This extension:
  • MUST be compatible with the existing x402 HTTP handshake
  • MUST use the standard x402 payload structure with an extension field
  • MUST support spending limits and transaction caps per delegation
  • SHOULD leverage Stripe’s off-session payment capabilities for seamless settlement
  • SHOULD support multi-party settlement via Stripe Connect for merchant routing
  • MUST ensure PCI compliance by never exposing raw card data to the facilitator or server
  • MUST allow facilitators to verify and settle payments on behalf of clients

2. Terminology

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in RFC 2119.

2.1 Roles

RoleDescription
ClientThe entity requesting access to a protected resource. Authenticates via JWT tokens issued by the facilitator.
ServerThe entity providing the protected resource (API, agent, service). Coordinates with the facilitator.
FacilitatorA third-party service that verifies delegations, manages spending limits, and executes Stripe PaymentIntents on behalf of clients.
Payment ProviderThe payment processor (Stripe) that handles card authorization, capture, and fund transfer.

2.2 Definitions

TermDefinition
DelegationA pre-authorized permission granting the facilitator the ability to charge a client’s card within defined spending limits and time constraints.
SetupIntentA Stripe object used to collect and confirm a customer’s payment method for future off-session charges, without immediately charging the card.
PaymentIntentA Stripe object representing the intent to collect a payment. Used during settlement to charge the delegated card.
Off-session paymentA Stripe payment executed without the cardholder being actively present, using a previously saved payment method.
Connected AccountA Stripe Connect account belonging to a merchant (server operator) that receives funds from settlements.
Spending LimitThe maximum amount (in cents) that can be charged against a delegation over its lifetime.
VGS (Very Good Security)A PCI-compliant proxy service used to tokenize and vault sensitive card data before it reaches the facilitator.

3. Extension Structure

3.1 Scheme Identifier

The scheme identifier is: nvm:card-delegation

3.2 Payload Schema

PaymentRequired Response (402)

When a server requires payment via card delegation, it returns:
{
  "x402Version": 2,
  "error": "Payment required to access resource",
  "resource": {
    "url": "/api/v1/agents/80918427023170428029540261117198154464497879145267720259488529685089104529015/tasks",
    "description": "AI agent task execution",
    "mimeType": "application/json"
  },
  "accepts": [{
    "scheme": "nvm:card-delegation",
    "network": "stripe",
    "planId": "plan_abc123",
    "extra": {
      "version": "1",
      "agentId": "80918427023170428029540261117198154464497879145267720259488529685089104529015",
      "httpVerb": "POST"
    }
  }],
  "extensions": {}
}

PaymentPayload (Client Response)

The client responds with a PaymentPayload containing a JWT token that encodes the delegation authorization:
{
  "x402Version": 2,
  "resource": {
    "url": "/api/v1/agents/80918427023170428029540261117198154464497879145267720259488529685089104529015/tasks",
    "description": "AI agent task execution",
    "mimeType": "application/json"
  },
  "accepted": {
    "scheme": "nvm:card-delegation",
    "network": "stripe",
    "planId": "plan_abc123",
    "extra": {
      "version": "1",
      "agentId": "80918427023170428029540261117198154464497879145267720259488529685089104529015",
      "httpVerb": "POST"
    }
  },
  "payload": {
    "token": "eyJhbGciOiJSUzI1NiIs...",
    "authorization": {
      "from": "0xD4f58B60330bC59cB0A07eE6A1A66ad64244eC8c",
      "sessionKeys": [{ "id": "redeem", "data": "0xabc123..." }]
    }
  },
  "extensions": {}
}

3.3 Field Definitions

PaymentRequired Root Fields

FieldTypeRequiredDescription
x402VersionnumberYesProtocol version. MUST be 2.
errorstringYesHuman-readable error message.
resourceobjectYesProtected resource information.
acceptsarrayYesArray of accepted payment schemes.
extensionsobjectYesEmpty object {} for x402 spec alignment.

Resource Fields

FieldTypeRequiredDescription
urlstringYesThe protected resource URL.
descriptionstringNoHuman-readable description.
mimeTypestringNoExpected response MIME type (e.g., "application/json").

Scheme Fields (in accepts[] / accepted)

FieldTypeRequiredDescription
schemestringYesPayment scheme. MUST be "nvm:card-delegation".
networkstringYesPayment network identifier. MUST be "stripe".
planIdstringNoPlan identifier associated with this delegation.
extraobjectYesAdditional scheme-specific fields.

Extra Fields

FieldTypeRequiredDescription
versionstringYesScheme version (e.g., "1").
agentIdstringNoAgent identifier (if resource has multiple agents).
httpVerbstringNoHTTP method for the endpoint.

PaymentPayload Fields

FieldTypeRequiredDescription
x402VersionnumberYesProtocol version. MUST be 2.
resourceobjectNoEchoed from PaymentRequired.
acceptedobjectYesSelected scheme from accepts[].
payloadobjectYesScheme-specific authorization data.
extensionsobjectYesEmpty object {} for x402 spec alignment.

Payload Fields

FieldTypeRequiredDescription
tokenstringYesJWT token encoding the card delegation authorization. See JWT Claims below.
authorizationobjectNoOn-chain authorization for credit burns. Contains subscriber address and session keys.
authorization.fromstringYes (if authorization present)Subscriber’s blockchain address (smart account).
authorization.sessionKeysarrayYes (if authorization present)Array of session key references for on-chain operations.
authorization.sessionKeys[].idstringYesSession key identifier. Must be "redeem" for burn session keys.
authorization.sessionKeys[].datastringYesKeccak-256 hash of the serialized session key.

JWT Claims

The token field contains a signed JWT with the following claims:
ClaimTypeRequiredDescription
issstringYesToken issuer. MUST be the facilitator URL (e.g., "https://api.nevermined.app").
substringYesSubject identifier. The userId of the client who created the delegation.
audstringYesAudience. MUST be "nvm:card-delegation".
jtistringYesJWT ID. The delegationId (UUID) that uniquely identifies this delegation.
iatnumberYesIssued-at timestamp (Unix epoch seconds).
expnumberYesExpiration timestamp (Unix epoch seconds).
nvm.delegationIdstringYesUnique delegation identifier (UUID). MUST match the jti claim.
nvm.providerstringYesPayment provider identifier. MUST be "stripe".
nvm.providerCustomerIdstringYesStripe Customer ID (e.g., "cus_PaBcDeFgHiJk").
nvm.providerPaymentMethodIdstringYesStripe PaymentMethod ID for the enrolled card (e.g., "pm_1AbCdEfGhIjKlM").
nvm.spendingLimitCentsnumberYesMaximum amount in cents that can be charged over the delegation lifetime.
nvm.currencystringYesISO 4217 currency code (e.g., "usd", "eur").
nvm.merchantAccountIdstringNoStripe Connected Account ID for the merchant receiving funds (e.g., "acct_1AbCdEfGhIjKlM").
nvm.planIdstringNoPlan identifier associated with this delegation.
nvm.maxTransactionsnumberNoMaximum number of individual transactions allowed under this delegation.
The nvm claims are namespaced under a single nvm object within the JWT payload to avoid collisions with standard JWT claims. The jti and nvm.delegationId MUST contain the same value for consistency.

4. Protocol Flow

4.1 Overview

The protocol flow extends standard x402 with a card enrollment phase and replaces on-chain settlement with Stripe PaymentIntents:

4.2 Step-by-Step Flow

The following steps detail the complete payment and execution flow. Steps are grouped into four phases: Card Enrollment, Delegation Creation, Verification, and Settlement.

Phase 0: Card Enrollment (Steps 1-10)

Card enrollment is a one-time process that securely saves a client’s payment method for future use. Step 1. Client requests a SetupIntent from the facilitator.
POST /payments/card/setup HTTP/1.1
Host: facilitator.example.com
Authorization: Bearer <user-auth-token>
Step 2. Facilitator creates a Stripe SetupIntent and returns the client_secret to the client. Step 3. Client submits card details through a VGS (Very Good Security) proxy. The VGS proxy tokenizes the card data before it reaches any Nevermined infrastructure, ensuring PCI compliance. Step 4. VGS forwards the tokenized card data to Stripe to confirm the SetupIntent. Step 5. Stripe confirms the SetupIntent and attaches the PaymentMethod. Step 6. Client notifies the facilitator that enrollment is complete.
POST /payments/card/enroll HTTP/1.1
Host: facilitator.example.com
Authorization: Bearer <user-auth-token>
Content-Type: application/json

{
  "setupIntentId": "seti_1AbCdEfGhIjKlM"
}
Step 7. Facilitator retrieves the confirmed PaymentMethod from Stripe and stores the customer-to-payment-method mapping. Step 8. Facilitator confirms enrollment to the client.
Card enrollment only needs to happen once per payment method. A single enrolled card can back multiple delegations with different spending limits and expiry times.

Phase 1: Delegation Creation (Steps 9-12)

Step 9. Client requests a delegation from the facilitator, specifying the scheme, spending limits, and optional constraints. The request body follows the GenerateX402TokenDto structure, where accepted identifies the payment scheme and delegationConfig contains card-delegation-specific options.
POST /x402/permissions HTTP/1.1
Host: facilitator.example.com
Authorization: Bearer <user-auth-token>
Content-Type: application/json

{
  "resource": {
    "url": "/api/v1/agents/80918427023170428029540261117198154464497879145267720259488529685089104529015/tasks",
    "description": "AI agent task execution",
    "mimeType": "application/json"
  },
  "accepted": {
    "scheme": "nvm:card-delegation",
    "network": "stripe",
    "planId": "plan_abc123",
    "extra": {
      "version": "1"
    }
  },
  "delegationConfig": {
    "providerPaymentMethodId": "pm_1AbCdEfGhIjKlM",
    "spendingLimitCents": 10000,
    "durationSecs": 2592000,
    "currency": "usd",
    "maxTransactions": 100,
    "merchantAccountId": "acct_1AbCdEfGhIjKlM"
  }
}
Step 10. Facilitator validates the client’s enrolled payment method and creates a delegation record with status Active. Step 11. Facilitator signs a JWT token containing the delegation claims (see Section 3.3) and wraps it in a standard x402 PaymentPayload structure. The resource and accepted fields echo back the values from the client’s request:
{
  "x402Version": 2,
  "resource": {
    "url": "/api/v1/agents/80918427023170428029540261117198154464497879145267720259488529685089104529015/tasks",
    "description": "AI agent task execution",
    "mimeType": "application/json"
  },
  "accepted": {
    "scheme": "nvm:card-delegation",
    "network": "stripe",
    "planId": "plan_abc123",
    "extra": { "version": "1" }
  },
  "payload": {
    "token": "<signed-delegation-jwt>"
  },
  "extensions": {}
}
Step 12. Facilitator base64-encodes the PaymentPayload and returns it to the client. This token is what the client will include in the PAYMENT-SIGNATURE header when accessing protected resources.
{
  "accessToken": "eyJ4NDAyVmVyc2lvbiI6Mi...",
  "permissionHash": "0x1a2b3c..."
}

Phase 2: Verification (Steps 13-22)

Step 13. Client initiates an HTTP request to a Server (AI Agent).
GET /api/resource HTTP/1.1
Host: agent.example.com
Step 14. Server validates whether the request contains a valid payment in the PAYMENT-SIGNATURE header. Step 15. If payment is absent, Server responds with HTTP 402 Payment Required status and the PaymentRequired object in the PAYMENT-REQUIRED header (base64-encoded).
HTTP/1.1 402 Payment Required
PAYMENT-REQUIRED: eyJ4NDAyVmVyc2lvbiI6MiwiZXJyb3IiOiJQYXltZW50IHJlcXVpcmVkLi4u
Step 16. The Client selects the nvm:card-delegation scheme from accepts[] and uses the base64-encoded PaymentPayload (received in Step 12) as the x402 access token. Step 17. Client sends an HTTP request to the server including the base64-encoded PaymentPayload in the PAYMENT-SIGNATURE HTTP header.
GET /api/resource HTTP/1.1
Host: agent.example.com
PAYMENT-SIGNATURE: <base64-encoded-PaymentPayload>
Step 18. Server validates the incoming data and forwards the payment data to the facilitator for verification.
POST /verify HTTP/1.1
Host: facilitator.example.com
Content-Type: application/json

{
  "paymentRequired": { ... },
  "x402AccessToken": "<base64-encoded-PaymentPayload>",
  "maxAmount": "500"
}
Step 19. Facilitator base64-decodes the PaymentPayload, extracts the JWT from the payload.token field, and performs the following verification checks:
  1. JWT signature verification --- validates the JWT was signed by the facilitator’s private key
  2. Delegation status check --- confirms the delegation record exists and has status Active
  3. Expiry check --- confirms exp claim is in the future
  4. Credit balance check --- if planId is present, checks the subscriber’s on-chain credit balance
  5. Session key validation --- if authorization is present, validates the burn session key exists and is active
Step 20. IF any verification check fails, the facilitator returns an error to the server. Step 21. IF all verification checks pass, the facilitator confirms verification to the server. Step 22. The Server, after obtaining the verification result from the Facilitator (and BEFORE executing any task), checks the verification result:
  • If the verification was INVALID, the Server returns to the client a HTTP 402 PAYMENT-FAILED response
  • If the verification was correct, the Server continues with the request execution
The verification phase ensures that the delegation CAN be settled before the server performs any work. This protects the server from executing expensive operations without guaranteed payment.

Phase 3: Settlement (Steps 23-32)

Step 23. The Server executes the task to fulfill the client request (AI Task or any necessary work). Step 24. The Server calls the /settle endpoint of the Facilitator to settle the request.
POST /settle HTTP/1.1
Host: facilitator.example.com
Content-Type: application/json

{
  "paymentRequired": { ... },
  "x402AccessToken": "<base64-encoded-PaymentPayload>",
  "maxAmount": "500"
}
The maxAmount specifies the number of credits to burn for this request (not cents). Step 25. Facilitator resolves the subscriber’s blockchain address and loads the plan from the on-chain registry. Step 26. Facilitator checks the subscriber’s on-chain credit balance for the plan. Step 27. IF balance is insufficient for the requested maxAmount:
  • Calculate plan price in cents from plan.price.amounts
  • Atomically increment the delegation’s spend counter (card charge ceiling)
  • Create an off-session Stripe PaymentIntent to charge the card for the plan price
  • On Stripe failure: roll back spend counter, return settlement failure
  • On Stripe success: mint credits to the subscriber’s blockchain address
  • Wait for the credit balance to update on-chain
Step 28. Facilitator burns the requested credits on-chain using the burn session key from the token’s authorization.sessionKeys. Step 29. IF the credit burn fails, the facilitator returns a settlement failure. Step 30. Facilitator returns the settlement receipt to the server. Step 31. Server returns to the client the response with the payment confirmation in the PAYMENT-RESPONSE header (base64-encoded).
HTTP/1.1 200 OK
Content-Type: application/json
PAYMENT-RESPONSE: eyJzdWNjZXNzIjp0cnVlLCJwYXltZW50SW50ZW50SWQiOi4uLg==

{
  "result": "...",
  "payment": {
    "creditsRedeemed": 2,
    "remainingBalance": 98,
    "orderTx": "pi_1AbCdEfGhIjKlM"
  }
}
Decoded PAYMENT-RESPONSE:
{
  "success": true,
  "transaction": "0x1234567890abcdef...",
  "network": "stripe",
  "creditsRedeemed": "2",
  "remainingBalance": "98",
  "orderTx": "pi_1AbCdEfGhIjKlM"
}
The PAYMENT-RESPONSE header contains x402-standard settlement fields. Additional Nevermined-specific info (like creditsRedeemed and remainingBalance) can be included in the response body.
Steps 27-28 represent a failure scenario where the server has already performed work but settlement failed. Implementations SHOULD have mechanisms to handle this edge case, such as retry logic or dispute resolution.

4.3 HTTP Header Summary

Per x402 HTTP Transport v2, payment data is transmitted via HTTP headers:
HeaderDirectionContent
PAYMENT-REQUIREDServer -> Client (402)Base64-encoded PaymentRequired object
PAYMENT-SIGNATUREClient -> ServerBase64-encoded PaymentPayload object (consistent for both nvm:card-delegation and nvm:erc4337 schemes)
PAYMENT-RESPONSEServer -> Client (200)Base64-encoded settlement receipt

5. Verification Requirements

5.1 JWT Verification

The facilitator MUST verify the following aspects of the JWT token:
CheckRequirement
SignatureJWT MUST be signed by the facilitator’s private key and verifiable with the corresponding public key
AlgorithmJWT MUST use RS256 or ES256 signing algorithm
Issueriss claim MUST match the facilitator’s configured issuer URL
Audienceaud claim MUST equal "nvm:card-delegation"
Expiryexp claim MUST be in the future
Issued Atiat claim MUST be in the past
JWT IDjti claim MUST match an existing delegation record

5.2 Delegation Status Verification

The facilitator MUST verify:
CheckRequirement
ExistenceA delegation record matching the jti / nvm.delegationId MUST exist
StatusDelegation status MUST be Active
Customer Matchnvm.providerCustomerId MUST match the delegation record
Payment Methodnvm.providerPaymentMethodId MUST match a valid, active payment method

5.3 Balance and Permission Checks

The facilitator MUST verify:
CheckRequirement
Credit BalanceIf a planId is present, the subscriber’s on-chain credit balance SHOULD be checked (informational — settle auto-orders if needed)
Session KeyIf authorization is present, the burn session key hash MUST match an active PermissionEntity
Delegation ActiveThe delegation MUST have status Active
Unlike the previous cents-based budget check, verification always returns valid for active delegations. The settle step handles insufficient credits by auto-ordering via card charge. The delegation’s spending limit serves as a ceiling on total card charges, not a per-request budget.

6. Settlement Requirements

6.1 Execution Order

When executing settlement, the facilitator MUST:
  1. Decode the x402 token and verify the delegation JWT
  2. Resolve the subscriber’s blockchain address from their userId
  3. Load the plan from the on-chain asset registry
  4. Check the subscriber’s on-chain credit balance
  5. If balance is insufficient for maxAmount: a. Calculate plan price: sum(plan.price.amounts) (in cents) b. Atomically increment delegation spend counter c. Create off-session Stripe PaymentIntent for the plan price d. On Stripe failure: roll back spend counter, return error e. Mint credits to subscriber using the node account f. Wait for balance update on-chain
  6. Burn credits on-chain using the burn session key
  7. Return settlement receipt with creditsRedeemed and remainingBalance

6.2 Atomicity

The spend counter MUST be incremented atomically BEFORE the Stripe PaymentIntent is created. If the Stripe charge fails, the spend counter MUST be rolled back. This prevents race conditions where concurrent requests could exceed spending limits.

6.3 Delegation Lifecycle

Delegations transition through the following states:
StatusDescription
ActiveDelegation is valid and can be used for payments
ExhaustedSpending limit or transaction count has been reached
ExpiredThe exp timestamp has passed
RevokedThe client or facilitator has explicitly revoked the delegation
The facilitator MUST update the delegation status to Exhausted when:
  • spentCents >= nvm.spendingLimitCents
  • Transaction count reaches nvm.maxTransactions (if set)

6.4 Stripe Connect Routing

When nvm.merchantAccountId is present, the facilitator MUST route funds to the merchant’s Stripe Connected Account using Stripe Connect’s transfer_data parameter. The facilitator MAY apply platform fees via the application_fee_amount parameter.

6.5 Receipt Format

The facilitator MUST return a receipt. The PAYMENT-RESPONSE header contains x402-standard fields:
FieldTypeDescription
successbooleanWhether settlement succeeded.
networkstringPayment network. MUST be "stripe".
Additional settlement details MAY be included in the response body:
FieldTypeDescription
creditsRedeemedstringNumber of credits burned on-chain.
remainingBalancestringSubscriber’s remaining credit balance.
orderTxstringStripe PaymentIntent ID if auto top-up occurred (only present when card was charged).
transactionstringBlockchain transaction hash of the credit burn.

7. Error Handling

7.1 Error Codes

CodeNameDescription
INVALID_PAYLOADInvalid PayloadThe payment payload structure is invalid or missing required fields
INVALID_TOKENInvalid TokenThe JWT token signature verification failed
EXPIRED_TOKENExpired TokenThe JWT token exp claim is in the past
DELEGATION_NOT_FOUNDDelegation Not FoundNo delegation record found for the given jti / delegationId
DELEGATION_INACTIVEDelegation InactiveDelegation status is not Active (may be Exhausted, Expired, or Revoked)
BUDGET_EXCEEDEDBudget ExceededDeprecated. The requested amount would exceed the delegation spending limit
INSUFFICIENT_BALANCEInsufficient BalanceCredit balance too low and card charge failed
MINT_FAILEDMint FailedCredit minting failed after successful card charge
BURN_FAILEDBurn FailedOn-chain credit burn failed
TRANSACTION_LIMIT_REACHEDTransaction Limit ReachedThe maximum number of transactions has been reached
PAYMENT_FAILEDPayment FailedStripe PaymentIntent creation or confirmation failed
CARD_DECLINEDCard DeclinedThe card was declined by the issuing bank
CURRENCY_MISMATCHCurrency MismatchThe request currency does not match the delegation currency
MERCHANT_ACCOUNT_INVALIDMerchant Account InvalidThe specified Stripe Connected Account is invalid or inactive

7.2 Error Response Format

{
  "error": {
    "code": "BUDGET_EXCEEDED",
    "message": "Requested amount exceeds remaining delegation budget",
    "details": {
      "delegationId": "deleg-8f14e45f-ce34-4797-b88e-968374b0d4b6",
      "spendingLimitCents": 10000,
      "spentCents": 9800,
      "requestedAmountCents": 500
    }
  }
}

8. Security Considerations

8.1 JWT Security

  • JWT tokens MUST be signed using asymmetric cryptography (RS256 or ES256)
  • The facilitator’s signing private key MUST be stored in a secure key management system
  • JWT tokens SHOULD have limited validity periods (RECOMMENDED: 30 days maximum)
  • Replay protection is inherent through the atomic spend counter and transaction tracking

8.2 Spending Limits

  • Every delegation MUST have a finite spending limit (nvm.spendingLimitCents)
  • Spend counters MUST be incremented atomically to prevent race conditions
  • The facilitator MUST reject requests that would exceed the spending limit, even by a single cent

8.3 Atomic Operations

  • The spend counter increment and Stripe PaymentIntent creation MUST be treated as a logical unit
  • If the Stripe charge fails after the counter is incremented, the counter MUST be rolled back
  • Concurrent settlement requests for the same delegation MUST be serialized or use optimistic concurrency control

8.4 PCI Compliance

  • Raw card numbers (PAN), CVV, and expiry dates MUST NEVER be transmitted to or stored by the facilitator
  • Card enrollment MUST use a PCI-compliant proxy (VGS) that tokenizes card data before it reaches Nevermined infrastructure
  • Only Stripe-issued tokens (Customer IDs, PaymentMethod IDs) are stored by the facilitator
  • The facilitator MUST maintain PCI DSS compliance for the handling of any cardholder data references

8.5 Delegation Revocation

  • Clients MUST be able to revoke delegations at any time
  • Revoked delegations MUST immediately fail verification
  • In-flight settlements at the time of revocation MAY complete if the Stripe PaymentIntent has already been confirmed

8.6 Session Key Security

  • Burn session keys MUST be scoped to specific plan IDs and subscriber addresses
  • Session keys MUST have expiration times aligned with the delegation expiry
  • Session keys MUST be stored securely in the facilitator’s database
  • The facilitator MUST validate that the session key referenced in the token matches an active permission record
  • Session key policies MUST limit the maximum burn amount per operation

9. Implementation Notes

9.1 Stripe Integration

This extension requires the following Stripe features:
FeaturePurpose
SetupIntentsSecurely save payment methods for future use
PaymentIntentsCharge saved payment methods off-session
Stripe ConnectRoute payments to merchant connected accounts
Off-session paymentsExecute charges without cardholder presence
Implementations MUST use Stripe API version 2023-10-16 or later.

9.2 VGS Proxy for Card Enrollment

Card enrollment flows MUST route through a VGS (Very Good Security) forward proxy to ensure PCI compliance:
  1. The client collects card details in a VGS-secured iframe or form
  2. VGS tokenizes the card data and forwards it to Stripe
  3. The facilitator only ever receives Stripe-issued tokens (SetupIntent IDs, PaymentMethod IDs)
This architecture ensures that raw card data never touches Nevermined servers.

9.3 Stripe Connect for Merchant Routing

When merchants (server operators) have Stripe Connected Accounts, the facilitator routes settlement funds using Stripe Connect:
  • Direct charges with transfer_data.destination send funds to the merchant
  • The facilitator MAY deduct a platform fee using application_fee_amount
  • Merchants MUST complete Stripe Connect onboarding before receiving funds
  • The nvm.merchantAccountId in the JWT identifies the destination account

9.4 Idempotency

Implementations SHOULD use Stripe’s idempotency_key parameter when creating PaymentIntents to prevent duplicate charges in case of network failures or retries. The idempotency key SHOULD be derived from the delegation ID and a request-specific nonce.

10. References