EMILIA Protocol is an open standard for verifiable pre-action authorization. The protocol is formally verified — 26 TLA+ theorems and 35 Alloy facts run in CI on every change — and the reference runtime is Apache 2.0. Below: the people responsible for it, the advisors guiding it, and the entity behind it.
For consequential, irreversible actions — wire transfers, benefit redirects, infrastructure changes, AI-agent-issued operations — session-level and scope-level authorization stop short of what the action itself needs. We build the layer that binds authorization to the exact action and to a named human, so the system refuses to execute anything that isn't both authorized and accountable.
We treat this as standards work, not platform work. The protocol is open. The reference implementation is open. The conformance suite is open. The trust layer for AI-era infrastructure has to be inspectable, or it isn't trust.
The team behind EMILIA Protocol is intentionally not yet listed publicly on this page. Open-source contributors are visible on GitHub at github.com/emiliaprotocol/emilia-protocol with signed commits.
For pilot, procurement, or partnership conversations we make introductions on signed NDA. Reach team@emiliaprotocol.ai.
Procurement and partnership inquiries: team@emiliaprotocol.ai
We are actively recruiting an advisory board across formal methods, federal regulatory, and financial-fraud-defense expertise. We will name advisors on this page only after each individual has confirmed engagement; an empty advisor list is more credible than a fabricated one. If you are a former OCC / FDIC / Federal Reserve examiner, a former Treasury / FinCEN / CISA official, a bank or credit-union CISO or fraud lead, or an academic cryptographer interested in this category, we would value the conversation. Reach team@emiliaprotocol.ai.