1. TL;DR
AIP requires that messages are authenticated and integrity-protected, with replay protection mechanisms. Operators implement their own cryptographic systems, key management, and verification logic to enforce these constraints.
2. Why it matters
In digital advertising, fraud and data tampering are common:- Fake clicks and impressions
- Replay or duplicate requests
- Manipulated billing data
3. Core security guarantees
The protocol defines the following security invariants:| Guarantee | Description |
|---|---|
| Authenticity | Messages must be authenticated to verify their origin. |
| Integrity | Messages must be tamper-evident — data cannot be silently altered after signing. |
| Non-repudiation | Message authentication mechanisms must enable non-repudiation. |
| Replay protection | Unique nonces and timestamps must prevent reused requests within operator-defined validity windows. |
| Confidentiality | Transport must use encrypted channels (e.g., HTTPS or gRPC). |
4. Signature Model
Each message — fromContextRequest to EventPacket — must provide a verifiable signature or equivalent authentication mechanism.
Example signature approach
The following is an example of how messages may be signed. Operators may use different algorithms, header formats, or authentication mechanisms:Verification steps (example)
- Receiver verifies the signature using the appropriate authentication mechanism.
- If verification succeeds, the message is considered authentic.
- If verification fails, the message is rejected.
5. Key Management
Participants manage keys according to their own security policies. Each participant (Platform, Operator, Brand Agent) must:- Maintain authentication credentials for signing outgoing messages
- Verify signatures on incoming messages
- Implement key rotation and management according to their security requirements
6. Replay and Duplication Defense
AIP requires replay protection mechanisms. Operators implement their own nonce tracking and timestamp validation:- Nonces must be unique within operator-defined validity windows
- Timestamps must be validated to prevent replay attacks
- Duplicate requests must be detectable and rejectable
7. Secure Event Verification
Operators are the verification authority for all events. Each event (cpx_exposure, cpc_click, cpa_conversion) must be verified by the Operator using:
- Authentication and integrity verification of the event message
- Serve token validation
- Timestamp checks within operator-defined windows
8. Audit and Compliance
Operators may expose security artifacts for audit or compliance purposes. The protocol does not mandate specific audit ledgers, compliance frameworks, or audit infrastructure. Operators implement their own audit and compliance systems according to their requirements.9. Guarantees
The protocol guarantees:- Message authenticity: Messages cannot be silently altered without detection
- Replay detection: Replayed messages can be detected within operator-defined validity windows
- Message origin authentication: Message origin can be authenticated through operator-defined mechanisms
Summary
AIP defines protocol-level security invariants that ensure messages are authenticated, tamper-evident, and protected against replay attacks. Operators implement their own cryptographic systems, key management, and verification logic to enforce these constraints.Next: Compliance