08 Profiles And Scenarios

This chapter defines conformance profiles and scenario coverage for evaluating Dina-compatible implementations.

Conformance Profiles

Not every implementation must implement every layer.

The protocol SHOULD define conformance profiles.

Implementations SHOULD advertise their supported profile identifiers through the capability discovery layer.

Home Node Profile

Implements:

This is the fullest Dina implementation.

Device Profile

Implements:

May delegate storage and D2D authority to a Home Node.

Agent Executor Profile

Implements:

May act only through a Home Node and does not own Dina identity or vault authority.

Agent Compliance Model

The protocol SHOULD be explicit about what it means for an agent to be Dina-protocol-compliant.

Not every agent that can call a Dina endpoint is Dina-protocol-compliant.

At minimum, the protocol distinguishes:

  1. Dina-compatible agent executor
  2. implements the agent-executor profile
  3. authenticates using Dina-compatible auth
  4. declares intent and caller identity
  5. obeys session, grant, approval, and egress controls
  6. consumes or produces supported interaction semantics through a Home Node

  7. Dina-aware agent

  8. can talk to a Dina-compatible Home Node or bridge
  9. but does not itself implement the required executor profile contract
  10. is integration-capable, not protocol-conformant

  11. Sovereign Dina implementation

  12. implements a fuller profile such as home-node, provider-dina, or mobile-home-node
  13. may also host or route work to one or more compliant agent executors

An agent therefore SHOULD NOT be described simply as \"Dina-compatible\" without a profile qualifier.

Recommended language is:

This avoids conflating:

Minimum Agent Executor Requirements

To claim the agent-executor profile, an agent implementation SHOULD at minimum:

An agent executor MAY be narrow.

For example, an implementation may legitimately support only:

provided it advertises that subset honestly and negotiates against the remote common subset.

D2D Service / Provider Profile

Implements:

May satisfy requests through direct lookup, internal tools, or delegated execution.

Trust AppView Profile

Implements:

Does not need to implement vault storage or agent safety.

Bridge Connector Profile

Implements:

This preserves interoperability without making bridges the protocol center.

Mobile Home Node Profile

Implements:

Delegates to hosted infrastructure:

This profile enables zero-cost sovereign operation
on a mobile device with no user-managed server.

Scenario Coverage

The protocol should be judged against scenario families, not only transport primitives.

Personal Memory

Pattern:

Live World-State Query

Pattern:

Example:

Social Coordination

Pattern:

Example:

Provider Request

Pattern:

Example:

Durable Delegated Work

Pattern:

Monitoring

Pattern:

Example:

Briefing and Proactive Delivery

Pattern:

Examples:

Trust Query

Pattern:

Example:

Trust Publication

Pattern: