Programmable authorization for money, agents, and access

On-chain logic enforces spending limits, payments, and permissions without custody, cron jobs, or repeated signatures.

Non-custodial. Time-bound. Deterministically enforced on-chain.

Time-Bound Delegation

Users authorize spending and access with strict time and amount limits. Funds always remain in-wallet and fully revocable.

Time-Bound Delegation

Users authorize spending and access with strict time and amount limits. Funds always remain in-wallet and fully revocable.

Time-Bound Delegation

Users authorize spending and access with strict time and amount limits. Funds always remain in-wallet and fully revocable.

Time-Bound Delegation

Users authorize spending and access with strict time and amount limits. Funds always remain in-wallet and fully revocable.

Deterministic Execution Windows

Transactions execute only within predefined windows — enforced on-chain, without cron jobs or race conditions.

Deterministic Execution Windows

Transactions execute only within predefined windows — enforced on-chain, without cron jobs or race conditions.

Deterministic Automation

Keeper nodes trigger charges on-chain, ensuring reliability without central servers.

Deterministic Execution Windows

Transactions execute only within predefined windows — enforced on-chain, without cron jobs or race conditions.

Idempotent Execution

Each execution window is enforced exactly once. No double-execution. No ambiguity.

Idempotent Execution

Each execution window is enforced exactly once. No double-execution. No ambiguity.

Transparent Fee Split

Every transaction distributes fees instantly to merchants, keepers, and treasury.

Idempotent Execution

Each execution window is enforced exactly once. No double-execution. No ambiguity.

Chain-Local, Multi-Chain Ready

Execution is local to each chain, while authorization remains consistent across networks.

Chain-Local, Multi-Chain Ready

Execution is local to each chain, while authorization remains consistent across networks.

Cross-Chain Future

Designed for multi-chain expansion — one protocol, many execution layers.

Chain-Local, Multi-Chain Ready

Execution is local to each chain, while authorization remains consistent across networks.

Authorize rules, not transactions

Authorize rules, not transactions

Smart contracts can enforce rules — but they can’t express ongoing authorization.

Web3 has no native way to grant permission once, define its lifetime, and enforce it automatically over time.

Amser separates authorization from execution, allowing users to approve rules up front — and smart contracts to enforce them later, deterministically and on-chain.

Web3 still lacks a native standard for automated payments.


SubNetwork introduces an open, non-custodial protocol for recurring billing and automated payments — built for merchants, developers, and keeper operators.


Bridging Web2 simplicity with Web3 sovereignty, it brings familiar recurring payment experiences to a decentralized world — trustless, user-controlled, and seamless.

Define Authority

Merchants define rules, not transactions.

Configure recurring payment and access rules with transparent on-chain logic — no intermediaries, no custodial risk.

Define Authority

Merchants define rules, not transactions.

Configure recurring payment and access rules with transparent on-chain logic — no intermediaries, no custodial risk.

Define Authority

Merchants define rules, not transactions.

Configure recurring payment and access rules with transparent on-chain logic — no intermediaries, no custodial risk.

Define Authority

Merchants define rules, not transactions.

Configure recurring payment and access rules with transparent on-chain logic — no intermediaries, no custodial risk.

Grant Time-Bound Permission

Users authorize rules — with strict time and amount limits.

Subscribers approve spending and access once through a secure delegation model. Funds stay in their wallet, permissions are bounded, and authority is always revocable.

Grant Time-Bound Permission

Users authorize rules — with strict time and amount limits.

Subscribers approve spending and access once through a secure delegation model. Funds stay in their wallet, permissions are bounded, and authority is always revocable.

Grant Time-Bound Permission

Users authorize rules — with strict time and amount limits.

Subscribers approve spending and access once through a secure delegation model. Funds stay in their wallet, permissions are bounded, and authority is always revocable.

Grant Time-Bound Permission

Users authorize rules — with strict time and amount limits.

Subscribers approve spending and access once through a secure delegation model. Funds stay in their wallet, permissions are bounded, and authority is always revocable.

Enforce Over Time

Execution happens automatically when conditions are met.

Actions execute deterministically within predefined windows. Each execution is enforced exactly once — transparent, verifiable, and on-chain.

Enforce Over Time

Execution happens automatically when conditions are met.

Actions execute deterministically within predefined windows. Each execution is enforced exactly once — transparent, verifiable, and on-chain.

Enforce Over Time

Execution happens automatically when conditions are met.

Actions execute deterministically within predefined windows. Each execution is enforced exactly once — transparent, verifiable, and on-chain.

Enforce Over Time

Execution happens automatically when conditions are met.

Actions execute deterministically within predefined windows. Each execution is enforced exactly once — transparent, verifiable, and on-chain.

Authorization and execution are no longer the same action.

Authorization and execution are no longer the same action.

More than subscriptions

Subscriptions are just one expression of programmable authorization. The same execution model powers many transaction patterns.


Recurring access enforced through time-bound authorization.
Users approve rules once, and execution happens automatically at each interval — without repeated signatures.

Subscriptions & memberships

Recurring access to products, protocols, or services — enforced automatically over time.

Usage-based billing

Metered execution that runs within predefined limits, without repeated user signatures.

API & SaaS access

Time-bound authorization backing on-chain and off-chain services with expiring permissions.

Autonomous agents

Agents that operate continuously with safe, delegated authority and strict execution rules.

Smart contract access control

Gate functions, features, or mints based on active authorization state.

Protocol infrastructure fees

Automated fees that execute predictably without manual intervention or cron jobs.

All powered by the same primitive: authorize rules once, enforce them over time.

More than subscriptions

Subscriptions are just one expression of programmable authorization. The same execution model powers many transaction patterns.


Recurring access enforced through time-bound authorization.
Users approve rules once, and execution happens automatically at each interval — without repeated signatures.

Subscriptions & memberships

Recurring access to products, protocols, or services — enforced automatically over time.

Smart contract access control

Gate functions, features, or mints based on active authorization state.

Autonomous agents

Agents that operate continuously with safe, delegated authority and strict execution rules.

Protocol infrastructure fees

Automated fees that execute predictably without manual intervention or cron jobs.

API & SaaS access

Time-bound authorization backing on-chain and off-chain services with expiring permissions.

Usage-based billing

Metered execution that runs within predefined limits, without repeated user signatures.

All powered by the same primitive: authorize rules once, enforce them over time.

More than subscriptions

Subscriptions are just one expression of programmable authorization. The same execution model powers many transaction patterns.


Subscriptions & memberships

Recurring access to products, protocols, or services — enforced automatically over time.

Usage-based billing

Metered execution that runs within predefined limits, without repeated user signatures.

API & SaaS access

Time-bound authorization backing on-chain and off-chain services with expiring permissions.

Autonomous agents

Agents that operate continuously with safe, delegated authority and strict execution rules.

Smart contract access control

Gate functions, features, or mints based on active authorization state.

Protocol infrastructure fees

Automated fees that execute predictably without manual intervention or cron jobs.

All powered by the same primitive: authorize rules once, enforce them over time.

More than subscriptions

Subscriptions are just one expression of programmable authorization. The same execution model powers many transaction patterns.


Recurring access enforced through time-bound authorization.
Users approve rules once, and execution happens automatically at each interval — without repeated signatures.

Subscriptions & memberships

Recurring access to products, protocols, or services — enforced automatically over time.

Usage-based billing

Metered execution that runs within predefined limits, without repeated user signatures.

API & SaaS access

Time-bound authorization backing on-chain and off-chain services with expiring permissions.

Autonomous agents

Agents that operate continuously with safe, delegated authority and strict execution rules.

Smart contract access control

Gate functions, features, or mints based on active authorization state.

Protocol infrastructure fees

Automated fees that execute predictably without manual intervention or cron jobs.

All powered by the same primitive: authorize rules once, enforce them over time.

Protocol guarantees

Protocol guarantees

Protocol guarantees

Amser is designed around strict, enforceable guarantees.
These are not conventions — they are properties of the protocol.

Amser is designed around strict, enforceable guarantees.
These are not conventions — they are properties of the protocol.

Amser is designed around strict, enforceable guarantees.
These are not conventions — they are properties of the protocol.

Transparent and verifiable

All authorization and execution logic lives on-chain. Anyone can verify what is allowed, when it executes, and why.

Transparent and verifiable

All authorization and execution logic lives on-chain. Anyone can verify what is allowed, when it executes, and why.

Deterministic execution

Actions execute only when predefined conditions are met. Execution may be attempted multiple times, but can only succeed once, and only within valid execution windows — deterministic and on-chain.

Deterministic execution

Actions execute only when predefined conditions are met. Execution may be attempted multiple times, but can only succeed once, and only within valid execution windows — deterministic and on-chain.

Transparent and verifiable

All authorization and execution logic lives on-chain. Anyone can verify what is allowed, when it executes, and why.

Transparent and verifiable

All authorization and execution logic lives on-chain. Anyone can verify what is allowed, when it executes, and why.

Deterministic execution

Actions execute only when predefined conditions are met. Execution may be attempted multiple times, but can only succeed once, and only within valid execution windows — deterministic and on-chain.

Deterministic execution

Actions execute only when predefined conditions are met. Execution may be attempted multiple times, but can only succeed once, and only within valid execution windows — deterministic and on-chain.

Non-custodial by design

Funds never leave the user’s wallet. Authorization grants permission — not custody — and can be revoked at any time.

Non-custodial by design

Funds never leave the user’s wallet. Authorization grants permission — not custody — and can be revoked at any time.

Non-custodial by design

Funds never leave the user’s wallet. Authorization grants permission — not custody — and can be revoked at any time.

Time-bound authorization

Every authorization has explicit start and end conditions. Permissions expire automatically — no lingering approval

Time-bound authorization

Every authorization has explicit start and end conditions. Permissions expire automatically — no lingering approval

Time-bound authorization

Every authorization has explicit start and end conditions. Permissions expire automatically — no lingering approval

Deterministic execution

Actions execute only when predefined conditions are met. Execution may be attempted multiple times, but can only succeed once, and only within valid execution windows — deterministic and on-chain.

Deterministic execution

Actions execute only when predefined conditions are met. Execution may be attempted multiple times, but can only succeed once, and only within valid execution windows — deterministic and on-chain.

Deterministic execution

Actions execute only when predefined conditions are met. Execution may be attempted multiple times, but can only succeed once, and only within valid execution windows — deterministic and on-chain.

Transparent and verifiable

All authorization and execution logic lives on-chain. Anyone can verify what is allowed, when it executes, and why.

Transparent and verifiable

All authorization and execution logic lives on-chain. Anyone can verify what is allowed, when it executes, and why.

Transparent and verifiable

All authorization and execution logic lives on-chain. Anyone can verify what is allowed, when it executes, and why.

These guarantees apply to every execution — without exception.


Built for developers

Built for developers

Built for developers

Amser is designed to be predictable to build on.
The execution model is explicit, inspectable, and consistent under real-world conditions.

Amser is designed to be predictable to build on.
The execution model is explicit, inspectable, and consistent under real-world conditions.

Amser is designed to be predictable to build on.
The execution model is explicit, inspectable, and consistent under real-world conditions.

  • Clear, composable primitives — no hidden flows or implicit behavior

  • Predictable behavior under retries, failures, and edge cases

  • On-chain authority with off-chain liveness assistance

  • Clear, composable primitives — no hidden flows or implicit behavior

  • Predictable behavior under retries, failures, and edge cases

  • On-chain authority with off-chain liveness assistance

  • Clear, composable primitives — no hidden flows or implicit behavior

  • Predictable behavior under retries, failures, and edge cases

  • On-chain authority with off-chain liveness assistance

Developers can rely on this behavior across all execution paths.


Email Address

Email Address

hello@amser.io

hello@amser.io

Social Media

Social Media

© Copyright 2025, All Rights Reserved by Amser Protocol

© Copyright 2025, All Rights Reserved by Amser Protocol

© Copyright 2025, All Rights Reserved by Amser Protocol

© Copyright 2025, All Rights Reserved by Amser Protocol