Anchor-Governed Hierarchical Nesting: Recursive Semantic Containers at Unlimited Depth
by Nick Clark | Published March 27, 2026
The adaptive index disclosed in U.S. Application 19/326,036 organizes data into recursively nested semantic containers in which each container is itself a fully governed scope. Outer scopes govern inner ones through a strictly bounded delegation relationship; inner scopes inherit policy from their parents but exercise local authority within the territory the parent has demarcated. The nesting is acyclic by construction, depth is bounded by an explicit policy parameter rather than by an implementation limit, and every level carries its own anchor group, mutation rules, and consensus boundary. The result is a namespace that grows organically with the system it serves rather than constraining the system to a predetermined shape.
Mechanism
The mechanism of anchor-governed hierarchical nesting rests on three structural elements: the container, the anchor group, and the delegation edge. A container is a named scope that holds entries, child containers, and a policy descriptor. An anchor group is a set of nodes responsible for ratifying mutations within a container's scope. A delegation edge is the relationship that connects a parent container to a child container and that records the policy under which the child was admitted into the parent's namespace.
When a new container is created, the parent's anchor group evaluates the creation request against the parent's mutation policy. The policy specifies who may create children, what naming constraints apply, what minimum anchor-group size the child must declare, and what subset of the parent's policy the child must accept as binding. If the request is admissible, the parent ratifies the creation and emits a delegation edge. The edge carries a cryptographic commitment to the child's initial anchor-group composition, the parent's ratified policy subset, and a monotonic depth counter incremented from the parent's depth.
After ratification, the child operates as an independent scope. Mutations within the child are governed by the child's anchor group and the child's local policy, which may extend but never weaken the policy the parent ratified. The parent does not participate in routine mutation decisions inside the child; the parent's authority is limited to admitting or removing the delegation edge and to enforcing the policy floor that the child accepted at admission.
Outer scope governs inner scope through this floor relationship. The outer scope cannot reach into the inner scope to mutate individual entries, but the outer scope can revoke the delegation edge, which structurally detaches the inner scope and renders its further mutations unrecognized by the broader system. This bounded form of authority preserves local autonomy while preventing inner scopes from drifting outside the territory their parents originally permitted.
Cycle freedom is guaranteed by the depth counter and by the rule that delegation edges flow only from lower depth to higher depth. A container at depth k may emit edges only to children at depth k+1. No edge from depth k+1 back to any depth less than or equal to k is admissible. The acyclicity is therefore a property of the edge-admission rule rather than a runtime check, and cycle detection is not required during routine operation.
Bounded depth is enforced by a policy parameter carried in each delegation edge. When a parent ratifies a child, the parent declares the maximum further depth the child is permitted to extend. The child's own children inherit a depth budget reduced by one. When the budget reaches zero, further nesting is refused at admission time. Depth is therefore bounded for every branch of the hierarchy, but the bound is per-branch and selected by policy rather than fixed across the system.
Operating Parameters
The depth budget is the primary operating parameter. Typical deployments select budgets in the range of eight to thirty-two for general-purpose namespaces, with deeper budgets reserved for specialized hierarchies such as multinational organizational structures or deeply nested capability trees. Budgets above sixty-four are admissible but rarely useful; resolution latency at such depths exceeds operational tolerance for most workloads.
The minimum anchor-group size is a per-scope parameter. Root and near-root scopes typically require larger anchor groups, with representative values in the range of seven to fifteen nodes. Deeper scopes may operate with smaller groups, down to a floor of three nodes for leaf-adjacent scopes. The floor is enforced at admission to prevent a child from declaring a trivially compromised anchor group.
The policy floor is expressed as a partial order over policy clauses. A child accepts the parent's floor and may extend it with additional restrictions but may not relax any clause. Extension is monotonic: a child can require stronger consensus, finer-grained access controls, or stricter naming rules than its parent, but it cannot weaken any of these.
Resolution latency is bounded by depth and by the per-hop verification cost. Each hop performs one anchor-group lookup and one delegation-edge verification. Both operations are constant in the size of the namespace. End-to-end resolution of a path of depth d therefore costs O(d) verification work, parallelizable when intermediate scopes are reachable concurrently.
Mutation latency is bounded by the consensus protocol of the scope being mutated. Because mutations are local to the scope, the latency does not grow with the size or depth of the surrounding hierarchy. A leaf scope with a small anchor group commits mutations in the time required by its own group's consensus, regardless of how many ancestors sit above it.
The delegation edge is a constant-size structure. Its components are the parent identifier, child identifier, depth counter, depth budget, ratified policy subset hash, and anchor-group commitment. The edge is signed by the parent's anchor group at admission and stored alongside the child's container record.
Alternative Embodiments
A first embodiment instantiates the hierarchy as a tree with strict single-parent semantics. Each child has exactly one parent edge, and the global structure is a forest of trees rooted at well-known scope identifiers. This embodiment is appropriate for organizational namespaces where every scope has a single chain of authority.
A second embodiment admits multiple parent edges per child while preserving acyclicity through the depth-counter rule. The structure becomes a directed acyclic graph in which a child may inherit policy floors from several parents, and admission requires that the child accept the union of all parental floors. This embodiment supports federation scenarios where a scope is sponsored by several distinct authorities.
A third embodiment implements the policy floor as an executable predicate rather than a static clause set. Each parent declares a function that the child must satisfy at admission and at periodic re-attestation. Predicate-based floors permit fine-grained governance such as time-of-day restrictions or workload-dependent constraints.
A fourth embodiment uses a verifiable random function over the parent's anchor-group seed to assign initial anchor positions to a child. This embodiment removes the need for the parent to negotiate anchor selection with the child at admission time and supports rapid creation of large numbers of child scopes.
A fifth embodiment composes the nesting with the dynamic-hash-chain identity scheme so that each scope's anchor group is itself authenticated through hash-chain continuity rather than through long-lived keys. This embodiment removes any persistent key material from the governance layer and inherits the post-quantum properties of the underlying chain.
A sixth embodiment supports structural mutations such as splitting a container into two children, merging two siblings into a single child, or grafting a subtree from one parent to another. Each structural mutation is governed at the boundary by joint ratification: the affected parents and children all sign the structural change, and the depth budget is recomputed to maintain the global bound.
A seventh embodiment enables cross-scope references that do not constitute delegation edges. A reference is an entry that names another scope without altering its governance. References permit semantic linking across the hierarchy without compromising acyclicity, because they do not carry policy and do not affect resolution of mutation authority.
Composition
Anchor-governed nesting composes with the resolution subsystem of the adaptive index. Path resolution proceeds hop by hop through delegation edges; at each hop the resolver verifies the edge signature, checks the depth counter, and consults the local anchor group for the next-hop authority. Because each hop is locally verifiable, resolution requires no global state and tolerates partial failure: a query confined to a healthy subtree completes even when sibling subtrees are unreachable.
The mechanism composes with the mutation subsystem by routing each proposed mutation to the anchor group of the containing scope. Cross-scope mutations are decomposed into per-scope steps, each ratified locally. Atomic cross-scope mutations are supported through a two-phase protocol in which the affected scopes prepare independently and a joint ratification step commits or aborts.
The mechanism composes with the auditing subsystem by emitting a hash-linked record of every delegation creation, revocation, and structural mutation. The records are stored within the affected scopes and aggregated upward through periodic commitments to parent scopes. Auditors can therefore trace the full structural history of a subtree without traversing the entire system.
The mechanism composes with external naming systems through a thin shim that exposes a portion of the hierarchy under an external naming convention. The shim does not alter governance; it translates external queries into internal resolutions and returns results consistent with the local policies of the addressed scopes.
Prior-Art Distinction
DNS provides a hierarchical namespace but binds governance to a fixed depth structure with root authority concentrated in a small set of operators. The disclosed system rejects this concentration: every scope governs itself locally, and the root is a coordination point rather than an authority over the contents of distant subtrees. DNS is therefore not anticipatory.
LDAP and X.500 directories nest containers but rely on schema-level constraints enforced by a central directory server. Authority is administrative rather than cryptographic, and child scopes cannot constrain their parents' ability to read or modify them. The disclosed system inverts this relationship: parents cannot reach into children, and authority is enforced by anchor-group ratification rather than by directory privilege.
Filesystems support arbitrary nesting depth but subordinate every scope to a single root authority. Permissions are administrative bits rather than cryptographic ratifications. The disclosed system replaces administrative permission with structural ratification carried in delegation edges, which are independently verifiable.
Blockchain naming systems such as ENS support nested registration but lack per-scope anchor groups and per-scope policy floors. Subdomain governance is delegated by contract code, not by ratified delegation edges with depth budgets. The disclosed system's combination of anchor groups, policy floors, depth budgets, and acyclicity rules is structurally distinct from prior on-chain naming.
Capability systems in operating-system research provide bounded delegation of authority but typically do so over flat namespaces or over fixed-depth hierarchies. The disclosed system extends bounded delegation into a recursive namespace with per-scope governance, combining the locality of capabilities with the structural richness of hierarchical naming.
Disclosure Scope
This disclosure covers recursive nesting of semantic containers in which each container is governed by an independent anchor group, ratification of children proceeds through delegation edges carrying depth counters and policy floors, outer scopes govern inner scopes through bounded delegation rather than through reach-in authority, and the global structure is acyclic by construction with bounded depth enforced by per-edge budget.
The scope includes single-parent and multi-parent embodiments, static and predicate-based policy floors, verifiable-random and negotiated anchor-group selection, integration with dynamic-hash-chain identity, structural mutations including split and merge, and non-governing cross-scope references. The scope further includes the composition of these features with resolution, mutation, audit, and external-naming subsystems.
The scope excludes namespaces in which authority is centrally administered, hierarchies that lack per-scope anchor groups, and structures that permit cycles in the delegation graph. The scope excludes any embodiment in which a parent retains routine reach-in authority over the contents of its child scopes, because such reach-in authority defeats the bounded-delegation property that distinguishes the disclosed system from prior administrative hierarchies.
The disclosure is structural: the protected subject matter is the architectural decision to make every nesting level a fully governed scope, to bind parent and child through ratified delegation edges, and to enforce acyclicity and bounded depth by edge admission rather than by runtime detection. Implementations that adopt these structural choices inherit the property; implementations that retain centrally administered hierarchy do not, regardless of any naming similarities at the surface.