Mutation Router With Contextual Signals: Policy-Aware Propagation Path Selection

by Nick Clark | Published March 27, 2026 | PDF

Mutations are not all alike. An insert that adds a new entry to a working scope places different demands on the system than an update that mutates an existing entry under an active claim, which in turn differs from a delete that retires an entry, and again from a claim mutation that changes the authority structure governing the entry itself. Treating these mutation classes as a uniform stream — pushing every change through a single propagation pipeline regardless of class — collapses the governance distinctions that make the adaptive index trustworthy across organizational boundaries. Mutation routing by class is the architectural property that preserves these distinctions: each mutation, at the moment it is committed, is classified into one of a defined set of classes (insert, update, delete, claim, and the structural classes split, merge, alias-rebind, and governance-transition), and is routed to a class-appropriate handler whose admission gates, propagation policy, audit obligations, and trust-path requirements differ from those of other classes. The routing decision is cryptographic: each routing edge is signed by the routing authority and verifiable by any downstream participant, so that no mutation can be silently re-routed across a class boundary. The mechanism described below specifies the classification step, the per-class handler chains, the cryptographic-routing protocol, and the per-class governance hooks that make class-specific policy enforceable.


Mechanism

The mutation router accepts a committed mutation together with the lineage commitment that admitted it and emits a routing decision: a class assignment, a destination set, a propagation-path schedule for each destination, and a signed routing record that binds the assignment to the originating commitment. The router operates as a stage downstream of the lineage-preserving admission gate and upstream of the per-class handler chains; it does not re-evaluate admission, only classifies and dispatches.

Classification proceeds by examining the mutation's structural form, the affected scope's role, and the originating governance authority. A mutation whose delta introduces a new key-value or new entry into a scope is classified as insert. A mutation whose delta replaces or amends the value or attributes of an existing entry is classified as update. A mutation whose delta removes an entry is classified as delete. A mutation whose delta alters the authority structure governing an entry — the anchor set responsible for further mutations, the policy under which mutations are admitted, the credentials required for further proposals — is classified as claim. Structural mutations affecting scope boundaries (split, merge), aliasing (rebind), and governance transitions are classified into their respective structural classes. Classification is deterministic given the mutation form and the surrounding context, and the same input produces the same classification on every router instance.

The class assignment drives handler selection. Each class has an associated handler chain consisting of the validation handler, the propagation handler, the acknowledgment handler, and the audit handler. The validation handler enforces class-specific structural invariants: the insert validator confirms that no entry with the same key already exists in the scope; the update validator confirms that an entry with the targeted key exists and that its current state matches the update's prior-state assertion; the delete validator confirms that the entry exists and is not under a non-revocable claim; the claim validator confirms that the proposing authority has the standing required to alter the governance structure of the affected entry. Validation failures are recorded as rejection commitments in the lineage and do not propagate.

The propagation handler is the class-specific implementation of the routing policy. For insert mutations, the propagation handler typically fans out to all replicas and child scopes, since the new entry must be visible to all consumers. For update mutations, propagation is scoped to replicas that hold the affected entry; child scopes that inherit the entry receive the update only if their inheritance policy admits it. For delete mutations, propagation includes a tombstone marker so that replicas that may have cached the deleted entry can invalidate their caches. For claim mutations, propagation is restricted to participants whose governance policy admits the new claim; participants that reject the claim receive a class-tagged notice but do not apply the mutation.

The cryptographic routing protocol binds the routing decision to the originating commitment. The router produces a routing record containing the originating commitment hash, the assigned class, the destination set, the per-destination propagation-path schedule, the routing-policy reference, and the router's signature. The routing record is itself content-addressed, and its hash is included in the propagation message to each destination. Each destination, upon receipt, verifies the routing record's signature against the routing-authority directory and verifies that the originating commitment hash is present in the lineage chain it maintains for the source scope. A destination that detects a routing-record signature mismatch, an unauthorized routing authority, or a missing originating commitment refuses the mutation and emits a rejection notice.

Per-class governance hooks are the architectural mechanism by which policy is enforced differentially across classes. Each class exposes pre-validation, post-validation, pre-propagation, and post-propagation hook points; the scope's governance policy may install class-specific hook handlers that examine the mutation, consult external authorities, or impose additional admission criteria. A scope may, for example, install a post-validation hook on the delete class that requires a counter-signature from a regulatory authority before the delete may propagate, while imposing no such hook on the insert class. The hook discipline preserves class as a first-class governance dimension.

The acknowledgment handler is class-specific. Insert and update mutations typically require positive acknowledgment from a configurable quorum of destinations before the originating scope considers the mutation propagated. Delete mutations require acknowledgment that includes evidence of cache invalidation. Claim mutations require acknowledgment that includes evidence of governance-directory update at the destination. The acknowledgment record is itself a signed message that the originating scope commits to a propagation-tracking subsystem; failed or partial acknowledgments trigger class-specific recovery procedures (retry, escalation, or governance-mediated reconciliation).

Operating Parameters

The class set is configurable. The canonical class set comprises insert, update, delete, claim, split, merge, alias-rebind, and governance-transition, but a deployment may add domain-specific classes (for example, a regulatory-disclosure class whose handler chain includes integration with an external regulatory-reporting interface) or may collapse classes that are not operationally distinguished in the deployment.

The class-to-handler mapping is a per-scope governance parameter. A deployment may install scope-specific handlers that override the default chain; for example, a high-sensitivity scope may install a delete handler that enforces a multi-day cooling-off period before propagation, while a routine scope uses the default immediate-propagation handler.

The acknowledgment quorum is a per-class parameter. Insert and update may require majority acknowledgment in routine deployments; sensitive scopes may require unanimous acknowledgment for delete and claim. The quorum interacts with the propagation handler's retry policy: a destination that fails to acknowledge within the configured window may be re-attempted, escalated to a backup propagation path, or excluded from the destination set with a governance-mediated reconciliation event.

The routing-authority directory is a deployment parameter. A deployment may operate a single routing authority (the originating scope's anchor set), a federated authority (multiple anchor sets jointly empowered to sign routing records), or a hierarchical authority in which routing decisions for cross-scope mutations are signed by a parent-scope anchor set. The directory's structure determines the verification path that destinations follow when checking routing-record signatures.

The propagation-path scoring function is a parameter. The function combines trust, proximity, availability, and class-specific weighting to score candidate paths. A deployment may configure class-specific weight vectors so that, for example, claim mutations weight trust most heavily while insert mutations weight availability most heavily. The function is itself subject to governance: changes to the scoring function are themselves admitted as governance-transition mutations and committed to the lineage.

The hook-installation policy is a per-class parameter. A scope's governance may permit any participant to install hooks (open hook policy), may restrict hook installation to anchor-set members (anchor-only hook policy), or may forbid hooks entirely (closed hook policy). The hook policy is itself a governance parameter and is auditable through the lineage.

The routing-record retention horizon is a parameter. Routing records may be retained alongside the lineage indefinitely, retained for a regulatory tail with periodic checkpointing, or retained only for the duration of acknowledgment. The retention choice trades audit completeness against storage cost.

The class-classification fallback is a parameter governing handling of mutations whose class cannot be determined by the deterministic classifier. A deployment may configure rejection (mutations that cannot be classified are rejected at the routing stage), default-to-update (treat as update with conservative validation), or escalation (route to a governance-mediated classification authority).

Alternative Embodiments

A first alternative embodiment substitutes a learned classifier for the deterministic structural classifier. The learned classifier examines mutation form together with semantic features extracted from the mutation contents and emits a class candidate together with a confidence score. The embodiment falls back to the deterministic classifier when confidence is below a configurable threshold, and the learned classifier is itself subject to governance — its weights are committed to the lineage as a governance-transition record when updated.

A second alternative embodiment expands the class set to a class lattice in which mutations may belong to multiple classes simultaneously (an update-and-claim, for example, that both alters a value and re-credentialed its governance authority). The lattice embodiment runs the union of the applicable handler chains in parallel, with conflict-resolution rules that resolve contradictions between class-specific policies in favor of the most restrictive.

A third alternative embodiment integrates the routing decision with the mutation-admission stage so that classification occurs prior to admission and the admission gate consults the class-specific policy before admitting the mutation. The integrated embodiment forecloses the possibility of admitted-but-unrouteable mutations at the price of admission-time complexity.

A fourth alternative embodiment substitutes a fully decentralized routing protocol in which each destination independently classifies received mutations and selects propagation paths to its own downstream destinations. The decentralized embodiment removes the single-point-of-classification but at the price of consistency: destinations may classify identically only when they share classification policy, and policy synchronization becomes a governance concern.

A fifth alternative embodiment supports class-specific batching: mutations of the same class within a configurable window are batched into a single routing decision and propagated as a batch. The batching embodiment reduces routing-record overhead at the price of latency for individual mutations.

A sixth alternative embodiment integrates the routing protocol with an external policy-decision-point service so that class-specific policy evaluation is delegated to a dedicated authority. The external embodiment is appropriate for deployments in which class-specific policy is centrally administered (as in regulated industries with prescribed mutation-handling regimes).

A seventh alternative embodiment supports speculative propagation: low-class-risk mutations (typically routine inserts) are propagated speculatively prior to full acknowledgment quorum, with rollback if quorum fails. The speculative embodiment reduces effective propagation latency for routine traffic at the price of occasional rollback events that themselves are committed to the lineage.

An eighth alternative embodiment supports per-class encryption of mutation contents so that destinations that do not have decryption authority for a particular class receive only the routing record and the class tag, while destinations with decryption authority receive the full mutation. The embodiment is appropriate for multi-classification deployments in which class corresponds to a security-classification hierarchy.

Composition with Surrounding Architecture

The mutation router composes with the lineage-preserving mutation subsystem, the operator-intent tier subsystem, the resolver-witness subsystem, and the governance anchor mesh. Composition with the lineage subsystem occurs at admission and at routing: each admitted mutation produces a lineage commitment, and each routing decision produces a routing record that references the commitment. The routing record may itself be committed to the lineage (in retention configurations that retain routing records indefinitely) or may be recorded in a separate routing log linked to the lineage by hash reference.

Composition with the operator-intent tier subsystem occurs through the per-class governance hooks. A claim-class mutation, for example, may install a pre-validation hook that requires an authorizing-tier or commanding-tier operator-intent token within whose envelope the claim falls; the hook examines the proposing authority's standing tokens and rejects the claim if no admissible token is present. The composition links operator authority directly to mutation routing, ensuring that mutations of high-authority classes can occur only under correspondingly high-authority operator intent.

Composition with resolvers occurs through routing-record-aware witness consumption. A resolver consulting a scope receives, alongside the lineage-head witness, the most recent routing-record summary for the scope. The summary allows the resolver to verify that recent mutations have been routed under the appropriate class and through propagation paths consistent with the scope's governance policy. The composition closes a verification loop that would otherwise require resolvers to perform separate routing-record audits.

Composition with the governance anchor mesh occurs in two ways. First, the routing-authority directory is itself maintained by the anchor mesh; the router consults the directory to resolve routing-authority signatures and to propagate routing-authority updates as governance-transition mutations. Second, the per-class governance hooks are configured by anchor-mesh policy publication; changes to class-handler mappings are themselves admitted as governance-transition mutations that propagate through the same routing protocol they configure (with the standing routing policy applied to the configuration mutation itself, avoiding bootstrap paradoxes through a designated bootstrap policy).

Prior-Art Posture

Prior-art mutation propagation systems fall into several families. Database replication topologies (master-slave, multi-master, peer-to-peer gossip) propagate mutations through fixed paths without class-specific routing; all mutations follow the same path regardless of structural form or governance sensitivity. Message-bus systems (pub/sub, message queues with class-tagged topics) support class-tagged routing but do not couple class to validation or governance hooks: class is a routing tag without policy weight.

Workflow-engine systems support class-specific handler chains through workflow-state machines, but they do not typically couple the workflow to a cryptographic lineage chain that supports tamper-evident verification of routing decisions; the workflow record is administrative rather than cryptographic. Service-mesh systems support per-class policy evaluation at routing time but operate at the service-call layer rather than at the data-mutation layer; mutations to underlying data stores are not class-routed.

Cryptographic-routing systems (onion routing, mix networks) provide signed routing decisions but address the privacy of the routing path rather than its policy compliance; they do not couple routing to a class-specific governance regime. Distributed-ledger systems route transactions through consensus protocols that treat all transactions uniformly, with class distinctions encoded only at the application layer above the consensus.

The disclosed mechanism is distinguished from this prior-art landscape by the combination of (i) per-class handler chains with class-specific validation, propagation, acknowledgment, and audit handlers, (ii) cryptographic routing records that bind class assignment to the originating lineage commitment and that destinations verify before applying mutations, (iii) per-class governance hooks that make class a first-class policy dimension, (iv) integration with operator-intent tier governance such that high-authority classes require correspondingly high-authority operator-intent envelopes, and (v) class-specific propagation-path scoring that enables differential routing of sensitive and routine mutations through separately scored paths. No prior-art mechanism known to the inventor combines these features.

Disclosure Scope

This disclosure describes the mutation-routing-by-class mechanism, its deterministic classification stage, its per-class handler chains, its cryptographic routing protocol, its per-class governance hooks, and its operating parameters governing class set, handler mapping, acknowledgment quorum, routing-authority structure, propagation-path scoring, hook policy, retention, and classification fallback. Alternative embodiments span learned classification, lattice classes, integrated admission, decentralized routing, class batching, external policy decision points, speculative propagation, and per-class encryption. The disclosure supports claims directed to (a) the deterministic class assignment with class-specific handler dispatch, (b) the cryptographic routing record that binds classification to the originating lineage commitment, (c) the per-class governance hook discipline, (d) the composition with operator-intent tier governance for high-authority classes, (e) the class-specific propagation-path scoring, and (f) the alternative embodiments enumerated above as variants falling within the claim scope. The mechanism is general across class-set choices and routing-authority structures; the disclosure is not limited to any particular class enumeration.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01