Robotic System Standardization via Structural Field Composition

by Nick Clark | Published March 27, 2026 | PDF

The 2025 revisions of ISO 10218-1 and ISO 10218-2, the consolidation of collaborative-robot guidance under ISO/TS 15066, the modular-robot framework of ISO 22166, and the personal-care service-robot safety standard ISO 13482 each define what a compliant robotic agent must guarantee. None of them defines a structural object that two robots from different vendors can exchange to verify those guarantees mechanically. RIA R15.06 and the newer R15.08 mobile-robot standard, the ROS-Industrial Consortium reference architectures, and OPC UA Robotics companion specifications likewise prescribe behavior and interfaces, but leave identity, capability, governance, and trust to bilateral integration. The canonical agent schema closes that gap by giving every robotic agent — regardless of manufacturer, controller, or operating system — a single typed structure across which standardization, conformance, and interoperability can be evaluated.


Regulatory Framework

The regulatory environment surrounding industrial, collaborative, mobile, and service robotics has matured into a dense lattice of standards published by ISO, IEC, IEEE, and national accreditors such as ANSI through the Robotics Industries Association (now part of the Association for Advancing Automation). ISO 10218-1:2025 governs the design, construction, and information-for-use requirements of industrial robots, while ISO 10218-2:2025 covers the integrated robotic system and cell. ISO/TS 15066 supplements both for collaborative operation, defining biomechanical limits, power-and-force-limited modes, and the speed-and-separation monitoring discipline that underpins safe human-robot coexistence. ISO 22166-1 introduces the modular-robot information model; ISO 13482 governs personal-care robots; and the IEC 61508 functional-safety lineage still flows through every safety-rated controller in the field.

Layered on top of safety standards is an emerging ethics and trust regime. The IEEE 7000-series — IEEE 7000 itself for value-based engineering, IEEE 7001 for transparency, IEEE 7007 for ontologies, and IEEE 7009 for fail-safe design — establishes that a robot's governance is not exhausted by mechanical safety. RIA R15.06 (the U.S. national adoption of ISO 10218) and R15.08, the first mobile-robot standard issued by ANSI/A3, extend the perimeter to autonomous mobile robots and autonomous industrial vehicles. OPC UA Robotics, ROS-Industrial, and the VDA 5050 interface specification address communication, but only after a robot has been onboarded into a particular ecosystem.

The structural problem is that none of these instruments specifies a portable identity for a robot. A compliance certificate is a paper artifact tied to a serial number; a capability description lives inside a vendor URDF or proprietary configuration; a governance policy is encoded in PLC ladder logic, in a safety-rated controller's parameter table, or in the integrator's risk-assessment binder. Regulators can audit each of those artifacts in isolation, but the multi-vendor cell as a system has no canonical object to be audited against.

Architectural Requirement

Standardization at the regulatory level requires standardization at the architectural level. For ISO 10218-2 to be enforceable across a heterogeneous cell, the cell controller must be able to read each robot's identity, governance constraints, declared capabilities, and trust posture in a single typed format. For ISO/TS 15066 to apply uniformly to a mixed fleet of cobots, every participating arm must expose its biomechanical limits, its current operating mode, and its separation-monitoring state through a structure the integrator can compare. For R15.08 to govern a fleet of autonomous mobile robots from competing vendors, the fleet manager must be able to verify each AMR's payload envelope, navigation authority, and zone authorizations as data, not as a PDF.

The architectural requirement is therefore a shared structural primitive: a fixed set of typed fields that every robotic agent populates, regardless of its underlying hardware, controller stack, or middleware. The fields must be expressive enough to carry safety modes, capability envelopes, role declarations, governance policy references, trust relationships, and lineage of changes. They must be narrow enough that conformance is decidable. And they must be transport-neutral, because the same fields must travel across DDS in a ROS 2 cell, across OPC UA in an MES integration, across VDA 5050 in an AMR fleet, and across REST in a digital-twin or audit pipeline.

Canonical agent schema provides exactly this primitive. Six fields — identity, role, capability, governance, trust, and lineage — describe a robotic agent as a verifiable object. Identity binds the agent to a cryptographic root and to the regulatory artifacts that certified it. Role declares whether the agent is operating as a picking arm, a transport AMR, a packing cobot, or a charging station. Capability enumerates payload, reach, sensor modalities, end-effector tooling, and safety-rated functions, each tagged with the standard clause that grounds it. Governance carries policy: speed limits per zone, allowed handoff partners, ROE for autonomous navigation, escalation triggers. Trust records the agent's relationships with peers, supervisors, and human operators. Lineage records every change to the previous five fields, signed and timestamped.

Why Procedural Compliance Fails

Procedural compliance — the dominant model today — treats each robot as a paperwork artifact. The integrator performs a risk assessment under ISO 12100, selects the appropriate ISO 10218 and TS 15066 clauses, validates the cell, signs the documentation, and files it. When a vendor pushes a firmware update, when a new robot joins the cell, or when an AMR fleet is reconfigured, the procedure must be repeated by humans because the compliance evidence does not live in the system; it lives in a binder. There is no mechanical check that the cell as currently configured still satisfies the standard against which it was certified.

This failure mode has three concrete consequences. First, multi-vendor cells calcify: integrators avoid mixing brands not because the robots cannot communicate, but because every change re-triggers a manual conformance exercise. Second, ROS-Industrial and OPC UA Robotics, despite excellent communication semantics, cannot answer governance questions. A ROS 2 node can subscribe to another node's joint states; it cannot ask "are you a TS 15066 power-and-force-limited cobot in collaborative mode right now, signed by your controller's safety MCU?" Third, IEEE 7001 transparency obligations and emerging EU Machinery Regulation (2023/1230) requirements for digital instructions and conformity data assume a structured, machine-readable representation that the existing standards stack does not supply.

Procedural compliance also fails under fleet dynamics. An R15.08 AMR fleet that adds a third-party charger, a new docking station, or an autonomous forklift cannot rely on documentation written before those agents existed. Without a canonical structure, every new participant requires bilateral negotiation with every existing participant — the integration cost grows quadratically with fleet size, exactly the regime in which standardization is supposed to deliver its benefits.

What AQ Primitive Provides

Adaptive Query's agent-schema primitive replaces the binder with a structured object. Each robot — whether a Fanuc arm, a KUKA cobot, a MiR AMR, an Agility Digit, or a custom modular platform built under ISO 22166 — exposes a single canonical agent record. The record is generated by a thin schema adapter that maps the vendor's native state model (URDF, OPC UA address space, ROS 2 parameter server, vendor SDK) into the six typed fields.

The capability field is grounded in standard clauses. A cobot operating under TS 15066 power-and-force-limited mode declares that capability with a reference to clause 5.5.5 and a parameter block carrying the validated force and pressure limits per body region. An AMR declares its R15.08 navigation authority with the zone graph and the speed envelope it was validated against. A modular robot under ISO 22166 declares its module composition and the conformance evidence for each module. The governance field references the operating policy under which the robot is currently running, and the integrity check is structural: the policy hash must match the hash recorded in the lineage at the last validated configuration.

Trust is the field that makes multi-vendor interoperation tractable. Two robots from different manufacturers establish a trust relationship by exchanging signed agent records and validating each other's identity, capability, and governance against the cell's policy. A handoff from a picking arm to a transport AMR becomes a structural evaluation: does the AMR's capability field satisfy the picking arm's governance requirement for a downstream transport agent, and is the AMR's trust posture consistent with the cell's policy? If the answer is yes, the handoff proceeds; if no, the cell controller raises a structured exception that maps directly to the standard clause that was violated.

Lineage delivers the audit trail that IEEE 7001 and the EU Machinery Regulation increasingly require. Every change to identity, role, capability, governance, or trust is appended to the lineage as a signed event. A regulator auditing a cell can replay the lineage and verify that every state the cell passed through was conformant. A vendor pushing a firmware update emits a lineage event that the cell controller evaluates before accepting the update; if the update would invalidate a TS 15066 parameter, the cell rejects it before it loads.

Compliance Mapping

The agent-schema fields map cleanly onto the existing standards stack. ISO 10218-1 design requirements map to capability and governance entries grounded in the relevant clauses; ISO 10218-2 integration requirements map to the cell-level composition of agent records and the policy that governs their interaction. ISO/TS 15066 collaborative-operation parameters live in the capability field as power-and-force-limited descriptors and in the governance field as mode-selection policy. ISO 22166 modular composition is represented as a structured capability tree, with each module's conformance evidence carried in lineage.

ISO 13482 personal-care robot hazards map to capability entries describing the robot's physical envelope and to governance entries describing the operational constraints under which those hazards are mitigated. RIA R15.06 maps onto the same structure as ISO 10218 because it is a national adoption; R15.08 mobile-robot requirements map to capability fields describing navigation envelopes and to governance fields describing zone authorizations. IEEE 7000 value-based engineering is represented in the governance field as the policy reference that encodes the values the robot was designed to honor; IEEE 7001 transparency is satisfied directly by the structured, signed agent record itself.

ROS-Industrial and OPC UA Robotics become transport bindings rather than competing standards: the agent record can be published over either, and the canonical content is unchanged. VDA 5050 fleet messages can be enriched with agent-record references so that fleet-manager decisions are traceable to the underlying governance objects. Functional-safety evidence under IEC 61508 attaches to capability entries that declare safety-rated functions, with the SIL level and validation report carried as lineage.

Adoption Pathway

Adoption proceeds in three pragmatic phases. In the first phase, an integrator wraps each existing robot in the cell with a schema adapter that emits a read-only canonical agent record. The records are aggregated by the cell controller and exposed to the integrator's compliance dashboard. No control behavior changes; the immediate benefit is that conformance is now visible as data, and audits become near-instantaneous instead of week-long binder reviews.

In the second phase, the cell controller begins enforcing governance through the schema. Handoffs, mode changes, and zone transitions are evaluated against the agent records before being authorized. Vendor firmware updates emit lineage events that are validated against the active policy. The integrator's risk assessment is encoded as policy and re-evaluated automatically on every configuration change. At this stage the integrator's marginal cost of adding a fourth or fifth vendor falls dramatically, because the canonical schema absorbs what was previously bilateral integration.

In the third phase, robot manufacturers ship native schema support. A robot that emits a canonical agent record from its safety controller, signed by the controller's own key, removes the adapter layer and reduces attack surface. Standards bodies — ISO TC 299, IEC TC 65, IEEE Robotics and Automation Society, and ANSI/A3 — can reference the schema as the structural binding for their clauses, allowing future revisions to specify required capability and governance entries directly. At that point, robotic standardization is no longer a paperwork exercise overlaid on incompatible systems; it is a property of the systems themselves, verifiable in the field, in real time, by any participant in the cell.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01