Human-Agent Primitive Integration for Biological Identity

by Nick Clark | Published March 27, 2026 | PDF

The biological identity thread disclosed herein is integrated with the cognitive state of the operator-bound agent such that affective state, motivation vector, and capability tier all bind to a single continuous biological identity rather than to a session token, account credential, or device handle. The integration is structural: the cognitive bindings are defined as functions of the identity thread, and any break in the identity thread invalidates the downstream cognitive bindings that depended upon it. This coupling produces an agent whose internal state is anchored to the biological continuity of its human operator, such that cognitive operations cannot proceed under a disrupted, spoofed, or replaced identity. The present disclosure describes the identity-to-cognition coupling primitives, the invalidation propagation rules that govern identity-break events, and the governance envelope under which the coupling operates.


Mechanism

The biological identity thread is a continuously updated structural object representing the binding between an operator's biological signal stream and an identity handle. The thread is parameterized by signal sources admitted under operator consent, by a continuity score updated as new signal samples are correlated with the prior thread state, and by a set of cognitive bindings that name the downstream domain fields whose validity depends on the thread's continuity. The cognitive domain fields under the present disclosure include at least an affective-state field representing the agent's modeled emotional posture toward the operator's situation, a motivation field representing the prioritized goals the agent is currently pursuing on the operator's behalf, and a capability-tier field representing the operational privileges the agent is permitted to exercise at the present moment.

Each cognitive binding is expressed as a governed coupling function that takes the current identity thread state as one of its inputs. When the thread continuity score remains above a configured admission threshold, the coupling functions evaluate normally and the cognitive fields update according to their internal dynamics together with the identity input. When the continuity score drops below the threshold, the coupling functions enter an invalidation state in which the cognitive fields they govern are marked as not-currently-bound, and downstream consumers of those fields receive an explicit invalidation signal rather than stale values.

An identity break is the event in which the continuity score crosses below the threshold, whether due to signal loss, signal corruption, detection of substitution, or operator-initiated disengagement. Identity breaks propagate transitively: any cognitive field bound to the identity thread is invalidated, any downstream field whose coupling function consumes an invalidated field is itself invalidated, and any agent action whose precondition depended upon a now-invalidated field is suspended pending re-establishment of the thread. The propagation is enforced by the governance layer, not left to the discretion of individual cognitive modules.

Operating Parameters

The integration is parameterized by the admission threshold for the continuity score, the update cadence at which the score is recomputed, the set of signal sources admitted into the thread, the coupling-function selection for each cognitive field, and the privacy envelope governing what derived state is permitted to leave the operator-bound boundary. The admission threshold is itself bounded below by a governance floor that prevents an operator from configuring an arbitrarily permissive thread, and bounded above by an operator-configurable ceiling that determines the strictness of cognitive binding.

The update cadence is selected to balance responsiveness against signal noise. A high cadence permits rapid invalidation upon identity break but may produce false invalidations under transient signal loss; a low cadence smooths over transients but delays response to genuine breaks. The disclosure contemplates adaptive cadence in which the substrate increases sampling rate when the continuity score is observed to be drifting and decreases it when the score is stable above the threshold.

The privacy envelope is enforced at the boundary between the identity thread and the cognitive fields. Raw biological signals do not cross the envelope; only the continuity score, the binding-state indicators, and any explicitly-permitted derived features cross. Cognitive fields therefore operate on identity strength, not on identity content, and downstream agent behavior cannot leak biological data through inference on cognitive output.

Re-establishment parameters govern how the substrate behaves following an identity break. The disclosure contemplates a re-establishment grace window during which the bindings remain in invalidation-pending state rather than fully invalidated, permitting recovery from transient signal loss without forcing a full rebind. The grace window is bounded by a governance ceiling and may be configured shorter by the operator. After the grace window expires without continuity recovery, the bindings transition to fully invalidated state and any cached cognitive context derived from the prior thread is discarded according to the configured discard policy. The discard policy specifies whether cached affective state, motivation vectors, and capability assertions are retained, archived, or purged on full invalidation, with operator consent required for retention beyond a session boundary.

Alternative Embodiments

In one embodiment, the cognitive bindings are statically declared at agent instantiation and remain fixed for the lifetime of the agent-operator pairing. In an alternative embodiment, the bindings are dynamically negotiated at session start, permitting an operator to enable or disable specific cognitive couplings for specific sessions while retaining a stable underlying identity thread. A further embodiment permits per-task binding negotiation in which a long-running session maintains a shared identity thread but binds different cognitive subsets for different sub-tasks.

In a further embodiment, the integration supports multi-operator cognitive fields in which the agent serves more than one operator simultaneously and each cognitive field is bound to a vector of identity threads rather than to a single thread. Identity-break propagation in this embodiment is per-operator: a break in one operator's thread invalidates only the cognitive bindings tagged to that operator, while bindings tagged to other operators continue to operate normally. The governance layer arbitrates conflicts among per-operator cognitive states by reference to a configured priority order.

In yet another embodiment, the substrate supports identity thread suspension and resumption rather than only break-and-restart. Suspension is an explicit operator-initiated state in which the cognitive bindings are placed in a frozen state that preserves their last valid values without updating them, and resumption restores the thread to active state with bindings updating again from the resumed score. This embodiment is contemplated for use cases in which an operator must temporarily disengage without forcing a full re-establishment of cognitive context on return.

Composition

The identity-to-cognition integration composes with the broader agent architecture along three axes. First, it composes with the governance state machine that records every binding event, every invalidation event, and every coupling-function evaluation as an auditable governance record. Second, it composes with the capability-tier system: the capability tier is itself an identity-bound field, so the agent's permitted operations are gated by identity continuity, and an identity break produces a capability degradation that the rest of the agent observes through the same mechanism it uses to observe any capability change. Third, it composes with the consent and revocation infrastructure: an operator's revocation of consent for any signal source propagates through the thread as a continuity-affecting event, and downstream cognitive fields respond as they would to any other thread perturbation.

The composition is uniform across cognitive field types. Affective state, motivation, and capability tier all consume the identity thread through the same coupling-function abstraction; additional cognitive fields introduced under the architecture inherit the same invalidation propagation behavior provided their coupling functions are declared against the thread.

Composition with delegation is also supported. Where the architecture permits an operator to delegate a subset of agent capabilities to a sub-agent or to another operator, the delegation is itself bound to the originating identity thread and inherits invalidation. A delegated sub-agent operating under the originating operator's authority observes invalidation events on that authority's thread and suspends or downgrades its own actions accordingly. Delegation chains of arbitrary depth are contemplated, with invalidation propagating along the chain at the rate of the governance state machine.

Prior-Art Distinction

Conventional agent architectures bind operator-specific state to session tokens or account credentials, neither of which carries a continuity guarantee tied to the operator's biological presence. Conventional biometric authentication systems verify identity at session start but do not maintain a continuous thread that gates downstream cognitive operations after the initial verification. Conventional affective-computing systems consume biological signals as direct inputs to behavior models without an intervening identity layer that bounds the consumption and without a propagation mechanism that invalidates dependent state on identity break.

The disclosed mechanism distinguishes over these by unifying biological identity, cognitive coupling, and invalidation propagation in a single structural primitive, by enforcing the propagation through the governance layer rather than through ad hoc handlers in each cognitive module, and by separating identity strength from identity content at a privacy envelope so that cognitive operations do not require, and cannot leak, raw biological signal data.

Implementation Considerations

Practical implementation places the identity thread on a process or hardware boundary distinct from the cognitive field implementations, with the privacy envelope realized as a typed interface that admits only the continuity score, binding-state indicators, and pre-declared derived features. Coupling functions are loaded as governed modules with explicit declared inputs and explicit declared outputs, such that an attempt to consume an undeclared input or emit an undeclared output is rejected at module load. Governance attestation of coupling-function modules is performed at deployment time, with attestation records retained for the operational lifetime of the agent.

Continuity-score computation is implemented as a streaming estimator that incorporates new signal samples in bounded time, with explicit treatment of missing samples, out-of-order samples, and samples whose source credentials have expired. The estimator emits not only the continuity score but also a confidence interval on the score, and the admission threshold may be evaluated against either the point estimate or a lower confidence bound according to operator configuration. Use of the lower confidence bound provides defense against gradual drift attacks in which an adversary attempts to shift the score below threshold through accumulated small perturbations; the lower bound widens under perturbed signal and triggers invalidation earlier than the point estimate would.

Logging and audit treatment of identity events is bounded by the privacy envelope. Audit records contain identity handles, binding-state transitions, and timestamps, but do not contain the raw signal samples that drove the transitions. Where regulatory or contractual obligation requires deeper audit, a separate audit channel under a distinct authority may be established, with samples crossing into the audit channel only under explicit operator consent and only for the period and purpose of the obligation.

Disclosure Scope

This disclosure encompasses any agent architecture in which one or more cognitive domain fields are structurally bound to a continuously updated biological identity thread, in which an identity break invalidates the bound cognitive fields and propagates invalidation to dependent fields and suspended actions, and in which the binding is mediated by governance-resolved coupling functions operating across a privacy envelope that admits identity strength but not identity content. The enumerated cognitive fields—affective state, motivation, and capability tier—are illustrative; architectures binding additional or alternative fields fall within scope provided the invalidation propagation and privacy envelope mechanisms are present. The disclosure further encompasses dynamic binding negotiation, multi-operator binding vectors, and suspension-and-resumption semantics as enumerated in the alternative embodiments.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01