Biological-Device-Agent Identity Layering
by Nick Clark | Published March 27, 2026
A single biological subject does not present a single identity to a governed system. The same human appears, across the course of a day, as a licensed professional, a private citizen, a parent, a corporate officer, a clinical patient, and an authenticated end-user of a dozen separate services. The disclosed identity layering mechanism stacks these distinct identities as discrete layers over one continuous biological thread, with each layer carrying its own scope of authority, its own evidentiary basis, and its own lifecycle. At resolution time, a deterministic selector chooses the layer whose scope and evidence match the policy demand of the requesting interaction, rather than collapsing all identity facets into a single conflated record.
Mechanism
The identity layering mechanism organizes a subject's identity material as an ordered stack of typed layers anchored to a single persistent biological thread. The biological thread is the substrate continuity proof: a longitudinal record of behavioral, biometric, and contextual continuity signals that establishes that a single biological subject persists across all enrollment events. The thread itself does not assert what the subject is authorized to do. It asserts only that the entity presenting at time T is the same entity that enrolled at time T-n.
Layered atop the biological thread are identity layers. Each layer is a typed structure composed of a scope descriptor, an evidence package, an issuer attestation, a validity window, and a binding back to the underlying biological thread. The scope descriptor declares the domain over which the layer is authoritative — for example, a legal-identity layer asserts authority over civil and contractual matters but is silent on professional licensure. The evidence package contains the cryptographic and procedural artifacts that justify the layer's existence: government-issued credential digests, regulator attestations, employer-asserted role bindings, contextual session evidence, or biometric proximity proofs. The issuer attestation identifies the party that produced the layer and the procedure by which it was produced, enabling downstream verifiers to evaluate trust independent of the layer's content.
Layers are added to the stack through a typed enrollment operation that requires the issuer to demonstrate authority over the asserted scope and to bind the new layer to the existing biological thread through a continuity proof. Layers are not free to assert arbitrary scope; the policy reference defines a lattice of admissible scopes and the issuers competent for each. Layers are removed through a typed retirement operation that records the reason for retirement and preserves the historical record for audit. At no point may a layer be silently mutated; modifications produce a new layer version with its own evidence package, and the prior version is retained as part of the lineage.
Resolution proceeds through a deterministic selector invoked by the relying party. The relying party submits a policy demand — a structured statement of what scope of authority is required for the pending interaction, what evidentiary strength is required, and what freshness window is acceptable. The selector enumerates the layers presently active on the subject's stack, filters by scope compatibility, filters again by evidentiary sufficiency, and returns the minimal layer that satisfies the demand. If no layer satisfies the demand, resolution fails closed: the system returns a structured insufficiency record naming what was missing rather than approximating with the closest available layer.
Cross-layer interactions are explicit. When a single interaction requires authority drawn from multiple scopes — for example, a clinician prescribing a controlled substance from an employer-issued workstation — the selector returns a layer composition rather than a single layer. The composition records which layers contributed which scope elements, and the relying party verifies each contributing layer independently. No layer inherits authority from another layer by adjacency on the stack; each layer's authority is bounded by its own scope descriptor regardless of what other layers happen to be present.
Operating Parameters
The mechanism operates within a defined parameter envelope set by the governing policy reference. Scope-lattice depth determines how finely scope can be partitioned: a shallow lattice exposes a small number of broad scopes (legal, professional, contextual), while a deep lattice exposes nested sub-scopes (legal/civil/contractual, legal/civil/tort, legal/criminal/witness). Evidence-strength thresholds determine the minimum cryptographic and procedural quality required for a layer to be admitted at a given scope. Freshness windows determine how long an evidence package remains acceptable before a re-attestation is required; high-stakes scopes carry short windows, low-stakes scopes carry long ones.
Stack depth is bounded but not fixed. A typical subject carries between three and twelve active layers; the architecture imposes no hard ceiling, but resolution latency grows with stack depth and policy-defined ceilings prevent pathological accumulation. Retired layers are not deleted; they migrate to a historical tier that supports audit queries but is excluded from live resolution. The biological thread itself is parameterized by continuity-confidence thresholds: a thread whose continuity confidence drops below a policy-defined floor triggers a re-anchoring procedure rather than silent acceptance.
Selector behavior is parameterized by a minimality bias and a release granularity. The minimality bias governs how aggressively the selector prefers narrowly scoped layers over broadly scoped ones when both would satisfy the policy demand; tighter bias improves least-privilege adherence at the cost of additional resolution events when interactions span scopes. Release granularity governs how much of the selected layer is disclosed to the relying party: full-layer release returns the complete evidence package, while attribute-bounded release returns only the specific scope elements named in the demand. Granularity is itself negotiated at resolution time and recorded in the resolution event, allowing auditors to verify that no layer was over-released relative to the demand.
Issuer-trust parameters declare, per scope, the set of issuers competent to enroll layers and the procedural requirements those issuers must satisfy. The trust set is versioned: when an issuer's competence is revoked, layers issued by that issuer remain in the historical tier with a revocation marker, and live resolution excludes them. The mechanism does not retroactively invalidate downstream actions taken in reliance on revoked layers; instead, it preserves the original resolution event so that the chain of reliance remains auditable even after the issuer's revocation.
Alternative Embodiments
In a centralized embodiment, the layer stack is materialized within a single identity provider that mediates all enrollment, retirement, and resolution operations. The identity provider holds the biological-thread continuity record and the layer stack as a single governed datastore, and relying parties query the provider over an attested channel.
In a federated embodiment, the layer stack is distributed across multiple issuers, each holding the layers it has issued, with the biological thread anchored to a continuity authority. Resolution requires the selector to traverse multiple issuers, gathering attested layer descriptors and assembling the stack at evaluation time. This embodiment supports jurisdictions in which no single party is permitted to hold the full identity record.
In a subject-custodial embodiment, the layer stack is held by the subject in a personal credential wallet, with each layer represented as a verifiable credential carrying issuer signatures. The selector runs locally within the wallet, releases only the minimal layer composition required to satisfy the policy demand, and produces a presentation receipt that the relying party verifies without needing direct contact with the issuers.
In a hybrid embodiment, foundational layers (legal identity, biological-thread anchor) are held by accredited issuers under regulatory custody, while contextual and ephemeral layers (session credentials, transient role assignments) are held by the subject or by relying parties. Selector logic spans both custodial domains, with cross-domain freshness reconciliation governed by the policy reference.
Composition
Identity layering composes with adjacent mechanisms in the cognition disclosure. The biological-thread continuity record consumes signals produced by the substrate-continuity mechanism, which establishes that a presenting subject is the same biological entity that previously enrolled. Layer evidence packages consume attestations produced by the device-identity and agent-identity mechanisms, allowing a layer to assert not merely that a human is present but that the human is operating from an attested device running an attested agent.
The selector's output composes with the policy-demand mechanism on the relying-party side: the relying party's demand is itself a structured artifact derived from its governing policy, and the match between demand and layer is recorded as an auditable resolution event. Resolution events feed the lineage mechanism, producing a permanent record of which identity layer was selected for which interaction under which policy demand.
The mechanism also composes with the forecasting and confidence-propagation infrastructure described elsewhere in the disclosure. A relying party deciding whether to accept a layer at a given evidentiary strength may consume forecast records about the issuer's reliability, the freshness of upstream attestations, or the likelihood that an evidence package has been silently revoked. Those forecasts pass through the engine's confidence bounds in the ordinary course, and the resolution event records the joint confidence under which the layer was accepted, allowing later reviewers to distinguish a high-confidence resolution from one made on thin evidence under operational pressure.
Distinction from Prior Art
Conventional identity systems treat identity as a single record. Federated identity protocols permit a subject to authenticate to multiple relying parties using a single provider, but the identity asserted is monolithic: the relying party receives the same identity assertion regardless of the scope of the interaction. Role-based and attribute-based access-control systems attach roles or attributes to a single identity record, but the roles and attributes are not themselves typed identity layers with their own evidence and lifecycle; they are properties of the underlying account, and compromise of the account compromises all attached roles.
Verifiable-credential frameworks introduce the notion of independently issued credentials but do not impose a deterministic layer-resolution mechanism keyed to policy demand, do not anchor the credential set to a continuous biological thread, and do not enforce scope-bounded authority across the credential set. Pseudonymous and self-sovereign identity systems support multiple personas but treat persona separation as a privacy feature rather than as a typed authority-scoping mechanism, and they generally lack the structural prohibition against scope inheritance across personas.
The disclosed mechanism differs in three structural respects: a single biological thread anchors a stack of typed scope-bounded layers; resolution is deterministic and policy-demand-driven rather than relying on application-level interpretation of attached attributes; and authority does not propagate across layers by adjacency, eliminating the conflation pathway by which compromise of one identity facet contaminates others.
Disclosure Scope
This article describes the identity-layering mechanism as disclosed in the cognition patent. The mechanism is claimed across centralized, federated, subject-custodial, and hybrid embodiments, and across the full range of scope lattices, evidence-strength thresholds, and freshness-window configurations admitted by the policy reference. Implementations that stack typed scope-bounded identity layers over a single biological-thread continuity proof and resolve them through a deterministic policy-demand-driven selector fall within the disclosed scope regardless of the specific cryptographic primitives, transport protocols, or storage architectures employed.