Biological Capability Extension
by Nick Clark | Published March 27, 2026
The agent's capability envelope is extended through a biological-identity binding that links the envelope to a verified human or biological substrate; while the binding holds, additional capability tiers are unlocked, and any lapse in the binding causes the envelope to contract automatically to its baseline tier, with the contraction recorded as a structural lineage event.
Mechanism
The capability envelope, as defined in the cognition patent's capability-awareness chapter, is the structural representation of the operations an agent is currently permitted and physically able to perform. It is not a static attribute but a dynamic record assembled from the agent's substrate properties, its policy reference, and any active bindings that augment or restrict the baseline. Biological-identity binding is one such binding, in which the envelope is conditionally extended for the duration that a verified link to a biological identity is maintained.
A biological-identity binding is established through an attestation procedure declared in the agent's policy reference. The attestation produces a binding certificate that names the biological identity, declares the attestation method, encodes the attestation strength as a tier index, and includes a freshness window beyond which the certificate must be re-attested. Attestation methods may include physiological signal channels such as heart-rate variability captured by a paired wearable, behavioral signature continuity measured against an enrolled baseline, multi-factor presence proofs combining device possession with biometric capture, or chain-of-custody attestations issued by an external identity authority.
When the binding is active, the gating runtime composes the baseline capability envelope with a tier-specific extension declared in the policy reference for the binding's tier index. The extension is additive in capability terms: it adds permitted operations, raises rate or fan-out limits on existing operations, enables higher-confidence trust-weight mappings, or unlocks skills whose manifests declare biological-binding as a precondition. The extension is never silent; each unlocked capability is recorded in lineage with a reference to the binding certificate that authorized the unlock.
The binding's freshness is monitored continuously by a watcher subroutine within the gating runtime. The watcher consumes the attestation channel's signal, compares it against the certificate's continuity invariants, and updates a binding-state register. Signals supporting continuity refresh the certificate's freshness window; signals contradicting continuity trigger an immediate revocation. Absence of signal beyond the freshness window also triggers revocation, distinguishing affirmative loss-of-presence from inferred lapse.
Upon revocation, the gating runtime contracts the capability envelope to its baseline tier in a single structural transition. The contraction is atomic from the perspective of skill admissibility: any in-flight invocation that depended on the extended envelope is interrupted at the next gating checkpoint, returns a binding-lapse rejection, and is recorded with the contributing certificate revocation event. Any skills whose admissibility required the extension are removed from the active skill set; subsequent re-admission requires a fresh attestation and the issuance of a new binding certificate.
The contraction event is itself a first-class lineage record, not a side effect. It captures the moment of revocation, the contributing signal or absence-of-signal that caused it, the prior envelope state, the contracted envelope state, and the set of invocations and admissibility decisions that were affected. This record is what makes the binding mechanism auditable: any later reviewer can reconstruct the precise interval during which an extended capability was active and the precise condition under which it ceased.
Operating Parameters
The binding regime is parameterized by a tier table declared in the policy reference, mapping each tier index to its capability extension, the minimum attestation strength required, the freshness window, and the continuity invariants. A deployment selects an active tier ceiling, beyond which no binding may extend regardless of attestation strength. The tier ceiling is a deployment-level safety control that prevents a strong attestation in a permissive policy from authorizing capabilities the deployment intends to forbid.
The freshness window is parameterized per tier and may be expressed in elapsed time, in number of intervening invocations, or as a function of the recent variance of the attestation signal. Higher tiers typically carry shorter freshness windows, requiring more frequent re-attestation in exchange for stronger capability extensions. The window may contract automatically when the watcher observes signal-quality degradation, even before contradiction occurs.
The continuity invariants encode what counts as a confirming versus contradicting signal. They are policy artefacts, not skill artefacts, allowing the same attestation method to be tightened or loosened across deployments without changes to skill manifests. Each invariant is associated with a revocation severity, governing whether a violation triggers immediate full contraction, partial contraction to a lower tier, or only a warning emission with continued binding under flag.
The lineage emission cadence governs the verbosity of binding-state records. At the minimum cadence, only attestation, revocation, and major tier transitions are emitted; at the maximum cadence, every continuity-signal sample is recorded. Deployment selects the cadence consistent with audit and storage requirements, with a guaranteed minimum so that the structural transitions are always recoverable.
Alternative Embodiments
In a first alternative embodiment, multiple concurrent biological-identity bindings extend the envelope jointly, with the joint extension determined by a composition function over each binding's tier index. This embodiment supports operator-pair authorization patterns and multi-party attestation.
In a second alternative embodiment, the binding is layered across non-biological identity attestations such as cryptographic device bindings, with the biological binding contributing only the topmost tier and lower tiers remaining available under the non-biological bindings alone. This embodiment supports graceful degradation when the biological channel fails but cryptographic continuity holds.
In a third alternative embodiment, the contraction is staged rather than atomic, with intermediate tiers traversed in a declared order to allow consumers of extended capabilities to drain orderly before the full contraction completes. The staged contraction is itself audited as a sequence of structural transitions.
In a fourth alternative embodiment, the binding extends not only the agent's own envelope but also the envelopes of agents in a delegation graph rooted at the bound agent, with revocation propagating along the graph. This embodiment supports human-supervised multi-agent operations.
In a fifth alternative embodiment, the attestation channel is split between an active-presence channel and a passive-physiological channel, with the binding tier determined jointly by both. The active channel confirms intent through deliberate action while the passive channel confirms continuity through involuntary signal; the binding holds at full tier only while both channels concur, degrades to a lower tier when only the passive channel concurs, and contracts to baseline when neither concurs.
In a sixth alternative embodiment, the binding certificate is non-transferable and bound cryptographically to the device that performed the original attestation, such that an attempt to migrate the certificate to a different device is treated as a binding lapse irrespective of the underlying biological signal. This embodiment guards against certificate exfiltration and replay across devices.
Composition with Other Mechanisms
Biological-identity binding composes with skill-gating admissibility: skill manifests may declare a minimum binding tier as an admissibility precondition, and the gating runtime's executability predicate consults the active envelope to filter skills accordingly. A skill whose precondition is not met by the current envelope is silently absent from the planner's candidate set rather than failing at invocation time.
The mechanism composes with trust-weight calibration by partitioning a skill's calibration history across envelope states. A skill operating under an extended envelope draws on a separate sufficient-statistic vector from its baseline-envelope history, preventing the carry-over of trust earned under different operating conditions. Contraction events are themselves calibration signals where appropriate.
The mechanism composes with the security layer by allowing the active envelope to parameterize sanitization signature sets and fan-out limits. Contraction may automatically tighten sanitization stricture or lower fan-out budgets, ensuring that loss of the binding does not leave the agent with unrelated permissions intact under conditions of reduced human supervision.
The mechanism composes with arbitration by giving outputs produced under a higher binding tier a structural weight bonus relative to outputs produced under baseline tiers, reflecting the increased supervisory accountability that accompanies the higher tier. The bonus is bounded and is itself a policy artefact, preventing the binding from becoming a free trust pass; rather, the bonus narrows the tie-breaking margin in cases where outputs would otherwise be selected on raw calibration alone.
Prior-Art Context
Conventional access-control systems treat human authentication as a session-establishment event after which the authenticated permissions remain in effect until explicit logout or session timeout. The disclosed mechanism contributes a continuously-attested, tier-structured binding whose lapse contracts capability automatically and whose contraction is itself a structural artefact rather than an administrative log entry.
Existing biometric continuity systems in operator-vehicle and operator-machine contexts typically gate a single Boolean permission, present or absent. The disclosed mechanism contributes a tiered envelope extension, integration with skill admissibility predicates, and structural composition with downstream calibration, security, and trust mechanisms.
Multi-factor and multi-party authorization systems in enterprise settings provide static role assignments under verified identity. The disclosed mechanism contributes a dynamic envelope that responds to live attestation strength, freshness, and continuity, and whose state is observable in the agent's lineage rather than in an external directory.
Disclosure Scope
The disclosure encompasses any embodiment in which an agent's capability envelope is extended through a verified biological-identity binding, in which the extension is structured as additional capability tiers conditioned on attestation strength, and in which the lapse, revocation, or freshness expiry of the binding causes the envelope to contract with the contraction recorded as a first-class lineage event.
The scope extends to embodiments in which multiple bindings compose, in which biological and non-biological bindings layer, in which contraction is staged, and in which the binding extends a delegation graph rooted at the bound agent. The scope further extends to compositions with skill-gating admissibility predicates, with envelope-partitioned trust-weight calibration histories, and with envelope-parameterized security-layer artefacts.
The disclosure does not depend on a specific attestation modality, biometric channel, or identity-authority substrate; it is the structural arrangement of envelope extension, tiered unlock, continuous attestation, and audited contraction that is claimed, with arbitrary substitution of the underlying attestation components permitted so long as the structural invariants are preserved. Implementations using emergent attestation modalities not yet practical at the time of disclosure remain within scope, provided that the binding produces a tier-indexed certificate, that continuity is monitored against declared invariants, and that revocation contracts the envelope as an audited structural transition rather than as an inferred administrative event.