Slope-Constrained Speculative Simulation
by Nick Clark | Published March 27, 2026
Forecast trajectories produced by the speculative simulator are bounded by a slope-of-change envelope derived from observation history. Predicted states whose first or second derivatives exceed the calibrated envelope are not emitted as forecasts; they are flagged as discontinuities, attributed to either tampering, sensor failure, or regime change, and routed to a separate verification pathway rather than allowed to enter the planning graph as ordinary speculative branches.
Mechanism
The slope-constrained speculative simulator operates as a deterministic forward-projection function defined in Chapter 4 of the Cognition Patent. Given a substrate-anchored present state S(t) and a candidate action a, the simulator produces a successor state S(t+1) together with an explicit slope vector representing the per-component rate of change between the two states. Each component slope is then compared against an observation-history envelope ENV that records, for that same component, the empirical distribution of slopes the agent has observed during verified, non-speculative operation.
The envelope is not a single threshold but a triple. It carries an upper bound, a lower bound, and a curvature bound, computed over a sliding observation window using a bounded-tail estimator rather than a Gaussian assumption. This matters because real telemetry is heavy-tailed and a Gaussian fit would either cut off legitimate variation or admit hallucinated jumps. The bounded-tail estimator is parameterized by a quantile floor declared in the agent's policy reference; values below the floor are treated as observation noise and discarded before the envelope is computed.
When a candidate slope falls inside the envelope, the successor state is admitted to the planning graph as a normal speculative node with full lineage provenance. When it falls outside, three things happen in fixed order. First, the candidate state is not promoted; it is held in a quarantined region of the speculation buffer that is structurally separate from the planning graph. Second, a discontinuity record is emitted, naming the offending component, the magnitude of the excursion, and the envelope parameters at the moment of evaluation. Third, the simulator selects a disposition path from a closed set declared in policy: tampering-suspected, regime-change-suspected, sensor-fault-suspected, or model-stale. The disposition is determined by a deterministic decision table over the envelope geometry, the recency of the input, and the identity of the component, not by a learned classifier. This is a design choice; the patent specifies that disposition selection must be auditable as a table lookup so that licensees can prove regulatory compliance without reference to model weights.
Calibration of the envelope is itself slope-constrained. The envelope updates on a slower timescale than the simulator runs, and the rate at which the envelope itself may shift is bounded by a meta-slope declared in the policy reference. This second-order constraint prevents an adversary from gradually widening the envelope through a sequence of small, individually-permissible excursions, a pattern the patent describes as envelope-creep. Meta-slope violations are themselves logged as discontinuities at the calibration layer and routed to the governance class for review.
Operating Parameters
Five parameters fully specify the behavior of the slope constraint and are exposed in the policy reference for per-deployment tuning. The observation window length determines how many prior verified states contribute to envelope computation; shorter windows produce a more reactive envelope that adapts quickly to legitimate regime change but is more easily manipulated, while longer windows produce a stable envelope that resists manipulation but lags real shifts. The quantile floor sets the threshold below which observation samples are treated as noise; typical deployments declare floors between the second and fifth percentile, with safety-critical deployments declaring floors at the tenth percentile to widen the rejection band.
The curvature bound governs the second derivative of permitted trajectories and is the parameter most often retuned in production. It is expressed as a ratio against the first-derivative bound rather than as an absolute value, which keeps the constraint dimensionally consistent across components with very different units. The meta-slope, governing how fast the envelope itself may move, is typically declared as a fraction of the primary slope, often between one-twentieth and one-fifth depending on how aggressive the deployment expects legitimate regime change to be. Finally, the disposition table declares which excursion patterns map to which suspected causes, and is the parameter that licensees most often customize for their specific operational domain.
Every parameter change is itself a lineage event. The policy reference is content-addressed, so altering any parameter produces a new policy hash, and every speculative simulation records the policy hash under which it ran. An auditor reconstructing a forecast can therefore reproduce not only the inputs and outputs but the exact constraint configuration that was active, which the patent identifies as a precondition for regulatory certification of forecasting subsystems.
Alternative Embodiments
The patent contemplates several alternative embodiments of the slope constraint that preserve the structural invariants while adapting to specific deployment contexts. In a first alternative, the envelope is computed not from the agent's own observation history but from a federated history maintained across a fleet of agents operating under a shared governance class. Federated envelopes are stricter against any individual agent's idiosyncratic drift but require a trust layer between agents, and the patent specifies that the federation must itself be substrate-anchored to a common identity layer to prevent envelope poisoning.
A second alternative replaces the bounded-tail estimator with a piecewise-linear envelope manually declared by a domain expert. This embodiment is preferred in safety-critical deployments where empirical calibration is unacceptable, such as therapeutic dosing agents or autonomous vehicle planners operating in regulated jurisdictions. The piecewise envelope is still subject to meta-slope constraints, but the meta-slope governs only the operator's permitted rate of envelope edit rather than an automatic update process.
A third alternative introduces a soft-rejection mode in which discontinuities are admitted to the planning graph but tagged with reduced confidence and excluded from action selection. This embodiment is appropriate for exploratory deployments where the cost of missed forecasts exceeds the cost of occasional hallucinated commitments, and it preserves auditability because every soft-admitted discontinuity carries its excursion record forward through the lineage.
A fourth alternative inverts the slope check at calibration time, using the envelope to detect gradual drift in the agent's own observation pipeline. When the simulator's predictions consistently fall at one edge of the envelope, the calibration layer treats this as evidence that the agent's perception has drifted relative to the world, and triggers a re-anchoring sequence rather than a regime-change disposition. This embodiment is used in long-running deployments where sensor decay is the dominant source of forecast error.
Composition
Slope-constrained speculative simulation composes with the rest of the cognition architecture along three explicit interfaces. Upstream, it consumes substrate-anchored states from the inference resolution layer; the slope check is meaningful only if the present state is itself anchored, because an unanchored present provides no reliable origin against which to measure slope. Downstream, it produces planning graph nodes that are consumed by the action selection and commitment subsystems, with discontinuity records flowing instead to the governance class. Laterally, it shares the policy reference and lineage log with every other deterministic mechanism in the agent.
The composition is strict in the sense that no mechanism in the architecture may emit a forecast that bypasses the slope constraint. Forecasts produced by alternative pathways, such as direct model inference or external oracle queries, are not admitted to the planning graph until they have been re-evaluated against the envelope. This invariant is enforced at the data structure level by requiring every planning graph node to carry an envelope-evaluation record, and by rejecting nodes whose record is missing or whose policy hash does not match the currently active policy.
Prior Art Distinction
Existing forecasting systems treat slope or rate-of-change checks as either a heuristic safety layer applied after prediction, or as a regularizer applied during model training. Neither approach satisfies the structural requirement the patent describes. A post-hoc safety layer can be bypassed by alternative emission pathways and provides no auditable record of which forecasts were rejected and why; it is also typically tuned by hand to a single deployment and does not generalize. A training-time regularizer is opaque to the auditor because the constraint is encoded in model weights, and it cannot be reconfigured without retraining, which makes per-deployment policy adjustment impossible.
The slope-constrained simulator is distinct in that the constraint is a first-class structural element of the cognitive architecture, declared in policy and enforced deterministically against every forecast regardless of its origin. The envelope is content-addressed, the disposition table is auditable as a lookup, and the meta-slope prevents adversarial drift in the constraint itself. No prior system known to the inventor combines all four properties.
Implementation Notes
Reference implementations of the slope-constrained simulator separate the envelope estimator from the simulation kernel along a stable interface so that the estimator may be replaced for domains with unusual statistical properties without disturbing the kernel. The estimator exposes three methods: a sample ingestion call invoked once per verified state transition, an envelope query call invoked once per simulator step, and a calibration snapshot call invoked at policy-hash boundaries. The snapshot is what flows into the lineage log; the patent specifies that the snapshot must be sufficient to recompute every envelope decision the simulator made between the previous snapshot and this one, which is the property an auditor depends on for forensic reconstruction.
The simulation kernel is engineered to be replayable bit-for-bit. Every source of nondeterminism — the random number generator's seed, the floating-point rounding mode, the iteration order over multi-component states — is captured in the lineage record together with the policy hash and the envelope snapshot reference. Deployments operating under safety-critical governance classes are required by the patent to run a continuous shadow replay that re-executes recent forecasts from their lineage records and asserts byte-equivalence against the originals; any divergence is itself a discontinuity event and triggers a re-anchoring sequence at the inference resolution layer. This shadow replay is the operational mechanism by which the patent's reproducibility claim is converted from a property of the formal specification into a property of the running system.
Performance considerations enter the architecture only at well-defined boundaries. The envelope query is the simulator's hot path, and reference implementations cache the most recent envelope snapshot in memory and revalidate it lazily on policy-hash change. Caching is bounded by the same invalidation rules the patent applies elsewhere: any change to the policy hash, the observation window, or the quantile floor invalidates the cache atomically. The patent forbids any caching policy that could outlive a policy-hash transition because such a policy would allow forecasts to be evaluated against an envelope that is no longer the system's official envelope, undermining the auditability guarantee.
Disclosure Scope
This article describes the slope-constrained speculative simulator at the level necessary for technical evaluation of the Cognition Patent and does not constitute a complete enabling disclosure. The full mechanism, including the bounded-tail estimator specification, the disposition decision table, the policy reference schema, the lineage record format, and the federation trust layer, is described in Chapter 4 of the patent and its associated appendices. Licensees receive the complete specification together with reference parameter sets for the deployment domains the patent contemplates. Implementers seeking to certify a deployment for regulated operation should refer to the formal specification rather than to this summary, which prioritizes structural intuition over completeness.