Integrity-Confidence Cross-Primitive Coupling
by Nick Clark | Published March 27, 2026
The integrity envelope and the confidence field are not independent governance signals layered side-by-side; they are coupled through a structural transfer function in which the instantaneous width of the integrity envelope is bound to the agent's current confidence state. Low confidence narrows the permissible envelope, restricting execution authority to conservative interior actions; high confidence widens the envelope toward — but never beyond — its declared outer bound. The coupling is a primary-key relationship inside the cognitive architecture, not a heuristic correlation, and it is what prevents an agent from claiming wide normative latitude on the basis of poorly grounded inference.
Mechanism
Cross-primitive coupling is implemented as a deterministic evaluation function defined in Chapter 3 of the cognition patent. The function consumes two canonical fields: the integrity envelope, which expresses the outer normative bounds the agent has been authorized to occupy, and the confidence field, which expresses the calibrated certainty the agent assigns to the inferences supporting a candidate action. The output is the operative envelope — the subset of the declared envelope within which execution authority is currently permitted.
The transfer function is monotonic and bounded. As confidence rises from a configured floor toward saturation, the operative envelope expands along defined dimensions until it asymptotically approaches the declared envelope. As confidence falls, the operative envelope contracts toward a conservative interior region, called the safe-core, that contains only those actions the agent's policy reference designates as admissible regardless of inferential state. The safe-core is never empty by construction, which guarantees that the agent always has at least one permitted action even under degraded confidence — typically a deferral, a clarification request, or a graceful no-op.
Importantly, the coupling is structural rather than additive. The agent does not first compute a confidence score and then separately consult an integrity policy; the integrity envelope is parameterized by confidence at the level of the field definition. A change in the confidence field propagates through the coupling within a single evaluation cycle and is recorded in the agent's lineage as a discrete envelope-narrowing or envelope-widening event, with cause and timestamp preserved.
The coupling is also bidirectional in a constrained sense. While confidence is an input to envelope width, the operative envelope feeds back into the confidence-governed execution and forecasting engine: actions that would land outside the operative envelope are excluded from the candidate set before confidence-based ranking begins, which prevents the engine from spending compute on inadmissible options and prevents post-hoc rationalization of out-of-envelope behavior.
Operating Parameters
The coupling exposes a small set of policy-governed parameters. The confidence floor sets the minimum confidence below which the operative envelope collapses fully to safe-core; the confidence saturation point sets the value at or above which the operative envelope reaches its declared maximum. The slope between floor and saturation is configurable as linear, sigmoidal, or step-quantized depending on the deployment domain — therapeutic and clinical agents typically prefer sigmoidal slopes that resist over-reaction to small confidence fluctuations, while safety-critical autonomous control prefers step-quantized profiles that produce sharp, auditable transitions between authority tiers.
The envelope itself is multi-dimensional. The patent contemplates dimensions including action magnitude, irreversibility class, third-party-impact radius, resource commitment, and temporal horizon. Each dimension may be coupled to confidence with its own transfer profile; for instance, a deployment may permit confidence to widen the temporal-horizon dimension aggressively while keeping the irreversibility dimension nearly flat, so that high confidence buys the agent more planning latitude but never more capacity to take irreversible actions than its declared envelope permits.
Hysteresis is a required parameter rather than an optional one. The transfer function distinguishes the threshold for widening from the threshold for narrowing, with the narrowing threshold always at or above the widening threshold. This prevents oscillatory expansion-and-contraction when confidence drifts near a boundary and produces a stable, auditable envelope trajectory rather than a high-frequency flicker.
Alternative Embodiments
In a per-domain embodiment, the agent maintains separate operative envelopes for distinct action classes — communication, financial commitment, physical actuation, knowledge assertion — each coupled to its own confidence sub-field. A medical-triage agent might run with a tight confidence-envelope coupling on diagnostic assertions while running a looser coupling on routine administrative actions, all within a single cognitive architecture.
In a delegated-confidence embodiment, the confidence input is not generated solely by the agent itself but is derived from a quorum of upstream evaluators — sensor fusion modules, retrieval-grounding scores, peer-agent attestations. The transfer function consumes the aggregated confidence and applies the same envelope-narrowing logic, which lets external evidence quality govern internal authority without requiring the agent to expose its policy to the evaluators.
In a tiered-authority embodiment, the operative envelope is quantized into named tiers (observe, propose, commit, irrevocable) and the coupling promotes or demotes the agent across tiers as confidence crosses defined thresholds. This embodiment is particularly useful for governance audits, because tier transitions produce discrete log entries that compliance officers can reason about without having to interpret continuous envelope geometry.
A degraded-substrate embodiment treats hardware health, network reachability, and clock-skew indicators as additional inputs that can independently narrow the envelope even when the agent's epistemic confidence is high. This decouples "I am sure of my answer" from "I am authorized to act on it," and it gives infrastructure operators a structural lever for restricting authority during maintenance windows or partial outages.
Lineage and Auditability
Every envelope-narrowing and envelope-widening event is recorded as a discrete entry in the agent's lineage with the confidence value that triggered the transition, the dimensions affected, the transfer-function parameters in effect, and the policy version that authorized the parameters. The lineage is append-only and signed at each entry, which gives external auditors a tamper-evident record that can be replayed against the policy reference to verify that the operative envelope at any historical moment was the one the policy required given the recorded confidence.
Replay is exact rather than approximate. Because the transfer function is deterministic and the inputs are recorded, an auditor can recompute the operative envelope for any timestamp and compare it byte-for-byte against the lineage entry. Any discrepancy indicates either lineage tampering or a runtime deviation from the declared coupling, both of which are first-class compliance events. This property is what permits structural certification: a regulator can certify the coupling once, against the policy, and rely on lineage replay to detect any deployment that departs from the certified configuration.
Composition With Other Primitives
Confidence-coupled integrity composes upstream with the forecasting engine: forecasts generated under low confidence are tagged with the operative envelope at the time of generation, and downstream consumers can therefore filter out forecasts that were produced inside an unusually narrow envelope. It composes downstream with discovery traversal, where envelope width governs how aggressively the agent is permitted to expand its candidate-action search before convergence.
It composes laterally with the multi-agent negotiation primitive: when two agents exchange envelopes during structured negotiation, each side's declared envelope is implicitly its declared maximum, and each side's operative envelope reflects current confidence. Negotiation outcomes therefore reflect not only what each agent is authorized to do in principle but what each agent is willing to commit to right now, which produces more honest collective decisions.
Failure Modes the Coupling Eliminates
Several recurring failure modes in autonomous and semi-autonomous systems trace directly to the absence of structural confidence-envelope coupling. The first is the over-confident-out-of-domain action: the agent's calibrated confidence score is high relative to its training distribution but the action class lies outside the envelope the deployment authorized. With the coupling in place, high confidence cannot expand the envelope past its declared maximum, so even a perfectly confident agent cannot stray into action classes for which it was never authorized. The second is the under-confident stall: an agent that becomes uncertain has no graceful behavior available because every concrete action requires confidence above some threshold. The non-empty safe-core construction eliminates this mode by guaranteeing that deferral, clarification request, or graceful no-op is always inside the operative envelope.
The third failure mode is silent envelope drift, in which an agent gradually expands the action classes it considers permissible because no structural mechanism resists drift. Because the coupling is part of the field definition rather than a runtime wrapper, drift cannot occur without producing an audit-visible change to either the declared envelope or the confidence transfer function — both of which are policy-governed and require explicit authorization to modify. The fourth mode is post-hoc rationalization: the agent generates an action and then constructs a confidence justification for it. The coupling forecloses this mode because the operative envelope is computed before the candidate action set is filtered, and the lineage records the envelope-at-time-of-decision, so any rationalization attempted after the fact is contradicted by the record.
A fifth mode worth naming is the calibration-mismatch attack, where an adversary supplies inputs designed to inflate the agent's confidence score artificially. The coupling does not by itself defeat calibration attacks, but the bounded envelope ensures that even a fully successful attack cannot widen authority past the declared maximum. The attack surface is therefore reduced from "any action the agent might take" to "actions inside the declared envelope," which is exactly the surface the deployment was designed to accept.
Prior-Art Distinction
Confidence-thresholded action gating is well known — most production LLM systems implement some form of "if perplexity exceeds X, refuse." That prior art is uniformly scalar and binary: a single confidence score gates a single action. The coupling described here is structurally different in three respects. First, the gated object is a multi-dimensional envelope rather than a single decision, so confidence shapes the geometry of permitted action rather than approving or denying one action at a time. Second, the coupling is part of the field definition rather than a wrapper around inference, which makes it auditable as a structural property of the agent rather than as runtime middleware. Third, the safe-core guarantee — non-empty by construction — distinguishes this approach from prior systems that can produce a "no admissible action" state and stall.
Disclosure Scope
The disclosure covers the coupling function, its parameter space (floor, saturation, slope, hysteresis, dimension-specific profiles), the safe-core construction, the embodiments above, and the lineage requirements that make envelope transitions auditable. It covers integration points with the confidence-governed execution and forecasting engine, the discovery traversal primitive, and the multi-agent negotiation primitive. It does not claim confidence estimation as such, nor envelope declaration as such; it claims the structural coupling between them and the operational consequences that follow from treating the coupling as a primary-key relationship inside the cognitive architecture.