Biological Identity-Scoped Access During Discovery

by Nick Clark | Published March 27, 2026 | PDF

Biological identity-scoped access, disclosed within the Cognition Patent governing the semantic-discovery subsystem, conditions traversal admission on the continuity of biological identity associated with the discovery object's operating principal. Access to discovery results, and even access to the structural neighborhood of protected anchors, is gated at admission rather than at retrieval. An unauthorized identity, or an identity whose continuity has lapsed or been revoked, is rejected at the traversal admission step and never reaches the protected region of the index. The mechanism converts identity from a retrieval-time check into a structural traversal predicate, which closes the side-channel by which neighborhood-level metadata can leak the existence and shape of protected content.


Mechanism

Each discovery session is bound at instantiation to an operating principal, which is the human operator or autonomous agent on whose behalf the discovery is conducted. The operating principal carries a biological identity continuity record: a credentialed object asserting that a verified biological identity has been continuously associated with the principal across a declared interval. For a human operator, the continuity record may be rooted in biometric enrollment and subsequent liveness-verified sessions. For an autonomous agent, the continuity record may be rooted in a delegating biological principal whose continuity has been verified and whose delegation envelope has not lapsed. The continuity record is not a static credential but a time-bounded attestation; it carries an expiration and may be subject to revocation through governance channels.

Each anchor in the semantic-discovery index carries an access predicate. The predicate may require a minimum trust-slope depth (a measure of the strength and recency of biological identity verification), a specific identity scope (membership in a declared identity group such as a clinical-care team, a defense compartment, or a research consortium), or a conjunction of such requirements. Anchors without access predicates are publicly traversable; anchors with predicates are governed by them.

When a discovery object proposes a traversal step from its current position to a candidate anchor, the admissibility gate retrieves the candidate's access predicate and evaluates it against the operating principal's biological identity continuity record. The evaluation is performed at admission, before the candidate's neighborhood metadata is exposed to the discovery object's scoring function. If the predicate is satisfied, the step proceeds and the candidate becomes the new current position. If the predicate is not satisfied, the step is denied, the candidate is excluded from the discovery object's view of its local neighborhood, and the denial event is recorded in lineage with the failed predicate component named.

The admission-time placement of the evaluation is structurally significant. Were the evaluation deferred to retrieval time, the discovery object would already have observed the candidate's existence, its position in the index, its semantic distance from the current trajectory, and potentially its anchor type and governance class. Each of these observations leaks information about the protected content even if the content itself is never returned. By gating at admission, the architecture denies the discovery object access to the candidate's existence, not merely to its content.

Continuity verification is performed not only at session initiation but at declared checkpoints throughout the session. A long-running discovery session whose biological continuity attestation expires mid-session is suspended pending re-attestation; protected anchors traversed under the prior attestation do not retroactively become inaccessible, but new traversals into protected regions cannot proceed without a current attestation. This treats biological continuity as a live property of the session, not a one-time gate.

Operating Parameters

Trust-slope depth is the principal continuity parameter and reflects the cumulative strength of biological identity verification leading to the current attestation. A shallow slope is produced by a single verification event of moderate confidence; a deep slope is produced by a chain of verifications spanning multiple modalities and time intervals. Anchor predicates declare minimum slope depths, and operating principals presenting attestations below the declared minimum are denied admission to those anchors.

Attestation lifetime governs how long a continuity record remains valid in the absence of refresh. Short lifetimes appropriate to highly sensitive deployments may force re-verification on the order of minutes; long lifetimes appropriate to lower-sensitivity deployments may tolerate session-length attestations measured in hours. The lifetime is declared per identity scope and may differ across the deployment.

Revocation propagation latency is the maximum delay between issuance of a revocation against an identity and effective denial of subsequent traversal admissions associated with that identity. Lower latency is operationally desirable but imposes higher synchronization cost on the substrate. Deployments declare a target latency consistent with their threat model and operating profile.

Identity-scope membership is governed by enrollment and de-enrollment procedures whose own auditability is part of the broader governance discipline. Membership changes are credentialed events that propagate to the admissibility gate through the same policy substrate that governs other access predicates.

Delegation depth ceilings cap the length of delegation chains by which an autonomous agent's operating principal may be derived from a delegating biological principal. Bounded delegation depth prevents the construction of attenuated chains that would functionally launder access through long sequences of intermediate principals.

Alternative Embodiments

In a first alternative embodiment, the access predicate is not a conjunction of fixed requirements but a policy expression evaluated against a richer context that includes the operating principal's identity attributes, the current session's prior trajectory, and contemporaneous environmental signals. This embodiment supports adaptive access regimes where the predicate's effective stringency varies with operational posture.

In a second alternative embodiment, denied traversal events are aggregated into a session-level signal that, beyond a threshold, triggers a session-level review or termination. Repeated denials from a single principal targeting protected regions may indicate either a misconfigured discovery objective or an adversarial probing pattern; the aggregation embodiment surfaces both for governance attention.

In a third alternative embodiment, biological continuity is established through a multi-modal verification chain that combines biometric, behavioral, and possession factors. Each factor contributes to the trust-slope depth with declared weight, and the slope's composition is itself recorded in lineage so that downstream auditors can reconstruct which factors supported a given admission decision.

In a fourth alternative embodiment, protected anchors emit, upon successful admission, a use-conditioned credential that constrains downstream handling of the discovered content. The use-conditioned credential travels with the result and enforces, for example, prohibitions against onward sharing, retention beyond a declared interval, or incorporation into derived works. This embodiment extends the identity gate's reach beyond admission into the result's lifecycle.

In a fifth alternative embodiment, the access predicate distinguishes between read admission, neighborhood admission, and discovery admission, each carrying its own continuity threshold. Discovery admission permits the candidate to enter the local neighborhood under consideration; neighborhood admission permits inspection of the candidate's structural relationships; read admission permits retrieval of the anchor's payload. Tiered admission supports deployments where the existence of an anchor is itself non-sensitive while its content remains protected, or conversely where existence must be hidden from principals who would be permitted to read content if its existence were known.

Composition

Biological identity-scoped access composes with the unified admissibility gate of the semantic-discovery subsystem. It is not a separate access-control layer interposed between the discovery object and the index but a predicate evaluated by the same gate that enforces affective bounds, governance-class transitions, and other admissibility properties. The unified gate is structurally significant because it precludes inconsistencies between layered access controls that could otherwise be exploited.

Composition with the lineage substrate occurs through the emission of admission and denial events, each carrying the principal's continuity attestation reference, the candidate anchor's access predicate, and the evaluation outcome. The lineage record permits reconstruction of why a particular discovery trajectory took the shape it did, including which protected regions were inaccessible to it.

Composition with the broader identity substrate occurs through the continuity attestation interface. The semantic-discovery subsystem does not itself perform biometric verification or identity enrollment; it consumes credentialed continuity attestations produced by the identity substrate. This separation of concerns permits the identity substrate to evolve independently of the discovery subsystem and ensures that identity assertions are not implementation-coupled to discovery-specific code paths.

Composition with affect-modulated traversal is bounded: the affective layer cannot raise an operating principal's effective trust slope, cannot bypass an access predicate, and cannot induce admission to a protected anchor under any affective state. The affective layer's domain is restricted to reweighting choice among admissible candidates, and biological identity-scoped access is a hard gate upstream of that reweighting.

Prior-Art Distinctions

Conventional access-control systems gate access at retrieval time. A query is evaluated against an index, candidate results are identified, and access checks are applied to determine which results are returned. This pattern is structurally incompatible with the side-channel discipline disclosed here: the act of identifying a candidate already exposes its existence to the querying principal, even if the candidate is subsequently filtered from the returned set. The disclosed mechanism gates at admission, before candidate identification exposes neighborhood metadata.

Role-based access-control systems associate access rights with declared roles and bind principals to roles through enrollment. They do not, in general, condition access on biological identity continuity, do not require continuity attestations to be live and time-bounded, and do not perform admission-time evaluation against a unified traversal gate. The disclosed mechanism's continuity discipline and admission-time placement together close vulnerabilities that role-based systems leave open.

Biometric-gated systems verify biological identity at session initiation but typically treat verification as a one-time gate. The disclosed mechanism treats biological continuity as a live session property with attestation lifetime, mid-session checkpoints, and revocation propagation, and integrates the continuity check into per-step traversal admission rather than per-session login.

Disclosure Scope

The disclosure encompasses methods, systems, and computer-readable media implementing biological identity-scoped access during semantic-discovery traversal, in which the admissibility gate evaluates anchor-declared access predicates against the operating principal's biological identity continuity attestation at traversal admission. The disclosure includes embodiments with static and adaptive access predicates, embodiments with single and multi-modal continuity verification, embodiments with and without delegation-depth ceilings, and embodiments with and without use-conditioned credentials emitted on admission.

The disclosure further encompasses the composition of the identity gate with affect-modulated traversal, with credentialed lineage emission, and with policy-substrate-driven parameter declaration. The Cognition Patent establishes priority for the semantic-discovery subsystem within which biological identity-scoped access operates. The disclosed mechanism is not limited to clinical, defense, or research deployments and applies wherever discovery traversal must respect identity-conditioned access boundaries with admission-time, side-channel-resistant enforcement.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01