16 utility applications — 15 substrate primitives and 1 platform patent — spanning content provenance, keyless identity, execution governance, autonomous agent infrastructure, and distributed systems.
The substrate primitives compose — a single product category may draw on several. These are illustrative applications, not an exhaustive list.
AI agents use governed semantic objects with policy binding and confidence scoring to gate actions before they mutate customer, financial, or contractual state. Execution is auditable by construction.
Platforms use structural content identity to verify provenance before output, attribute training data reuse, and produce cryptographic compliance bundles — without changes to model internals.
Vehicles use forecasting graphs and confidence-governed execution to plan across possible futures, pause under uncertainty, and gate irreversible maneuvers through policy-validated admissibility checks.
Robots use persistent semantic objects with capability gating to earn physical access privileges through validated performance, coordinate in swarms without a central scheduler, and maintain execution continuity across task interruptions.
Devices build keyless identity through behavioral continuity rather than stored certificates. Capability-scoped execution means a compromised device cannot exceed its earned authority boundary.
Clinical agents use policy objects that regulators can independently audit, biological trust-slope identity for patient authentication without static biometrics, and confidence-governed execution that suspends irreversible actions under uncertainty.
Financial systems use admissibility-first execution to gate transactions before commit, adaptive indexing to resolve identities without a central registry, and cryptographically auditable policy objects for regulatory reporting.
Memory-native protocol objects carry their own routing policy, trust scope, and propagation rules — displacing the need for routers to hold authority. Resolution is governed by the object, not by the network.
Keyless trust-slope identity eliminates persistent credentials that adversaries can target. Capability-bounded execution ensures compromised agents cannot escalate authority beyond their earned scope.
Agents use affective state as a deterministic execution field — not a heuristic — alongside integrity modeling that logs and governs deviations, enabling emotionally coherent and clinically accountable long-term interactions.
Capability unlocking is governed by semantic performance state, not configuration. The LLM proposes advancement; the agent is the authority. Certifications are cryptographically verifiable and tamper-resistant.
Users own their namespaces and content resolution policies. Content carries its own governance across platform boundaries. Moderation policy is decentralized and locally scoped without requiring global consensus.
15 substrate primitives and 1 platform patent — 16 total applications filed between November 2024 and February 2026. Each primitive is a logical derivation from the one before it; together they form a single coherent substrate. This list is illustrative of where licensing conversations may apply — it is not exhaustive of the portfolio's reach.
Global resolution without global consensus. Parent-child anchor relationships govern local scope; alias-based pathfinding provides global addressability with no central registry or controlling party. The founding primitive — and the one that most directly displaces DNS and CDN infrastructure.
Authority is intrinsic to the object — routing policy, trust scope, mutation permission, and propagation rules travel with the content itself. Routing decisions emerge from what the object is, not from what a router decides.
Devices authenticate through structural continuity — a trust slope built from accumulated behavioral observation — rather than through stored keys or certificates. Identity cannot be stolen; it can only be earned through continuity. Post-quantum by construction.
The platform patent unifying the substrate. Semantic agent objects with intrinsic execution state, policy binding, and lineage. The object knows whether it is eligible to execute, what it has tried, and under what conditions it may resume — without centralized coordination.
Agents are validated against a structural schema before execution is permitted — compliance proven from the agent's own lineage and field state, not asserted. Includes partial agents: components that have satisfied some but not all capability conditions, enabling staged composition and incremental trust without requiring fully-formed agents to execute.
Execution continuity maintained through object-resident memory state alone — not through workflow engines or centralized schedulers. Objects can be paused, migrated, resumed from validated checkpoints, and composed into distributed execution graphs.
Cryptographically bound, externally resolvable policy objects that auditors and regulators can verify independently. An agent cannot silently modify its governing policy. Compliance can be proven by any party with anchor access — not just the agent's self-report.
Structural identity for media derived from content entropy — not attached credentials. Survives format conversion, cropping, re-encoding. Enables mutation lineage graphs traceable back to origin. No competing IP covers this architecture.
Affective state modeled as a deterministic, policy-bounded field within the agent object. Modulates evaluation behavior without overriding policy constraints. The formal basis for emotionally coherent AI companions and clinically grounded therapeutic agents.
Agents construct structured representations of possible future states, filtered by policy admissibility. Enables multi-agent planning without a central orchestrator — each agent maintains its own planning graph; coordination emerges from the substrate.
Intentional policy deviation is a first-class, logged, restitution-tracked event. Deviation magnitude and moral trajectory are computable fields auditors can inspect. Ethics as infrastructure, not as a post-hoc filter.
Capabilities are earned, not configured. Progressive unlocking based on validated performance states — the LLM is the proposer; the semantic agent is the authority. Tamper-resistant skill certification applicable across AI, robotics, and clinical systems.
Continuity-based biological identity that accumulates confidence over time rather than comparing a single biometric sample. Supports verification, identification, and delegation without static credentials or device possession.
Agents operate within explicitly bounded capability sets — what they may invoke, mutate, or delegate is governed by their earned capability state, not by ambient permission. Capability scope is a structural property of the agent object, revocable and auditable at any point in the execution lifecycle.
Agents pause, reassess, and resume based on confidence state. When confidence in a proposed action falls below policy thresholds, execution is suspended rather than proceeding with degraded certainty. Non-execution is a valid and governed outcome.
Each candidate inference output is treated as a proposal to a governed object before any commitment occurs. The substrate governs whether a data packet, a user identity, or an AI inference may proceed — without knowing which it is. That is the point.
Every primitive in this portfolio derives from a single inversion: data objects carry their own identity, authority, and policy, not the infrastructure around them. That is the architectural foundation of deterministic autonomy. These are not features of a product. They are logical consequences of one foundational change.
If you're building in any of the areas above, the right time to have this conversation is before grant — not after. Pre-issuance engagement lets you evaluate structural overlap, establish a negotiated licensing position, and reduce long-horizon uncertainty before prosecution concludes.
Adaptive Query offers a limited number of pre-grant option-to-license agreements with selected parties. An option-to-license does not convey present patent rights and does not imply claim issuance — it establishes conditional future licensing terms should relevant claims issue in substantially similar form. Scope, field-of-use, exclusivity (if any), and financial terms are defined only in a separate written agreement. All discussions are exploratory and non-binding unless formalized.
Licensing inquiries, freedom-to-operate discussions, and defensive option agreement conversations welcome. Patent counsel: Downs Rachlin Martin PLLC, Burlington, Vermont.
Start a conversation →The primitives that govern the next generation of infrastructure are being filed now.
Early entrants establish the terms.
Patents pending. No guarantee of issuance or scope. Adaptive Query provides patent and trademark licensing services only. No rights are granted by this page. Any license would require issued claims (if any) and a separate written agreement.