MICKAI
Article · 21 May 2026

Kronos, the cognitive layer that moves work between Mickai brains

Mickai patent 02 specifies a cooperative of twenty five domain brains under a deterministic arbiter, and patents 53 to 57 specify the silicon substrate the cooperative runs on. The layer in between, the orchestration kernel that decides which brain handles which fragment of work and binds the result into a signed audit chain, is Kronos. Routing, reasoning, planning, tool use, code, browser, function, retrieval, embeddings, long term memory, context, document, image, video, data, ASR, TTS, voice biometric, policy, audit ledger, identity, quorum, permissions, revocation. Twenty four kernel functions, each patent bearing, each signed on the internal bus.

Author
Micky Irons
Published
21 May 2026
kronoscognitive-layermickaibrainsorchestration

A cognitive layer is not a model, and not a brain

Mickai patent 02 specifies twenty five specialist brains under a deterministic arbiter, with Poseidon as the silicon substrate beneath them at patents 53 to 57. What sits in between, the layer that decides which brain handles which fragment of an operator's request, resolves the dependency graph, gates the tool surface, signs every commit, walks the policy graph at the moment of action, and exports the resulting record in a format a third party can verify offline, is Kronos. It is not a model. It is not a domain brain. It is the kernel of the Sovereign Intelligence Operating System, the layer that makes the cooperative a single coherent system rather than twenty five independent specialists that happen to share a host.

Kronos is the name for the twenty four kernel functions that move work between the domain brains. The domain brains are named for the cognitive territory each specialises in (PALANTIR for strategic reasoning, SENTINEL for security, GABRIEL for communications, ZEUS for law and governance, JAXON for software, and twenty more across the five subsystems). Kronos functions are named for the mechanic each one performs: Arbiter routes, Router decomposes, Reasoning deliberates, Planning simulates, Tool Use invokes, Code reads and writes, Browser fetches, Function executes, Retrieval pulls, Embeddings represents, Long Term Memory persists, Context maintains, Document parses, Image renders, Video produces, Data shapes, ASR transcribes, TTS speaks, Voice Biometric authenticates, Policy enforces, Audit Ledger signs, Identity binds, Quorum agrees, Permissions checks, Revocation withdraws. Twenty four functions, each patent bearing in its own right.

The naming convention tracks role over personality. Poseidon was selected for the silicon substrate because the chip rules a depth no surface power can reach. Kronos in Hesiod separates earth from sky and sets the order of time. The kernel does the same thing for cognition. It separates one operator request into typed sub problems, binds each sub problem to the brain that owns it, sequences the resulting calls in a deterministic order so the audit ledger is replayable, and holds the conversation's temporal frame so that what was decided on Monday under one policy version is not silently re-decided on Friday under a different one.

The twenty four kernel functions, by family

The Kronos subsystem decomposes into six families. Each family is internally coherent and externally signed.

Orchestration

Arbiter is the deterministic conductor. It inspects every inbound request, the operator's active clearance, the active tenant, and the policy graph, and dispatches to the correct specialist brain or set of brains. For high stakes actions it convenes a quorum. Determinism is the central property. The same request, in the same context, with the same policy, always routes the same way. That determinism makes the audit ledger replayable five years later. Router decomposes complex operator intents into a directed acyclic graph of sub tasks across brains. It plans which brain produces which intermediate artefact, what the dependency edges are, and when a quorum is required. Reasoning handles open ended cognitive load: multi step deduction, hypothesis generation, counterfactual evaluation, structured deliberation. Planning generates long horizon plans and produces a deterministic dry run simulation that the operator reviews as a diff against the target state under patent 15 before any high impact action commits.

Tooling

Tool Use decides which Mickai permissioned tool to invoke for a given step, drives the invocation, parses the response, and signs the entire round trip into the audit ledger. Code is the kernel's software work specialist, distinct from the domain brain JAXON that handles computer science theory. Browser drives a sandboxed web surface for retrieval and form interaction. Function executes a typed envelope against a registered surface. Every tool invocation is gated by the Permissions function and the operator's active clearance. Sensitive tool calls require a fresh voice biometric match under patent 13. Per tool rate limits cap the blast radius of any compromised credential under patent 03.

Knowledge and memory

Retrieval pulls structured and unstructured documents from on device corpora. Embeddings produces dense vector representations so semantic search remains internal to the operator's trust domain. Long Term Memory persists facts, preferences, and outcomes across sessions under operator controlled retention policy. Context maintains the active conversational frame inside a single session, with explicit boundaries that prevent one tenant's context bleeding into another. Patent 04 (tenant isolation under cryptographic separation) is the formal statement of the cross tenant property.

Artefacts

Document, Image, Video, and Data are the four producers of tangible output. Each binds its output to a provenance manifest signed under operator controlled hardware. Three of the new filings at slots 41 to 57 add measurable depth here. Patent 41 (Sovereign 8K Video Provenance Chain Across Upscale and Interpolation) closes the chain of custody across the multi stage video pipeline where a per frame signature attached at generation is invalidated by every subsequent upscale or interpolation stage. Patent 54 (Sovereign Per-Pixel Image Authenticity Verification via Merkle-Tree Signing) lifts the audio watermarking primitive into the spatial domain, so a verifier can challenge any individual pixel of a generated image. Patent 50 binds generatively produced user interfaces to a signed lineage of design tokens, atomic composition, and WCAG accessibility attestation.

Voice

ASR transcribes operator speech with confidence scoring. TTS produces operator addressed speech with prosody control. Voice Biometric authenticates the speaker at the moment of action against an enrolled voice print template bound to silicon under patent 53. The voice family answers the question of authority. Session scoped voice authentication is replayable. Patent 13 is the original biometric gate. Patent 57 (voice gated multi brain quorum with replay resistant action composition) closes the replay window: the challenge phrase is drawn from a SHA3 digest of the composed action payload itself, so the captured utterance binds to one action and one action only.

Governance

Policy enforces the operator signed policy bundle at every decision point. Audit Ledger signs every commit under FIPS 204 ML-DSA-65 and emits a hash linked chain. Identity binds every signature to an operator controlled key in hardware. Quorum coordinates N way agreement across multiple brains for high stakes decisions. Permissions checks the operator's active clearance against the policy graph at the moment of action. Revocation withdraws a previously granted authority with a signed tombstone that downstream verifiers honour. The audit ledger is appended in the Open Inter-Vendor Audit Record format under patent 22, verifiable in any browser tab by the offline WebAssembly verifier filed under patent 23, inside the trust domain externalisation pattern of patent 24. Patent 48 (cross brain quorum for generative hallucination detection) extends the Quorum function into the generative output domain: the same prompt is dispatched in parallel to N independent brains, scored against a per domain semantic distance threshold, and no artefact is signed unless the quorum agrees.

Why Kronos is distinct from the twenty five domain brains it routes between

A domain brain owns a body of knowledge and a set of practiced skills inside that domain. PALANTIR knows defence intelligence sources and adversary models. ZEUS knows statute and case law. SENTINEL knows the CVE database and prompt injection patterns. Kronos owns no domain. Kronos owns the protocol by which the domain brains communicate, the order in which they execute, the policy that gates them, the audit chain that records what they did. If the cooperative is a hospital, the domain brains are the consultants and Kronos is the registrar, the medical records department, the on call rota, the prescribing committee, and the theatre booking system combined.

The boundary is enforced cryptographically. Every artefact a domain brain produces flows through the Audit Ledger function before it can leave the host. Every tool invocation flows through Tool Use and Permissions. Every long lived state read or write flows through Long Term Memory under tenant scoped policy. The domain brains are scoped, identified, signed, and audited. Kronos does the scoping, the identifying, the signing, and the auditing.

How Kronos works alongside the Mickai cooperative in practice

A representative trace. An operator at an NHS trust speaks a request to draft a triage note for a named patient, include the latest bloods, flag whether the chest x ray shows new infiltrates, sign under clinician clearance, and queue for the registrar's review.

ASR transcribes the utterance and emits a typed envelope. Context binds the envelope to the active session, tenant, operator, and clearance. Voice Biometric verifies the speaker under patent 13. Permissions evaluates the action against the trust's policy bundle. The check passes. Router decomposes the request into a DAG: Retrieval against the trust's on premises EHR adapter for the patient record, Document for the bloods parsing, the IRIS domain brain for radiological interpretation of the x ray, the GABRIEL domain brain for the draft, and a clinician readable summary. The plan is signed under Audit Ledger before execution begins.

Tool Use invokes the EHR adapter. The patient record flows in. Image hands the x ray to IRIS. Because the finding must be defensible, Arbiter convenes a Quorum across IRIS and a second independent imaging model under patent 48. The two models agree within the per domain semantic distance threshold. The aggregated finding is signed. GABRIEL drafts the note. Planning produces a pre commit dry run rendered as a diff against the registrar's inbox state under patent 15. The clinician speaks a fresh authorisation utterance. The utterance binds to a SHA3 digest of the composed draft under patent 57, the brain quorum threshold is met, and Audit Ledger signs the commit under ML-DSA-65 and emits an OAR record under patent 22.

Five years later, if a coroner asks what the system did at 14:37 on 21 May 2026, the chain replays deterministically. The same Kronos functions, the same domain brains, the same policy version, the same answer.

How the new patent filings extend Kronos

The seventeen new filings at slots 41 to 57 do not add new Kronos functions. They sharpen the existing twenty four against specific real world workloads. Patent 41 extends Video for upscale and interpolation pipelines. Patents 42 and 57 extend Voice Biometric, the first with per utterance consent class predicates, the second with replay resistance. Patents 43, 45, and 49 extend Image and Video for game world, avatar, and iterative refinement. Patent 44 extends Code with per line lineage from spoken intent. Patents 46 and 51 extend Document with type safe retroactive undo and per token translation lineage across 450 languages. Patent 47 extends audio provenance under triple watermark. Patent 48 extends Quorum into generative hallucination detection. Patent 50 extends Image into design system provenance. Patents 52 and 56 extend Audit Ledger and Identity for air gap bootstrap and continuous attestation. Patent 53 extends Revocation with cryptographic proof of erasure under GDPR Article 17. Patent 54 extends Image with per pixel Merkle authenticity. Patent 55 extends TTS and Audit Ledger for real time streaming voice synthesis.

The collective effect closes four workload classes. The clinical workload above is now defensible end to end. The defence workload (patents 52 air gap and 56 continuous attestation) is defensible end to end. The creative workload (patents 41, 43, 45, 47, 49, 54 across video, game world, avatar, music, iteration, and pixel granularity) is defensible end to end. The regulatory workload (patents 42 consent class, 51 translation lineage, 53 Article 17) is defensible end to end.

What Kronos means for an audit grade sovereign substrate

The phrase audit grade is overused. The structural claim Kronos makes is narrower and more testable. Every decision the cooperative takes is (a) signed at commit under FIPS 204 ML-DSA-65 in operator controlled hardware, (b) appended to a hash linked chain in the Open Inter-Vendor Audit Record format, (c) verifiable in any browser tab by the offline WebAssembly verifier filed under patent 23, (d) decided inside the trust domain externalisation pattern of patent 24 so self marking own homework is structurally impossible, (e) bound to a voice authenticated operator utterance at the moment of action under patent 13 or patent 57, and (f) gated by an operator signed policy bundle that walks the policy graph at the moment of action rather than the moment of session. Six properties. Each one a Kronos function. Each one a filed patent.

The combined statement, holding the Poseidon silicon substrate underneath at patents 53 to 57 (existing) and the new air gap and continuous attestation primitives at patents 52 and 56, is that the cooperative is the same kernel from the silicon up to the user facing brain. There is no layer at which the operator's trust position is dependent on a third party verifier, a vendor hosted endpoint, or a downstream supplier. The substrate is the answer to the procurement question, "show me, for the previous thirty days of operation, an exportable signed action chain of every decision your system made, verifiable in my browser without your tooling." Kronos produces the chain. Poseidon holds the keys. The cooperative answers to the kernel. The kernel answers to the operator.

Sources and references

  • Mickai patent portfolio, mickai.co.uk/patents
  • Mickai cooperative architecture, patent 02
  • Voice biometric gated LLM tool invocation, patent 13
  • Pre commit dry run simulation, patent 15
  • Causal DAG audit ledger, patent 16
  • Tenant isolation under cryptographic separation, patent 04
  • Open Inter-Vendor Audit Record format, patent 22
  • Browser resident offline post quantum verifier, patent 23
  • Trust domain externalisation, patent 24
  • Sovereign 8K Video Provenance Chain Across Upscale and Interpolation, patent 41
  • Sovereign Voice Cloning Consent Class Framework, patent 42
  • Cross Brain Quorum for Generative Hallucination Detection, patent 48
  • Sovereign Per Pixel Image Authenticity Verification via Merkle Tree Signing, patent 54
  • Sovereign Real Time Streaming AudioSeal, patent 55
  • Voice Gated Multi Brain Quorum with Replay Resistant Action Composition, patent 57
  • Poseidon silicon substrate, patents 53 to 57 (operator personalised root of trust, host acceptance attestation, SIOS bundle migration, operator controlled distribution)
  • Mickai brain catalogue, mickai.co.uk/brains
  • FIPS 204 (ML-DSA), NIST post quantum digital signature standard
  • Crown Commercial Service framework RM6263 and successors
Originally published at https://mickai.co.uk/articles/kronos-cognitive-layer. If you operate in a regulated sector or want sovereign AI on your own hardware, the audit form on mickai.co.uk is the entry point.
More articles
21 May 2026
The seventeen new Mickai patents, what they add to the substrate
Mickai has drafted seventeen new patent applications at UK IPO slots 41 to 57, approximately four hundred and fifteen new claims, queued for filing. Five thematic groupings: provenance across generative pipelines, voice and consent, defence and air gap, regulatory forgetting, and multi modal authenticity. This article walks each filing inline, the gap it closes against the existing corpus, and the policy framework it aligns to (NCSC, AISI, ARIA, GDPR Article 17, FIPS 204, RM6263).
21 May 2026
Sovereign provenance across generative pipelines, Mickai patents p41, p48, p54, p55
Four Mickai patents at IPO slots 41, 48, 54, and 55 close the chain of custody across the modern generative pipeline. The audience is technical and security cleared (NCSC analyst, AISI evaluator, MOD acquisition officer). The article walks each filing's specific technical claims in the order the pipeline fires, then shows the integration where the four compose into a single end to end provenance chain that survives the post quantum transition under FIPS 204.
19 May 2026
Poseidon: the silicon substrate brain that runs the rest of the Mickai cooperative on operator-personalised hardware, filed at the UK IPO as patents 53 to 57.
Mickai files patents 53 to 57 at the UK IPO, the Sovereign AI SoC quartet, and introduces Poseidon, the 26th brain in the cooperative. Poseidon is the silicon substrate. The operator personalises the chip at first power-on. The chip attests the host. The SIOS state and audit chain live on the silicon. The distribution endpoint is operator-controlled. Five structural inversions against every prior secure-enclave design. Retail price band GBP 1,500 to 3,000 per unit at general availability.
7 May 2026
Confidence IT named four IT challenges facing UK SMEs in 2025. Underneath all four sits an engineering substrate that does not depend on which Managed Service Provider you choose.
Confidence IT have named four IT challenges facing UK SMEs in 2025: cyber security, compliance, AI adoption, hybrid work. Each is real, each has an MSP-driven operational answer, and each has an engineering layer underneath it where the substrate-level answer is the same primitive: a vendor-neutral signed audit record that survives any one supplier and verifies offline. This piece sits the OAR primitive next to the four challenges and shows where it fits.