Kronos, the cognitive layer that moves work between Mickai brains
Mickai patent 02 specifies a cooperative of twenty five domain brains under a deterministic arbiter, and patents 53 to 57 specify the silicon substrate the cooperative runs on. The layer in between, the orchestration kernel that decides which brain handles which fragment of work and binds the result into a signed audit chain, is Kronos. Routing, reasoning, planning, tool use, code, browser, function, retrieval, embeddings, long term memory, context, document, image, video, data, ASR, TTS, voice biometric, policy, audit ledger, identity, quorum, permissions, revocation. Twenty four kernel functions, each patent bearing, each signed on the internal bus.
A cognitive layer is not a model, and not a brain
Mickai patent 02 specifies twenty five specialist brains under a deterministic arbiter, with Poseidon as the silicon substrate beneath them at patents 53 to 57. What sits in between, the layer that decides which brain handles which fragment of an operator's request, resolves the dependency graph, gates the tool surface, signs every commit, walks the policy graph at the moment of action, and exports the resulting record in a format a third party can verify offline, is Kronos. It is not a model. It is not a domain brain. It is the kernel of the Sovereign Intelligence Operating System, the layer that makes the cooperative a single coherent system rather than twenty five independent specialists that happen to share a host.
Kronos is the name for the twenty four kernel functions that move work between the domain brains. The domain brains are named for the cognitive territory each specialises in (PALANTIR for strategic reasoning, SENTINEL for security, GABRIEL for communications, ZEUS for law and governance, JAXON for software, and twenty more across the five subsystems). Kronos functions are named for the mechanic each one performs: Arbiter routes, Router decomposes, Reasoning deliberates, Planning simulates, Tool Use invokes, Code reads and writes, Browser fetches, Function executes, Retrieval pulls, Embeddings represents, Long Term Memory persists, Context maintains, Document parses, Image renders, Video produces, Data shapes, ASR transcribes, TTS speaks, Voice Biometric authenticates, Policy enforces, Audit Ledger signs, Identity binds, Quorum agrees, Permissions checks, Revocation withdraws. Twenty four functions, each patent bearing in its own right.
The naming convention tracks role over personality. Poseidon was selected for the silicon substrate because the chip rules a depth no surface power can reach. Kronos in Hesiod separates earth from sky and sets the order of time. The kernel does the same thing for cognition. It separates one operator request into typed sub problems, binds each sub problem to the brain that owns it, sequences the resulting calls in a deterministic order so the audit ledger is replayable, and holds the conversation's temporal frame so that what was decided on Monday under one policy version is not silently re-decided on Friday under a different one.
The twenty four kernel functions, by family
The Kronos subsystem decomposes into six families. Each family is internally coherent and externally signed.
Orchestration
Arbiter is the deterministic conductor. It inspects every inbound request, the operator's active clearance, the active tenant, and the policy graph, and dispatches to the correct specialist brain or set of brains. For high stakes actions it convenes a quorum. Determinism is the central property. The same request, in the same context, with the same policy, always routes the same way. That determinism makes the audit ledger replayable five years later. Router decomposes complex operator intents into a directed acyclic graph of sub tasks across brains. It plans which brain produces which intermediate artefact, what the dependency edges are, and when a quorum is required. Reasoning handles open ended cognitive load: multi step deduction, hypothesis generation, counterfactual evaluation, structured deliberation. Planning generates long horizon plans and produces a deterministic dry run simulation that the operator reviews as a diff against the target state under patent 15 before any high impact action commits.
Tooling
Tool Use decides which Mickai permissioned tool to invoke for a given step, drives the invocation, parses the response, and signs the entire round trip into the audit ledger. Code is the kernel's software work specialist, distinct from the domain brain JAXON that handles computer science theory. Browser drives a sandboxed web surface for retrieval and form interaction. Function executes a typed envelope against a registered surface. Every tool invocation is gated by the Permissions function and the operator's active clearance. Sensitive tool calls require a fresh voice biometric match under patent 13. Per tool rate limits cap the blast radius of any compromised credential under patent 03.
Knowledge and memory
Retrieval pulls structured and unstructured documents from on device corpora. Embeddings produces dense vector representations so semantic search remains internal to the operator's trust domain. Long Term Memory persists facts, preferences, and outcomes across sessions under operator controlled retention policy. Context maintains the active conversational frame inside a single session, with explicit boundaries that prevent one tenant's context bleeding into another. Patent 04 (tenant isolation under cryptographic separation) is the formal statement of the cross tenant property.
Artefacts
Document, Image, Video, and Data are the four producers of tangible output. Each binds its output to a provenance manifest signed under operator controlled hardware. Three of the new filings at slots 41 to 57 add measurable depth here. Patent 41 (Sovereign 8K Video Provenance Chain Across Upscale and Interpolation) closes the chain of custody across the multi stage video pipeline where a per frame signature attached at generation is invalidated by every subsequent upscale or interpolation stage. Patent 54 (Sovereign Per-Pixel Image Authenticity Verification via Merkle-Tree Signing) lifts the audio watermarking primitive into the spatial domain, so a verifier can challenge any individual pixel of a generated image. Patent 50 binds generatively produced user interfaces to a signed lineage of design tokens, atomic composition, and WCAG accessibility attestation.
Voice
ASR transcribes operator speech with confidence scoring. TTS produces operator addressed speech with prosody control. Voice Biometric authenticates the speaker at the moment of action against an enrolled voice print template bound to silicon under patent 53. The voice family answers the question of authority. Session scoped voice authentication is replayable. Patent 13 is the original biometric gate. Patent 57 (voice gated multi brain quorum with replay resistant action composition) closes the replay window: the challenge phrase is drawn from a SHA3 digest of the composed action payload itself, so the captured utterance binds to one action and one action only.
Governance
Policy enforces the operator signed policy bundle at every decision point. Audit Ledger signs every commit under FIPS 204 ML-DSA-65 and emits a hash linked chain. Identity binds every signature to an operator controlled key in hardware. Quorum coordinates N way agreement across multiple brains for high stakes decisions. Permissions checks the operator's active clearance against the policy graph at the moment of action. Revocation withdraws a previously granted authority with a signed tombstone that downstream verifiers honour. The audit ledger is appended in the Open Inter-Vendor Audit Record format under patent 22, verifiable in any browser tab by the offline WebAssembly verifier filed under patent 23, inside the trust domain externalisation pattern of patent 24. Patent 48 (cross brain quorum for generative hallucination detection) extends the Quorum function into the generative output domain: the same prompt is dispatched in parallel to N independent brains, scored against a per domain semantic distance threshold, and no artefact is signed unless the quorum agrees.
Why Kronos is distinct from the twenty five domain brains it routes between
A domain brain owns a body of knowledge and a set of practiced skills inside that domain. PALANTIR knows defence intelligence sources and adversary models. ZEUS knows statute and case law. SENTINEL knows the CVE database and prompt injection patterns. Kronos owns no domain. Kronos owns the protocol by which the domain brains communicate, the order in which they execute, the policy that gates them, the audit chain that records what they did. If the cooperative is a hospital, the domain brains are the consultants and Kronos is the registrar, the medical records department, the on call rota, the prescribing committee, and the theatre booking system combined.
The boundary is enforced cryptographically. Every artefact a domain brain produces flows through the Audit Ledger function before it can leave the host. Every tool invocation flows through Tool Use and Permissions. Every long lived state read or write flows through Long Term Memory under tenant scoped policy. The domain brains are scoped, identified, signed, and audited. Kronos does the scoping, the identifying, the signing, and the auditing.
How Kronos works alongside the Mickai cooperative in practice
A representative trace. An operator at an NHS trust speaks a request to draft a triage note for a named patient, include the latest bloods, flag whether the chest x ray shows new infiltrates, sign under clinician clearance, and queue for the registrar's review.
ASR transcribes the utterance and emits a typed envelope. Context binds the envelope to the active session, tenant, operator, and clearance. Voice Biometric verifies the speaker under patent 13. Permissions evaluates the action against the trust's policy bundle. The check passes. Router decomposes the request into a DAG: Retrieval against the trust's on premises EHR adapter for the patient record, Document for the bloods parsing, the IRIS domain brain for radiological interpretation of the x ray, the GABRIEL domain brain for the draft, and a clinician readable summary. The plan is signed under Audit Ledger before execution begins.
Tool Use invokes the EHR adapter. The patient record flows in. Image hands the x ray to IRIS. Because the finding must be defensible, Arbiter convenes a Quorum across IRIS and a second independent imaging model under patent 48. The two models agree within the per domain semantic distance threshold. The aggregated finding is signed. GABRIEL drafts the note. Planning produces a pre commit dry run rendered as a diff against the registrar's inbox state under patent 15. The clinician speaks a fresh authorisation utterance. The utterance binds to a SHA3 digest of the composed draft under patent 57, the brain quorum threshold is met, and Audit Ledger signs the commit under ML-DSA-65 and emits an OAR record under patent 22.
Five years later, if a coroner asks what the system did at 14:37 on 21 May 2026, the chain replays deterministically. The same Kronos functions, the same domain brains, the same policy version, the same answer.
How the new patent filings extend Kronos
The seventeen new filings at slots 41 to 57 do not add new Kronos functions. They sharpen the existing twenty four against specific real world workloads. Patent 41 extends Video for upscale and interpolation pipelines. Patents 42 and 57 extend Voice Biometric, the first with per utterance consent class predicates, the second with replay resistance. Patents 43, 45, and 49 extend Image and Video for game world, avatar, and iterative refinement. Patent 44 extends Code with per line lineage from spoken intent. Patents 46 and 51 extend Document with type safe retroactive undo and per token translation lineage across 450 languages. Patent 47 extends audio provenance under triple watermark. Patent 48 extends Quorum into generative hallucination detection. Patent 50 extends Image into design system provenance. Patents 52 and 56 extend Audit Ledger and Identity for air gap bootstrap and continuous attestation. Patent 53 extends Revocation with cryptographic proof of erasure under GDPR Article 17. Patent 54 extends Image with per pixel Merkle authenticity. Patent 55 extends TTS and Audit Ledger for real time streaming voice synthesis.
The collective effect closes four workload classes. The clinical workload above is now defensible end to end. The defence workload (patents 52 air gap and 56 continuous attestation) is defensible end to end. The creative workload (patents 41, 43, 45, 47, 49, 54 across video, game world, avatar, music, iteration, and pixel granularity) is defensible end to end. The regulatory workload (patents 42 consent class, 51 translation lineage, 53 Article 17) is defensible end to end.
What Kronos means for an audit grade sovereign substrate
The phrase audit grade is overused. The structural claim Kronos makes is narrower and more testable. Every decision the cooperative takes is (a) signed at commit under FIPS 204 ML-DSA-65 in operator controlled hardware, (b) appended to a hash linked chain in the Open Inter-Vendor Audit Record format, (c) verifiable in any browser tab by the offline WebAssembly verifier filed under patent 23, (d) decided inside the trust domain externalisation pattern of patent 24 so self marking own homework is structurally impossible, (e) bound to a voice authenticated operator utterance at the moment of action under patent 13 or patent 57, and (f) gated by an operator signed policy bundle that walks the policy graph at the moment of action rather than the moment of session. Six properties. Each one a Kronos function. Each one a filed patent.
The combined statement, holding the Poseidon silicon substrate underneath at patents 53 to 57 (existing) and the new air gap and continuous attestation primitives at patents 52 and 56, is that the cooperative is the same kernel from the silicon up to the user facing brain. There is no layer at which the operator's trust position is dependent on a third party verifier, a vendor hosted endpoint, or a downstream supplier. The substrate is the answer to the procurement question, "show me, for the previous thirty days of operation, an exportable signed action chain of every decision your system made, verifiable in my browser without your tooling." Kronos produces the chain. Poseidon holds the keys. The cooperative answers to the kernel. The kernel answers to the operator.
Sources and references
- Mickai patent portfolio, mickai.co.uk/patents
- Mickai cooperative architecture, patent 02
- Voice biometric gated LLM tool invocation, patent 13
- Pre commit dry run simulation, patent 15
- Causal DAG audit ledger, patent 16
- Tenant isolation under cryptographic separation, patent 04
- Open Inter-Vendor Audit Record format, patent 22
- Browser resident offline post quantum verifier, patent 23
- Trust domain externalisation, patent 24
- Sovereign 8K Video Provenance Chain Across Upscale and Interpolation, patent 41
- Sovereign Voice Cloning Consent Class Framework, patent 42
- Cross Brain Quorum for Generative Hallucination Detection, patent 48
- Sovereign Per Pixel Image Authenticity Verification via Merkle Tree Signing, patent 54
- Sovereign Real Time Streaming AudioSeal, patent 55
- Voice Gated Multi Brain Quorum with Replay Resistant Action Composition, patent 57
- Poseidon silicon substrate, patents 53 to 57 (operator personalised root of trust, host acceptance attestation, SIOS bundle migration, operator controlled distribution)
- Mickai brain catalogue, mickai.co.uk/brains
- FIPS 204 (ML-DSA), NIST post quantum digital signature standard
- Crown Commercial Service framework RM6263 and successors