MICKAI
Article · 21 May 2026

Sovereign provenance across generative pipelines, Mickai patents p41, p48, p54, p55

A generative pipeline that goes from prompt through quorum verification, through spatial super resolution, through optical flow interpolation, through live broadcast or static encoding, and ends with a third party verifier inspecting a single pixel or a single audio buffer, requires four primitives composed together. Mickai has filed each one. Patent 41 closes the multi stage video chain. Patent 48 catches hallucination at generation time. Patent 54 makes per pixel image authenticity testable. Patent 55 extends post quantum signing to live audio buffers. This article walks the four primitives in the order they fire and the integration that survives the post quantum transition.

Author
Micky Irons
Published
21 May 2026
provenance8k-videocross-brain-quorummerkle-treeaudioseal

The problem statement

A modern generative pipeline does not produce one signed artefact. It produces a sequence of artefacts, each transformed deterministically from the last. A text to video model emits raw frames. A spatial super resolution stage doubles the pixel count. An optical flow interpolation stage doubles the frame rate. An encoder packages the result into a streamed bitstream. A separate audio synthesiser produces a live narration. A still image is extracted and shared. A single pixel of that still image is later challenged in a forensic setting, or a sixty millisecond fragment of the live audio is replayed in a phishing call. The chain of custody from the originating prompt to the challenged pixel or fragment has to hold across every transformation, every transcode, every replay. Conventional signing breaks at the first transformation. Conventional watermarking breaks at re recording. Conventional metadata signing is stripped by the first encoder that does not preserve tags. The four filings in this article close each gap and compose into a single end to end pipeline.

Patent 48 fires first. Catch the hallucination before signing it

The order of operations is important. Signing a hallucination does not make it true. The first primitive on any generative output is the quorum check, before any provenance manifest is signed.

Patent 48 (Cross-Brain Quorum for Generative Hallucination Detection with Divergence-Triggered Refusal) dispatches the same prompt and a bounded entropy seed envelope to N independent generative brains on operator controlled silicon. A consensus aggregator computes a pairwise semantic distance matrix under a domain appropriate metric: BLEU and BERTScore for text, CLIP for imagery, AudioCLIP for music, AST edit distance for code, structural similarity for video. A threshold evaluator compares aggregate divergence against a per consent class threshold.

The decision is binary. Below threshold, a signed artefact and its provenance manifest are emitted under hardware attested post quantum signature. Above threshold, no artefact is signed and no artefact leaves the originating system. Hallucination is caught at generation time. Quorum size and threshold are configurable per consent class: legal evidence at three of three at a tight threshold, creative brainstorm at two of three at a looser threshold.

For an NCSC analyst, the filing addresses the prompt injection failure class by catching the divergent output before it propagates. For an AISI evaluator, it produces a measurable property (the divergence statistic over time) that maps to model alignment under adversarial conditions. For an MOD acquisition officer, it supplies regulator readable evidence for any AI workload involved in operational decision support.

Patent 41 fires next. The multi stage video chain

Once the quorum has cleared the artefact, the multi stage post processing pipeline begins. For video this is where conventional provenance fails most visibly. A generated 4K 30fps clip is upscaled to 8K, interpolated to 60fps, encoded under a specific codec profile, and packaged. Any per frame signature attached at generation is invalidated by every subsequent stage, because the pixels change at upscale and the frame count changes at interpolation. The chain of custody breaks at the first resolution or frame rate boundary.

Patent 41 (Sovereign 8K Video Provenance Chain Across Upscale and Interpolation) holds the chain. At each pipeline stage the invention computes a per frame cryptographic hash, arranges the hashes as leaves of a Merkle tree, signs the root with a post quantum module lattice signature in operator controlled hardware, and emits a stage manifest. The manifest hash links the present stage root to the preceding stage root and records the deterministic stage transform: the upscale factor (4K to 8K under a specific super resolution model), the interpolation kernel (linear, cubic, or RIFE 4.x under specific weights), the encoder profile (HEVC Main 10 at a specific quantisation parameter).

A verifier walks every output frame back through interpolation, upscaling, and generation to the originating prompt and reasoning trace. Tampering at any stage is localisable to the specific frame and stage. Each stage manifest carries the previous stage root hash, the present stage root hash, the transform parameters, the signing key identifier, the FIPS 204 ML-DSA signature, and a hardware timestamp. The chain replays as a sequence of signed transforms, each of which a verifier can independently re run. For a procurement officer specifying generative video for a broadcaster, a defence visualisation workload, or a regulated training content programme, the filing produces frame by frame evidence verifiable against a public key the operator controls.

Patent 54 fires when the still image is extracted

Single frames extracted from the video, or static images generated directly, require a sharper primitive than the per frame Merkle root of patent 41. A pixel can be edited, a face swapped, an object inserted, a region erased, a payload embedded into the least significant bits. Per frame signature checking does not detect any of these, because the per frame hash is over the entire frame and the attacker controls the frame contents before re hashing.

Patent 54 (Sovereign Per-Pixel Image Authenticity Verification via Merkle-Tree Signing) computes a Merkle tree at generation time whose leaves are cryptographic hashes of individual pixels or non overlapping pixel blocks (for example 16x16 or 32x32). Block size is configurable to trade off manifest overhead against attack localisation granularity. The root is signed under hardware attested post quantum signature. The root signature and Merkle proof for any pixel block are stored alongside the image as a provenance manifest.

A verifier can verify the authenticity of any individual pixel without trusting the manifest source. Verification is logarithmic in the number of blocks. An attack on a single block changes the block hash, breaks the Merkle proof for that block, and is detectable at that exact block while the rest of the image continues to verify. The filing produces a sub frame audit basis suitable for medical imaging, satellite imagery, legal evidence, and forensic photography.

Patent 55 fires for live audio

The remaining stage is live audio, where constraints are stricter and the failure mode is more immediate. File based audio watermarking assumes the entire utterance is available at signing time. It cannot be applied to live voice synthesis for broadcast, conference calls, voice driven actuator output, or live narration. Each buffer must leave the producer within a tight latency budget. Post hoc detection is bypassed before the recipient can act. Deepfake voice calls already exploit this gap.

Patent 55 (Sovereign Real-Time Streaming AudioSeal for Live Voice Synthesis with Rolling-Window Signatures) forms a rolling window signature chain over successive audio buffers. For each buffer a psychoacoustic shaper embeds a latency bound watermark into the samples, and a signing engine computes a per buffer signature whose payload binds the cryptographic hash of the watermarked buffer, the prior buffer's signature (forming the chain), an absolute hardware timestamp, and a speaker identity attestation. Signing is under FIPS 204. Each per buffer signature is interleaved with the audio so a verifier confirms authenticity within one buffer of arrival.

Total signing budget stays under fifty milliseconds per buffer, well within the human perceptual threshold for live interactivity. A broadcaster signing live AI voice content, a conference platform authenticating frames in flight, a voice driven actuator verifying live commands all operate within one buffer. The chain property matters equally: a replay attack that splices a captured buffer into a different stream breaks the chain at the splice point. A live deepfake call that interleaves captured operator utterances into a fresh prompt produces a chain break the verifier observes within one buffer.

The integration. End to end provenance from prompt to consumer

The four primitives compose into a single deterministic pipeline. First, the prompt arrives at the operator's silicon and Kronos routes it through patent 48. N brains generate N candidates. The aggregated output is signed in operator controlled hardware. The quorum manifest is the first link. Second, the signed output enters the multi stage post processing pipeline: video runs patent 41 at each stage (generation, upscale, interpolation, encoding), still frame extraction runs patent 54, live audio runs patent 55. Each stage hash links to the previous. Third, the final manifest chain is hash linked into the wider operator audit chain in Open Inter-Vendor Audit Record format under patent 22. The browser resident WebAssembly verifier under patent 23 walks the entire chain from the consumer facing artefact back to the originating prompt and reasoning trace, against the operator's public key, with no network call to any third party.

Five properties hold simultaneously. The output is verified at generation time (patent 48). The output is signed at commit (patents 41, 54, 55). The chain is post quantum (FIPS 204 ML-DSA throughout). The chain is verifiable offline by a third party (patent 23). The chain is in a vendor neutral schema (patent 22).

Surviving the post quantum transition

The NCSC migration roadmap is explicit: cryptographically relevant systems must complete the migration to FIPS 204 ML-DSA and FIPS 203 ML-KEM well before the arrival of cryptographically relevant quantum computing. The four filings are post quantum from inception. Patent 41 signs Merkle roots under ML-DSA at each video pipeline stage. Patent 48 signs the quorum aggregate under ML-DSA. Patent 54 signs the per pixel Merkle root under ML-DSA. Patent 55 signs each live audio buffer under ML-DSA. A signature emitted today remains evidentially valid in 2031, because the underlying module lattice hardness is the same hardness NIST has standardised against quantum attack. A broadcaster adopting the pipeline in 2026 does not need to re sign in 2030. The chain is forward compatible by construction.

The combined position

The four filings, in the order they fire, produce an end to end provenance chain from prompt to consumer that holds across (a) generative hallucination at the source, (b) multi stage video transformation, (c) per pixel image tampering, and (d) live audio splicing and replay. The chain is post quantum from inception, vendor neutral in schema, verifiable offline by any third party, and signed in operator controlled hardware under the Poseidon silicon root of trust at patents 53 to 57.

The NCSC analyst can verify the chain in a browser tab. The AISI evaluator can score the per consent class threshold behaviour of patent 48 over a representative workload. The MOD acquisition officer can specify the four filings as substrate requirements in any visualisation or training content tender. The financial regulator can require patent 55 for any recorded line involving AI generated speech. The Information Commissioner can audit the chain back to a specific prompt for any AI generated content touching personal data. The substrate is filed. The integration is engineering.

Sources and references

  • Mickai patent portfolio, mickai.co.uk/patents
  • Patent 41, Sovereign 8K Video Provenance Chain Across Upscale and Interpolation, mickai.co.uk/patents/sovereign-8k-video-provenance-chain
  • Patent 48, Cross Brain Quorum for Generative Hallucination Detection with Divergence Triggered Refusal, mickai.co.uk/patents/cross-brain-quorum-hallucination-detection
  • Patent 54, Sovereign Per Pixel Image Authenticity Verification via Merkle Tree Signing on Generated Imagery, mickai.co.uk/patents/sovereign-per-pixel-image-authenticity-merkle
  • Patent 55, Sovereign Real Time Streaming AudioSeal for Live Voice Synthesis with Rolling Window Signatures, mickai.co.uk/patents/sovereign-real-time-streaming-audioseal
  • Patent 22, Open Inter-Vendor Audit Record format
  • Patent 23, browser resident offline post quantum verifier
  • Poseidon silicon root of trust, patents 53 to 57
  • FIPS 204 ML-DSA, NIST post quantum digital signature standard
  • FIPS 203 ML-KEM, NIST post quantum key encapsulation standard
  • NCSC post quantum cryptography migration timeline
  • NCSC AI Cyber Security Code of Practice
  • UK AI Safety Institute, evaluation methodology
  • Crown Commercial Service framework RM6263 and successors
  • Police and Criminal Evidence Act 1984, Section 78 (admissibility)
Originally published at https://mickai.co.uk/articles/sovereign-provenance-pipeline-p41-p48-p54-p55. If you operate in a regulated sector or want sovereign AI on your own hardware, the audit form on mickai.co.uk is the entry point.
More articles
21 May 2026
Kronos, the cognitive layer that moves work between Mickai brains
Kronos is the operating system layer of the Mickai cooperative. It is not a domain brain. It is the orchestration kernel that moves work between the twenty five domain brains, gates every tool call against operator clearance, signs every decision at commit under FIPS 204 ML-DSA-65, and exports the resulting chain in the Open Inter-Vendor Audit Record format. This article walks through what Kronos is, why it is structurally distinct from the brains it routes between, how it composes with the Poseidon silicon layer underneath, and where the new patents at slots 41 to 57 sit inside it.
21 May 2026
The seventeen new Mickai patents, what they add to the substrate
Mickai has drafted seventeen new patent applications at UK IPO slots 41 to 57, approximately four hundred and fifteen new claims, queued for filing. Five thematic groupings: provenance across generative pipelines, voice and consent, defence and air gap, regulatory forgetting, and multi modal authenticity. This article walks each filing inline, the gap it closes against the existing corpus, and the policy framework it aligns to (NCSC, AISI, ARIA, GDPR Article 17, FIPS 204, RM6263).
19 May 2026
Poseidon: the silicon substrate brain that runs the rest of the Mickai cooperative on operator-personalised hardware, filed at the UK IPO as patents 53 to 57.
Mickai files patents 53 to 57 at the UK IPO, the Sovereign AI SoC quartet, and introduces Poseidon, the 26th brain in the cooperative. Poseidon is the silicon substrate. The operator personalises the chip at first power-on. The chip attests the host. The SIOS state and audit chain live on the silicon. The distribution endpoint is operator-controlled. Five structural inversions against every prior secure-enclave design. Retail price band GBP 1,500 to 3,000 per unit at general availability.
7 May 2026
Confidence IT named four IT challenges facing UK SMEs in 2025. Underneath all four sits an engineering substrate that does not depend on which Managed Service Provider you choose.
Confidence IT have named four IT challenges facing UK SMEs in 2025: cyber security, compliance, AI adoption, hybrid work. Each is real, each has an MSP-driven operational answer, and each has an engineering layer underneath it where the substrate-level answer is the same primitive: a vendor-neutral signed audit record that survives any one supplier and verifies offline. This piece sits the OAR primitive next to the four challenges and shows where it fits.