Patent Claim Extractor Irreducible Triangle Method
Reduce each system to three primitives + one governing interaction. The interaction is the invention. Everything else is dependent claims.
§1 The Method
Irreducible Triangle — Claim Architecture
Every foundational computing patent reduces to 3–4 primitives whose interaction rule defines the technology. The primitives themselves are often known — the novelty is the relationship between them.
Primitive A ←→ Primitive B PageRank: nodes + links + ranking
\ / RSA: message + encryption + decryption
Primitive C TCP/IP: packet + routing + acknowledgement
↓ Blockchain: tx + block + consensus
f(A, B, C) → outcome Sov: identity + coherence + governance
The independent claim protects f(A, B, C) → outcome. Dependent claims add variations, then implementation details. Three primitives give you: representation, transformation, outcome.
§2 Extracted Irreducible Triangles
Each patent family reduced to its core trinity. The governing interaction (italic) is the independent claim.
- P1 Identity vector — narrative embedding of user
- P2 Coherence function — cosine similarity to stored identity
- P3 Authorization state — approve / deny / escalate / delay
- P1 Temporal vector — 8D Fourier encoding of time
- P2 Decay function — exponential half-life trust erosion
- P3 Governance gate — threshold-based state transition
- P1 Semantic anchor pair — source + anti reference embeddings
- P2 Distance metric — L2 (relevance) + cosine delta (alignment)
- P3 Hysteresis gate — Schmitt trigger with 4 auth states
- P1 Content encoding — V1 cylindrical helix (lossless)
- P2 Shape tensor — 12D geometric fingerprint
- P3 Motif classifier — nearest-neighbor in shape space
- P1 Modal vectors — narrative, physical, temporal, role, location
- P2 Fusion function — multi-modal vector composition
- P3 Governed memory graph — storage with trust metadata
- P1 Semantic signal — real-time multi-modal data stream
- P2 Drift detection — deviation from identity baseline
- P3 Governance action — firewall / escalate / deny / audit
- P1 Verified identity vector — from Logos authentication
- P2 Ontology map — semantic role definitions and permissions
- P3 Role assignment — dynamic permission grant
- P1 Multi-modal input — local device capture
- P2 Semantic transformation — input to memory vector
- P3 Identity alignment — system adapts to user
- P1 Parsed intent — semantic representation of user request
- P2 Action ontology — available operations and their constraints
- P3 Governed routing — constitutional constraint enforcement
- P1 Isolation boundary — air-gapped execution environment
- P2 Governance engine — local policy enforcement
- P3 Provenance replay — audit trail reconstruction
- P1 Multi-modal Wisp — composite identity object
- P2 Compression function — coherence-preserving quantization
- P3 Rehydration function — governed reconstruction
- P1 Declarative intent — role/agent/procedure specification
- P2 Layered validation — ethics, coherence, role, reflection
- P3 Instantiated entity — governed runtime object
- P1 Value embeddings — human values as vectors
- P2 Behavioral coherence — real-time action evaluation
- P3 Override authority — constitutional constraint enforcement
- P1 Wisp graph — semantic memory lattice
- P2 Relationship inference — automatic edge discovery
- P3 Governance validation — trust-gated connection approval
- P1 Multi-modal input streams — text, voice, biometric, spatial
- P2 Transformer fusion — cross-attention composition
- P3 Coherent Wisp — fused identity representation
- P1 Governance event — any system action producing audit
- P2 Merkle chain — hash-linked immutable record
- P3 Verification proof — cryptographic integrity attestation
- P1 Atomic tick — 100ms frame broadcast
- P2 TimeState — spiral coord + decay factor + baseline
- P3 Freshness score — composite age + recency metric
- P1 Quantized vector — i8 compressed embedding
- P2 Dual-tier manifold — Neocortex (HNSW) + Hippocampus
- P3 Governance mask — tenant-level access control
§4 Kronos — Full Claim Tree
The Kronos section includes the full 10-pillar structure and expanded dependent claims from your source.
§4b SAGE — Full Claim Tree
Dual-anchor geometric authorization, Schmitt-trigger hysteresis, pluggable trust modules, and governance chain coverage.
| Source | Independent | Dependent | Status |
|---|---|---|---|
| SAGE provisional (filed) | 5 (vague) | 0 | Filed — weak claims |
| Codebase innovations | +4 | +12 | Implemented — incomplete IP coverage |
| Full tree | 9 | 22 | Target comprehensive provisional |
§4c DNA / N-Helix — Full Claim Tree
CRITICAL GAP — No filing exists. Full content-to-geometry encoding, 12D shape tensor, and motif classification coverage.
§4d Logos — Full Claim Tree (Filed Non-Provisional)
BENCHMARK FILING — Non-provisional utility patent filed. Three independent claims with eleven dependents.
§5 IP Coverage Map
| Family | Filing Status | Claim Strength | Gap |
|---|---|---|---|
| Logos | Non-provisional filed | Strong | None critical |
| Kronos | 1 thin provisional | Weak | Critical |
| DNA / N-Helix | Provisional ready | Strong | File immediately |
§6 Formal Math Signature Registry
250 formally documented signatures across 7 registries mapped to claim families.
| Registry | File | Signatures | Key Domains |
|---|---|---|---|
| sovOS Core | mathematical_formulas.md | 127+ | Temporal, Cryptographic, Geometric, Identity, Governance |
| Project Scribe | project_scribe_math.md | 24 | Helical Encoding, Shape Tensor, Manifold |
| Genesis Manifold | m_eco_genesis_manifold_math.md | 7 | Corpus Extraction, Embedding |
§7 Patent Document Exports
Generate and download full provisional documents from extracted claim trees.
Kronos_Provisional_Patent.md — 611 lines · 31 KBSov Research · Patent Infrastructure · Method v1.0