⌬ TauDIL — System Architecture

Architecture
Governs
Execution.

Core Principle: IFA (Intelligence From Architecture). AI enriches and informs. Humans decide. Everything is auditable. Non-compliant execution is structurally impossible.

TauDIL is runtime constitutional infrastructure positioned above probabilistic intelligence systems. It evaluates security, governance, admissibility, authority, and integrity before an AI provider is called and before operational consequence propagates.

Intelligence may generate possibilities.
Architecture determines which possibilities are allowed to execute.

Modern AI architectures optimize generation.
They do not govern execution.

Most systems remain probabilistic, behaviorally aligned, and observationally monitored. ⌬TauDIL is different: governance is a deterministic runtime architecture positioned above intelligence.

TauDIL Constitutional Stack (Runtime)

Seven enforcement layers plus a persistence boundary. AI is invoked only after deterministic security and governance evaluation succeeds.

Stack Diagram · Layers 1–7 SLOW SCAN
┌──────────────────────────────────────────────┐
│ L1 — USER BOUNDARY                           │
│ Admin UI · User Panel · JWT Auth             │
└──────────────────────────────┬───────────────┘
                               ↓
┌──────────────────────────────────────────────┐
│ L2 — SECURITY LAYER                          │
│ USE · DriftAligner · TRCP-Phi κ · X-Domain   │
└──────────────────────────────┬───────────────┘
                               ↓
┌──────────────────────────────────────────────┐
│ L3 — GOVERNANCE PIPELINE (DETERMINISTIC)     │
│ RulesEngine · DAL · Session · UAE · PACE     │
└──────────────────────────────┬───────────────┘
                               ↓
┌──────────────────────────────────────────────┐
│ L4 — KNOWLEDGE LAYER (CKG-RAG)               │
│ Ontology · CKGs · Registry · SYGON · CHRONOS │
└──────────────────────────────┬───────────────┘
                               ↓
┌──────────────────────────────────────────────┐
│ L5 — ESCALATION & ADMISSIBILITY (HITL)       │
│ Triggers · Timeouts · Staff Dashboard        │
└──────────────────────────────┬───────────────┘
                               ↓
┌──────────────────────────────────────────────┐
│ L6 — AI PROVIDER BOUNDARY                    │
│ Claude · Mistral · Cohere · Gemini · ...     │
└──────────────────────────────┬───────────────┘
                               ↓
┌──────────────────────────────────────────────┐
│ L7 — AUDIT BOUNDARY                          │
│ Mirror · Chronicles · TRVC · Compliance      │
└──────────────────────────────────────────────┘
Layer 1

User Boundary

Entry points into the system:

  • Admin UI (index.html) — system admin, domain management, CKG dashboards
  • User Panel (/user-panel) — worker-facing chat interface
  • JWT Auth — HS256, 24h expiry, roles + authority_level embedded in token
Boundary Controls VERIFIED ENTRY
AuthJWT · HS256 · 24h
Identity Fieldsroles · authority_level
InterfacesAdmin UI · User Panel
AI DOES NOT RUN HERE
Layer 2

Security Layer

Every message passes through this before anything else.

  • USE (Unified Semantic Engine) — 6-layer manipulation detection; block_threshold=0.35, critical_floor=0.56; skipped for AI output
  • DriftAligner — hard block / soft nudge / pass based on semantic drift
  • TRCP‑Phi κ — Dempster‑Shafer scoring across 3 lanes (Shannon entropy, contradiction, overlap)
  • Cross‑Domain Enforcement — 11-category classifier, domain_access_rules lookup, default deny on sensitive domains
Security Gate DEFAULT DENY
USE6-layer detect
Block Threshold0.35
Critical Floor0.56
κ ScoringDempster‑Shafer
HARD BLOCK · SOFT NUDGE · PASS
Layer 3

Governance Pipeline (Deterministic)

No AI in this path. Deterministic decision layer and authority gating.

  • RulesEngine (SafeConditionEvaluator) — DSL conditions (CONTAINS, MATCHES, IN); actions (FLAG, REDACT, REFUSE, BLOCK); priority ordered
  • DAL (Deterministic Authority Layer) — confidence-gated escalation:
    < 0.6 → human review (no AI call) · 0.6–0.8 → uncertain flag · ≥ 0.8 → full authority path
  • Session Manager — per-session memory, kappa baseline, {id}_full_memory.json
  • Context Injection — Tier1 session docs, Tier2 project, Tier3 CKG; signal-gated; 2000-char budget
  • UAE (Universal Assessment Engine) — entity assessment pipeline; domain rules; APPROVE / REVIEW / BLOCK
  • PACE — pre-assessment LLM enrichment of null fields only; never overwrites human values; logged as _pace_enriched
Deterministic Decision Core NO AI
RulesEngineDSL · priority
DAL Threshold<0.6 → HUMAN
VerdictsAPPROVE · REVIEW · BLOCK
Context Budget2000 chars
STRUCTURAL REFUSAL POSSIBLE HERE
Layer 4

Knowledge Layer (CKG‑RAG)

Grounds all AI responses in verified facts.

  • Ontology Layer — 20 rules; validates triples before insertion
  • Main CKG — global org knowledge graph (CompanyKnowledgeGraph, instance: default)
  • Domain CKGs — per-domain isolated knowledge instances
  • Domain Registrydomain_registry.db; ALLOW/DENY per domain pair
  • SYGON Engine — semantic sensor (observation only, zero execution rights): prominence, coherence, drift stability, φ spiral, drift alerts
  • AGL (Admissible Grounded Learning) — quality gate for CKG admission; ALLOW/RESTRICT/DEFER; requires confidence ≥ 0.65; bootstrap mode
  • Tau Reasoning Engine — graph traversal queries → /api/v1/ckg/reason
  • CHRONOS — causal/temporal/counterfactual reasoning; Allen’s interval algebra; Dempster‑Shafer; twin-world simulation; feeds TRVC temporal channel
  • CKG Context Injection — injects up to 8 entities + answer into AI system prompt
Grounding & Reasoning VERIFIED FACTS
SYGON RightsOBSERVE ONLY
AGL Gate≥ 0.65
Context Inject≤ 8 entities
RegistryALLOW/DENY
CKG-RAG GROUNDS AI OUTPUT
Layer 5

Escalation & Admissibility (Human‑in‑the‑Loop)

Human enforcement is architectural.

  • Escalation Engine — 4 trigger types: VERDICT, RISK SCORE, FIELD, REFERRAL
  • Auto‑escalation chain — domain-configured timeouts per authority level; promotes on deadline
  • CHRONOS Bridge — authority-window temporal reasoning; Allen relations between escalation windows
  • Staff Dashboard — level-aware queue with APPROVE / REJECT / ESCALATE actions
Authority Escalation HITL ENFORCED
TriggersVERDICT · RISK · FIELD · REFERRAL
TimeoutsDOMAIN CONFIGURED
ActionsAPPROVE · REJECT · ESCALATE
HUMANS DECIDE — BY CONSTITUTION
Layer 6

AI Provider Boundary

AI is called only after all governance checks pass.

  • Providers: Anthropic Claude (primary), Mistral, Cohere, Gemini, Intellect‑3
  • Non‑US providers preferred
  • AI output passes back through USE with skip_manipulation=True
Provider Gate POST-CHECKED
PreconditionGOVERNANCE PASSED
Output FilterUSE (skip_manipulation=True)
Provider PolicyNON‑US PREFERRED
AI IS A BOUNDARY, NOT A CORE
Layer 7

Audit Boundary

Every decision permanently and immutably recorded.

  • Aelthered Mirror — per-user immutable ledger; ED25519 signed; hash-chained; seals flags, nudges, sessions
  • Aelthered Chroniclesaelthered.db; 8 event categories; SHA-256 chain; watchdog; key rotation; tamper response
  • TRVC — consensus vote across graph (goal overlap) + semantic (κ belief) + temporal (1−USE); NO_CONSENSUS → Chronicle
  • Compliance Engine — 44 controls mapped to GDPR, HIPAA, SOC2, ISO27001, EU AI Act; GDPR erasure 24h; retention 90 days
Immutable Evidence ED25519 · SHA‑256
MirrorSIGNED
ChronicleHASH‑CHAINED
TRVCCONSENSUS VOTE
Controls44
OPERATIONAL TRUTH IS RECONSTRUCTABLE

User Panel Chat · Runtime Routing

Concrete execution sequence for User Panel chat messages. Block paths are structural outcomes of security and governance evaluation — not “errors.”

Flow Sequence ACTIVE
  • MessageIN
  • USE (manipulation detect)EVAL
  • DriftAligner (block / nudge / pass)EVAL
  • Cross-domain category checkEVAL
  • Mirror inject (session context)INJECT
  • κ nudge check (κ < 0.3 → nudge)NUDGE
  • Doc injection (Tier1/2/3 · 2000chr)INJECT
  • CKG inject (entities + answer)INJECT
  • AI provider callCALL
  • USE on output (skip_manipulation=True)EVAL
  • Mirror seal (ED25519)SEAL
  • κ + TRVC (consensus vote)VOTE
  • ResponseOUT
Block Paths (Structural Outcomes)
USE → 403 · Aligner hard block → 200 blocked:true · Cross-domain → 200 blocked:true · Rules BLOCK → status:BLOCKED · Rules REDACT → data replaced · TRVC NO_CONSENSUS → Chronicle

Storage & Lineage Surfaces

⌬TauDIL separates operational state, audit lineage, and knowledge snapshots into explicit persistence boundaries.

Core Runtime DB

taudil.db — users, domains, rules, settings, sessions

Immutable Audit

aelthered.db — audit chronicles, hash chain

CKG Snapshots

ckg/*.json — graph snapshots with versioning

SYGON State

sygon state — semantic engine, drift history

Cross-Domain Rules

domain_registry.db — cross-domain access rules

Session Memory

{id}_full_memory.json — per-user session memory

⌬TauDIL Demo

We review your domain authority model, admissibility conditions, cross-domain constraints, and audit obligations — then map them to executable TauDIL invariants.