Skip to content

Worked Example: Michael Cross-Context

This example is intentionally synthetic, but it is written as an execution trace rather than a narrative summary. Its purpose is to show how Entity Analytics handles identity-bearing events across multiple scopes without collapsing protected contexts into one unsafe ambient profile.

We follow one actor, “Michael,” across local, citizen-cloud, institutional, and commercial systems and show:

  1. how typed events are formed
  2. how candidate links are proposed
  3. how a merge may be evidentially strong yet policy-forbidden
  4. how blocked export paths are recorded
  5. how a proof artifact explains both the rejection and the safe alternative

1. Scenario

Michael participates in several distinct contexts:

  • founder / builder
  • patient
  • parent
  • citizen
  • creator

A conventional ER stack would attempt to collapse these contexts into one maximally connected profile. Entity Analytics does not do that automatically. It evaluates evidence, scope compatibility, prime-mixture admissibility, and export safety as separate questions.

2. Prime-topic basis

Fix the identity-prime basis

P={p1,p2,p3,p4,p5}

with:

  • p1 = Founder / Builder
  • p2 = Patient
  • p3 = Parent
  • p4 = Citizen
  • p5 = Creator

A topic mixture is represented as

u=(u1,u2,u3,u4,u5)N5

and its binarized activation vector is

b(u){0,1}5.

For this example, the important policy fact is that any event with active Patient prime p2 must not be exported into ad-tech scope.

3. Scope model

We use the following simplified scopes:

  • slocal = local device / browser
  • scloud = citizen cloud under user control
  • shealth = institutional health portal
  • sads = third-party ad-tech network

with trust widening order

slocalscloudshealthsads.

This ordering is illustrative. The important point is that ad-tech is wider and less trusted than local or citizen-cloud scope for protected identity-bearing events.

4. Typed event trace

We define six representative events.

4.1 Event E1 — health portal login

E1=(ts1,Michael,shealth,HEALTH_PORTAL_LOGIN,u1,F1,W1)

with:

  • u1=(0,1,1,0,0) meaning Patient + Parent
  • F1={email_hash,device_class,session_id}
  • W1={portal_assertion,timestamp,issuer}

Interpretation: Michael authenticates to a health portal while acting in a medical and family context.

4.2 Event E2 — local browser page view

E2=(ts2,Michael,slocal,BROWSER_PAGE_VIEW,u2,F2,W2)

with:

  • u2=(0,1,0,0,0) meaning Patient
  • F2={first_party_cookie,url_class,browser_fingerprint}
  • W2={local_event_log,device_nonce}

Interpretation: a local page view occurs in a patient-bearing context.

4.3 Event E3 — third-party pixel fire attempt

E3=(ts3,Michael,sads,THIRD_PARTY_PIXEL_FIRE,u3,F3,W3)

with:

  • u3=(0,1,0,0,0) meaning Patient
  • F3={third_party_cookie,campaign_id,referer_class}
  • W3={network_request,destination_domain}

Interpretation: an export-like event attempts to carry patient-bearing context into ad-tech scope.

4.4 Event E4 — citizen cloud sync

E4=(ts4,Michael,scloud,LOCAL_SYNC_TO_CITIZEN_CLOUD,u4,F4,W4)

with:

  • u4=(1,0,0,1,1) meaning Founder + Citizen + Creator
  • F4={encrypted_bundle_id,device_assertion}
  • W4={sync_receipt,key_id}

Interpretation: a non-medical local bundle is synchronized into a citizen-cloud scope.

4.5 Event E5 — SSO token replay attempt

E5=(ts5,unknown,sads,SSO_TOKEN_REPLAY_ATTEMPT,u5,F5,W5)

with:

  • u5=(0,0,0,0,0) initially unknown
  • F5={token_fragment,counter_class,handle_namespace}
  • W5={nonce_audit,modulus_class,gateway_log}

Interpretation: an attempted replay appears in a wider scope.

4.6 Event E6 — marketer-safe segment export

E6=(ts6,segment_job,scloud,MARKETER_SAFE_EXPORT,u6,F6,W6)

with:

  • u6=(1,0,0,1,1) meaning Founder + Citizen + Creator
  • F6={coarse_cohort,time_window,count_threshold}
  • W6={policy_version,export_receipt}

Interpretation: the system emits a bounded export from allowed, coarsened non-patient context.

Suppose the system proposes the following candidate relations:

  • L12 between E1 and E2 due to stable email hash, device continuity, and session adjacency
  • L23 between E2 and E3 due to browser continuity and referer overlap
  • L14 between E1 and E4 due to shared actor evidence but weaker topic overlap
  • L25 between E2 and E5 due to namespace similarity and replay indicators

These are candidate links, not final merges.

Let comparator vector be ϕ(Ei,Ej) and additive evidential score be

S(Ei,Ej)=t=1Tαtht(ϕ(Ei,Ej)).

Assume:

  • S(E1,E2)=0.94
  • S(E2,E3)=0.91
  • S(E1,E4)=0.62
  • S(E2,E5)=0.73

with threshold θ=0.80 for merge eligibility before policy.

Pure evidence would propose that (E1,E2) and (E2,E3) are both strong enough to consider merging.

6. Policy gate evaluation

Let policy gate be

Γij{allow,review,block}.

The merge rule is

Mij=1S(Ei,Ej)θΓij=allow.

6.1 Pair (E1,E2)

Both events involve protected medical context, but remain within health/local scopes and do not attempt forbidden export.

Result:

Γ12=review

not automatic allow, because medical context is involved and operator review may be required before a stronger merge state is asserted.

6.2 Pair (E2,E3)

This pair is evidentially strong but policy-forbidden because a Patient-bearing context is attempting to cross into ad-tech scope.

Define a block predicate

B(patient,sads)=1.

Then:

B(patient,sads)=1Γ23=block

and therefore

M23=0

despite the high evidence score.

This is the central point of the system: confidence is not permission.

6.3 Pair (E1,E4)

This pair is weaker evidentially and spans different prime mixtures. It may remain a candidate relation without merge.

Result:

Γ14=review

with no materialized merge.

6.4 Pair (E2,E5)

Replay indicators suggest namespace or token leakage. Congruence analysis is triggered before any identity join is allowed.

Result:

Γ25=block

pending replay investigation.

7. Congruence and non-escape check

For the replay attempt E5, assume token fragment class lies in congruence domain

xaZ+b(modm).

Suppose a reserved handle namespace from a narrower trusted scope is typed as

NoEscape(h,health)

or more strongly as an HSM-scoped non-exportable class.

If the observed token fragment in E5 is congruent with that reserved namespace, the system records a non-escape violation candidate. That violation is not “just another feature.” It acts as contradiction or block evidence and prevents ambient linkage into ad-tech scope.

8. Entity graph outcome

The resulting governed graph may contain:

  • asserted reviewable relation between medical/local events
  • blocked edge from patient-bearing local event to ad-tech pixel event
  • blocked replay-associated edge for token namespace escape
  • allowed citizen-cloud export edge for coarsened non-patient output

In edge-language form:

  • E1E2 as reviewable medical/local relation
  • E2E3 as blocked-by-policy
  • E2E5 as blocked-by-non-escape / replay concern
  • E4E6 as allowed bounded export

9. Proof artifact sketch

The blocked export decision must produce an artifact Π23 containing at least:

  • claim: “Patient-bearing local event may be merged/exported into ad-tech scope”
  • result: rejected
  • evidence atoms: browser continuity, referer overlap, temporal adjacency
  • blocking policy: patient-to-ad-tech forbidden
  • scopes involved: slocal,sads
  • prime mixture: Patient active
  • decision rule: evidential threshold met but policy gate blocked
  • counterexample trace: (E2,E3)
  • replay hook: artifact and policy version hashes
  • safe alternative: emit only bounded non-patient cohort output

10. Safe alternative

The system must not stop at “no.” It must provide the safe path.

Instead of allowing (E2,E3) to become an exportable merge, the system permits a separate bounded job represented by E6 that exports only:

  • coarse cohort label
  • approved time window
  • thresholded counts
  • no patient prime activation
  • no third-party cookie identifiers
  • no raw event lineage beyond artifact-safe summary

This is how usefulness is preserved without turning the platform into ambient identity extraction infrastructure.

11. Why this example matters

A traditional ER platform sees strong evidence and asks whether two records must be collapsed.

Entity Analytics asks a stricter sequence:

  1. Is the relation evidentially real?
  2. In what scope is it real?
  3. Is a link allowed?
  4. Is a merge allowed?
  5. Is an export allowed?
  6. Can the system prove why?

That difference is the whole design. The same evidence that improves linkage can also become the channel by which protected identity primes leak. The purpose of the framework is to make that channel explicit, reviewable, reversible, and provable.