Appearance
Worked Example: Michael Cross-Context
This example is intentionally synthetic, but it is written as an execution trace rather than a narrative summary. Its purpose is to show how Entity Analytics handles identity-bearing events across multiple scopes without collapsing protected contexts into one unsafe ambient profile.
We follow one actor, “Michael,” across local, citizen-cloud, institutional, and commercial systems and show:
- how typed events are formed
- how candidate links are proposed
- how a merge may be evidentially strong yet policy-forbidden
- how blocked export paths are recorded
- how a proof artifact explains both the rejection and the safe alternative
1. Scenario
Michael participates in several distinct contexts:
- founder / builder
- patient
- parent
- citizen
- creator
A conventional ER stack would attempt to collapse these contexts into one maximally connected profile. Entity Analytics does not do that automatically. It evaluates evidence, scope compatibility, prime-mixture admissibility, and export safety as separate questions.
2. Prime-topic basis
Fix the identity-prime basis
with:
= Founder / Builder = Patient = Parent = Citizen = Creator
A topic mixture is represented as
and its binarized activation vector is
For this example, the important policy fact is that any event with active Patient prime
3. Scope model
We use the following simplified scopes:
= local device / browser = citizen cloud under user control = institutional health portal = third-party ad-tech network
with trust widening order
This ordering is illustrative. The important point is that ad-tech is wider and less trusted than local or citizen-cloud scope for protected identity-bearing events.
4. Typed event trace
We define six representative events.
4.1 Event E1 — health portal login
with:
meaning Patient + Parent
Interpretation: Michael authenticates to a health portal while acting in a medical and family context.
4.2 Event E2 — local browser page view
with:
meaning Patient
Interpretation: a local page view occurs in a patient-bearing context.
4.3 Event E3 — third-party pixel fire attempt
with:
meaning Patient
Interpretation: an export-like event attempts to carry patient-bearing context into ad-tech scope.
4.4 Event E4 — citizen cloud sync
with:
meaning Founder + Citizen + Creator
Interpretation: a non-medical local bundle is synchronized into a citizen-cloud scope.
4.5 Event E5 — SSO token replay attempt
with:
initially unknown
Interpretation: an attempted replay appears in a wider scope.
4.6 Event E6 — marketer-safe segment export
with:
meaning Founder + Citizen + Creator
Interpretation: the system emits a bounded export from allowed, coarsened non-patient context.
5. Candidate link analysis
Suppose the system proposes the following candidate relations:
between and due to stable email hash, device continuity, and session adjacency between and due to browser continuity and referer overlap between and due to shared actor evidence but weaker topic overlap between and due to namespace similarity and replay indicators
These are candidate links, not final merges.
Let comparator vector be
Assume:
with threshold
Pure evidence would propose that
6. Policy gate evaluation
Let policy gate be
The merge rule is
6.1 Pair
Both events involve protected medical context, but remain within health/local scopes and do not attempt forbidden export.
Result:
not automatic allow, because medical context is involved and operator review may be required before a stronger merge state is asserted.
6.2 Pair
This pair is evidentially strong but policy-forbidden because a Patient-bearing context is attempting to cross into ad-tech scope.
Define a block predicate
Then:
and therefore
despite the high evidence score.
This is the central point of the system: confidence is not permission.
6.3 Pair
This pair is weaker evidentially and spans different prime mixtures. It may remain a candidate relation without merge.
Result:
with no materialized merge.
6.4 Pair
Replay indicators suggest namespace or token leakage. Congruence analysis is triggered before any identity join is allowed.
Result:
pending replay investigation.
7. Congruence and non-escape check
For the replay attempt
Suppose a reserved handle namespace from a narrower trusted scope is typed as
or more strongly as an HSM-scoped non-exportable class.
If the observed token fragment in
8. Entity graph outcome
The resulting governed graph may contain:
- asserted reviewable relation between medical/local events
- blocked edge from patient-bearing local event to ad-tech pixel event
- blocked replay-associated edge for token namespace escape
- allowed citizen-cloud export edge for coarsened non-patient output
In edge-language form:
as reviewable medical/local relation as blocked-by-policy as blocked-by-non-escape / replay concern as allowed bounded export
9. Proof artifact sketch
The blocked export decision must produce an artifact
- claim: “Patient-bearing local event may be merged/exported into ad-tech scope”
- result: rejected
- evidence atoms: browser continuity, referer overlap, temporal adjacency
- blocking policy: patient-to-ad-tech forbidden
- scopes involved:
- prime mixture: Patient active
- decision rule: evidential threshold met but policy gate blocked
- counterexample trace:
- replay hook: artifact and policy version hashes
- safe alternative: emit only bounded non-patient cohort output
10. Safe alternative
The system must not stop at “no.” It must provide the safe path.
Instead of allowing
- coarse cohort label
- approved time window
- thresholded counts
- no patient prime activation
- no third-party cookie identifiers
- no raw event lineage beyond artifact-safe summary
This is how usefulness is preserved without turning the platform into ambient identity extraction infrastructure.
11. Why this example matters
A traditional ER platform sees strong evidence and asks whether two records must be collapsed.
Entity Analytics asks a stricter sequence:
- Is the relation evidentially real?
- In what scope is it real?
- Is a link allowed?
- Is a merge allowed?
- Is an export allowed?
- Can the system prove why?
That difference is the whole design. The same evidence that improves linkage can also become the channel by which protected identity primes leak. The purpose of the framework is to make that channel explicit, reviewable, reversible, and provable.