Trust & Assurance Calculus (F–G–R with Congruence)

About this pattern

This is a generated FPF pattern page projected from the published FPF source. It is canonical FPF content for this ID; it is not a fpf-memory product feature page.

How to use this pattern

Read the ID, status, type, and normativity first. Use the content for exact wording, the relations for adjacent concepts, and citations to keep active work grounded without pasting the whole specification.

Plain‑English headline. B.3 defines how assurance (trust) is computed and propagated for both physical systems and knowledge artifacts, using a small typed assurance tuple (F–G–R: F/R characteristics plus G as scope object) and conservative aggregation rules that respect the Γ‑invariants and A.15 Strict Distinction. It treats the Working‑Model layer as the publication-facing assertion layer for claims, with assurance attached downward (Mapping - Logical - Constructive - Empirical) per E.14.

Use this when. Use B.3 when a claim, label, dashboard, evidence bundle, model, report, or gate-support package is being used to raise assurance, trust, readiness, compliance, safety, release confidence, F, G, R, or CL for a named claim. First output. One typed Assurance(H, C \| K, S) claim per named assurance claim C, or an explicit no-assurance-use disposition when the visible item is only a cue, evidence pointer, wording issue, gate decision, role/status assertion, commitment, or work occurrence. Not this pattern when. Not when the item is only a cue, action invitation, boundary wording, evidence/currentness question, gate decision, release decision, role/status assertion, commitment, or work occurrence; use A.15, A.6, A.10, A.21, A.20, A.2.1, A.2.8, A.2.9, or A.15.1 as appropriate.

Assurance load posture. Use the lightest assurance result that can decide the live use. A cue or source pointer gets no B.3 tuple. A local, non-release, non-compliance, non-safety, non-reused claim may be written as a compact bounded assurance claim statement that names claim, intended use, evidence pointer, limit, and stop/reopen condition. Reserve a full typed Assurance(H, C \| K, S) claim for readiness, compliance, safety, release confidence, trust, F, G, R, CL, or reused assurance input.

Continuous assurance posture. Treat an assurance claim as an engineering-process state that can decay, reopen, narrow, or be withdrawn, not as a one-time checklist result. For model, data, AI, documentation, release, or operational assurance, name the drift, monitoring, incident, evidence-refresh, version-change, policy/gate-change, or residual unsupported-use condition that reopens the assurance claim.

Every non‑trivial result in FPF—a composed system is safe, a model is credible, a conclusion holds—is a claim that rests on composed evidence.

Keywords

  • trust
  • assurance
  • reliability
  • F-G-R
  • formality
  • scope
  • congruence
  • evidence
  • claim-strength posture
  • authority-looking labels
  • dashboard tiles
  • probe/distributed/export/causal assurance.

Relations

B.3coordinates withQuantum-Like Modeling Lens
B.3prerequisite forB.3.x
B.3coordinates withHuman-Centric Working-Model
B.3explicit referenceEvidence Graph Referring (C-4)
B.3explicit referenceDependency Graph & Proofs
B.3explicit referenceHuman-Centric Working-Model
B.3explicit referenceAssurance Subtypes & Levels
B.3explicit referenceOntological Parsimony (C-5)
B.3explicit referenceCanonical Evolution Loop

Content

Problem frame

Every non‑trivial result in FPF—a composed system is safe, a model is credible, a conclusion holds—is a claim that rests on composed evidence.

  • For U.System holons (Γ_sys), assurance is about capabilities and constraints under stated conditions.
  • For U.Episteme holons (Γ_epist), assurance is about the quality of support for a statement or model.

To make such claims comparable and auditable across domains, B.3 introduces a Trust & Assurance Calculus that:

  • uses a small typed assurance tuple (F–G–R: F/R characteristics plus G as scope object) governed by conservative propagation rules (this is not a state space),
  • accounts for integration quality via Congruence Level (CL) along the edges of a DependencyGraph (B.1.1, A.14),
  • and composes these values with Γ‑flavours while respecting the Invariant Quintet (IDEM, COMM/LOC or their replacements, WLNK, MONO).

B.3 is conceptual and normative: it defines which assurance components must be published and how they propagate. How you improve those components (e.g., formalize, replicate, reconcile, or admissibly widen/narrow scope) is the job of KD‑CAL actions (the knowledge‑dynamics patterns; references are descriptive, not required to read here).

Mechanism linkage. For law‑governed operation families (e.g., USM/UNM) authored as mechanisms, use A.6.1 — U.Mechanism to publish OperationAlgebra/LawSet/AdmissibilityConditions and the Transport clause (Bridge‑only, CL/CL^k/CL^plane). All such penalties reduce R/R_eff only; F/G remain invariant.

Working‑Model handshake (alignment with E.14 - B.3.5 - C.13). Assurance consumes two inputs declared in the Working‑Model assertion layer (CT2R‑LOG, B.3.5): the justification stance validationMode ∈ {postulate, inferential, axiomatic} and, where present, the grounding link tv:groundedBy. Structural claims that aspire to the strongest guarantees rely on Constructive grounding as a Γₘ (Compose‑CAL) narrative referenced via tv:groundedBy. No assurance artefact defines Working‑Model wording or layout (downward‑only dependence, E.14).

Problem

Without a disciplined calculus, four chronic failures appear:

  1. Trust inflation: Averaging or summing heterogeneous “quality” tags yields aggregates that look better than their weakest parts, violating WLNK.
  2. Scale confusion: Mixing ordinal and ratio scales (e.g., averaging F ordinal scale values with numeric reliabilities) produces meaningless numbers.
  3. Congruence blindness: Integration quality (how well pieces fit) is invisible; brilliantly strong parts connected by weak mappings produce overconfident wholes.
  4. Scope drift: Design‑time formalism and run‑time evidence are composed into a single score; dashboards then claim “assurance” for a blueprint using live data, or vice versa.

Forces

ForceTension
Conservatism vs. SynthesisAvoid overclaiming (WLNK) ↔ allow real gains from better integration (raise CL) or true emergence (B.2).
Universality vs. Domain nuanceOne calculus for systems and epistemes ↔ physics and epistemology use different primitives; keep them comparable but not identical.
Simplicity vs. FidelityKeep the assurance tuple small and typed (A.11) ↔ capture enough structure to be informative and improvable by KD‑CAL actions.
Static clarity vs. Dynamic evolutionA score must be reproducible today ↔ tomorrow it should legitimately rise after formalization, replication, or reconciliation.

Solution — Part 1: The assurance tuple and the universal aggregation skeleton

B.3 defines what the assurance components are, how they live on nodes and edges of the dependency graph, and the shape of the aggregation that any Γ‑flavour must honor when producing an assurance result.

The F–G–R assurance components (typed; F/R CHR, G USM)

We standardize two node characteristics, one node scope object, and one edge characteristic:

  1. Formality (F)how constrained the reasoning is by explicit, proof‑grade structure.

    • Scale kind: ordinal (its scale values do not admit arithmetic).
    • Canonical scale values (example): F0 Informal prose - F1 Structured narrative - F2 Formalizable schema - F3 Proof‑grade formalism.
    • Monotone direction: higher is better (never lowers assurance when all else fixed).
  2. ClaimScope (G)the declared set of U.ContextSlice where the result applies.

    • Type: set‑valued USM scope object (A.2.6), not a CHR characteristic.
    • Well‑typed operations: membership and set algebra (, , , , SpanUnion, plus declared Bridge translation / widen / narrow / refit).
    • Scalar proxy (report‑only): if a profile needs a number for reporting, it MAY publish an explicitly declared CoverageMetric(G); such a proxy MUST NOT replace G in norms, gates, bridge semantics, or CL routing.
  3. Reliability (R)how likely the claim/behavior holds under stated conditions.

    • Scale kind: ratio in [0,1] (or a conservative ordinal proxy when numeric modeling is unavailable).
    • Monotone direction: higher is better.
  4. Congruence Level (CL)edge property: how well two parts fit (semantic alignment, calibration, interface Standard).

    • Scale kind: ordinal with a monotone penalty function Φ(CL) where Φ decreases as CL increases.
    • Canonical scale values (example): CL0 weak guess - CL1 plausible mapping - CL2 validated mapping - CL3 verified equivalence.
    • Interpretation: low CL reduces the credibility of the integration itself (not the parts), and therefore penalizes the aggregate R.

Strict Distinction (A.15).

  • Assurance components live as value/scope claim components: F/R as characteristics, G as a scope object, while Γ‑flavours fold structure/order/time.
  • Do not smuggle assurance components into structural edges; keep F/R/CL explicit as CHR metadata and G explicit as a USM scope object.

Assurance shoulders (Working‑Model split). Mapping raises TA (typing, fit/CL). Logical and Constructive contribute to VA (intended relation semantics; Γₘ extensional identity for structure). Empirical Validation contributes to LA (evidence in a bounded context). These supports attach downward from the Working‑Model assertion layer (E.14).

Assurance as a typed claim

B.3 speaks about assurance of a specific typed claim C over a holon H under context K and scope S ∈ {design, run}:

Assurance(H, C | K, S) = ⟨F_eff, G_eff, R_eff, Notes⟩
  • C examples: meets load L, argument Q holds, model M predicts within δ.
  • K binds assumptions (environment, usage, priors).
  • Notes include the SCR (all sources, B.1.3), OrderSpec/TimeWindow where applicable (B.1.4), cutsets, and evidence citations (A.10).

This tuple gives readers an at‑a‑glance view (didactic primacy) while preserving the pieces needed for audit and improvement.

Validation modes (declaration, normative). Each published Working‑Model assertion SHALL declare validationMode ∈ {postulate, inferential, axiomatic} (E.14). — postulate → pragmatic working claim; Empirical Validation is required for audit. — inferential → reasoned consequence; Logical assurance carries the reasoning requirement. — axiomatic → constructive identity; structural edges MUST provide a Γₘ narrative and a tv:groundedBy pointer (C.13, B.3.5).

Design vs run (no chimeras). Assurance tuples for design‑time and run‑time SHALL be reported separately and not composed into a single score; see the Scope drift hazard in §2 and the obligations in B.3.3.

Authority-looking labels and dashboard tiles

A badge, label, score, dashboard tile, credential display, provenance mark, compliance-looking mark, model card, datasheet, data card, assurance document, attestation label, assurance-looking note, or generated confidence phrase does not enter assurance calculus or improve F, G, R, CL, readiness, safety, compliance, trust, release confidence, or assurance by display alone.

Adversarial misuse guard. Do not let greenwashed dashboards, compliance-looking badges, old model cards, provenance labels, assurance-looking documents, or generated confidence phrases launder missing evidence, limitations, scope, decay, or argument into assurance strength.

Valid B.3 dispositions for such an item are:

DispositionUse whenOutput
No assurance useThe item is only a cue, source pointer, evidence/currentness question, gate decision, role/status assertion, commitment, boundary wording, or work occurrence.Return to A.15, A.10, A.6, A.21, A.20, A.2.1, A.2.8, A.2.9, or A.15.1; no tuple is needed.
Compact bounded assurance claim statementThe claim is local, non-release, non-compliance, non-safety, not reused as assurance input, and does not affect people/team status.Record the claim, intended use, evidence pointer, limit, and stop/reopen condition in the current work artifact.
Full assurance tupleThe item is being used to raise readiness, compliance, safety, release confidence, trust, F, G, R, or CL.One typed Assurance(H, C | K, S) claim per named assurance claim C, with argument/evidence/limitations/decay.
Rejected or downgraded assurance claimEvidence, scope, argument, currentness, or limitations do not support the attempted assurance use.State unsupported stronger use and the next legitimate strengthening or narrowing move.

Build a B.3 assurance claim only when the attempted use is assurance-strength use. The typed assurance claim must name:

FieldRequired content
Claim and intended useThe exact claim C and whether it supports readiness, release, audit, compliance, safety, model credibility, or other assurance use.
Holon/context/scopeH, K, and S plus audience or relying context when the label is human-facing.
Evaluation conditionWhat was evaluated, under which method, policy, test, review, measurement, or assurance case.
Evidence carriersThe A.10 evidence path, carrier refs, source roles, windows, verifier/relying-party rule, and proof/status results that support the assurance tuple.
Argument / support rationaleThe argument pattern, assurance case, or reason why the evidence carriers support claim C under K and S, including assumptions and defeaters/open challenges.
Limitations and rival explanationsScope limits, unsupported uses, stale display, spoofing, copied/generated text, proxy-for-value substitution, provenance-only support, context shift, and known failure conditions.
Decay/reopen conditionValid-until, revocation, policy/gate version, model/version drift, monitoring change, incident signal, evidence refresh, and contest/redress route.

Assurance evidence minimization. A typed assurance result should cite the minimum A.10 support needed for the named assurance claim and relying context. Use redacted, hashed, scoped, or role-mediated evidence refs when raw carriers would expose personal data, secrets, privileged logs, tenant identifiers, security-sensitive traces, incident details, or unnecessary identities; do not build a full assurance dossier when pointers preserve enough recoverability.

Role prompts for assurance-strength use:

Role in the situationPrompt
Assurance reviewerWhich named Assurance(H, C | K, S) claim is actually being strengthened?
Auditor/reviewerWhich evidence path, argument, limitation, decay/reopen condition, and relying context must be recoverable?
Manager or release readerWhich desired decision or action is outside B.3 and must instead use A.15, A.21, A.10, or another exact source?
Model/data readerWhich intended use, evaluation condition, version/window, limitation, drift, and incident condition bound the model/data documentation?
Evidence source roleWhat evidence carrier or scoped pointer must be exposed without turning documentation presence into assurance strength?

Display guidance for assurance labels: a readiness, safety, compliance, trust, release-confidence, or assurance display should show the named assurance claim, intended use, evaluation condition, evidence-path ref, scope/window, limitation, decay/reopen condition, and unsupported stronger uses. A label that only points to documentation should remain a source pointer, not an assurance-strength result.

Incident-learning fields for assurance overread: visible label or documentation artifact, attempted assurance claim, missing tuple or evidence-path field, unsupported stronger use, limitation or decay condition that defeated the use, next legitimate strengthening or narrowing move, and upstream repair item for documentation, evidence refs, assurance label wording, monitoring, or reopen trigger.

Contestability/redress route: when an assurance claim affects people, team status, release acceptance, compliance posture, safety posture, or resource allocation, the B.3 result should name the claim being contested, evidence path, limitation or decay condition, reviewer or decision forum, safe interim disposition, and what evidence or scope change would reopen the assurance claim.

If those fields are missing, the visible item remains an orientation label, source pointer, evidence pointer, documentation artifact, or unsubstantiated confidence cue. Return to A.15 when the question is whether the item may guide action/reliance, to A.10 when the question is evidence/currentness/provenance, and to A.6 when the question is mixed policy/API/schema wording.

Positive repaired path. When an assurance-strength use is live and the supporting fields are present, return the smallest typed assurance result that can guide work: the named claim, context/scope, evaluation condition, evidence path, argument, limitations, and decay/reopen condition. That result may improve or justify assurance only for the stated claim and scope; other action, gate, evidence, work-occurrence, or compliance uses still need their own exact sources.

Constructive assurance moves:

  • narrow G to the actually supported scope;
  • raise F by formalizing argument/method structure;
  • raise R by adding validation, replication, stronger, repeated, current, or more relevant evidence;
  • improve CL by repairing mappings, units, interfaces, or integration edges;
  • separate design assurance from run assurance;
  • add limitations, assumptions, defeaters, monitoring, drift, and reopen triggers;
  • reject or downgrade the assurance use when those moves are not available.

Negative controls:

Visible itemWhat it may supportWhat it must not support without a full tuple
Release dashboard green tileSource-finding for A.21 GateDecision / DecisionLogRef and an A.10 evidence path; when those sources are recovered, they may support gate-passage reliance outside B.3 for the named release/environment.Release approval by display, compliance proof, rollback success, work occurrence, or assurance-strength increase.

| Credential/compliance/provenance label | Bounded source, holder, status, history, or documentation support when evidenced. | Safety, truth, permission, gate passage, readiness, or assurance strength. | | Model card / datasheet / data card / assurance document / assurance-looking note | Scoped documentation for a named claim, documented intended use, evaluated condition, limitation, and version/window. | Higher R, broader G, stronger F, better CL, readiness, compliance, safety, or release confidence by document presence. | | Generated confidence phrase | Source-finding or explanation relation when grounded. | Assurance-strength increase, authority, approval, or evidence by wording alone. |

Model cards, datasheets, data cards, assurance documents, and assurance-looking notes are external documentation artifacts or source carriers unless they are mapped into existing FPF claims and publication faces. They do not add MVPK face kinds and do not bypass B.3 when the live use is assurance strength.

Lint trigger. A model card, datasheet, or data card cited as readiness, safety, compliance, release confidence, or assurance proof requires documented intended-use match, evaluation condition, limitations, an A.10 evidence path, and one typed Assurance(H, C \| K, S) claim for the named assurance claim. Without those, return no assurance use or a rejected/downgraded assurance claim.

Positive repaired example: a model card plus documented intended use, evaluation condition, version/window, limitations, an A.10 evidence path, and a typed Assurance(H, C \| K, S) claim may support assurance for that named model claim in that evaluated context. The same documentation still does not support another deployment context, gate passage, release work occurrence, or compliance proof unless those sources are separately present.

Where the numbers live (and do not)

  • On nodes: each input holon contributes its local F, G, R according to its nature (system vs. episteme).
  • On edges: each integration step has a CL (congruence of the connection).
  • Not inside Γ: Γ consumes D and returns a composed holon; B.3 governs how F, G, R, CL propagate to the Assurance tuple for that composed holon. This keeps Γ algebra and assurance calculus separable and reviewable.
  • Not a state space: ⟨F,G,R⟩ is an assurance tuple, not a U.CharacteristicSpace; do not draw “trajectories” in ⟨F,G,R⟩. For episteme evolution, use ESG states and the assurance‑trace hooks (see below).

Universal aggregation skeleton (domain‑neutral)

Any Γ‑flavour that claims an Assurance result must adopt the following conservative skeleton:

  1. Formality:

    F_eff = min_i F_i

    Rationale: the least formal piece caps the formality of the whole (WLNK on F). Monotone: raising any F_i cannot reduce F_eff.

  2. ClaimScope:

    G_eff = SpanUnion({G_i}) constrained by support
    • “SpanUnion” is a set/coverage union in the domain’s space.
    • Constraint: any region in the union unsupported by reliable parts is dropped (WLNK).
    • Monotone: adding supported span cannot reduce G_eff.
  3. Reliability (penalized by integration):

    R_raw = min_i R_i                       // Weakest-link cap
    R_eff = max(0, R_raw − Φ(CL_min))       // Congruence penalty
    • CL_min is the lowest Congruence Level (CL) value on any edge in the proof spine / critical integration region for the claim C.
    • Φ is monotone decreasing and bounded (never makes negative values).
    • Monotone: increasing any R_i or any CL cannot lower R_eff.
  4. SCR and Notes:

    • The aggregate SHALL produce a SCR listing all contributing nodes and edges, with their F, G, R, CL, scopes, and evidence links (A.10).
    • The SCR SHALL additionally display the describedEntity (describe(Object→GroundingHolon)) and the ReferencePlane for the claim, and present a separable TA/VA/LA table of evidence contributions with valid_until/decay marks and the Epistemic‑Debt per § B.3.4.
    • If order/time mattered for the claim, attach the OrderSpec or TimeWindow identifiers (B.1.4).

This skeleton is mandatory. Domain‑specific patterns may add refinements (e.g., separate epistemic “replicability” vs. “calibration”) as long as they do not violate WLNK or MONO and preserve scale kinds.

System vs. Episteme — same shape, different readings

  • For systems (Γ_sys):

    • F reads as engineering discipline (from ad‑hoc procedure to verified specification).
    • G reads as operational envelope coverage.
    • R reads as assured reliability under K (requirements, environment, test campaigns).
    • CL often arises at interfaces (Boundary‑Inheritance Standard; B.1.2): poorly controlled interfaces reduce R_eff.
  • For epistemes (Γ_epist):

    • F reads as logical/semantic formality (from prose to proof).
    • G reads as domain span (concepts, populations, conditions).
    • R reads as evidential support (replication quality, measurement integrity).
    • CL measures semantic alignment of merged constructs (terminology mapping, ontology bridges, calibration).

Agentness is separate (A.13). Agency metrics (Agency‑CHR) do not enter the skeleton by default. They may act as a contextual overlay (e.g., to argue why a supervisory policy can maintain R across disturbances), but never to bypass WLNK or the CL penalty. Grade shifts should be modeled as MHT events when they create new capabilities.

Scale discipline (CHR guard‑rails)

To prevent silent misuse:

  • Ordinal scales (F, CL): never average or subtract; only min/max, thresholds, and monotone comparisons are valid operations.
  • Coverage scales (G): use union/intersection in a declared domain space; do not “average” sets. If a numeric proxy is used (e.g., coverage ratio), it must be derived from a set operation, not vice versa.
  • Ratio scales (R): may be combined with min, max, or explicitly justified conservative functions; do not add R’s from different contexts without normalization of K (assumptions).

What improves the tuple (action-pattern overview)

B.3 remains neutral about how improvement happens, but for didactic clarity:

  • Raise F: formalize narratives (specifications, machine‑checked models).
  • Raise G: enlarge supported span (new test regimes, new populations) with adequate evidence.
  • Raise R: replicate, calibrate, tighten measurement error, reduce bias.
  • Raise CL: reconcile vocabularies, align units, formalize mappings, verify interface Standards.

Each of these corresponds to recognizable Transformer roles and KD‑CAL moves (design‑time); their run‑time counterparts are covered by Γ_time (phase evidence) and Γ_work (cost of obtaining assurance).

Prohibition (normative) — F–G–R is not a CharacteristicSpace

Do not treat ⟨F,G,R⟩ as a U.CharacteristicSpace and do not define geometric trajectories over it. Use ESG for episteme state and the assurance‑trace hooks for trends in assurance tuples.

Assurance consequence for unsupported causality-ladder climb

B.3 consumes CausalUseSupportVerdict from C.28 when an assurance claim depends on causal-use support:

CausalUseSupportVerdict = supported | bounded | unsupported | abstain

CausalAssuranceTupleTrigger is narrower than local causal-use repair. Local C.28 downgrade, reroute, or abstain does not require a new B.3 assurance tuple by itself. Create or update a B.3 tuple only when the causal-use claim is assurance-bearing, publication-bearing, release-bearing, or reused as an input to assurance, trust, certification, risk acceptance, or downstream selection. Exploratory causal wording, local authoring repair, or a C.28 cheap stop remains outside B.3 until it changes assurance or publication posture.

Unsupported causality-ladder climb lowers, blocks, or abstains from R for the affected causal-use claim. If CounterfactualSamplingRealizabilityProfile.verdict = nonrealizable, B.3 lowers or blocks R for claims that require direct counterfactual-rung evidence. If CounterfactualSamplingRealizabilityProfile.verdict = unknown, direct-realization claims are unsupported, but identified, bounded, or simulation-only supported use may still be admissible when C.28 declares the supported use and unsupported use.

Verdict consequences:

CausalUseSupportVerdictAssurance consequenceAdmissible assurance wording
supportedThe causal-use claim contributes to R only inside the named CausalUseSupportStatement, scope G, evidence support basis, and cited profile refs."Supported only for the declared causal use under the cited support basis, profile refs, and scope."
boundedR is bounded to the declared admissible-use limit; assurance prose must name the bound, the CausalUseSupportStatement, and the CausalUseUnsupportedStatement, and must not imply unqualified causal support outside them."Bounded causal support for the declared regime, population, policy, model, or window; unsupported outside that bound."
unsupportedThe causal-use claim cannot raise R; it becomes CausalUseUnsupportedStatement, is downgraded, removed, or blocks the assurance claim when the causal use is necessary."Causal use unsupported for this assurance claim; use association/metric/simulation-only wording or block the causal assurance claim."
abstainNo causal-use conclusion contributes to R; the assurance tuple either proceeds only on named non-causal grounds or abstains from the affected causal claim."No causal-use conclusion is used; assurance proceeds only on named non-causal grounds or abstains from this causal claim."

What changes in practice: assurance prose cannot say "high confidence that the policy caused improvement" when the evidence path only supports association or simulation-only counterfactual output; the unsupported causal step must degrade, abstain, or block the causal-use claim.

What this does not authorize: B.3 does not determine the causality-ladder rung, estimand, causal identification, evidence design, or realizability profile; it applies assurance consequences to the support verdict supplied by C.28 and the evidence path supplied by A.10.

B.3:5 Proof obligations (attach these when producing an Assurance tuple)

These obligations refine the generic Proof Kit from B.1.1 §6 for assurance outputs. Each Γ‑flavour that emits an Assurance(H, C | K, S) tuple MUST attach the applicable obligations below.

Common obligations (all Γ‑flavours)

  • ASS‑CLM (Typed claim & context). State the claim C (what is being assured), the context K (assumptions, environment), and the scope S ∈ {design, run}.

  • ASS‑SCA (Scale discipline). Declare the scale kind used for each characteristic (F ordinal, G coverage, R ratio) and confirm that all operations are admissible for that kind (no averaging of ordinals; G via set/coverage ops).

  • ASS‑WLNK (Weakest‑link evidence). Identify the cutset (node or edge set) that caps F/G/R for the claim (the proof spine for epistemes, the structural or assurance bottleneck for systems).

  • ASS‑CL (Congruence path). Identify the relevant integration path(s) and record CL_min used in the penalty Φ(CL_min).

  • ASS‑MAN (SCR). Produce a SCR listing all contributing nodes and edges with (F, G, R) and CL values, their DesignRunTag, and Evidence Graph Ref (A.10). If order or time were material, include the OrderSpec or TimeWindow identifiers from B.1.4.

  • ASS‑MONO (Declared monotone characteristics). List the characteristics along which local improvement cannot reduce the aggregate (this supports future evolution, B.4).

Γ_sys (systems) — additional obligations

  • CORE‑BIC (Interface congruence). Reference the Boundary‑Inheritance Standard (BIC) from B.1.2 and record any interface mismatches; these contribute to CL_min.

  • CORE‑ENV (Operating envelope). Specify the domain used for G (e.g., load–temperature region) and how coverage is computed (set union constrained by support).

Γ_epist (epistemes) — additional obligations

  • EPI‑SPN (Entailment spine). Identify the premise/lemma spine for the claim; R_raw = min R_i is taken along this spine, not over arbitrary satellites.

  • EPI‑MAP (Semantic mapping congruence). Point to the vocabulary/ontology mappings used; their verification status sets the CL values on the integration edges.

Γ\ctx / Γ\method (order‑sensitive) — additional obligations

  • CTX‑ORD (OrderSpec). Attach the partial or total order σ and any join‑soundness conditions (types, pre/post‑conditions). (See B.1.4 for NC‑1..3 invariants; B.1.5 adds duration/capability typing.)

Γ_time (temporal) — additional obligations

  • TIME‑COV (Coverage & identity). Show that PhaseOf intervals cover the declared window without overlap for the same carrier; justify any gap/overlap explicitly.

Note on Γ_work. Resource spending and efficiency live in Γ_work. Their measurement integrity can influence R for a claim (e.g., if a reliability figure depends on calibrated energy input), but costs themselves are not assurance; keep them in Γ_work and cite their measurement assurance as inputs here.

Archetypal grounding (worked examples)

System archetype — Battery pack safety claim

  • Claim C: Pack P meets discharge current L with thermal safety margin δ in environment K.

  • Context K: Ambient ≤ 35 °C; airflow ≥ X; duty cycle Y. Scope S = run.

  • Graph: Cells ComponentOf modules ComponentOf pack; BIC exposes main power and thermal interface.

  • Inputs:

    • F per node: module spec F2, cell test F1 → F_eff = F1.
    • G: operating envelope regions; union constrained by supported test regimes.
    • R: per‑module reliability from test data; cutset is hot‑spot path near weakest cell.
    • CL: interface congruence (sensor calibration CL2; thermal contact CL1).
  • Aggregation:

    • R_raw = min R_i along the thermal cutset.
    • R_eff = max(0, R_raw − Φ(CL_min=CL1)).
    • G_eff: union of supported (L,T) rectangles, dropping regions lacking validated thermal data.
    • F_eff = min(F_cell=F1, F_module=F2) = F1.
  • SCR: Evidence for calibration, test campaigns, BIC.

  • Improvement path: raise CL (better thermal interface verification), raise F (formal thermal model), add supported envelope → R_eff and G_eff increase monotonically.

Episteme archetype — Meta-analysis claim

  • Claim C: Intervention X reduces outcome O by Δ on population P.

  • Context K: Inclusion/exclusion criteria, measurement protocol; S = design.

  • Graph: Studies MemberOf evidence corpus; effect models ConstituentOf synthesis; mappings align different outcome scales.

  • Inputs:

    • F: two RCTs at F3, one observational at F2 -> F_eff = F2.
    • R: per-study replication/quality -> weakest R on the entailment spine caps R_raw.
    • CL: mapping of scales (CL1 vs CL3).
    • G: populations union, but unsupported sub-populations are dropped.
  • Aggregation:

    • F_eff = F2 from the weakest study-design support in the synthesis.
    • R_eff = max(0, min(R_RCT1, R_RCT2, R_OBS) - Φ(CL_min=CL1)).
    • G_eff: union of supported sub-populations; out-of-scope groups excluded.
    • CL_min = CL1 for scale mappings; record the mapping witness and weakest-link study in the SCR.
  • SCR: Data provenance, scale mappings, bias assessment, and proof-term hash for the effect-model equivalence when it is used constructively.

  • Improvement path: upgrade mapping verification to CL2/CL3; increase F via registered analysis plan; replicate lagging study.

Order/Process archetype — Manufacturing route assurance

  • Claim C: Route R meets output defect rate ≤ ε.

  • Context K: Materials, equipment class; S = run.

  • Γ_ctx artifacts: σ order; declared independent branches; join conditions at inspection.

  • Assurance:

    • R_raw = min R_step along the critical path (includes inspection effectiveness).
    • Penalty from poor join soundness CL_min.
    • Improvement via faster but verified inspection (↑R_step) or tighter join spec (↑CL).

Temporal archetype — Versioned model credibility

  • Claim C: Model M predicts within ±δ over τ.

  • Context K: Data regime and drift tolerance; S = run.

  • Γ_time artifacts: PhaseOf slices v1, v2, v3 covering τ.

  • Assurance:

    • R_raw = min(R_v1, R_v2, R_v3);
    • penalty if v2–v3 interface had low calibration congruence;
    • improvement via re‑calibration (↑CL) or new validation campaign (↑R_v3).

Conformance Checklist (normative)

IDRequirementPurpose
CC-B3.1An assurance result SHALL be a typed claim Assurance(H, C | K, S) with S ∈ {design, run}.Prevent scope drift and chimeras.
CC-B3.2F SHALL be treated as ordinal (min/thresholds only); G as coverage (set/measure union constrained by support); R as ratio (min + conservative operations).Preserve scale integrity (CHR).
CC-B3.3The Congruence Level CL SHALL live on edges; the penalty Φ(CL) SHALL be monotone decreasing and bounded (R_eff ≥ 0).Make integration quality first-class.
CC-B3.4R_eff SHALL be computed as R_eff = max(0, min_i R_i - Φ(CL_min)) for the relevant integration paths, unless a stricter domain-specific rule is justified.Enforce WLNK and penalize weak integrations.
CC-B3.5F_eff = min_i F_i; G_eff = SpanUnion({G_i}) constrained by support.Prevent over-generalization.
CC-B3.6An Assurance SCR SHALL be produced, listing node/edge values, Evidence Graph Ref, and any OrderSpec/TimeWindow identifiers, and SHALL also display the describe(Object->GroundingHolon) binding for the claim, the declared CHR:ReferencePlane ∈ {world|concept|episteme}, a separable TA/VA/LA evidence breakdown per CC-KD-08, decay/valid-until indicators on empirical bindings, and the Epistemic-Debt tally from B.3.4.Provide auditability through A.10 without collapsing evidence families.
CC-B3.7Agency-CHR values (A.13) SHALL NOT override WLNK or Φ(CL) penalties; if agency grade change alters capabilities, model it as a Meta-Holon Transition.Preserve safety; keep agency separate.
CC-B3.8Design-time and run-time assurance SHALL NOT be mixed in one tuple; compare them side by side if needed.Avoid design/run mixing.
CC-B3.9If an assurance claim depends on causal-use support, it SHALL consume CausalUseSupportVerdict, CausalEvidenceSupportBasis, and relevant profile refs from C.28/A.10; unsupported causality-ladder climb SHALL degrade, block, or abstain rather than raising R.Prevents assurance prose from certifying unsupported causal claims.
CC-B3.10A local C.28 downgrade, reroute, or abstain SHALL NOT be treated as a new assurance tuple trigger unless the claim is assurance-bearing, publication-bearing, release-bearing, or reused as an assurance input.Keeps cheap causal triage from becoming assurance ceremony.
CC-B3.11A conforming B.3 use SHALL NOT treat a label, badge, dashboard tile, credential display, provenance mark, compliance-looking mark, model card, datasheet, data card, assurance document, attestation label, or generated confidence phrase as raising F, G, R, CL, readiness, safety, compliance, trust, release confidence, or assurance unless a typed Assurance(H, C | K, S) claim and A.10 evidence path name the claim, intended use, scope, evaluation condition, evidence carriers, argument/support rationale, limitations, decay/reopen condition, and relying context.Blocks assurance-strength laundering from visible authority-looking labels.

Anti‑patterns and repairs

Anti‑patternSymptomRepair
Averaging assuranceMean of R_i reported as system reliabilityUse min R_i on the cutset, then apply Φ(CL_min).
Ordinal arithmeticAveraging F or CL to produce “2.3”Use min/max or thresholds; never average ordinals.
Coverage as centroidReplacing G union with a single “typical point”Keep G as set/coverage; if a numeric proxy is needed, derive it from the set.
Ignoring congruenceNo penalty for weak mappings/interfacesAssign CL to integration edges; apply Φ(CL_min).
Design/run chimera“One score” mixing blueprint and telemetrySplit into S=design and S=run tuples; compare explicitly.
Agency overrideClaiming higher assurance because a controller is “clever”Agency may justify how improvements are achieved; it cannot remove WLNK or Φ.
MemberOf as stockUsing MemberOf to sum reliabilitiesKeep MemberOf for collections; reliability comes from the relevant Γ composition (e.g., Γ_sys cutset).
Assurance-strength launderingBadge, dashboard color, credential display, compliance mark, provenance label, model card, datasheet, data card, assurance document, attestation label, or generated confidence phrase is used as assurance strength.Keep it as orientation/source pointer unless a typed assurance claim and A.10 evidence path support the intended assurance use.

Consequences

Benefits

  • Comparable, conservative, improvable. The tuple ⟨F, G, R⟩ with edge-scoped Congruence Level (CL) values gives a compact, auditable view that improves monotonically under targeted actions (formalize, replicate, reconcile).
  • Cross‑scale coherence. Works for assemblies and arguments, procedures and histories, without leaking order/time/cost into structure.
  • Clear upgrade paths. It is obvious what to do to raise each component (raise F/G/R locally or raise CL on the glue).

Trade‑offs

  • More explicit metadata. You must state scale kinds, cutsets, and mapping congruence; this is intentional transparency.
  • Conservatism may feel pessimistic. True synergy appears only via MHT or after raising CL—never by arithmetic optimism.

Rationale (informative)

B.3 distills mature post‑2015 practice across several fields into a single, small calculus:

  • Assurance by weakest link reflects reliability engineering and safety cases in complex systems; composing claim strength by minima prevents over‑statement.
  • Formality and verifiability mirror advances in model‑based engineering and formal verification, where raising F turns subjective arguments into verifiable artifacts.
  • Coverage as set/measure follows evidence synthesis and validation practice that treat applicability as a domain region, not a scalar to “average.”
  • Congruence on edges captures what meta‑analysis, interface control, and ontology alignment have repeatedly shown: integration quality is often the real bottleneck. Penalizing low‑CL is a principled way to prevent silent over‑confidence while rewarding verified reconciliation.
  • Assurance documentation, provenance, and release-status practice treats labels, model cards, datasheets, C2PA provenance marks, SLSA / in-toto attestations, credential displays, generated confidence phrases, and dashboards as scoped documentation or source pointers, not automatic assurance strength. B.3 adopts claim/argument/evidence discipline and scoped assurance-documentation use, adapts model cards, datasheets, data cards, attestations, provenance marks, dashboards, and generated confidence phrases as possible documentation or evidence inputs for a named assurance claim, and rejects visible-label promotion into readiness, compliance, safety, trust, R, F, G, CL, or release confidence without a typed tuple and A.10 evidence path.

This arrangement preserves A.11 Parsimony (few characteristics), aligns with A.14/A.15 (clear separation of structure, order, time, cost, values), and leaves Context for domain‑specific refinements that do not break the invariants.

Relations

  • Builds on: B.1 (Universal Γ), B.1.1 (Proof Kit), B.1.2 (Γ_sys & BIC), B.1.3 (Γ_epist & SCR), B.1.4 (Γ_ctx/Γ_time), A.12 (Transformer), A.14 (Mereology), A.15 (Strict Distinction), C.13 (Compose‑CAL).
  • Coordinates with: E.14 (Human‑Centric Working‑Model) for publication-facing assertion discipline and B.3.5 (CT2R‑LOG) for Working‑Model relation aliasing and grounding (tv:*, validationMode).
  • Coordinates with: C.28 for causal-use support verdicts, causality-ladder support, identification/realizability profile refs, and supported/unsupported causal use; A.10 for the evidence graph path carrying causal support-basis refs.
  • Coordinates with: A.15 for first-use action/reliance disposition, A.6 for mixed authority wording, A.21 for OperationalGate(profile), GateDecision, and DecisionLogRef, A.20 for ConstraintValidity status/witness, and A.15.1 for release/deployment work occurrence. B.3 only handles assurance-strength use; labels and evidence pointers return to the exact neighboring source when assurance is not live.
  • Used by: KD‑CAL action patterns (to plan improvements), B.4 (Evolution loops that raise F/G/R or CL over time).
  • Triggers: B.2 (Meta‑Holon Transition (MHT): Recognizing Emergence and Re‑identifying Wholes) when genuine new capabilities emerge that change the applicable cutsets or envelopes.

One‑page takeaway. Report assurance as ⟨F, G, R⟩ for a typed claim under explicit context/scope, and penalize by the lowest edge-scoped Congruence Level (CL) value. Improve assurance by raising F, G, R, or CL—and keep order, time, and cost in their own lanes.

Assurance posture for quantum-like claims

Quantum-like wording does not raise the claim-strength requirement by default. A local C.26 modeling note can remain lightweight when it only prevents a representational mistake and does not support action, close audit, certify readiness, or claim empirical superiority.

Action path:

  1. Decide the claim strength before building assurance machinery.
  2. If the QL note only prevents a local misreading, keep it as QL-lite with ordinary evidence.
  3. If the claim will be reused, state source role, ordinary FPF pattern, local stop condition, and evidence posture.
  4. If the claim supports release, readiness, audit, compliance, assurance, or high-impact action, build the B.3 assurance claim over named evidence carriers and scope.
  5. If the claim says QL is better, faster, more accurate, or uniquely necessary, compare rival models, baseline, mechanism, scope, and loss.
  6. State decay/reopen conditions so an old QL-supported assurance claim does not silently stay current after probes, carriers, or scope change.
Claim strengthB.3 expectationOutput
Local modeling noteNo assurance tuple beyond the ordinary pattern and evidence noteQL-lite note with local stop
Reusable pattern/exampleName source role, ordinary pattern, local stop condition, and evidence postureReusable example with source-support role
Decision, release, audit, readiness, or compliance useProvide F-G-R/congruence support, evidence carriers, confidence, rival explanations, and decay/reopen conditionsAssurance tuple and evidence route
Comparative superiority claimAdd rival-model comparison, baseline, mechanism, and scope limitsBounded superiority claim or reroute

Useful outputs:

  • no B.3 action when QL is only a local representational lens;
  • a compact bounded assurance claim statement when reuse is modest;
  • a full assurance tuple only when consequence severity demands it;
  • a rejected or weakened claim when evidence does not support the intended use.

B.3:End