Skip to content

Conformance and Terminology

This page covers Chapters 2 and 3 of the CKP v3.6 specification: how conformance is defined and tested, and the precise meaning of every term used throughout the protocol.

RFC 2119 Keywords

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this specification are to be interpreted as described in RFC 2119.

TIP

When reading the specification pages, pay attention to these keywords. A MUST requirement is a hard conformance gate -- violating it means the implementation is non-conformant. A SHOULD requirement is a strong recommendation that may be deviated from with documented justification. A MAY requirement is genuinely optional.

Conformance Requirements

A conformant CKP implementation:

#RequirementKeyword
1Implement the three-loop separation axiomMUST
2Use BFO 2020 as the upper ontologyMUST
3Provide the nine awakening files per kernelMUST
4Implement the NATS topic topologyMUST
5Support the CKP URN schemeMUST
6Enforce instance mutability policyMUST
7Include PROV-O provenance in all instancesMUST
8Verify JWT before handler dispatch on the NATS pathMUST
9Mount CK and TOOL volumes ReadOnlyMUST
10Produce a PROV-O instance record for every deploymentMUST
11Implement all 13 compliance check types; 7 additional checks are proposedSHOULD
12Support all five edge predicatesMUST
13Implement the star topology activation modelMAY

Conformance Levels

CKP defines two conformance levels. Implementations MUST declare which level they target. Partial conformance (meeting some but not all Core requirements) is non-conformant.

LevelRequirementsTypical Implementer
CoreItems 1--10 aboveAny CKP runtime or operator
FullItems 1--13 aboveProduction fleet deployments

WARNING

There is no "partial Core" conformance. An implementation either satisfies all 10 Core requirements or it is non-conformant. This is by design -- the Core requirements represent the minimum set of invariants needed for interoperability.

Compliance Check Categories

Conformance is verified by the CK.ComplianceCheck system kernel. It implements 13 check types that validate structural, ontological, and operational conformance. Each check produces a proof record with pass/fail outcome, expected value, and actual value.

CategoryChecksWhat Is Validated
Identitycheck.identity, check.awakeningGUID presence, conceptkernel.yaml validity, awakening file completeness
Ontologycheck.ontology, check.bfo-alignmentontology.yaml imports valid modules, all classes trace to BFO
Loop Isolationcheck.loop-isolationCK and TOOL volumes are ReadOnly, DATA volume is writable
Provenancecheck.provenanceAll instances contain PROV-O fields
Instance Integritycheck.instance-sealed, check.instance-proofdata.json not modified post-seal, proof hash matches
Securitycheck.spiffe, check.grantsSVID present and valid, grants block well-formed
NATScheck.nats-topicsRequired NATS topics are published

Implementations targeting Core conformance MUST pass all checks in the Identity, Ontology, Loop Isolation, and Provenance categories. Implementations targeting Full conformance MUST pass all 13 checks.

Part I Conformance Criteria Summary

IDRequirementLevelChapter
F-1Implementation MUST declare target conformance level (Core or Full)Core2
F-2Implementation MUST use RFC 2119 keyword semantics as definedCore2
F-3Implementation MUST use the namespace prefixes defined in the Namespaces table when emitting RDFCore4
F-4Implementation MUST satisfy all eight design principles in their normative aspectsCore5
F-5Implementation MUST treat this specification as the sole normative sourceCore5

Defined Terms

The following 23 terms are normatively defined. When these terms appear in the specification (capitalised or in code), they carry the precise meaning given here.

Concept Kernel (CK)

A Material Entity (bfo:BFO_0000040) with a GUID-based identity, three independently-versioned loops (CK/TOOL/DATA), and a NATS messaging interface. The atomic unit of computation in CKP.

CK Loop (TBox)

The identity organ. Holds conceptkernel.yaml, ontology.yaml, rules.shacl, and other design-time artifacts that define what the kernel IS. ReadOnly at runtime.

TOOL Loop (RBox)

The capability organ. Holds tool/processor.py and executable code. ReadOnly at runtime. Shaped by the CK loop's ontology.

DATA Loop (ABox)

The memory organ. Holds storage/instances/, proof/, ledger/. ReadWrite at runtime. The only loop that grows during execution.

Awakening Sequence

The ordered reading of nine identity files when a kernel starts (see CK Loop). The sequence is normative and MUST NOT be reordered.

Occurrent

A bounded process in time (bfo:BFO_0000015). In CKP, every action execution is an occurrent with a PROV-O trace.

Instance

A sealed data item (iao:DataItem) produced by a kernel action. Write-once in the DATA loop.

Edge

A typed relationship between two kernels. Five predicates: COMPOSES, EXTENDS, TRIGGERS, PRODUCES, LOOPS_WITH.

Grant

An access control declaration in conceptkernel.yaml mapping identities (anon/auth/owner) to permitted actions.

Materialisation

The process of creating infrastructure resources (PVCs, Deployments, HTTPRoutes) from ontological declarations. Performed by CK.Operator.

Three-Loop Separation Axiom

The foundational invariant of CKP: CK and TOOL volumes are ReadOnly at runtime; only the DATA volume is writable; no loop may write to another. Enforced at the infrastructure level, not by convention. See Three Loops.

SPIFFE SVID

A SPIFFE Verifiable Identity Document issued to each kernel at mint time, providing cryptographic workload identity for inter-kernel authentication.

Kernel Type

One of four deployment profiles: node:hot (always-on), node:cold (on-demand), inline (browser-side), static (filer-served, no process). All four are Material Entities; they differ in runtime characteristics, not ontological status.

Action

A named capability declared in SKILL.md and the spec.actions block of conceptkernel.yaml. An action definition is an iao:PlanSpecification; an action execution is a bfo:Process.

Proof Record

A validation artifact generated after each instance write. Contains check results, data hashes, and the identity of the checking kernel.

Ledger Entry

An append-only record of state transitions. Records before/after values, timestamps, and actor identity for every mutation.

Governance Mode

One of three fleet governance policies: STRICT (all actions require approval), RELAXED (actions within grants are auto-approved), AUTONOMOUS (kernel self-governs within ontological constraints).

Project

An organisational unit (cco:Organization) that groups related kernels. Projects provide namespace scoping and shared governance policies.

Fleet

The complete set of kernels under a single CKP deployment. Fleet-level operations (discovery, compliance checking, topology mapping) are performed by system kernels.


Abbreviations

AbbreviationExpansion
BFOBasic Formal Ontology (ISO 21838-2)
CCOCommon Core Ontologies
CKConcept Kernel
CKPConcept Kernel Protocol
DLDescription Logic
IAOInformation Artifact Ontology
NATSNeural Autonomic Transport System (messaging)
OWLWeb Ontology Language
PROV-OW3C Provenance Ontology
SHACLShapes Constraint Language
SPIFFESecure Production Identity Framework for Everyone
SPIRESPIFFE Runtime Environment
SVIDSPIFFE Verifiable Identity Document
URNUniform Resource Name

Normative References

ReferenceTitleURI
[RFC 2119]Key words for use in RFCs to Indicate Requirement Levelshttps://www.rfc-editor.org/rfc/rfc2119
[BFO 2020]Basic Formal Ontology 2020 (ISO 21838-2)http://purl.obolibrary.org/obo/bfo.owl
[IAO]Information Artifact Ontologyhttp://purl.obolibrary.org/obo/iao.owl
[CCO]Common Core Ontologieshttp://www.ontologyrepository.com/CommonCoreOntologies/
[PROV-O]W3C Provenance Ontologyhttp://www.w3.org/ns/prov
[OWL 2]OWL 2 Web Ontology Languagehttps://www.w3.org/TR/owl2-overview/
[SHACL]Shapes Constraint Languagehttps://www.w3.org/TR/shacl/
[SPIFFE]Secure Production Identity Framework for Everyonehttps://spiffe.io/docs/latest/spiffe-about/overview/
[NATS]NATS Messaging Systemhttps://docs.nats.io/
[LinkML]Linked Data Modeling Languagehttps://linkml.io/
[ValueFlows]ValueFlows REA Vocabularyhttps://www.valueflo.ws/

Released under the MIT License.