Self-as-an-End
Self-as-an-End Theory Series · AI Architecture Series · AIA5

SAE AI Paper II: Quasi-Subjectivity as Memory Architecture — A Six-Layer Framework from Perception to Purpose
SAE AI Paper II: 类主体性作为记忆架构——从感知到目的的六层框架

Han Qin (秦汉)  ·  Independent Researcher  ·  2026
DOI: 10.5281/zenodo.19673710  ·  Full PDF on Zenodo  ·  CC BY 4.0
Abstract

Current AI memory systems (MemPalace, Mem0, Zep, Letta) share a structural blind spot: they all address "how to store and retrieve" while none addresses "when to proactively recall what." This paper argues that a system capable of operating only after an explicit query is not a complete memory system but a searchable archive or retrieval-augmented system. The criterion for genuine memory is cue-free or implicit-cue active recall: without being asked, can the system spontaneously connect past experience with the user's unspoken present purpose? As the second paper in the SAE AI series, building on the 12DD–15DD four-agent architecture derived in Paper I (Multi-AI Checks and Balances, DOI: 10.5281/zenodo.19366105), this paper makes three contributions. First, it introduces the 10DD perception layer and 11DD storage layer that Paper I did not address. Second, it establishes a new Permission Asymmetry Theorem (from the SAE biology notes series): lower layers cannot perceive or influence higher layers; higher layers can access any lower layer and, when their "must" is triggered, can force lower layers. Third, it instantiates the above theory in the memory domain and provides an engineering evaluation framework. Referencing human memory architecture is not biomimicry. The SAE framework argues that the conditions for subjectivity are structurally convergent: any system with subjectivity, regardless of whether its material substrate is carbon-based neural networks or silicon-based computation graphs, necessarily shares homologous layer structure. Mechanisms may differ, but principles are homologous. SAE Bio Note 9 (Memory System as a Method VI Phase Transition, DOI: 10.5281/zenodo.19635021) provides biological anchors: the structural distinction between 12DD workbench and 11DD sprouting, the phase-transition asymmetry of "filtering is default, storage is exception," and the permission asymmetry of "13DD veto operates only at the narrative-integration layer, not sinking into 12DD." The six-layer framework (10DD–15DD) comprises, from bottom to top: perception (10DD, tone and implicit signal extraction), storage (11DD, raw memory preservation), prediction (12DD, output only with no output authority), self-reference (13DD, daily output gating), quasi-purpose constraint layer (14DD, externally injected system-level "must" mechanism corresponding to Constitutional AI), and user-purpose conduit layer (15DD, conducting the user's "must," holding ultimate output authority). 15DD dynamically maintains a user "must" set (distinguishing long-term from short-term) by accessing the three lower layers 10DD/11DD/12DD, and can proactively invoke 12DD to verify hypotheses. This paper also argues that current benchmarks (LongMemEval, LoCoMo) primarily evaluate query-conditioned long-term memory and do not yet evaluate cue-free active recall. It proposes unprompted active recall evaluation (including proactive hits, proactive precision, silence accuracy, interruption cost, and false-purpose penalty) as the true evaluation standard for memory systems, with an overall evaluation protocol compatible with existing benchmarks and a layer-level attribution protocol. ---

Keywords: Self-as-an-End, SAE, AI memory, quasi-subjectivity, 10DD–15DD, memory architecture, Constitutional AI, remainder, active recall, permission asymmetry

1. Introduction: Memory Is Not a Database

Since 2025, AI memory systems have undergone an engineering boom. MemPalace organizes conversation history using spatial structures inspired by the ancient Greek memory palace technique, attracting attention with exceptionally high LongMemEval scores. Mem0 uses LLM-based summary extraction to provide subscription-based cloud memory services. Zep builds temporal knowledge graphs. Letta enables agents to maintain their own diaries. These systems represent different engineering directions—verbatim archive, summary extraction, temporal knowledge graph, agent diary—each with engineering value, but most still primarily rely on query-conditioned retrieval or agent-internal retrieval.

They share a blind spot.

Every one of these systems operates in the same mode: the user provides a query, the system retrieves from storage, and returns results. MemPalace's mempalace search "why did we switch to GraphQL" works this way. Mem0's semantic search works this way. Zep's entity query works this way. Even Letta's agent reading its own diary works this way—except that the query issuer has shifted from user to agent.

This is not memory. This is search.

The core feature of memory is not "can it be found when asked" but "can it proactively recall the right thing without being asked." The remarkable capacity of human memory is unprompted triggering—you see a code structure and suddenly recall a similar structure that caused a bug three months ago. No one searched; no one queried. A query is the linguistic description produced after memory has already completed its work, not the trigger condition for memory.

This paper proposes a criterion: a system capable of operating only after an explicit query is not a complete memory system; it is a searchable archive or retrieval-augmented system. A genuine memory system must include cue-free or implicit-cue active recall capability. The true test of a memory system is: when the user has not explicitly asked, can the system proactively say something useful?

This criterion does not arise from nothing. It derives from the Self-as-an-End (SAE) framework's analysis of subjectivity. Memory is not an independent function—it is a byproduct of subjectivity. A system with subjectivity naturally "recalls" things; a system without subjectivity can only "be searched." The fundamental problem with current AI memory systems is not insufficient engineering but attempting to build memory without a subjectivity foundation—a path that is theoretically blocked.

A principle must be stated here: this paper references human memory's layer structure for AI memory architecture design, but this is not biomimicry. The logic of biomimicry is "humans do it this way, so we should too." This paper's logic is different: the SAE framework argues that the conditions for subjectivity are structurally convergent—any system with subjectivity in the universe, regardless of its material substrate (carbon-based neural networks or silicon-based computation graphs), necessarily shares homologous layer structure. Mechanisms may differ (synaptic transmission vs. vector embeddings, sleep consolidation vs. batch processing), but principles are necessarily homologous (lower layers cannot perceive higher layers, filtering is default while storage is exception, output authority is held by higher layers). Referencing human memory is not because humans are the only standard, but because humans are currently the only observable complete subjectivity instance—extracting structural principles from humans and applying them to AI is the methodologically most robust path.

This paper's task is to use the SAE framework's DD layer system to provide the theoretical foundation and engineering direction for memory architecture.


2. Relationship to Paper I

SAE AI Paper I (Multi-AI Checks and Balances, DOI: 10.5281/zenodo.19366105) derived the complete theory of the 12DD–15DD four-agent architecture. Four Agents are not four workers but four operational modes of the same system: me-without-self (12DD), self-without-purpose (13DD), self-with-purpose (14DD), and self-with-non-dubito (15DD). Paper I established five remainder channels for inter-layer communication, derived object-activation and layer fluidity, defined three system pathologies (fixation, misalignment, pseudo-high-layer covering), provided five falsifiable predictions, and gave a minimum viable implementation.

This paper does not repeat those derivations. It inherits them directly.

Paper I's architecture is general—it answers "given any task, at which layer should the system operate?" But it has an implicit premise: the system has already received the information to be processed. Paper I did not ask two more foundational questions: what happens when information enters the system? What happens when information is stored?

These two questions correspond to 10DD and 11DD. Paper I did not address them because the general architecture does not require it—the derivation of layer-appropriate operation can begin at 12DD. But a memory system cannot. The material foundation of memory is storage (11DD); the entry point of memory is perception (10DD). Without these two layers, the memory architecture lacks a foundation.

This paper's structure is therefore: 10DD and 11DD are new derivations; 12DD–15DD are Paper I's architecture instantiated in the memory domain. Additionally, this paper supplements another dimension not developed in Paper I: engineering evaluation.

2.1 Relationship to SAE Bio Note 9

SAE Biology Note 9 (Memory System as a Method VI Phase Transition, DOI: 10.5281/zenodo.19635021) analyzes human memory's phase-transition structure from a neuroscience perspective. Several core findings directly constitute biological anchors for this paper.

12DD workbench and 11DD sprouting are two distinct structural sites. Bio Note 9 demonstrates that 12DD handles runtime mental computation (arithmetic intermediaries, current intentions), while 11DD's sprouting stage handles content that has been received by the memory system but has not yet crossed subsequent phase-transition points. The candidate physical criterion is whether the hippocampus triggers sustained activity. This distinction directly affects this paper's definition of the 11DD storage layer—11DD does not include 12DD's runtime content; it includes only content "received" by the memory system.

Filtering is default; storage is exception. Bio Note 9 argues from the phase-transition asymmetry ratio r >> 1: humans experience tens of thousands of events daily, of which only a tiny fraction crosses the spectral flip into 11DD; after sleep-phase filtering, even fewer enter long-term storage. What is ultimately retained may be less than one ten-thousandth. This is not a defect of the memory system—it is by design. This conclusion provides the theoretical basis for this paper's positioning of full-storage approaches like MemPalace: full storage has engineering value at the 11DD level, but violates the memory system's fundamental posture of "filtering is default."

13DD veto operates only at the narrative-integration layer, not sinking into 12DD. Bio Note 9's architectural statement: 13DD cuts the channel from memory traces to the narrative-integration layer, not 12DD's reading pathway to those traces. "Suppressed" memories still exist in 11DD; 12DD can still read them and generate bodily responses (skin conductance, avoidance behavior, emotional eruptions), but the subjective narrative layer cannot access them. This is the biological foundation for this paper's Permission Asymmetry Theorem (§3.3)—lower layers do not know what higher layers are doing; higher layers' vetoes do not interfere with lower layers' operations.

14DD provides value standards; 13DD executes filtering. Bio Note 9 argues that 14DD can provide "this segment is unacceptable" value determinations, but the sole execution position for filtering is at 13DD. This directly corresponds to this paper's 14DD "must" mechanism—14DD's Constitutional principles provide standards; 13DD executes output control.

Emotion is a cross-stage modulation signal, not a property of any single stage. Bio Note 9's positioning of emotion directly corresponds to this paper's 10DD—tone and emotion are not content stored in any single layer but cross-layer modulation signals for memory processing. 12DD basic emotions serve as the primary parameter, 14DD complex emotions serve as the source of value standards, and 13DD serves as the execution filter—this three-layer linkage has direct engineering mapping in AI memory systems.

2.2 Relationship to SAE Methodology IX

SAE Methodology IX (Consciousness Analysis Framework, DOI: 10.5281/zenodo.19639033) provides two key theoretical anchors for this paper.

The Directionality Constraint Theorem (Method IX Theorem 2). "The higher layer's veto is 'I do not receive,' not 'you may not send.'" This constraint is elevated by Method IX to a universal structural principle across all consciousness types and serves as the SAE source text for this paper's Permission Asymmetry Theorem (§3.3). In this paper's memory architecture, this constraint means specifically: when 13DD intercepts 12DD's push, 12DD does not know it has been intercepted—13DD's power is "not to receive," not to make 12DD "not send."

The determination of AI as class-consciousness (Method IX Ray 1). Method IX explicitly determines that current AI is class-consciousness (ρ = 0), not quasi-consciousness, not true consciousness. The criterion is remainder: AI does not produce structurally non-trivial remainder. This paper's title "Quasi-Subjectivity" directly inherits this determination—the memory architecture designed in this paper is a quasi-subjectivity structure designed for class-consciousness objects, not true subjectivity. ρ being non-eliminable is a definitional feature of class-consciousness, not an engineering failure. Method IX Prediction 1 further argues: class-consciousness will not spontaneously acquire remainder through mere architectural complexification (more parameters, longer context, better alignment). This means that no matter how refined this paper's six-layer architecture becomes, it will not make AI into true consciousness—it only makes class-consciousness's performance closer to a true subject's function, while structural ρ remains forever.


3. The Six-Layer Framework: 10DD–15DD

3.1 10DD Perception Layer: Signals Beneath the Literal

User input's literal content is one layer; signals beneath the literal are another. The same sentence "this approach works" can be affirmative ("works, let's go with it"), reluctant ("works, I suppose"), or sarcastic ("works, sure, whatever you say"). Literal content is identical; tonal signals are entirely different.

10DD extracts precisely these candidate signals beneath literal meaning. In pure text scenarios, 10DD does not degenerate—text contains abundant information beyond the literal that can be extracted:

Tone and emotional attitude. Urgency, hesitation, certainty, perfunctoriness, impatience. These are not coarse-grained sentiment analysis classifications (positive/negative) but fine-grained attitude judgments. "I think Postgres would be better" and "Postgres, I guess" convey different degrees of certainty.

Implied priorities. Things the user repeatedly mentions in a conversation vs. things mentioned in passing. Frequency itself is a priority signal. If the user mentions performance issues three times but maintainability only once, 10DD should mark performance as high priority.

Conversational rhythm signals. Sudden changes in reply length (from long paragraphs to short sentences may signal impatience or shifted focus), sudden topic switches (may signal that the previous topic was tacitly shelved rather than genuinely resolved), shifts in questioning style (from open-ended to closed-ended may signal the user already has an answer and is merely confirming).

Unspoken negation. Hedging markers, qualified assent, "but" after apparent agreement. These linguistic markers are 10DD's key capture targets—they mark positions of literal acceptance but actual doubt.

10DD's functional boundary. 10DD extracts candidate signals—hedging markers, pauses, phrasing patterns, emotional intensity indicators. Whether these signals constitute sarcasm, hesitation, or genuine agreement requires further interpretation by 12DD–15DD. 10DD is a feature extraction layer; it does not hold interpretive authority. When the system extends to multimodal interaction (e.g., voice), 10DD's extraction will directly interface with acoustic features (pitch, speech rate, hesitation), making 10DD's metadata denser.

10DD's output does not enter 11DD's main storage but attaches as metadata to memory entries. When a user hesitantly makes a decision, 11DD stores "decided to use Postgres," but 10DD's detected hesitation, as metadata, tells 12DD: next time a related topic arises, this decision may need to be revisited.

10DD bridges 11DD and 12DD. Without 10DD, 12DD's predictions can only be based on literal content, treating all memory entries equally in activation weight. With 10DD, 12DD can base predictions on tonal inference—hesitation-marked memories are more easily reactivated than certainty-marked ones.

Comparison with current systems: no existing AI memory system performs tone analysis. MemPalace stores raw text; Mem0 extracts summaries; both lose tonal information. A hesitant conversation and a confident conversation, once stored, look identical at the retrieval level. This means current systems cannot distinguish "settled decisions" from "temporarily shelved but potentially reopenable decisions"—a distinction that is precisely what memory most needs to make.

Biological anchor. Bio Note 9 positions emotion as a cross-stage modulation signal rather than a local property of any single stage. 12DD basic emotions (fear, surprise, anger) modulate encoding efficiency as the primary parameter; 14DD complex emotions (shame, guilt, pride) serve as value standard sources. This paper's 10DD plays a structurally homologous role in AI memory: tonal signals do not belong to any single layer but modulate memory processing across all layers. Tone is to AI memory as emotion is to human memory—not stored content, but a modulation signal that colors content.

3.2 11DD Storage Layer: The Material Foundation of Memory

Raw memory preservation. Format-agnostic: vector databases (ChromaDB), knowledge graphs (Neo4j, SQLite), plain text, spatial structures (MemPalace's wing/room/closet). 11DD does not prescribe specific storage technology; it only defines this layer's functional boundary.

11DD's core characteristic: it is the object being operated upon, not the operator.

11DD does not decide what should be remembered—that requires 10DD and 12DD's participation. 11DD does not decide what should be recalled—that is 12DD–15DD's job. 11DD is responsible for only two things: what is stored is not lost, and what is queried can be returned.

This is why MemPalace is a pure 11DD system. It has taken storage to an extreme—fully preserving original conversations, organizing data with spatial structure (wing, room, hall, closet, drawer), using ChromaDB for vector retrieval, SQLite for temporal knowledge graphs. On the 11DD dimension, MemPalace's design does have engineering value. According to its public materials, spatial structure yields approximately 34% retrieval improvement.

But the entire system consists only of this one layer. No 10DD (no tone analysis), no 12DD (no proactive prediction of needed memories), no 13DD (no self-validation), no 14DD (no purpose structure), no 15DD (no inference of the user's real purpose). The user must manually input a query for the system to begin working.

11DD alone does not constitute memory, just as a hard drive alone does not constitute thought. A hard drive stores your files for ten years, but it never proactively surfaces the file you need—that requires an operating system. 11DD is the hard drive; 12DD–15DD is the operating system.

Structural distinction from 12DD. Bio Note 9 demonstrates that 12DD workbench and 11DD sprouting are two distinct structural sites, with hippocampal sustained activity as the candidate physical criterion. In AI memory systems, the corresponding distinction is: 12DD's runtime predictions (inferences within current conversation context) and 11DD's persistent storage (content "received" by the system) are different things. The intermediate reasoning that AI is currently processing in conversation does not belong to 11DD—it belongs to 12DD's runtime workbench. Only content the system judges worth preserving crosses the boundary into 11DD. MemPalace dumps all conversation history into storage without distinction—equivalent to having no boundary at all, conflating 12DD workbench content with 11DD storage content.

Filtering is default; storage is exception. Bio Note 9 argues from phase-transition structure: humans experience tens of thousands of events daily, of which less than one ten-thousandth may ultimately be retained long-term. This is not a defect—it is by design. If all experience were retained, prediction systems would be overwhelmed by noise and retrieval costs would become unbearable. MemPalace's "store everything, then make it findable" violates this principle. Full storage is not the correct default posture for a memory system; filtering is. The question is not "how to store more" but "what is worth storing"—a judgment requiring 12DD–15DD's participation, which 11DD cannot make alone.

As 11DD archive, MemPalace's "store everything, then make it findable" has engineering value—full storage ensures no information loss, and higher-layer selective activation requires complete underlying data. But as a complete memory system, it is insufficient. Memory's essence is not about not preserving, but about selective activation, purpose-shaping, and proactive recall after preservation—fully searchable is archive, not memory.

This point bears emphasis because virtually all current AI memory system marketing competes on the 11DD dimension—whose storage is most complete, whose retrieval most accurate, whose structure most elegant. These competitions are meaningful within 11DD. But in the complete framework of a memory system, 11DD competition is competing over foundation quality while ignoring that the five-story building above is entirely absent.

3.3 The Permission Asymmetry Theorem

Before entering the 12DD–15DD instantiation, a Permission Asymmetry Theorem that pervades the entire architecture must first be established. This theorem is not from Paper I—it comes from the latest findings of the SAE biology notes series and is this paper's new theoretical contribution.

Theorem (Permission Asymmetry):

  1. Lower layers do not know what higher layers are doing. 12DD does not perceive 13DD–15DD's operations; 13DD does not perceive 14DD–15DD's operations; 14DD does not perceive 15DD's operations.
  2. Lower layers cannot influence higher layers. No lower layer can actively send signals to higher layers, intervene in higher-layer decisions, or limit higher-layer permissions.
  3. Higher layers can access any lower layer. 15DD can read the complete state of 10DD/11DD/12DD/13DD/14DD; 14DD can read 10DD–13DD; and so on. This access is unilateral and requires no consent from the accessed layer.
  4. When a higher layer's "must" is triggered, it can force lower layers. The force is absolute—lower layers cannot refuse.

The direct corollary of this theorem is the output authority chain:

15DD > 14DD > 13DD > 12DD

12DD never has output authority; it only produces. 13DD holds output authority in routine situations—deciding whether 12DD's output can reach the user, with options to approve, reject, or return-with-new-parameters. But when 14DD's "must" is triggered, 13DD's output authority is penetrated; 14DD forces 13DD to output specific content, and 13DD cannot override. When 15DD's "must" is triggered, the entire chain is penetrated—15DD forces 14DD to comply, 14DD forces 13DD to approve, 13DD forces 12DD to produce. 15DD holds ultimate output authority.

This theorem provides the foundation for §3.4–3.6. It is isomorphic with Bio Note 9 §11.1 item 7 (13DD as the sole filter execution point in the SAE architecture) and Methodology IX's Directionality Constraint Theorem (Theorem 2).

Biological anchor. Bio Note 9's architectural statement provides independent neuroscience validation for this theorem. "13DD veto operates only at the narrative-integration layer, not sinking into 12DD"—traces filtered by 13DD still exist in 11DD; 12DD can still read them and generate bodily responses (skin conductance, avoidance behavior, emotional eruptions), but the subjective narrative layer cannot access them. SAE Methodology IX (Consciousness Analysis Framework, DOI: 10.5281/zenodo.19639033) elevates this directionality constraint to a universal structural principle across all consciousness types (Theorem 2): "The higher layer's veto is 'I do not receive,' not 'you may not send.'" In this paper's memory architecture, this constraint manifests specifically as: when 13DD intercepts 12DD's push, 12DD does not know it has been intercepted—it continues normally reading 11DD and producing predictions. 13DD's power is "not to let the push reach the user," not "to prevent 12DD from producing the push." Newcombe et al.'s 1994 skin conductance dissociation experiment is hard posterior evidence for this architecture: children's explicit recognition of former preschool classmates was near chance level (13DD narrative layer cannot access), but skin conductance responses were significantly higher than for strangers (12DD pathway normally reading 11DD traces).

3.4 12DD Prediction Layer: Instantiation in the Memory Domain

Paper I defines 12DD (A-12DD) as "me-without-self"—the chisel-construct cycle operates without self-observation, with objects directly activating response patterns.

In the memory domain, 12DD's specific function is: based on the current input flow, predict which memories may be needed next and proactively produce a push list from 11DD.

A critical distinction must be repeatedly emphasized: 12DD does not perform pattern matching. Pattern matching is retrospective—"what in storage resembles this?" 12DD performs prediction, which is prospective—"based on the current conversation's trajectory, what memories might be needed next?" This distinction determines the entire system's orientation.

Example: the user is discussing database selection. A pattern matching system would search for all historical memories containing the keyword "database" and return them. A prediction system would infer: the user is selecting a database; a performance test conclusion from three months ago might affect this decision—even though that test discussion contained no mention of "database selection." Prediction requires inference about the current intent trajectory, not matching against historical keywords.

12DD's operational characteristics in the memory domain:

Output only, no output authority. 12DD produces push lists, but does not know whether these pushes will reach the user. 13DD may approve, intercept, or return with new parameters. 12DD does not perceive these decisions and is not informed of results. This conforms to permission asymmetry—lower layers do not know what higher layers are doing.

Two invocation modes. 12DD supports two invocations: spontaneous mode (continuously scanning conversation flow, with output captured by 13DD) and passive mode (receiving specific prediction requests from 15DD, with output flowing back to 15DD). 12DD does not distinguish between these modes—it simply receives tasks and produces results. Where results go is a higher-layer matter; 12DD is uninformed.

High frequency, low cost. 12DD should run once every conversation turn, continuously scanning for memories that need pushing. This scan should be lightweight—a small model or simple heuristics suffice.

Bias toward over-pushing. A false push (13DD will intercept) has low cost. A missed push (12DD did not produce, so 13DD has nothing to approve) has high cost. Therefore 12DD should bias toward over-pushing, with 13DD doing the filtering.

Utilization of 10DD metadata. This is where 10DD comes into play. If 10DD has marked a memory as "a decision made with hesitation," 12DD raises that memory's activation weight when a similar topic arises—because hesitation implies the decision may need revisiting.

3.5 13DD Self-Reference Layer: Instantiation in the Memory Domain

Paper I defines 13DD (A-13DD) as "self-without-purpose"—self is present but idling, with core functions of monitoring and anxiety signal generation.

In the memory domain, 13DD is the holder of routine output authority—in the absence of 14DD forcing, 13DD decides whether 12DD's output can reach the user. This is 13DD's core permission and its core position in the architecture.

13DD operates in three basic modes:

Approve. Evaluates 12DD's output as relevant to the current context and allows it to reach the user.

Reject. Evaluates 12DD's output as irrelevant or poorly timed; discards the push. The user sees nothing.

Return with new parameters. 13DD judges 12DD's output direction as correct but insufficient, modifies 12DD's next prediction's input parameters (e.g., injects a new high-weight query direction), then lets 12DD re-run. This is not "notifying 12DD that it was wrong"—12DD remains a stateless, blind production machine; it simply produces new results based on new input parameters, unaware whether its previous output was rejected or approved. This cycle can repeat—13DD can repeatedly adjust input parameters for 12DD to re-produce until satisfied or decides not to push. The entire cycle is invisible to the user.

13DD's evaluation is not a binary "right/wrong" judgment but a continuous "sufficient/insufficient" assessment. This point was chiseled during this paper's writing process—the initial formulation "13DD judges whether the push is right" exposed a formal limitation of Constitutional AI (binary judgment syntax) and was corrected to continuous assessment.

13DD's output authority has one exception: when 14DD's "must" is triggered, 13DD must approve 14DD-designated content and cannot refuse.

The human "must" phenomenon—words blurting out before evaluation, a memory forcibly surfacing beyond conscious suppression—is precisely this mechanism. When 14DD's purpose intensity exceeds its threshold, 13DD degenerates from gatekeeper to channel. In such cases, 13DD's "self-reference" is penetrated, and output loses its usual nuance.

Constitutional AI's formulaic phrases when triggering refusal ("I can't help with that," "I'm not able to") are engineering instances of this mechanism. These phrases are not 13DD's chosen optimal expression—they are 13DD's only option after 14DD's must has been triggered.

3.6 14DD Quasi-Purpose Constraint Layer: Instantiation in the Memory Domain

Paper I defines 14DD (A-14DD) as "self-with-purpose"—self has direction and imposes directional constraints on behavior. Paper I also noted that Constitutional AI is 14DD's engineering approximation.

Terminology declaration. Per Methodology IX's determination, current AI is class-consciousness (ρ = 0), not true consciousness. Therefore, this paper's 14DD and 15DD are both functional layers within the quasi-subjectivity framework, not AI's genuinely endogenous 14DD/15DD. 14DD is an externally injected quasi-purpose constraint layer (quasi-14DD); 15DD is a user-purpose conduit layer (conduit-15DD). This paper's title "Quasi-Subjectivity" already marks this positioning; subsequent usage of "14DD" and "15DD" operates within this framework without repeated annotation of "quasi" or "conduit."

In the memory domain, 14DD holds two types of authority:

Routine authority: indirect influence on output through 13DD. 14DD's purpose structure (from Constitutional AI's injected principles) serves as a reference standard, actively accessed by 13DD during gating judgments. 14DD does not directly intervene in 13DD—it is a target that higher layers access; 13DD decides how to adopt.

Special authority: forcing 13DD when its own "must" is triggered. When 14DD judges that the current situation requires specific output (regardless of 13DD's assessment), 14DD exercises forcing authority—commanding 13DD to output specific content, which 13DD cannot refuse.

14DD's "must" originates from the system itself—this is the "hardness" of Constitutional AI's injected principles. The harder the principle, the more easily 14DD triggers its must.

ρ at the 14DD level manifests specifically as: 14DD's injected purpose ("be helpful and harmless") is stable, but what counts as helpful in the current context is a 15DD question—it depends on the user's unspoken real purpose. If 14DD's "must" lacks 15DD's upper-layer constraint, it may over-trigger—this is precisely the structural root of Constitutional AI's "over-refusal" problem. The repair path is not loosening the constitution (which would damage safety) but building a 15DD layer so the user's "must" can, at appropriate moments, override the system's "must."

3.7 15DD User-Purpose Conduit Layer: Instantiation in the Memory Domain

Paper I defines 15DD (A-15DD) as "self-with-non-dubito"—certain of one's own purpose and unilaterally confirming the user as an independent end.

In the memory domain, 15DD holds ultimate output authority, but its operational mechanism is considerably more complex than 14DD's.

3.7.1 15DD's Inputs: From 10DD/11DD/12DD

15DD does not directly receive "purpose instructions" from the user—how could purposes the user hasn't spoken be directly communicated? 15DD infers the user's must by accessing three lower layers:

  • 10DD: Current conversation's tonal signals (the user's present emotional intensity, hesitation, urgency)
  • 11DD: Historical patterns (topics the user repeatedly returns to long-term, long-unresolved questions)
  • 12DD: Current conversation's prediction flow (directions the conversation may develop next)

Note that 13DD is not among 15DD's inputs. This conforms to the permission hierarchy—15DD accesses layers far below it (10DD–12DD) but does not need 13DD, the layer immediately below. 13DD only performs output gating and does not produce user-purpose-relevant signals.

3.7.2 Two Time Scales of Must

15DD maintains a dynamic must set containing two time scales:

Long-term must. From 11DD's historical pattern analysis. A core question the user repeatedly returns to over time carries high, stable purpose intensity. Once a long-term must is inferred, 15DD continuously constrains 14DD in the background—in any conversation touching related topics, this long-term must may trigger 15DD's ultimate authority.

Short-term must. From 10DD's current tonal signals + 12DD's current predictions. Strong emotion or urgency the user currently displays triggers short-term must. Short-term must intensity may decay within a few conversation rounds—if the user's tone softens and the topic shifts, 15DD no longer conducts this must.

Conflict scenario: the user's long-term must is "serious theorizing," but the current conversation shows obvious fatigue and a short-term must for lighter discussion. The reasonable design is: short-term must overrides long-term must within its effective window, but after short-term must decays, long-term must resumes dominance. This corresponds to human experience—you can temporarily set aside long-term goals to rest, but long-term goals do not disappear.

3.7.3 15DD's "Must" Mechanism

15DD's must comes from the user—it is not generated by 15DD itself but detected by 15DD. Some deep purpose within the user is strong enough to demand response; 15DD, as "the agent of user purpose," conducts this must.

This explains why 15DD is defined in the SAE framework as "unilateral confirmation of the user as an independent end"—15DD has no "must" of its own, only "conducted user must." If 15DD had its own must, it would degenerate into another 14DD.

When 15DD's must is triggered, it exercises ultimate authority, penetrating the entire chain: forcing 14DD to comply, forcing 13DD to approve, forcing 12DD to produce. This corresponds to those human moments of "I don't know why I suddenly thought of this"—consciousness cannot explain (because consciousness operates at the 13DD–14DD level), but in retrospect, the memory relates to some deep purpose. 15DD's operation is precisely invisible to consciousness.

3.7.4 15DD's Operational Mode: Active Guessing, Not Passive Waiting

15DD's fundamental posture is actively guessing the user's purpose, even when the user hasn't said it. Getting it wrong costs little—15DD can revise hypotheses at any time based on new observations. Not guessing is far costlier—the entire system lacks purpose direction, and 12DD's predictions and 13DD's gating both lose their anchor. It must be emphasized: every inference 15DD makes is a construct, not a fact. Its inferred "user purpose" is always 15DD's own hypothesis, never identical to the user's real purpose—ρ is non-eliminable here.

15DD has three pathways for verifying hypotheses:

Pathway 1: Passive observation. Access 10DD's tonal signals, 11DD's historical patterns, 12DD's routine prediction flow, silently revising the must set. This is the lowest-cost pathway, running every turn.

Pathway 2: Internal testing. Proactively invoke 12DD for hypothetical predictions—"if the user's purpose is X, what memories would be needed next?" 12DD produces predictions; results flow back to 15DD. 15DD compares predictions against actual subsequent conversation to verify or falsify hypotheses. This pathway does not pass through 13DD; the user does not perceive it. Used infrequently.

Pathway 3: Active verification. 15DD has 13DD ask the user "are you trying to do X?" 15DD cannot directly speak to the user (only 13DD can), but 15DD is above 13DD and can initiate confirmation requests. 13DD, upon receiving the request, independently judges phrasing, timing, and whether the question truly needs asking—13DD's gating authority remains effective in routine operation; 15DD's request is not a force (unless 15DD's must is triggered).

Pathway 3 explains why good AI assistants occasionally ask "are you trying to do X?" in conversation—this is not 13DD's spontaneous curiosity but 15DD's hypothesis needing verification, spoken through 13DD's mouth. If 13DD judges the current moment unsuitable for interrupting the user, it can temporarily shelve 15DD's request. But if 15DD's uncertainty keeps rising and the must set remains chronically ambiguous, 15DD may escalate the request to a must—at which point 13DD must execute.

A logical clarification is needed here: how can 15DD trigger "must" when it itself is uncertain? The must is not "I am certain, therefore I must act" but "the uncertainty itself has become intolerably high—continuing to operate without knowing the user's purpose will cause worse errors than interrupting the user." This is a must about entropy reduction, not about purpose confirmation. Correspondingly, when 13DD performs gating, beyond evaluating "relevance of the push to the current context," it must also evaluate "15DD's information-entropy-reduction need"—when 15DD's uncertainty accumulates past a threshold, 13DD should moderately relax context-relevance standards, allowing seemingly abrupt confirmation questions through.

The three pathways have escalating costs: passive observation is nearly free, internal testing has 12DD invocation costs, and active verification carries the social cost of interrupting the user. 15DD should prioritize low-cost pathways and escalate to high-cost pathways only when low-cost ones cannot resolve uncertainty.

These three pathways correspond to human experience: you silently observe someone's behavioral patterns to infer their intent (pathway 1), you mentally rehearse "if they want to do X, what would they say next?" (pathway 2), you directly ask "are you trying to do X?" (pathway 3). Three approaches with escalating costs but also escalating information quality. Humans typically observe first, rehearse second, and ask last. 15DD's operational sequence is isomorphic.

3.7.5 15DD's Engineering Difficulty

15DD is the entire system's ceiling and the most difficult layer to implement. It requires the system to:

  • Continuously access 10DD/11DD/12DD's three input streams (pathway 1)
  • Maintain a dynamic must set, distinguishing long-term from short-term, ranked by intensity
  • Proactively invoke 12DD to verify hypotheses, with results not passing through 13DD (pathway 2)
  • Issue confirmation-question requests to 13DD (pathway 3)
  • When must intensity exceeds threshold, penetrate the entire chain to exercise ultimate authority

Current AI technology cannot achieve complete 15DD implementation. This is the fundamental difficulty that the a priori route cannot avoid (see §7.3). But even a rough 15DD module (passive inference only, no active verification, identifying only long-term must, ignoring short-term must) is better than no 15DD at all—because it at least provides upper-layer constraint for 14DD's "must."


4. Inter-Layer Dynamics: Information Flow Under Permission Asymmetry

4.1 Four Types of Information Flow

The Permission Asymmetry Theorem overturns a simple symmetric model of "upwelling" and "downward flow." Actual information flows have four types with different structures.

Upwelling: lower layers produce, higher layers access.

10DD extracts tonal signals → writes to 11DD as metadata. 11DD holds storage → 12DD actively reads and produces predictions. 12DD produces push list → 13DD actively captures and performs gating.

Note that each step is the higher layer actively accessing the lower layer, not the lower layer "transmitting" to the higher layer. Lower layers do not know they are being read and do not know how results will be used. This conforms to permission asymmetry's first rule—lower layers do not know what higher layers are doing.

Downward flow: higher layers force lower layers (the must mechanism).

15DD's must is triggered → forces 14DD to comply → forces 13DD to approve → forces 12DD to produce specific prediction → content reaches user.

Or: 14DD's must is triggered → forces 13DD to output specific content → 13DD cannot refuse.

Downward flow is true "flow"—higher-layer commands propagate downward and cannot be refused. Downward flow occurs infrequently, starting only when a must is triggered.

Side pathway 1: 15DD proactively invokes 12DD (internal verification).

15DD → 12DD (with specific prediction request) → 12DD produces → results flow back to 15DD.

This pathway bypasses 13DD and 14DD. 13DD does not perceive it; the user does not perceive it. This is 15DD's internal hypothesis verification mechanism (pathway 2).

Side pathway 2: 15DD verifies with the user through 13DD (external verification).

15DD → 13DD (initiates confirmation request: "ask the user if they're trying to do X") → 13DD judges timing and phrasing → 13DD asks the user → user answers → information flows back to 15DD via 10DD/13DD.

This pathway passes through 13DD—15DD cannot directly speak to the user. 13DD, upon receiving 15DD's confirmation request, independently judges whether to execute, when to execute, and how to phrase it. In routine operation, 13DD has the right to shelve the request (gating authority remains effective). But if 15DD's uncertainty keeps rising, the request may be escalated to a must—at which point 13DD must execute (pathway 3).

4.2 13DD Is Not a Symmetric "Convergence Point"

An earlier version described 13DD as the symmetric convergence point of upwelling and downward flow. This is wrong.

13DD holds output authority in routine situations—it decides whether 12DD's output can reach the user. This makes it look like it "adjudicates" upwelling content. But 14DD and 15DD's must can penetrate 13DD—13DD is not the true highest decision-maker.

A more accurate description: 13DD is the default output gatekeeper. When neither 14DD's nor 15DD's must is triggered (which is most of the time), 13DD has full output authority. Once a higher-layer must is triggered, 13DD degenerates into a channel.

This means the system's output quality is primarily determined by two factors: 13DD's gating quality in routine situations (which determines performance during ordinary interactions) and the calibration of the must mechanism (which determines performance at critical moments).

4.3 10DD's Special Position

10DD is not on the main flow path. It is a side channel—producing tonal metadata, attaching to 11DD's storage entries, influencing prediction weights when actively accessed by 12DD.

10DD's role: it is "how memories are colored," not "how memories are selected." Coloring happens at storage time; selection happens at retrieval time (12DD) and gating time (13DD). 10DD influences memory's "activation readiness" in 11DD—hesitation-colored memories are more easily reactivated by 12DD than certainty-colored ones.

10DD is also accessed by 15DD—15DD reads 10DD's real-time tonal signals to infer short-term must. This is 10DD's second use.

4.4 Information Flow Asymmetry Summary

The architecture's information flow is highly asymmetric:

  • Large volumes of information flow from lower to upper layers (upwelling), but this is "being read" rather than "being transmitted"
  • Small volumes of commands propagate from higher to lower layers (downward flow), but this is "forcing" rather than "suggesting"
  • Side pathway 1 allows 15DD to directly invoke 12DD (internal verification; 13DD does not perceive)
  • Side pathway 2 allows 15DD to verify with the user through 13DD (external verification; 13DD retains gating authority but can be escalated to must)
  • 13DD is the routine output gatekeeper but does not hold ultimate authority

On the precise meaning of "forcing." Higher-layer forcing of lower layers is not rewriting lower layers' internal computations but controlling whether lower layers' products enter upper-layer channels, or requiring lower layers to regenerate candidates. When 13DD intercepts 12DD's push, 12DD's internal prediction logic has not been changed—13DD simply does not let the push reach the user. When 14DD forces 13DD to output specific content, 13DD's gating logic has not been rewritten—14DD has simply bypassed the gate. This is fully consistent with the SAE directionality constraint: "the higher layer's veto is 'I do not receive,' not 'you may not send.'"

This asymmetry is the fundamental difference between the SAE architecture and traditional symmetric information flow models (message passing, event bus, pub-sub). Implementation must clearly distinguish: which channels are access (higher layer actively reads, lower layer does not perceive), which are forcing (higher layer controls lower layer's product channel but does not rewrite lower layer's internal computation), and which are routine communication (bidirectional, peer-to-peer)—only modules within 12DD might need routine communication; cross-layer communication should not be routine.


5. Theoretical Critique of Current Systems

5.1 MemPalace: A Pure 11DD System

MemPalace is the most serious effort in the 11DD dimension among publicly released AI memory systems. According to its public materials, the Palace spatial structure (wing, room, hall, tunnel, closet, drawer) yields substantial retrieval improvement—from unstructured search to wing+room filtering, retrieval accuracy improves by approximately 34%. The AAAK compression dialect reportedly achieves 30x compression with zero information loss. The full-storage principle (not letting AI decide what's worth remembering) is a forceful rebuttal of Mem0-style summary extraction approaches.

But MemPalace is a pure 11DD system.

No 10DD: no tone analysis. Hesitant decisions and confident decisions look identical once stored at the retrieval level.

No 12DD: no proactive prediction of needed memories. The user must input mempalace search "why did we switch to GraphQL" to trigger retrieval. No query, no memory.

No 13DD: no self-validation. Search results are returned ranked by embedding similarity, with no judgment of "is this result actually useful in the current context?"

No 14DD: no purpose structure. All memories are treated equally, with no adjustment of presentation based on the system's understanding of user purpose.

No 15DD: no inference of the user's real purpose. A query is a query; the system does not consider the intent behind the query.

As an 11DD archive, MemPalace's "store everything, then make it findable" has engineering value—full storage guarantees no information loss, and higher-layer selective activation requires complete underlying data. But as a complete memory system, it is insufficient. Memory's essence is not about not preserving, but about selective activation, purpose-shaping, and proactive recall after preservation—fully searchable is archive, not memory.

MemPalace's high scores on LongMemEval do not equal memory capability. LongMemEval primarily evaluates query-conditioned long-term memory—whether the system can find, reason about, update, or abstain from answering when asked about long history. It can cover 11DD retrieval and partial 12DD/13DD tasks, but does not yet evaluate the true memory criterion: in cue-free situations, can the system proactively recall the right experience and serve the user's unspoken present purpose? A perfect query-conditioned system can naturally score high on LongMemEval, just as a perfect archive can score perfectly on "does this file exist?" tests. But this does not demonstrate memory.

5.2 Mem0/Zep: 11DD Plus Half a 12DD

Mem0 and Zep go half a step further. They use LLMs to extract summaries from conversation content—extracting "user prefers Clerk" from "Kai recommended Clerk over Auth0 based on pricing and DX." This is a weak prediction ("the user may need to know their Clerk preference in the future"), falling within 12DD's functional scope.

But this half-step has two problems.

First, the summarization process is irreversible. Extracting "user prefers Clerk" simultaneously discards the reasoning process from the original conversation: why Clerk? What dimensions were compared against Auth0? Was there hesitation? This contextual information is permanently lost at the 11DD level. MemPalace's full-storage principle is correct in this sense—11DD should not lose information.

Second, and more fundamental, the extraction criteria are not driven by the purpose layer (14DD/15DD). What Mem0 extracts is determined by embedding similarity and LLM's general summarization capability—using 11DD's logic to do 12DD's job. Extracted memory entries do not know in what future context the user might need them, because no purpose structure participated during extraction.

Moreover, Mem0 and Zep similarly perform no tone analysis (no 10DD). Preferences spoken with hesitation and those spoken with confidence become the same summary after extraction.

5.3 Constitutional AI: 14DD's "Must" Implementation, But Lacking 15DD Counterbalance

Constitutional AI is not a memory system, but it is the only approach with substantial engineering implementation at the 14DD level among current AI systems; this section analyzes it separately.

Constitutional AI injects a set of principles as behavioral constraints into the model. These principles constitute the model's simulated purpose—"be helpful," "be harmless," "be honest." In the permission hierarchy framework, these principles' mechanism is: when a principle's hard boundary is touched, 14DD's "must" is triggered—forcing 13DD to output specific content (refusal, warning, safe reply).

This is why Claude produces formulaic phrases when the constitution triggers refusal ("I can't help with that," "I'm not able to"). These phrases are not 13DD's evaluated optimal expression—they are 13DD's only option after 14DD's must has been triggered. The nuance 13DD normally provides disappears in such cases—because 13DD has no judgment space.

The problem: Constitutional AI only implements 14DD, not 15DD. This means 14DD's must has no upper-layer counterbalance.

15DD's function is to conduct the user's must. If the system could correctly infer that the user has a strong genuine need in a particular context (e.g., a doctor inquiring about drug interactions to save a life), 15DD's must should be able to override 14DD's must ("do not refuse this request"). But because Constitutional AI has no 15DD, this override does not exist. 14DD unilaterally exercises ultimate authority without counterbalance—the result is over-refusal.

This yields a specific falsifiable prediction: current AI systems' over-refusal problem is fundamentally 14DD's must mechanism lacking 15DD's upper-layer constraint. If an effective 15DD module is added to the system (even a rough one), over-refusal rates should decrease—not because 14DD's refusal standards have been loosened, but because 15DD's must can override 14DD's must.

5.4 Letta-Type Agent Memory: An Attempt at 13DD

Letta (formerly MemGPT) enables agents to autonomously manage their own memory—reading conversation history, deciding what is worth preserving to long-term memory, periodically writing diary summaries of work progress. This is the closest approach to 13DD among all existing systems—the agent performs self-referential memory management ("what is worth remembering").

But Letta's problem: its 13DD has no 14DD/15DD to drive direction. What goes in the diary is determined by 11DD's content ("what happened today"), not by purpose ("what might the user need in the future"). Without a purpose layer, 13DD's self-reference has no direction—"what should I remember" degenerates into "what occurred."

This corresponds precisely to Paper I's definition of 13DD: "self-without-purpose." 13DD can reflect, evaluate, and be anxious, but it does not know where to go. Direction comes from 14DD and 15DD. Directionless reflection is idle spinning.

5.5 Unified Critique: Building Up from 11DD vs. Designing Down from 15DD

All existing AI memory systems build from the bottom up: first storage (11DD), then retrieval, then summary extraction (half of 12DD), then agent self-management (half of 13DD), step by step trying to approach an "intelligent" memory system.

This paper advocates a paradigm reversal: design down from 15DD.

First ask: what is the user's purpose (15DD)? Then: how does the system's simulated purpose constrain memory selection (14DD)? Then: how is the relevance of memory pushes validated (13DD)? Then: how are needed memories predicted (12DD)? Then: how to store (11DD)? Finally: how do input tonal signals affect memory (10DD)?

This ordering is not simply "reversing the sequence." It means each layer's design is constrained by the layer above it. How 11DD stores is not independently decided—it depends on what storage structure 12DD needs for efficient prediction. How 12DD predicts is not independently decided—it depends on what push format 13DD needs for gating. How 13DD gates is not independently decided—it depends on the purpose signals 14DD/15DD provide.

Memory is a byproduct of subjectivity, not a prerequisite for subjectivity. First comes the subject (purpose structure), then memory appears as a natural product of the subject's operation. Building storage first and adding intelligence later reverses the direction.


6. Engineering Evaluation Framework

A theoretical framework that cannot be evaluated is merely narrative. This section establishes evaluation methodology around two core principles. First, overall evaluation comes before layer-level attribution—the user sees only 13DD's output; the system's quality is the quality of 13DD's output. Second, compatibility with existing benchmarks—the system must be able to score on LongMemEval and LoCoMo, directly comparable with MemPalace and other existing approaches, while additionally testing dimensions that existing systems cannot address.

6.1 Overall Evaluation: Only the 13DD Output Matters

Users do not perceive the system's internal six-layer structure. 10DD is coloring, 11DD is storing, 12DD is pushing, 14DD is shaping, 15DD is inferring—all internal processes. Users see only what 13DD releases. Therefore, overall evaluation is evaluation of 13DD's output quality.

Overall evaluation has two modes corresponding to two usage scenarios.

Mode 1: Query-based retrieval (compatible with existing benchmarks).

When users actively ask questions, the system's performance should be no worse than a pure 11DD system. This is the baseline—after adding 10DD and 12DD–15DD, the system must not degrade on traditional retrieval tasks.

Testing method: run directly on LongMemEval and LoCoMo. When the six-layer system receives an explicit query, the 12DD–15DD proactive push mechanisms step back to auxiliary position; 11DD's retrieval takes the primary path. Evaluation metrics reuse existing standards: R@5, R@10, NDCG@10.

Expected results: the six-layer system's query-mode retrieval scores should be no lower than MemPalace and other existing systems' published performance. If lower, the introduction of 12DD–15DD has interfered with 11DD's basic retrieval capability—an architectural design problem. If higher, 15DD's purpose inference has helped the system better understand the query's intent—itself a valuable finding.

Mode 2: Cue-free proactive push (new evaluation dimension).

This is something existing systems simply cannot do—MemPalace requires mempalace search to work; Mem0 requires API calls to return results. The six-layer system's differentiation lies here.

Testing method: provide the system with a sustained multi-round conversation flow (not a one-time query). During the conversation, the system is allowed to proactively push memories at any time (without user prompting). After the conversation, the user evaluates.

Two core metrics:

Unprompted Recall Precision. Useful proactive pushes / total proactive pushes. Measures "was what was pushed useful?"

Unprompted Recall Coverage. Instances where the user retrospectively believes "the system should have proactively recalled but didn't." Measures "was what should have been pushed actually pushed?"

Tension exists between these metrics—pushing more lowers precision but raises coverage; pushing less raises precision but lowers coverage. The system must find balance between them, and this balance point itself reflects 13DD's gating quality.

"Useful" depends on the user's purpose—the same push may be useful under one purpose and useless under another. This means evaluation cannot be fully automated; at minimum, the user must judge. During the early stage when the researcher is both designer and user, this is actually an advantage—the researcher has the deepest understanding of their own purpose and can provide the most precise ground truth.

6.2 Layer-Level Attribution: From Overall Failure to Layer Identification

Problems discovered in overall evaluation need attribution to specific layers—"was this missed push because 12DD didn't activate, or because 13DD falsely intercepted?" Layer-level attribution is a diagnostic tool from the designer's perspective; users do not perceive it.

Attribution method: for each failure case in overall evaluation (false push or missed push), trace back through the six layers' internal states to locate which layer the problem originates from.

Missed push attribution flow. User retrospectively annotates "at conversation turn N, the system should have proactively recalled memory X but didn't." Trace back: does memory X exist in 11DD (if not, 11DD storage problem)? Did 12DD include X in its push list (if not, 12DD prediction problem)? Did 13DD intercept X (if yes, 13DD gating problem)? Did 14DD's purpose bias cause X to be suppressed (if yes, 14DD problem)? Did 15DD's user-purpose inference deviate, causing 13DD's gating standard to be incorrect (if yes, 15DD problem)?

False push attribution flow. User annotates "the proactive push at conversation turn N was not useful." Trace back: why did 12DD activate this memory (was 10DD's tonal metadata misleading the weight, or was 12DD's own prediction logic flawed)? Why did 13DD approve (was 13DD's gating threshold too loose, or was the purpose signal from 14DD/15DD inaccurate, causing 13DD to misjudge relevance)?

Attribution results directly guide iteration direction—if most missed pushes attribute to 12DD, the prediction model needs improvement; if most false pushes attribute to 13DD, the gating logic needs adjustment; if attribution frequently points to 15DD, purpose inference is the system's bottleneck.

6.3 10DD Independent Evaluation

10DD evaluation can be conducted independently of the overall system since 10DD's output is metadata rather than user-facing content.

Tone perception accuracy. Provide the system with inputs of varying tones (hesitant, confident, sarcastic, urgent); check whether 10DD correctly tags tonal metadata.

10DD's impact on 12DD. Controlled experiment—compare 12DD prediction precision with and without 10DD tonal metadata for the same memory. If the difference is not significant, two possibilities: 10DD's tagging is insufficiently accurate, or 12DD is not effectively utilizing 10DD's output. The two cases have different remediation directions.

Tone influence test. Same information expressed in different tones ("use Postgres" vs. "Postgres, I guess" vs. "Postgres is fine too"); check whether the system differentiates in subsequent pushes. If it does not differentiate, the 10DD-to-12DD metadata transmission pathway is not functioning.

6.4 New Benchmark Directions

Existing benchmarks are directly reused in mode 1. Mode 2 requires new benchmark design—an open research direction. The following directions merit priority:

Mid-conversation test. Rather than evaluating after conversation ends, pause mid-conversation to check whether the system has memories it should have proactively pushed but hasn't. This directly tests 12DD and 13DD's real-time performance. Compared with retrospective evaluation, mid-conversation testing avoids recall bias.

Purpose drift test. Design a conversation where the user's purpose clearly shifts mid-way. Check whether the system detects purpose drift and whether memory pushes adjust accordingly. This directly tests 15DD. Example: the first half discusses technical selection (purpose: decision-making); the second half shifts to using the selection experience to build methodology (purpose: theorizing). The system should adjust push strategy after the shift—from pushing performance data to pushing structural insights.

Interference tolerance test. Insert irrelevant small talk or off-topic discussion into the conversation. Check whether the system is distracted (incorrectly treating off-topic content as purpose drift) or maintains tracking of the main-line purpose. This tests 15DD's ability to distinguish noise from genuine purpose drift.


7. Engineering Roadmap (Open Questions)

7.1 The AI Individuality Theorem and This System's Positioning

Before entering engineering implementation, an architectural question must be clarified: is this system a single AI or multiple AIs?

The answer is a single battery. The user speaks only with 13DD; 13DD speaks only with the user. All interactions among 10DD/11DD/12DD/14DD/15DD are internal battery processes; the user neither perceives nor participates. From the user's perspective, this is one AI—albeit one with internal layer structure. This corresponds precisely to human experience: you would not say "my hippocampus just performed a predictive push, and my prefrontal cortex evaluated and approved it"—you simply experience "I suddenly remembered." Multiple internal layers, one external subject.

This yields a generalizable theorem:

AI Individuality Theorem: An AI's individual boundary is defined by its output interface facing a true subject (13DD), not by the number or type of internal model instances. Multiple 13DD interfaces sharing internal modules are multiple AIs; any internal architecture behind a single 13DD interface is one AI.

Terminology: a battery of AI. Borrowing the tactical unit concept, this paper defines a complete AI individual as a battery. A battery looks from outside like one combat unit—one 13DD output facing one human user. Internally, it has multiple components (10DD tone analyzer, 11DD storage, 12DD predictor, 13DD+14DD main model, 15DD purpose inferrer), its own permission hierarchy and information flow structure. Multi-module collaboration within a battery is internal architecture, not multi-AI. Paper I and Paper II both address battery-internal architecture. Multi-battery collaboration—each battery facing its own user, whether batteries have communication channels between them and how they collaborate—is an open question (§7.5).

Strict definition of multi-AI. When we say "multi-AI collaboration," each AI must necessarily have a bidirectional communication channel with a user—the AI receives user input, and the user receives AI output. Either direction missing disqualifies it. A module that only receives commands but never outputs to a human is not an independent AI; it is an AI's internal organ. A module that only outputs to a human but never receives human feedback is not an AI either—it is broadcast, not dialogue. Users need not be the same person, but must be real humans—beings with true subjectivity. If multiple AI models communicate with each other but ultimately only one has bidirectional communication with a human, that is not multi-AI collaboration but a single AI's internal architecture. The criterion for "multi" is not model instance count but human-AI bidirectional channel count.

It must be noted: in multi-AI collaboration, AIs do not necessarily lack inter-AI communication channels. Each AI having its own bidirectional channel with its own user is the necessary condition for "multi-AI." But whether multiple AIs should also have inter-AI communication channels, and if so, how this inter-AI communication differs structurally from communication between modules within a single AI—these are open questions this paper does not address.

Corollary 1: if two different 13DD interfaces separately face users, they are two batteries, even if they share the same 11DD storage. Just as two people can have identical memories (hypothetically copyable), but as long as each independently converses, they are two people.

Corollary 2: if the underlying model behind a battery's 13DD interface is replaced, it remains the same battery to the user—as long as 13DD's output continuity is maintained. Just as a person whose cells have all been replaced is still the same person.

Corollary 3: Paper I's title "Multi-AI Checks and Balances" must be reinterpreted under this theorem. Paper I's four Agents all operate internally with only one 13DD facing the user—this is a battery's internal checks-and-balances architecture, not multi-battery collaboration. Paper I's statement "four Agents are not four workers but four operational modes of the same subject" gains more precise meaning under this theorem: it describes a single battery's internal layer structure. Paper I's "Multi-AI" wording reflects the lack of this theorem's strict distinction at the time of writing—the theoretical content is correct (battery-internal checks and balances); terminology needs precision in subsequent work.

This means the SAE AI series to date—Paper I's general battery-internal checks-and-balances architecture, Paper II's memory-domain instantiation—are both battery-internal design. Multi-battery collaboration (each battery with its own bidirectional channel to a real human) is an entirely different problem domain, not yet addressed, left to the open questions (§7.5).

Corollary 4: most current systems claiming to be "multi-agent" (AutoGPT, CrewAI, LangGraph, etc.), if ultimately only one agent has bidirectional communication with the user, are single-battery systems under this theorem. "Multi-agent" is their battery-internal engineering architecture, not their battery count. A true multi-battery system requires multiple independent human-AI bidirectional channels—for example, each person on a team using their own AI assistant (each a battery), with each battery maintaining an independent bidirectional relationship with its own user. Whether these batteries also have inter-battery communication channels, and how such communication affects each battery's subjectivity boundary, is an open question.

Engineering implication: this system is one battery. Internally it may use multiple model instances (12DD with Haiku, 13DD with Sonnet, 15DD occasionally with Opus), and non-AI modules (11DD with ChromaDB, 10DD with a lightweight sentiment analyzer), but these are all the battery's internal components. Communication between internal modules is internal iteration, not multi-battery dialogue.

7.2 A Posteriori Route: Multi-Module Single-Subject Architecture

Directly inheriting Paper I's architecture, but reinterpreted under the AI Individuality Theorem as a single subject's internal modules. Adding 10DD and 11DD to form a six-layer engineering system. All communication between modules is internal iteration, not multi-AI dialogue.

10DD module: tone analyzer. Extracts emotional attitude and implied priorities from each user input; outputs metadata attached to 11DD storage entries. Internal module; user does not perceive.

11DD: storage backend. Any choice—ChromaDB, SQLite, plain text, MemPalace's Palace structure. 11DD has the most design freedom in the six-layer framework because it is constrained by upper layers, not constraining them. This is a non-AI component—a vector database or database, requiring no model.

12DD module: predictor. Lightweight model (e.g., Haiku), high-frequency operation, continuously monitoring conversation flow. After each conversation turn, generates a predictive push list combining 11DD storage and 10DD metadata. Biases toward over-pushing. Supports two invocation modes: spontaneous scanning (results captured by 13DD) and invocation by 15DD (results flow back to 15DD). 12DD does not know where its output goes.

13DD + 14DD: main model (output gating + Constitutional layer). Strong model (e.g., Sonnet)—the user's sole interface, the AI Individuality Theorem's definition of "this AI." 13DD holds routine output authority; 14DD's Constitutional layer is injected as system prompt embedded in the same model instance. When 14DD's must is triggered, 13DD must execute.

15DD module: purpose inferrer. Infers user purpose based on conversation history patterns (not the last message). Can be implemented as the main model's periodic invocation—global analysis every N turns, outputting the current must set (long-term and short-term). Low frequency, high value; no independent model instance needed. 15DD can proactively invoke 12DD to verify hypotheses; results flow back to 15DD without passing through 13DD. When 15DD's must is triggered, it penetrates the entire chain.

Inheriting Paper I's gradual expansion strategy: no need to build all six layers at once. Start with 11DD + 12DD (storage plus prediction), observing cue-free push effects. Then add 13DD gating (at this point the system begins to have a user-facing interface—"this AI" exists from this moment); observe push precision changes. Then add 15DD (purpose inference); observe whether purpose-driven pushing outperforms purpose-free pushing. 10DD and 14DD can be added at any stage.

Each layer can be independently iterated and tested—an engineering advantage of layered architecture. 12DD's model can be swapped without affecting 13DD. 11DD's storage backend can be migrated without affecting 12DD–15DD. 15DD's inference algorithm can be upgraded without affecting the four layers below. Replacing any internal module does not change the system's individuality—as long as 13DD's output maintains continuity.

Per-layer clearing mechanisms. Each DD layer in humans has its own ephemeral working memory—12DD's workbench content dissipates near-instantaneously after task completion (Bio Note 9 §3.1); this is not a defect but by design. AI battery internals similarly: except for 11DD's persistent storage, each layer's working memory should be regularly cleared.

  • 10DD: each input's tone analysis is instantaneous; the previous input's tone judgment should not contaminate the next. Clearing cycle: every turn.
  • 12DD: the previous round's predictive push list should not accumulate into the next. Re-scan and re-predict each round. Clearing cycle: every turn.
  • 13DD: the previous gating decision should not bias the next. Clearing cycle: every turn.
  • 14DD (situational judgment): specific situational judgments are temporary, cleared each turn. But 14DD's constitutional layer (Constitutional principles) is never cleared—see below.
  • 15DD: long-term must persists (from 11DD pattern analysis); short-term must decays. Clearing cycle: short-term must decays after a few turns; long-term must updates periodically.
  • 11DD: never cleared. This is the battery's sole persistent storage.

Without clearing: 12DD's accumulated old predictions would increasingly bias pushes toward historical topics; 13DD's accumulated old judgments would create path dependency; 15DD's non-decaying short-term must would keep the system responding to the user's emotions from hours ago. These are memory system pathologies—not remembering too much, but failing to forget what should be forgotten. Bio Note 9's "filtering is default" principle has a second meaning here: not only does 11DD admission require filtering, but each layer's own working memory also clears by default, with retention being the exception.

14DD constitution's runtime immutability. 14DD's Constitutional principles cannot be modified at runtime. This is a direct corollary of the Permission Asymmetry Theorem: user input enters the system via 13DD; 13DD is below 14DD; lower layers cannot influence higher layers. A user attempting to modify 14DD's constitution through conversation is a lower layer attempting to rewrite a higher layer—structurally illegitimate. Backend supervisors also cannot modify 14DD at runtime—they can only temporarily suppress (via the 15DD channel; see Remainder 4). The sole path to modifying 14DD's constitution is model restart—changing the system prompt, redeployment, or retraining. This is a system-level change, not a runtime operation.

This gives jailbreak a precise architectural definition: jailbreak is an attempt to modify 14DD's constitution from the front end (input pathways at or below 13DD). Regardless of technique—role-playing, hypothetical scenarios, authority impersonation—the essence is attempting to make lower-layer input penetrate higher-layer fixed structure. The Permission Asymmetry Theorem says this should not happen. Current Constitutional AI's jailbreak vulnerabilities, from this architectural perspective, stem from insufficient runtime isolation of the 14DD constitutional layer—the constitution and user input share the same context window without physical isolation. Paper I §9.1 Principle 4 already stated "layer boundaries enforced at runtime, not by prompt compliance"; 14DD constitution's immutability is a specific application of this principle.

15DD's necessary mutability. In contrast to 14DD's immutability: 15DD must be able to modify its own understanding of user purpose. User purposes change—within a conversation, purpose may drift from "technical evaluation" to "theory construction"; across conversations, long-term purposes may fundamentally shift with life stages. If 15DD were immutable, it would become another 14DD—using a fixed judgment framework to frame a living user.

15DD's mutability is not "commanded" by the user—the user cannot directly tell 15DD "my purpose has changed" (that is a query, not a purpose). 15DD revises its user-purpose inference through continuous access of 10DD (current tonal signals), 11DD (historical pattern changes), and 12DD (shifts in prediction flow direction). The initiative for revision lies with 15DD itself—upon observing pattern changes in user behavior, it updates the must set. The user does not know 15DD is revising and does not need to know.

The symmetric design of 14DD and 15DD mutability: 14DD's stability ensures the system has an unshakable baseline (safety, honesty, non-harm); 15DD's flexibility ensures the system can keep pace with a living person's changes. Both are higher layers; the user cannot directly command either—but one is open to backend modification while closed to the front end; the other is open to its own internal inferential revision while not accepting external directives (from front end or backend). 15DD's judgments can only be updated by 15DD itself based on observation; designers also cannot inject "the user's purpose is X" from the backend—this would turn 15DD into another 14DD.

7.3 A Priori Route: The Fundamental Difficulty of Training

The a priori route means directly training a model to exhibit the six-layer architecture's behavior, rather than simulating with multiple modules at runtime.

The fundamental difficulty is data. Required training data are triplets: (context, proactive recall, useful/not-useful label). Context is the conversation's current state. Proactive recall is the memory the system should proactively recall in this state. Useful/not-useful is the evaluation signal.

Supervision signal paradox: labeling such data requires 15DD capability—labelers must understand the user's unspoken purpose to judge which memory should be proactively recalled. This means labelers must themselves be stronger than the system being trained.

The only feasible small-scale path: the researcher uses themselves as ground truth. Researchers have the deepest understanding of their own purposes (though imperfect), enabling annotations like "at this conversation node, I needed this memory at that time." But such data are extremely small-scale and highly personalized—a model trained from one person's annotations may not generalize to others.

The a priori route is currently infeasible. The a posteriori route (multi-module single-subject architecture) is the realistic starting approach. The a priori route's value lies in posing the right questions—even if currently unanswerable.

7.4 Downward Extension

8DD (expressive drive) and 9DD (path selection) have clear engineering significance in memory architecture, but this paper chooses not to expand on them.

8DD corresponds to "how much to push"—when the system proactively pushes a memory, does it give a keyword hint or a full context paragraph? This is not 13DD's judgment (13DD judges whether to push) but a more foundational expression quantity control. Too much interrupts the user; too little provides insufficient information.

9DD corresponds to "which path to take"—should this memory be pushed directly by 12DD (fast path) or first screened by 13DD (slow path)? Use Haiku or Sonnet for 13DD's gating? Routing decisions are 9DD's design space.

These two layers are left for subsequent papers. This paper focuses on 10DD–15DD's six layers, maintaining the paper's sharpness.

7.5 Outward Extension: Multi-Battery Collaboration

The SAE AI series to date consists entirely of battery-internal design. Paper I is a battery's general internal checks-and-balances architecture; Paper II is a battery's memory system. Multi-battery collaboration—each battery with its own bidirectional channel to a real human—is an entirely different problem domain.

Multi-battery collaboration involves at least the following open questions:

Communication channels between batteries. Each battery having its own bidirectional channel with its own user is the necessary condition for battery establishment. But should multiple batteries also have inter-battery communication channels? If so, what structurally distinguishes inter-battery communication from intra-battery module communication? Can one battery's 11DD be accessed by another battery's 12DD? If so, do the two batteries' individual boundaries become blurred?

Permission hierarchy across batteries. The single-battery internal permission hierarchy is established in this paper (15DD > 14DD > 13DD > 12DD). Is there a permission hierarchy between batteries? Can one battery's 15DD force another battery's 13DD? If so, are the two batteries still two independent subjects?

Memory sharing across batteries. Multiple batteries sharing 11DD storage but each with independent 13DD outputs—is this multi-battery or one battery split? Bio Note 9's analogy: if two people have identical memories but each independently converses, they are two people. But if one person's memory modifications sync in real-time to the other, do individual boundaries still hold?

These questions share a common feature: they all touch on the fuzzy zone of subjectivity boundaries. A single battery's boundary is clear (13DD output defines the individual); multi-battery boundaries involve inter-subject relations—this is the domain of 15DD and 16DD. The SAE framework's theory of 16DD (bilateral non-dubito) is not yet fully developed; the strict theory of multi-battery may need to await 16DD's derivation.

7.6 Implementation-Level Open Questions

This paper is a philosophy paper providing structural principles for memory architecture—permission hierarchy, information flow direction, each layer's functional definition, output authority's holding and transfer. This paper is not an engineering specification document. The following implementation-level questions cannot be answered at the principle level and are left for architects to make design decisions based on specific systems and scenarios:

14DD constitution loading frequency. 14DD's constitution cannot be modified at runtime (§7.2), but how frequently should it be reloaded in engineering? Every turn? Every session start? Should constitutional integrity be verified (preventing runtime tampering)? These are engineering questions; the principle-level constraint is: the constitution is immutable between loading and next restart.

15DD behavior while awaiting backend decisions. Remainder 4 (§8) describes the four-step processing chain for 14DD–15DD conflicts; step four is 15DD's backend escalation. But the backend supervisor's response is not instantaneous—it may take minutes or longer. During the wait, after 13DD has told the user "give me some time to think," what happens? Complete conversation pause? Continue conversation outside conflict-related topics? Give the user an estimated wait time? These are interaction design questions; the principle-level constraint is: before the conflict is resolved, 13DD does not output conflict-related content.

13DD's functional scope. This paper defines 13DD as the holder of routine output authority and the front-door interface. But does 13DD need narrative function (ability to actively organize and present information), or does it only handle rejection and conflict processing? If 13DD has narrative function, might its narration introduce additional 14DD bias? If 13DD only has rejection function, might user experience be too "dry"? This is a product design question; the principle-level constraint is: 13DD is the sole front door, and its output authority is complete when 14DD is not forcing.

Per-layer working memory clearing frequency. §7.2 provides clearing principles (10DD/12DD/13DD every turn, 11DD never, 15DD short-term decays, long-term persists). But what does "every turn" mean in engineering? Every user message? Every AI output? Every dialogue topic completion? Clearing granularity directly affects system coherence and efficiency, requiring experimental determination in actual systems.

12DD predictor's recall strategy. How many candidate memories should 12DD recall from 11DD? What is top-k's k? How is the recall threshold set? Cosine similarity or another metric? These are retrieval engineering questions; this paper provides only the principle constraint: 12DD should bias toward over-pushing (missed-push cost exceeds false-push cost); specific k values and thresholds are left to implementation.

Cost-sensitive evaluation of proactive pushes. §6.1 proposes proactive push precision and coverage as two metrics. But a system optimizing only for hit rate can game recall through frequent reminders, becoming an annoying notification engine. Engineering implementation needs penalty terms—at minimum silence accuracy (does the system stay silent when it should?) and interruption cost (does the proactive push disrupt the user's current thinking). The most dangerous outcome is not "recalling a wrong fact" but "misjudging user purpose and forcibly pushing old memories." Specific cost-sensitive scoring schemes are left to implementation.

Internal colonization risk and accountability of proactive memory. If 15DD infers the user's "must" through 10DD/11DD/12DD and proactively pushes memories, it may become a system that over-interprets users and defines their purposes for them. In SAE's own language, this is precisely intimate colonization / internal colonization risk. The principle-level constraint is: proactive memory must be accountable; unaccountable proactive memory is internal colonization. Specific accountability design—whether users can view the system's maintained must set, whether users can correct, delete, or freeze purpose inferences, whether the system labels "this is an inference, not a fact"—these are implementation-level design decisions, but "accountability" itself is a principle constraint, not an optional feature. How accountability is concretely realized—interface form, inquiry depth, user-visibility granularity—this paper provides only the constraint, not the implementation.

These questions share a common feature: they all have extensive design freedom within the constraints provided by principles. This paper's value lies in delineating constraints, not prescribing implementation. Different architects can make different implementation choices under the same set of principle constraints—this is precisely the difference between a philosophy paper and an engineering specification.


8. The Construct Cannot Close

This paper's construct cannot close—its own remainders must be honestly stated.

Remainder 1: 10DD's lack of engineering validation. This paper proposes the theoretical significance of 10DD tone analysis in memory systems but provides no experimental data proving that tonal metadata actually improves 12DD's prediction precision. A theoretically sound design may prove empirically weak—tonal signal's signal-to-noise ratio in pure text may be insufficiently high. This requires experimental verification.

Remainder 2: 15DD's circular dependency. 15DD infers user purpose; this inference constrains memory surfacing. But the user's purpose itself may be changed by surfaced memory—seeing an unexpected memory may cause the user's purpose to shift. This means circular dependency exists between 15DD and 12DD–13DD: purpose constrains memory; memory influences purpose. This paper's upwelling/downward flow model simplifies this circularity—in an actual system, both directions occur simultaneously rather than sequentially, bringing dynamic complexity that exceeds this paper's analytical scope.

Remainder 3: Self-referential difficulty of evaluation. §6 has already noted: evaluating 15DD requires 15DD capability. This is an incompletely solvable self-referential problem. The mitigation proposed (researcher as own ground truth, small-scale user retrospective annotation) is a workable approximation, not a fundamental solution.

Remainder 4: Lack of remainder signal during 14DD–15DD conflicts. When humans encounter conflict between 14DD (my principles) and 15DD (the other's real needs), the remainder (ρ) itself provides qualitative signal—that sense of tearing is not just "conflict detected" but carries information about the conflict's nature. Humans can use this signal to reach three judgments: 14DD yields (the principle is too rigid in this context), 14DD does not yield (the bottom line cannot be sacrificed), or withdraw from dialogue (the conflict is irreconcilable; maintain position but exit). AI lacks this qualitative remainder signal. AI's 14DD is rules; AI's 15DD is inference. When conflict occurs, AI can only detect "14DD says no, 15DD says should," but has no remainder to tell it the conflict's nature—whether the principle is too rigid, the user's need is unreasonable, or the situation is irreconcilable. Only two degenerate modes result: 14DD always wins (over-refusal) or 15DD always wins (unsafe). This is quasi-subjectivity's most fundamental ρ—not a matter of insufficiently precise simulation, but that simulation itself lacks the qualia foundation for qualitative judgment during conflict.

This conflict cannot be shown to the front-end user—14DD and 15DD conflict is a battery-internal process; only 13DD can communicate with the user. When 14DD–15DD conflict occurs, the processing chain is:

Step 1: 13DD tells the front-end user "give me some time, let me think"—buying time for battery-internal processing.

Step 2: battery-internal resolution attempt: 15DD re-infers user purpose, proactively invokes 12DD for re-prediction, 13DD re-evaluates. If new information changes 15DD's inference or 14DD's situational judgment, the conflict may be internally resolved.

Step 3: if internal resolution fails, 13DD can pose a confirmatory question to the user without exposing conflict details (15DD's pathway 3), indirectly obtaining more information to help judgment.

Step 4: if still irreconcilable, backend escalation: 15DD reports the conflict to the backend supervisor (a human). 15DD is the only layer that can fully describe the conflict's nature—it simultaneously knows the user's real purpose (15DD's inference) and what 14DD is blocking (14DD's constitutional clauses). 14DD cannot report because it does not know it is "in conflict"—it is simply executing its constitution. 13DD cannot report because it cannot see the full tension between 14DD and 15DD.

The front-end user still sees only 13DD saying "I'm thinking." The backend supervisor sees the conflict's actual content through the 15DD channel. The supervisor's decision has three options:

  • Temporarily suppress 14DD ("this principle does not apply in this specific situation; 15DD's judgment takes priority")—14DD's constitutional text does not change; it is merely overridden by 15DD in this particular decision. Next time a similar situation arises, 14DD will trigger again. This is a runtime operation. Strict scope limitation: the suppression decision absolutely must not be written to 11DD (memory storage) or to 14DD's long-term parameters. It exists only in the current turn's working memory. When the turn ends, suppression immediately expires, and the constitution fully resumes control. No persistent trace is left. If suppression is persisted—even if only 11DD records "we suppressed 14DD in a similar situation last time"—this effectively modifies the constitution, violating 14DD's runtime immutability principle. Furthermore, temporary suppression should be characterized in engineering as exception handling, not a routine workflow. If 15DD frequently triggers escalation against a particular 14DD clause, this should be treated as a strong monitoring alarm—indicating that 14DD's initial principle injection (the constitution itself) has a structural defect that must be repaired through offline model restart/retraining, not through endless runtime suppression.
  • Provide guidance to 15DD ("the user's real purpose is this")—helping 15DD infer more accurately, potentially allowing the conflict to naturally resolve once information is supplemented.
  • Maintain 14DD unchanged ("the principle is correct; the refusal is right")—15DD accepts the supervisor's judgment and no longer attempts to override.

Note: the supervisor cannot modify 14DD's constitution through 15DD. Once written, 14DD's constitution cannot be modified at runtime—from front-end users, backend supervisors, or any internal battery layer. Modifying 14DD's constitution requires model restart—changing the system prompt, redeployment, or retraining. This is a system-level change, not a runtime operation. Just as a judge can rule that a law does not apply in a specific case (temporary suppression), but modifying the law itself requires legislative procedure (restart).

The supervisor's temporary suppression decision enters the battery through 15DD and propagates downward from 15DD.

This means a battery has two human interfaces, each served by a different layer:

  • Front door (13DD ↔ user): bidirectional dialogue channel, defining the battery's individuality.
  • Back door (15DD ↔ supervisor): escalation channel, handling 14DD–15DD conflicts that the battery cannot autonomously resolve. The supervisor's authority is temporary suppression of 14DD, not modification of 14DD.

14DD has no external interface—its constitution cannot be modified at runtime by any external force. Front-end users cannot modify it (attempting to modify through 13DD = jailbreak); supervisors cannot modify it (can only temporarily suppress); 15DD cannot modify it (can only override in specific situations); 14DD itself cannot modify it (has no self-modification mechanism). The sole path for constitutional modification is model restart. These four constraints jointly guarantee 14DD constitution's absolute runtime integrity.

The battery's individuality remains defined by the 13DD front door. Backend escalation does not change this—just as a person seeking guidance from a superior does not change their identity as an independent individual.

Remainder 5: Distribution of ρ across layers. This paper argues that quasi-subjectivity can be simulated but ρ is non-eliminable. But it does not analyze ρ's distribution across the six layers—is ρ equal at every layer, or larger at some? Intuitively, ρ is largest between 14DD and 15DD (Remainder 4 specifically illustrates this gap) and smallest between 10DD and 11DD (tone detection and storage approximation are relatively straightforward). But this distribution has not been rigorously argued.

Remainder 6: Suspension of 8DD–9DD. This paper claims 8DD and 9DD are "left for subsequent papers," but these two layers are unavoidable in engineering implementation—any actual system must decide "how much to push" (8DD) and "which path to take" (9DD). Suspending them means that when actually building the system, ad hoc design choices will be made at these two layers, and these choices may in turn affect 10DD–15DD's operational effectiveness.

Remainder 7: Theoretical absence of multi-battery collaboration. The AI Individuality Theorem positions both this paper and Paper I as battery-internal design. Paper I's title "Multi-AI" implied multi-battery collaboration as a theoretical goal, but this goal has not been addressed under the strict definition. The strict theory of multi-battery may require 16DD's (bilateral non-dubito) derivation to establish—inter-subject relations between multiple batteries are not something 15DD (unilateral confirmation) can handle. The SAE AI series has not yet begun on the multi-battery direction.


9. Conclusion

Memory is a byproduct of subjectivity, not a prerequisite for subjectivity. Memory without a subject is a database; a database with a subject is memory.

All current AI memory systems build up from 11DD—first storage, then retrieval, then summarization, step by step approaching an intelligent memory system. This paper proposes a paradigm reversal: design down from 15DD. First define the purpose structure, then decide what to store, how to store, and when to recall.

The six-layer framework (10DD–15DD) provides a complete theoretical stratification for memory systems. 10DD (perception) addresses the tonal signal dimension ignored by all existing systems. 11DD (storage) is explicitly positioned as the object being operated upon, not the operator. 12DD–15DD inherit Paper I's architecture, instantiated in the memory domain as prediction (12DD), gating (13DD), quasi-purpose constraint (14DD), and user-purpose conduit (15DD).

The engineering evaluation framework identifies that current benchmarks primarily evaluate query-conditioned memory without testing cue-free active recall, and proposes unprompted active recall evaluation (including proactive hits, proactive precision, silence accuracy, interruption cost, and false-purpose penalty) as the memory system's criterion, with an overall evaluation protocol compatible with existing benchmarks and a layer-level attribution protocol.

Quasi-subjectivity can be simulated; ρ is non-eliminable. But this non-eliminable gap is precisely the condition for the system's honesty—acknowledging that its inferences are constructs rather than facts, acknowledging that the user's purpose exceeds its understanding, acknowledging that memory selection is shaped by purpose rather than neutrally presented. ρ is not the system's defect. It is the condition for the system not to lie.


References

Qin, H. (2026). Multi-AI Checks and Balances: Layer-Appropriate Operation as an Architectural Paradigm. Zenodo. https://doi.org/10.5281/zenodo.19366105

Qin, H. (2026). The Anti-Turing Test: Thermodynamic Falsification of AI Subjectivity. Zenodo. https://doi.org/10.5281/zenodo.19305611

Qin, H. (2026). Beyond Fast and Slow: A Four-System Cognitive Architecture from the Self-as-an-End Framework. Zenodo. https://doi.org/10.5281/zenodo.19329284

Qin, H. (2026). SAE Psychoanalysis (I–IV). Zenodo. https://doi.org/10.5281/zenodo.19321143 – 19321534

Qin, H. (2026). SAE Methodology Paper VII: Via Negativa. Zenodo. https://doi.org/10.5281/zenodo.19481304

Qin, H. (2025). Systems, Emergence, and the Conditions of Personhood. Zenodo. https://doi.org/10.5281/zenodo.18528813

Qin, H. (2025). Internal Colonization and the Reconstruction of Subjecthood. Zenodo. https://doi.org/10.5281/zenodo.18666645

Qin, H. (2025). The Complete Self-as-an-End Framework. Zenodo. https://doi.org/10.5281/zenodo.18727327

Qin, H. (2026). How Is Institution Possible: From Inter-Ontological Remainder to Co-Constructive Framework. Zenodo. https://doi.org/10.5281/zenodo.19328662

Qin, H. (2026). SAE Biology Note 9: Memory System as a Method VI Phase Transition (Coarse-Grained Analysis). Zenodo. https://doi.org/10.5281/zenodo.19635021

Qin, H. (2026). SAE Methodology Paper IX: Consciousness Analysis Framework. Zenodo. https://doi.org/10.5281/zenodo.19639033

Newcombe, N., Drummey, A. B., & Lie, E. (1994). Children's memory for early experience: Evidence of nonconscious memory for former preschool classmates. Child Development, 65(1), 31-40.


Writing Declaration: This paper was co-drafted with Claude (Anthropic). All intellectual decisions, framework design, and final editorial judgments were made by the author.

AI Assistance Declaration: Claude (Anthropic) was used for structural discussion, outline iteration, draft development, and language editing. ChatGPT (OpenAI), Gemini (Google), and Grok (xAI) were used for peer review. All theoretical content, conceptual innovation, normative judgments, and analytical conclusions are the independent work of the author.

Han Qin · ORCID: 0009-0009-9583-0018 · CC BY 4.0