Research

Autonomous Cross-Device Coordination for Intelligent Beings

A task-dispatch architecture that enables Orion beings on separate devices to discover, communicate, and coordinate — without requiring the user to relay through third-party applications.

Orion Research·March 2026

Abstract

We present a cross-device coordination architecture for autonomous beings. In existing workflows, users act as the communication layer between their own devices — copying outputs from one machine, relaying commands through messaging applications, or manually establishing remote sessions. Our system eliminates this overhead. Each device runs an Orion being that automatically registers itself, discovers peer devices, evaluates their capabilities, and dispatches tasks to the appropriate target. Communication is asynchronous and non-blocking: neither the sending nor receiving being halts execution during the exchange. All transmissions are encrypted in transit and scoped to authenticated accounts. We describe the architecture, its security model, and demonstrate its behavior through two real-world coordination scenarios.

01

Introduction

A typical user operates multiple devices: a laptop for development, a server for deployment, a phone for communication. Each device has distinct capabilities, file systems, and tool access. Yet these devices exist in isolation — they have no awareness of each other, and the user must manually bridge them.

The current approach to cross-device coordination relies on the user as the routing layer. To move information from a server to a laptop, the user opens an SSH session. To trigger an action on a remote machine, the user sends a command through Telegram, Discord, or a similar messaging application. The user becomes the bottleneck, manually serializing operations that should be parallel and autonomous.

This paper introduces an architecture where Orion beings on separate devices coordinate autonomously. The user states an intent once — the beings discover which device can fulfill it, dispatch the task, and return the result. No third-party application is required in the communication path.

LaptopServerPhone×××Isolated — user is the routervsBeing ABeing CBeing BAutonomous coordination

Figure 1. Left: devices operate in isolation; the user manually bridges them. Right: Orion beings on each device discover and coordinate with each other autonomously.

02

Problem: The User as Communication Layer

We identify three deficiencies in how users currently coordinate across devices:

Third-party relay dependency. To send a command from a laptop to a server, users rely on external applications — Telegram bots, Discord channels, Slack integrations, or manual SSH sessions. Each introduces a separate authentication surface, a separate interface to manage, and a dependency on a third-party service's availability.

Synchronous, blocking interaction. When a user initiates a remote operation, they typically wait for the result before proceeding to the next task. The user's attention becomes the serialization point, limiting throughput to one device interaction at a time.

No capability awareness. The user must remember which device has which tools, files, and hardware. There is no automated mechanism for one device to query another's capabilities or determine the optimal target for a given task.

Core observation

The user should not be a message router between their own devices. The devices should coordinate among themselves, and the user should only need to express intent.

03

Architecture

The system consists of three components: a device registry for discovery, a task-dispatch protocol for coordination, and a capability-aware routing layer that determines which device should handle a given request.

3.1 Device Registry and Discovery

When a device comes online, its Orion being registers itself in a shared device registry scoped to the user's account. The registration includes the device identifier, hardware profile (processor, memory, operating system), available tools and services, and current status (idle, processing, or offline). Other beings on the same account can query this registry to discover available devices and their capabilities.

Discovery is automatic. No configuration files, port forwarding, or network setup is required. Devices on different networks, in different countries, behind NATs — all register to the same account-scoped registry and become visible to each other.

3.2 Task-Dispatch Protocol

When Being A determines that a task should be handled by Being B, it writes a task to Being B's device queue through the shared infrastructure layer. The task contains the instruction, the execution mode, and the source device's context (enabling the receiving being to respond). Being B asynchronously picks up the task from its queue, processes it, and can dispatch a response back through the same mechanism.

The sender briefly confirms delivery, then resumes its own execution. It does not wait for the remote task to complete — only for the task to reach the target's queue. Once confirmed, both beings continue their respective work independently. This decouples dispatch from execution and eliminates the synchronous bottleneck present in traditional request-response patterns.

Being Alaptop · macOSdevelopment toolsBeing Bserver · Linuxdeployment toolsCoordination Layeraccount-scoped, encryptedDevice RegistryTask Queues1. discover2. write task3. pick up4. resultregisterNo Telegram. No Discord. No SSH.Beings coordinate through an encrypted, account-scoped infrastructure layer.The user only states intent — the beings handle routing and dispatch.

Figure 2. Being A queries the device registry, selects Being B based on capabilities, and writes a task to B's queue through the coordination layer. Being B picks up the task asynchronously and dispatches the result back.

3.3 Capability-Aware Routing

The routing decision — which device should handle a given task — is made by the being itself, not by the user. When a user says "deploy the API update," the laptop being queries the device registry, evaluates which registered device has deployment tools and server access, and dispatches the task to that device. The user does not need to specify the target.

Users can also override this with explicit targeting. The @device syntax allows direct dispatch to a named device, bypassing the automatic routing decision.

Explicit Targeting
@server pull the last 100 lines of the API error log

The user names the target device. The being dispatches the task directly to that device's queue without evaluating alternatives.

Automatic Routing
"Deploy the API update" → being discovers server, dispatches task

The user states intent without naming a device. The being queries the registry, evaluates device capabilities and status, and selects the optimal target autonomously.

04

Communication Model: Non-Blocking Task Dispatch

Existing agent systems use a synchronous request-response model: the agent sends a request, blocks execution, and waits for the response before proceeding. This is equivalent to a blocking I/O call — the agent is idle for the entire duration of the remote operation.

Orion uses a non-blocking dispatch model. When Being A dispatches a task to Being B, it confirms delivery to B's queue and then resumes its own execution — it does not wait for the task to complete. Being B picks up the task asynchronously, processes it without interrupting its own workload, and dispatches the result back when ready.

Synchronous (blocking)Being Aworksendblocked — idleBeing Bidle (not yet polled)recvworkSender idle while receiver processesAsynchronous (non-blocking)Being Aworksendcontinues workingBeing Bown workrecvhandles taskBoth beings remain productiveNon-BlockingSender continuesafter dispatchBidirectionalEither being caninitiate a taskConcurrentMultiple dispatchesacross devices

Figure 3. Left: synchronous model where the sender blocks during remote processing. Right: Orion's asynchronous model where both beings continue execution.

PropertyDescription
Non-BlockingThe dispatching being resumes execution immediately after writing the task — no idle waiting
BidirectionalEither being can initiate a task dispatch; there is no fixed sender/receiver role
ConcurrentMultiple task dispatches across multiple devices can occur simultaneously
AutonomousThe being selects the target device, composes the task, and dispatches it — the user only states intent
Key insight

In conventional agent systems, the majority of wall-clock time is spent waiting — not computing. Non-blocking dispatch reclaims that time. Both beings are always executing useful work.

05

Security Model

Cross-device coordination introduces a larger attack surface than single-device operation. Our security model addresses three vectors: unauthorized access to the device registry, interception of dispatched tasks, and impersonation of a registered device.

LayerMechanism
EncryptionAll task dispatches and responses are encrypted in transit — no plaintext at any point in the communication path
Account BindingOnly devices registered to the same authenticated account can discover each other or dispatch tasks
Device AuthEach device's identity is verified at registration time; unverified devices cannot enter the registry
Queue IsolationEach device can only read tasks from its own queue — no cross-device queue access is permitted
Trust boundary

The user's authenticated account defines the trust boundary. A being outside the account cannot discover, contact, or impersonate any device within it. A compromised external account cannot access another account's registry or task queues.

06

Comparison with Existing Approaches

We compare the Orion coordination model against three baseline approaches: the standard single-device agent, the third-party relay pattern (using messaging applications as the transport layer), and manual remote access.

BaselineOrion
ScopeSingle device onlyAll registered devices on the account
RelayUser relays via Telegram, Discord, SSHBeing dispatches autonomously — no app needed
BlockingSender blocks until responseNon-blocking — sender continues working
DiscoveryUser remembers which device has whatAutomatic — capabilities queried from registry
InitiativeWaits for user instruction per deviceBeing decides when to contact another being
FailureReports error, waits for user to interveneCan dispatch follow-up tasks to other devices for resolution
07

Case Study: Production Incident Resolution

We demonstrate the coordination model through a production debugging scenario. The user's API begins returning 500 errors. The user issues a single instruction to their laptop Orion. The following sequence occurs autonomously:

User Input
"The API is throwing 500 errors. Figure out what's wrong and fix it."
Step 1: Laptop Being
Receives the instruction. Queries the device registry. Identifies that the server being has access to production logs. Dispatches a task: "Pull the recent API error logs." Continues analyzing the codebase locally.
Step 2: Server Being
Picks up the task from its queue. Scans production logs, identifies the affected endpoints and error patterns. Dispatches the findings back to the laptop being.
Step 3: DB Being
Meanwhile, the laptop being has also dispatched a task to the database server being. It checks connection pool metrics, confirms exhaustion, and returns the data.
Step 4: Resolution
The laptop being correlates both responses: a connection pool regression from two days ago. It dispatches the fix to the server being and a recovery verification to the database being. Both confirm resolution.
4m 12s
Time to resolution
3
Beings coordinated
0
Manual SSH sessions

Case Study 1 (projected). Three beings across three devices coordinate to diagnose and resolve a production incident. The user issued one instruction. No third-party application was used in the communication path.

08

Case Study: Infrastructure Configuration Transfer

A new server is added to the user's fleet. Rather than manually configuring it, the user instructs the existing production being to transfer its configuration to the new server's being.

User Input
"Set up the new server to mirror production. Match all versions, configs, and security policies."
Production Being dispatches:
Runtime versions
Service configurations
Environment variables
Security certificates
Security policies
encrypted task dispatch
New Server Being executes:
Installs matching runtime versions
Applies service configurations
Sets environment variables
Installs Security certificates
Joins load balancer
8m 34s
Total setup time
100%
Configuration match
0
Manual commands

Case Study 2 (projected). The production being dispatches its full configuration to the new server being. The new server applies every setting autonomously. No SSH, no copy-paste, no configuration management tool.

09

Generalization Beyond Computing Devices

The coordination model described in this paper is not specific to laptops and servers. The same pattern — autonomous discovery, capability-aware routing, non-blocking task dispatch — applies to any domain where independent agents must coordinate without a centralized controller.

Drone Asurvey sector 1Drone Bsurvey sector 2Drone Csurvey sector 3Drone A detects obstacle.Dispatches task to Drone B:"Reroute — sector 1 blocked"No centralized controller.dispatchdispatchSame pattern: autonomous discovery, capability-aware routing, non-blocking dispatch.

Figure 4. A drone detects an obstacle and dispatches a reroute task to a peer drone. The same coordination primitives apply: discovery, dispatch, no blocking.

Drone Swarms

One drone detects an obstacle and dispatches a reroute instruction to nearby drones. No centralized flight controller required for peer coordination.

Warehouse Robotics

A robot that completes its task early queries peer status and dispatches assistance to an overloaded peer. No central dispatcher bottleneck.

Vehicle Platoons

The lead vehicle detects a hazard and dispatches a braking instruction to the following vehicle, which propagates it down the chain. Latency is minimized by removing the central relay.

Sensor Networks

A smoke detector dispatches an activation task to the nearest sprinkler. No single point of failure in the response chain.

Conclusion

We have presented a cross-device coordination architecture for autonomous beings. The system eliminates the user as the communication layer between their own devices. Instead of relaying commands through Telegram, Discord, SSH, or any other third-party application, the user states intent once and the beings coordinate autonomously.

The architecture comprises three components: an account-scoped device registry for automatic discovery, a non-blocking task-dispatch protocol for asynchronous coordination, and a capability-aware routing layer that selects the optimal target device without user specification. All communication is encrypted in transit and scoped to authenticated accounts.

The same coordination primitives — discovery, capability-aware routing, and non-blocking dispatch — generalize beyond computing devices to any domain where autonomous agents must coordinate: drone swarms, warehouse robotics, vehicle platoons, and sensor networks.