Intellectual Property
A new class of security, protected by design.
Most security systems fail because they store secrets. Our patented architecture removes that assumption entirely. Instead of protecting secrets, we eliminate them.
Core Patent
The foundational IP.
U.S. Patent No. 12,438,716 B2
Issued October 7, 2025
This patent covers the foundational architecture behind Phantom Secrets™ and the Regen Token system: a new approach to cryptographic security where secrets are never stored, no party ever holds a complete key, reconstruction occurs only when authorised, and secrets exist ephemerally, then are destroyed.
ISSUED & ACTIVE
Unlike traditional systems, which rely on protecting stored keys, Lokblok removes the need to store them at all. This is not an incremental improvement on key management. It is a shift from protecting secrets to eliminating them entirely.
What Makes It Patent-Worthy
Five innovations in one architecture.
Most cryptographic systems reuse the same core ideas: store the key, split the key, lock the key in hardware. Lokblok takes a different approach at every layer.
No Persistent Secrets
Eliminates entire attack classes: database breaches, insider theft, backup compromise.
Public, Non-Sensitive Recovery Data
Regen Tokens are authorisation signals, not secret material. Even full exposure exposes nothing.
Non-Custodial Recovery
Collusion is pointless. There is nothing persistent to collude with. Fundamentally different from MPC, HSM, or custody systems.
Ephemeral Reconstruction in Hardware
Secrets exist only during use, then disappear without a trace.
Policy-Enforced Cryptography
Governance without custody. Delegation without exposure. Recovery without trust assumptions.
Why This Matters
From "how do we protect keys?" to "who should be allowed to act?"
Most breaches happen because secrets exist somewhere. In databases, in backups, in memory, in people's heads. Lokblok removes that attack surface entirely. The question becomes a governance problem, not a security problem.
TRADITIONAL QUESTION
"How do we protect keys?"
An arms race against attackers who grow more capable every year. The target always exists. Eventually, someone gets to it.
LOKBLOK QUESTION
"Who should be allowed to act, and when?"
A governance problem. Much easier. The target no longer exists. Nothing to protect means nothing to steal.
Strength & Defensibility
Independent technical assessment.
Independent technical assessment of the patent concludes across four dimensions. This is not an incremental improvement on key management.
Novelty
Very High
Technical Merit
Very High
Market Defensibility
Very High
Category Position
New Architectural Class
Portfolio Coverage
What the portfolio covers.
Lokblok's patent portfolio (issued and pending) covers five foundational areas that together form the complete Phantom Secrets™ architecture.
PATENT AREAS
PRODUCTS PROTECTED
Also covers enterprise delegation and recovery frameworks built on the Phantom Secrets™ architecture.
Global Protection
International Patent Filings
To protect Lokblok's rapidly expanding global footprint, this invention has been filed internationally via the Patent Cooperation Treaty (PCT). Patent applications are active in seven jurisdictions spanning key global markets in finance, defence, digital identity, and national digital infrastructure.
Australia
Origin market
Brazil
Emerging digital economy
China
Largest digital market
European Union
Filed via EPO
Hong Kong
Regional finance hub
India
Fintech & digital ID
United Arab Emirates
Digital asset & CBDC
With an issued U.S. patent and broad PCT coverage internationally, Lokblok sets a new benchmark for zero-persistence, zero-trust cryptographic systems. This IP foundation ensures that the Phantom Secrets™ ecosystem remains globally protected and uniquely positioned to secure the next generation of digital identity and authentication.
The Bottom Line
Most companies build better locks.
We removed the thing worth stealing.
If that sounds unfair, it is. Complete patent documentation including numbers, filing dates, and jurisdictions is available to verified investors, partners, and legal teams.