A new class of security, protected by design.

Most security systems fail because they store secrets. Our patented architecture removes that assumption entirely. Instead of protecting secrets, we eliminate them.

The foundational IP.

U.S. Patent No. 12,438,716 B2

Issued October 7, 2025

This patent covers the foundational architecture behind Phantom Secrets™ and the Regen Token system: a new approach to cryptographic security where secrets are never stored, no party ever holds a complete key, reconstruction occurs only when authorised, and secrets exist ephemerally, then are destroyed.

Secrets never stored
No party holds a complete key
Authorised reconstruction only
Destroyed after use

ISSUED & ACTIVE

Unlike traditional systems, which rely on protecting stored keys, Lokblok removes the need to store them at all. This is not an incremental improvement on key management. It is a shift from protecting secrets to eliminating them entirely.

Five innovations in one architecture.

Most cryptographic systems reuse the same core ideas: store the key, split the key, lock the key in hardware. Lokblok takes a different approach at every layer.

01

No Persistent Secrets

Keys do not exist at rest
No encrypted backups or seed phrases
No recoverable shares stored anywhere

Eliminates entire attack classes: database breaches, insider theft, backup compromise.

02

Public, Non-Sensitive Recovery Data

Recovery uses Regen Tokens derived from public cryptographic material
Safe to store or transmit openly
Useless to attackers without authorisation

Regen Tokens are authorisation signals, not secret material. Even full exposure exposes nothing.

03

Non-Custodial Recovery

Recovery agents hold no key shares
Recovery agents hold no encrypted secrets
Cannot reconstruct anything independently

Collusion is pointless. There is nothing persistent to collude with. Fundamentally different from MPC, HSM, or custody systems.

04

Ephemeral Reconstruction in Hardware

Secrets created only inside certified hardware
Only at the exact moment they are needed
Under strict quorum, identity, and policy checks

Secrets exist only during use, then disappear without a trace.

05

Policy-Enforced Cryptography

Business rules enforced inside the cryptographic layer
Who can act, when, and under what conditions
All enforced cryptographically, not procedurally

Governance without custody. Delegation without exposure. Recovery without trust assumptions.

From "how do we protect keys?" to "who should be allowed to act?"

Most breaches happen because secrets exist somewhere. In databases, in backups, in memory, in people's heads. Lokblok removes that attack surface entirely. The question becomes a governance problem, not a security problem.

TRADITIONAL QUESTION

"How do we protect keys?"

An arms race against attackers who grow more capable every year. The target always exists. Eventually, someone gets to it.

LOKBLOK QUESTION

"Who should be allowed to act, and when?"

A governance problem. Much easier. The target no longer exists. Nothing to protect means nothing to steal.

Independent technical assessment.

Independent technical assessment of the patent concludes across four dimensions. This is not an incremental improvement on key management.

Novelty

Very High

Technical Merit

Very High

Market Defensibility

Very High

Category Position

New Architectural Class

What the portfolio covers.

Lokblok's patent portfolio (issued and pending) covers five foundational areas that together form the complete Phantom Secrets™ architecture.

PATENT AREAS

Ephemeral key reconstruction architectures
Regen Token-based recovery systems
Non-custodial quorum-based authorization
Hardware-attested reconstruction workflows
Policy-bound cryptographic execution

PRODUCTS PROTECTED

Phantom Secrets™
Phantom Gate™
Secure Terminal™

Also covers enterprise delegation and recovery frameworks built on the Phantom Secrets™ architecture.

International Patent Filings

To protect Lokblok's rapidly expanding global footprint, this invention has been filed internationally via the Patent Cooperation Treaty (PCT). Patent applications are active in seven jurisdictions spanning key global markets in finance, defence, digital identity, and national digital infrastructure.

Australia

Origin market

Brazil

Emerging digital economy

China

Largest digital market

European Union

Filed via EPO

Hong Kong

Regional finance hub

India

Fintech & digital ID

United Arab Emirates

Digital asset & CBDC

With an issued U.S. patent and broad PCT coverage internationally, Lokblok sets a new benchmark for zero-persistence, zero-trust cryptographic systems. This IP foundation ensures that the Phantom Secrets™ ecosystem remains globally protected and uniquely positioned to secure the next generation of digital identity and authentication.

Most companies build better locks.
We removed the thing worth stealing.

If that sounds unfair, it is. Complete patent documentation including numbers, filing dates, and jurisdictions is available to verified investors, partners, and legal teams.

Get In Touch