No keys at rest. No shares to steal. No recovery backdoors.
They can't steal what isn't there.
Most systems try to protect keys. Lokblok® removes them.
Phantom Secrets™ replaces stored secrets with ephemeral, hardware-bound reconstruction, created only when needed, used once, and destroyed immediately.
Built for digital-asset custodians · enterprise security teams · banks & fiduciaries · HSM and security partners
Verified posture
Patented IP, certified hardware, an audit roadmap we'll show you.
Granted Patent
US 12,438,716 B2
Issued Oct 7, 2025. The protocol behind Phantom Secrets™.
International Coverage
PCT filings · 7 jurisdictions
Active national-phase entries across major markets.
Hardware Root of Trust
FIPS 140-3 Level 3 · CC EAL6+
Underlying secure-element class behind Toughkey™. Certificate references and scope shared on request.
Operational Audits
SOC 2 Type II, in progress
Targeted for completion in 2026. ISO 27001 under evaluation. Status shared in technical briefings.
Pedigree: our team previously built the first HSMs certified to FIPS 140, the first secure email protocol on HSMs, and the first security platform to protect a western power grid.
Sources: patent and PCT details on /patents (USPTO record). Hardware certification scope, audit roadmap, and SOC 2 / ISO 27001 status documents available under NDA via technical brief request.
The Lokblok® Approach
Replace stored secrets with
Phantom Secrets controlled reconstruction.
Lokblok® doesn't store keys. It reconstructs them only at the moment of use, under strict conditions.
Phantom Secrets are never stored
Not in devices, cloud, or backups. There is no key at rest to exfiltrate.
Public, Non-sensitive Data
All persistent data is public Regen Tokens, cryptographically useless on their own.
Quorum-Based Recovery
Reconstruction requires a quorum of independent participants. No single point of failure.
Hardware-Enforced Security
Reconstruction happens only inside secure hardware (Toughkey™). Keys never leave the secure element.
Ephemeral by Design
The key exists ephemerally, then is immediately destroyed. No participant holds a key.
Policy-Driven Access
Access based on conditions: identity verified, event confirmed, quorum achieved, device attested.
Biometric and Workflow Verification
Identity is confirmed through biometric attestation and verified workflow conditions before any reconstruction is permitted.
Delegation
Grant access to a secret without ever transferring it. Delegation is policy-controlled, time-bound, and auditable, with no key ever leaving secure hardware.
Core Principles
Five architectural guarantees.
Every Lokblok® product enforces these principles in certified hardware and cryptography, not policy.
01
No Persistent Secrets
Secrets only exist at the exact moment they are needed, then disappear.
This removes:
- Theft at rest
- Backup compromise
- Insider access risk
02
Public, Useless Data
All stored artifacts are public, non-sensitive, and cryptographically useless on their own.
Regen tokens are:
- Public
- Non-sensitive
- Cryptographically useless on their own
They enable reconstruction only when quorum conditions are met, not before.
03
Quorum Without Custody
Recovery agents hold nothing sensitive and cannot act alone.
Recovery agents:
- Hold no key shares
- Cannot reconstruct anything alone
- Don't even know the full quorum
This eliminates collusion and targeting risk.
04
Hardware-Enforced Security
All reconstruction happens inside certified secure hardware (Toughkey™).
Guarantees:
- Keys never leave the secure element
- Device integrity is cryptographically verified
- Secrets exist only in protected memory
05
Policy-Driven Cryptography
Access isn't based on who has a key. It's based on whether conditions are satisfied.
Conditions required:
- Identity verified (ToughID™)
- Event confirmed (death, sale, approval)
- Quorum achieved
- Device attested
If the conditions aren't met, the key simply cannot exist.

Five products. One connected architecture.
One protocol. Five purpose-built surfaces. Each product maps to a specific function in your stack.
Integration
Works with your existing stack
Lokblok integrates as a middleware layer. You don't need to replace your systems.
It works with what you already have
- HSMs and MPC
- Cloud KMS and vaults
- Wallets and applications
- Identity platforms
Nothing to rip out
Your infrastructure stays the same. Lokblok simply changes one thing: how secrets are created and used.
- No keys stored
- No credentials to manage
- No recovery material to protect
Fast to deploy
API-first. No data migration. No disruption.
You don't rebuild your system. You just remove the part that creates the risk.
Delegation Without Custody
Give access. Not the secret.
Traditional delegation means handing over a key, which means losing control. Lokblok® enables delegation without ever transferring the secret.
- Permanent delegation: Ownership transfers only when conditions are met (e.g. inheritance, asset sale)
- Temporary delegation: A user can act with a key without being transferred ownership of said key
- Delegation becomes controlled capability, not key sharing
Conditions Set
Policy conditions are defined: who can access, when, and under what circumstances.
Identity Verified
ToughID™ confirms the identity of the requesting party using hardware attestation.
Quorum Achieved
The required number of independent participants authorize the reconstruction.
Key Reconstructed
The secret is reconstructed inside secure hardware, with no exposure at any point.
Operation Performed
The signing or decryption operation completes. The key is immediately destroyed.
Real-World Use Cases
Where Lokblok® matters most
Digital Asset Custody
Private keys are never stored, eliminating the primary attack surface. Bybit-proof architecture for exchanges and custodians.
Inheritance (Transfer on Death)
Assets transfer securely only after verified attestation and quorum approval. Estate planning for digital assets.
Asset Sale (Transfer on Sale)
Keys are regenerated only after escrow and compliance conditions are proven. Trustless transfers with no intermediary.
Enterprise Governance
Enforce real-world approval structures cryptographically: CFO + CEO + Compliance must all approve.
Authentication (Phantom Gate™)
No passwords, no tokens, no stored credentials. Keys exist only for the session, then are destroyed.
Banking & Finance
Zero-persistence secrets for internal systems. Hardware-bound identity. Multi-party approval workflows.
Code Signing & CI/CD Pipelines
Signing keys are never stored in build servers or repositories. Reconstructed at the moment of signing, used once, then destroyed, eliminating supply chain attacks.
Secure File Storage
File access governed by identity attestation and quorum policy. No stored credentials can unlock files without meeting verified conditions.
Why This Matters
Most breaches don't break encryption.
They exploit stored secrets. Lokblok® removes the thing attackers target, eliminating key theft, seed phrase loss, backup compromise, insider misuse, and custodian risk.
Bybit was a key-storage failure. Phantom Secrets™ has no key storage to fail.
Lokblok® removes:
Practitioner reading: eliminating stored private keys, alternatives to MPC custody, and recovery without seed phrases. See all insights or browse the glossary.
Who you'll be working with
People you can pick up the phone to.
Lokblok is led by hardware-security veterans who have spent careers building HSMs, PKI, and secure protocols for regulated industries.
Sue Pontius
CEO
Reid Carlisle
CTO
Dr. Adrian McCullagh
General Counsel
Spencer Lambert
CMO
For your architects
Technical resources, not just marketing.
Everything your security and engineering teams need to evaluate Phantom Secrets™ on the merits.
Architecture overview
Protocol, components, and trust boundaries.
Threat model
Trust assumptions, adversary model, and where the cryptographic guarantees come from.
Practitioner insights
Long-form analysis: zero-persistence, MPC alternatives, recovery without seed phrases.
Patent & protocol filings
US 12,438,716 B2 plus PCT references.
Glossary & reference
Cryptographic terms, primitives, and design vocabulary.
Request a technical brief (NDA)
Certifications detail, audit roadmap, and reference deployments, shared under NDA.
What happens when you contact us
Four steps. No high-pressure sales motion.
We work with security and engineering buyers. The process is built for evaluation, not for closing in a quarter.
1
Discovery call
30–45 minutes. We learn your environment, your constraints, and the problem you're actually trying to solve.
2
Architecture review
We map Phantom Secrets™ to your existing HSMs, KMS, and identity stack. No rip-and-replace assumptions.
3
Technical evaluation
Sandbox access, threat model, audit roadmap, and direct conversations with the engineering team.
4
Pilot scoping
Defined scope, defined success criteria, and a written commercial model before anyone signs anything.









