No keys at rest. No shares to steal. No recovery backdoors.

They can't steal what isn't there.

Most systems try to protect keys. Lokblok® removes them.
Phantom Secrets™ replaces stored secrets with ephemeral, hardware-bound reconstruction, created only when needed, used once, and destroyed immediately.

Built for digital-asset custodians · enterprise security teams · banks & fiduciaries · HSM and security partners

See the architecture

Patented IP, certified hardware, an audit roadmap we'll show you.

Verified

Granted Patent

US 12,438,716 B2

Issued Oct 7, 2025. The protocol behind Phantom Secrets™.

Verified

International Coverage

PCT filings · 7 jurisdictions

Active national-phase entries across major markets.

Hardware tier

Hardware Root of Trust

FIPS 140-3 Level 3 · CC EAL6+

Underlying secure-element class behind Toughkey™. Certificate references and scope shared on request.

In progress

Operational Audits

SOC 2 Type II, in progress

Targeted for completion in 2026. ISO 27001 under evaluation. Status shared in technical briefings.

Pedigree: our team previously built the first HSMs certified to FIPS 140, the first secure email protocol on HSMs, and the first security platform to protect a western power grid.

Sources: patent and PCT details on /patents (USPTO record). Hardware certification scope, audit roadmap, and SOC 2 / ISO 27001 status documents available under NDA via technical brief request.

⚠ The Problem

Security doesn't fail during normal operation. It fails during recovery.

During normal operation

Every system works…

Keys are protected. Backups are encrypted. Policies are enforced. Audits are clean. Everything looks secure.

Until something goes wrong:

  • A key is lost
  • A backup is exposed
  • An employee leaves
  • A transaction needs delegation

That's when security quietly collapses.

The root cause

Traditional approaches all rely on one thing:

Secrets that exist over time.

Stored keys

HSMs, wallets

Encrypted backups

Stored somewhere 'secure'

MPC shares

Held by participants

Seed phrases

Written down somewhere 'safe'

And anything that exists… can be stolen, copied, coerced, or lost.

Replace stored secrets with
Phantom Secrets controlled reconstruction.

Lokblok® doesn't store keys. It reconstructs them only at the moment of use, under strict conditions.

Phantom Secrets are never stored

Not in devices, cloud, or backups. There is no key at rest to exfiltrate.

Public, Non-sensitive Data

All persistent data is public Regen Tokens, cryptographically useless on their own.

Quorum-Based Recovery

Reconstruction requires a quorum of independent participants. No single point of failure.

Hardware-Enforced Security

Reconstruction happens only inside secure hardware (Toughkey™). Keys never leave the secure element.

Ephemeral by Design

The key exists ephemerally, then is immediately destroyed. No participant holds a key.

Policy-Driven Access

Access based on conditions: identity verified, event confirmed, quorum achieved, device attested.

Biometric and Workflow Verification

Identity is confirmed through biometric attestation and verified workflow conditions before any reconstruction is permitted.

Delegation

Grant access to a secret without ever transferring it. Delegation is policy-controlled, time-bound, and auditable, with no key ever leaving secure hardware.

What's actually different

This isn't better key storage.
It's no key storage.

Most solutions compete on

protecting secrets:

  • Stronger encryption
  • Better custody
  • More distributed shares

Lokblok

Removes the entire problem.

Traditional model

StoreProtectHope it isn't breached

Lokblok model

Don't storeReconstructDestroy

Security shifts from protecting data to controlling events.

Five architectural guarantees.

Every Lokblok® product enforces these principles in certified hardware and cryptography, not policy.

01

No Persistent Secrets

Secrets only exist at the exact moment they are needed, then disappear.

This removes:

  • Theft at rest
  • Backup compromise
  • Insider access risk

02

Public, Useless Data

All stored artifacts are public, non-sensitive, and cryptographically useless on their own.

Regen tokens are:

  • Public
  • Non-sensitive
  • Cryptographically useless on their own

They enable reconstruction only when quorum conditions are met, not before.

03

Quorum Without Custody

Recovery agents hold nothing sensitive and cannot act alone.

Recovery agents:

  • Hold no key shares
  • Cannot reconstruct anything alone
  • Don't even know the full quorum

This eliminates collusion and targeting risk.

04

Hardware-Enforced Security

All reconstruction happens inside certified secure hardware (Toughkey™).

Guarantees:

  • Keys never leave the secure element
  • Device integrity is cryptographically verified
  • Secrets exist only in protected memory

05

Policy-Driven Cryptography

Access isn't based on who has a key. It's based on whether conditions are satisfied.

Conditions required:

  • Identity verified (ToughID™)
  • Event confirmed (death, sale, approval)
  • Quorum achieved
  • Device attested

If the conditions aren't met, the key simply cannot exist.

Lokblok® Zero Trust Ecosystem architecture overview

Five products. One connected architecture.

One protocol. Five purpose-built surfaces. Each product maps to a specific function in your stack.

Phantom Secrets™Zero-persistence key reconstruction.
Phantom Gate™Passwordless, phishing-resistant auth.
Secure Terminal™Locked-down execution, hardware-enforced.
ToughID™Identity verified at the device root.
Toughkey™Certified secure-element runtime host.

Works with your existing stack

Lokblok integrates as a middleware layer. You don't need to replace your systems.

It works with what you already have

  • HSMs and MPC
  • Cloud KMS and vaults
  • Wallets and applications
  • Identity platforms

Nothing to rip out

Your infrastructure stays the same. Lokblok simply changes one thing: how secrets are created and used.

  • No keys stored
  • No credentials to manage
  • No recovery material to protect

Fast to deploy

API-first. No data migration. No disruption.

You don't rebuild your system. You just remove the part that creates the risk.

Give access. Not the secret.

Traditional delegation means handing over a key, which means losing control. Lokblok® enables delegation without ever transferring the secret.

  • Permanent delegation: Ownership transfers only when conditions are met (e.g. inheritance, asset sale)
  • Temporary delegation: A user can act with a key without being transferred ownership of said key
  • Delegation becomes controlled capability, not key sharing
1

Conditions Set

Policy conditions are defined: who can access, when, and under what circumstances.

2

Identity Verified

ToughID™ confirms the identity of the requesting party using hardware attestation.

3

Quorum Achieved

The required number of independent participants authorize the reconstruction.

4

Key Reconstructed

The secret is reconstructed inside secure hardware, with no exposure at any point.

5

Operation Performed

The signing or decryption operation completes. The key is immediately destroyed.

Most breaches don't break encryption.

They exploit stored secrets. Lokblok® removes the thing attackers target, eliminating key theft, seed phrase loss, backup compromise, insider misuse, and custodian risk.

$3.1BStolen in H1 2025 alone
$1.4BBybit breach, single event
100%Major breaches involved key compromise
0Keys stored with Lokblok®

Bybit was a key-storage failure. Phantom Secrets™ has no key storage to fail.

Lokblok® removes:

Key theft
Seed phrase loss
Backup compromise
Insider misuse
Custodian risk

Practitioner reading: eliminating stored private keys, alternatives to MPC custody, and recovery without seed phrases. See all insights or browse the glossary.

People you can pick up the phone to.

Lokblok is led by hardware-security veterans who have spent careers building HSMs, PKI, and secure protocols for regulated industries.

Portrait of Sue Pontius, CEO at Lokblok®

Sue Pontius

CEO

Portrait of Reid Carlisle, CTO at Lokblok®

Reid Carlisle

CTO

Portrait of Dr. Adrian McCullagh, General Counsel at Lokblok®

Dr. Adrian McCullagh

General Counsel

Portrait of Spencer Lambert, CMO at Lokblok®

Spencer Lambert

CMO

Meet the full team

Four steps. No high-pressure sales motion.

We work with security and engineering buyers. The process is built for evaluation, not for closing in a quarter.

1

Discovery call

30–45 minutes. We learn your environment, your constraints, and the problem you're actually trying to solve.

2

Architecture review

We map Phantom Secrets™ to your existing HSMs, KMS, and identity stack. No rip-and-replace assumptions.

3

Technical evaluation

Sandbox access, threat model, audit roadmap, and direct conversations with the engineering team.

4

Pilot scoping

Defined scope, defined success criteria, and a written commercial model before anyone signs anything.

Start the conversation