GeoCryptGeoCrypt

GeoCrypt

Cryptographic Proof of Compliance

Proving Reasonable Measures

Under the Defend Trade Secrets Act (DTSA) and corresponding state Uniform Trade Secrets Act (UTSA), trade secret protection requires proof that the owner took reasonable measures to maintain secrecy.

NDAs, passwords, and access logs authenticate identity at login. Some systems check location via IP addresses or GPS, but both can be spoofed, and none re-verify continuously after the session begins.

The result: organizations cannot prove what protections were active when access occurred. They can only argue that policies existed.

The gap

Trade secret theft costs U.S. businesses an estimated $180540 billion annually, yet fewer than 1,400 federal cases are filed each year. The gap exists because litigation requires proof that reasonable protective measures were in place, not just evidence that theft occurred.

Sources: IP Commission Report (2017), Lex Machina, Stout 2024 Trade Secrets Litigation Report

What GeoCrypt Proves

Every access event produces compliance-grade evidence. Not just that data was encrypted who accessed it, where, when, and on what device.

Who Accessed It

Biometric authentication tied to a registered device. Every access event is cryptographically signed with the users device key.

Where It Happened

Location verified continuously through Bluetooth proximity. Decryption keys are only available within the authorized geofence.

Immutable Aduit Log

An immutable audit chain records every authentication event with timestamps, device keys, gateway keys, and digital signatures.

The Virtual SCIF

Like a physical SCIF controls access by controlling space, the Virtual SCIF controls access by controlling cryptographic proximity.

Virtual SCIF Concept Design

Decryption requires three conditions to be met simultaneously:

1

An authorized device, registered to the organization

2

An authenticated user, confirmed by biometric verification

3

A verified location, confirmed by a mobile device within the geofence

If any condition fails, access terminates automatically. Re-authentication occurs at defined intervals throughout the session.

Proof of Geofence

U.S. Patent No. 12,470,927 B1

The protocol that makes trade secret protection provable. When an authenticated device is within the geofence, the gateway and device each independently produce a cryptographic certificate. Each contract links to the last, producing a tamper-evident record of every authenticated access event.

The result is not a log file. It is a cryptographic proof chain that documents who accessed what, where, when, and under what conditions.

Built by Those Who Understand the Problem

GeoCrypt was founded by Mick Kerr, a patent attorney of 30 years who recognized that trade secret litigation fails not because theft is hard to detect, but because compliance is hard to prove.

Request a Demo

See how GeoCrypt turns trade secret protection into provable compliance.

US-based operations. All data is stored and processed within United States jurisdiction.