GeoCrypt LogoGeoCrypt

Features

Trade secret protection requires more than policy. Courts require proof that reasonable measures were enforced. GeoCrypt generates that evidence by design.

Two Core Capabilities

Everything GeoCrypt does serves two purposes: enforce access control cryptographically, and log every event immutably.

Proof of Geofence
U.S. Patent 12,470,927 B1

Files are cryptographically bound to authorized locations. Decryption requires verified identity and confirmed presence within the geofence.

Files cannot decrypt outside authorized boundaries. Not "won't." "Cannot."

Immutable Audit Trail
Tamper-evident access records

Every access event is recorded: who accessed the file, when, from what location, and on which device. Records cannot be edited or deleted.

Litigation-ready evidence generated at time of access, not reconstructed later.

Access Requirements

Every decryption requires all three conditions to be met simultaneously.

Right Person

Biometric verification confirms identity at every access attempt.

Right Place

Location verified within authorized geofence boundaries.

Right Device

Encryption keys bound to registered hardware. Cannot be transferred.

Security Properties

Zero-Knowledge

GeoCrypt never sees your plaintext. We cannot access your files.

No Persistence

Decrypted content exists only in memory during use.

Hardware-Bound Keys

Encryption keys stored in device hardware. Cannot be extracted or copied.

Tamper-Evident Logs

Audit records cannot be modified. Any tampering attempt is detectable.

US-Based Operations

All data stored and processed within United States borders. Your data never leaves US jurisdiction.