Features
Proof of Geofence® combines authentication and consensus into a continuous protocol.
Addressing the "Reasonable Measures" Requirement
Under the Defend Trade Secrets Act (DTSA) and corresponding state Uniform Trade Secrets Act (UTSA) statutes, trade secret protection depends on whether the owner implemented "reasonable measures" to maintain secrecy.
Traditional safeguards, including NDAs, password controls, document management systems, and DLP tools, typically authenticate users at login. Some verify location via IP addresses or GPS, but both are susceptible to spoofing and none re-verify continuously after the session begins.
GeoCrypt's Virtual SCIF introduces continuous cryptographic proximity authentication. The system requires that an authorized device and user remain within an approved physical proximity boundary for access to persist.
If the device fails any of the checks, access is lost.
How Proof of Geofence® Operates
As described in U.S. Patent No. 12,470,927 B1
Proof of Geofence combines authentication and consensus into a continuous protocol tied to Bluetooth proximity. In operation:
- •A gateway component and client device communicate over Bluetooth.
- •The gateway generates a time-bound cryptographic challenge, including a hardware security module (HSM)-generated random token.
- •The client device must generate a corresponding certificate within a defined time interval.
- •Both gateway and device produce cryptographic certificates incorporating public keys, timestamps, short-range telemetry data, and a hash of the prior contract.
- •When certificate similarity thresholds are satisfied, a Proof of Geofence Contract is generated.
- •Each contract updates a chained ledger, forming a continuous record of proximity-bound authentication events.
Implications for Trade Secret Counsel and Compliance Programs
For attorneys and compliance teams building trade secret protection programs, the Virtual SCIF provides concrete structural advantages:
- •Continuous authentication rather than one-time credential validation.
- •Location-bound decryption, where keys are available only within the authorized short-range geofence.
- •Session-level audit logs, including timestamps, device keys, gateway keys, and digital signatures.
- •Automatic termination of access when proximity conditions fail.
- •Reduced exposure to remote credential reuse and off-site decryption attempts.
This approach shifts trade secret protection from static encryption and perimeter controls toward proximity-enforced access governance.
A Compliance-Oriented Architecture
Endpoint encryption and zero-knowledge architecture protect data at rest and in transit. GeoCrypt offers this and more, cryptographically proving where and under what conditions decryption occurred.
GeoCrypt is designed for corporate, joint development, regulated, and high-risk R&D environments where trade secret compliance is non-negotiable.
Proof of Geofence® is a registered trademark. The underlying technology is protected under U.S. Patent No. 12,470,927 B1.