Support  our Project on Lokdon

Keyless | Endpoint-to-Endpoint Encryption for B2B

Security Module as a Software Service (SMAASS)

LokDon$ App (New) »

LokDon creates solutions that protect online privacy and secure corporation' and client' information using patented keyless authentication and platform-agnostic internet protocols designed to keep your information a secret before and after you might have shared it.

  • Over 10x the capacity of current symmetric/asymmetric cryptography

  • Redefinition of data for identification products
    • a. Data Nucleus Aggregator(DNA)
    • b. Digital Data Nucleic Authority (DDNA)

    We have COTS software development kits for developers, businesses, enterprises and strategic partners (SP).

    This could be easily implemented by embedding instructions and protocols anywhere data is found. More so, you do not need to change your infrastructure or buy any special hardware.

    It is a dynamic cryptographic system which engages the nature of the digital world to address future threats and attack vectors on computers, networkds and the internet at large. We have built a robust, fast, low-cost, security module as a software service (SMaaSS). A quantum resistance cryptographic system that challenges the current state against high level security lapses in constrained environments like OT and IoT systems.

    "We Created Solutions That Protect Online Privacy; Secure Corporation’s and Clients’ Information. LokDon has built a robust, fast, low-cost, security module as a software service using patented keyless authentication and platform-agnostic internet protocols designed to keep your information a secret before and after you might have shared it."
    - Phase 1 : Autonomous control of information.
    - Phase 2 : Independent sales of information.

    Features Of LokDon



    Decentralization is the strength of lattice face keyless infrastructure (LSKI)
    Records are distributed across nodes.We have engaged an autonomous method or protocol allowing each user or node to keep its records. This removes reliance on a central or third party for record keeping.


    Encryption/decryption of all data with 2048 bits AES derivative
    Just like any progressive development. This layer of LokDon technology is quite novel. It is not far removed from its superior mechanism to forestall quantum computing assailants. It is over 10 times more aggressive than all others in securing data to fortifying the confidentiality, integrity and availability of data.

    Friendly Documentation

    Free use with friendly documentation
    Some of the support and extended features might not be free but a general use of the system in personal application is supported as it is.

    General Use

    General use for most application
    It is readily available for use in all applications where data need to be secure. It comes with easy integration. You can incorporate this into a simple mobile application as well as complex enterprise software regardless of the OS platform.

    Hides Data

    Hides data from all threat actors
    The system remains secure and compliant to all sort of classified data while filtering unauthorized users. It covers all known standards, compliances (GDPR & CCPA) and most regulatory mandates or statues.


    Indefatigable, personalized and flexible
    Corporations and clients can modify the modes of operation to their liking and technical specification. This will stand any future rise in advanced encryption hacking techniques and /or analysis.

    Private/Public Cloud

    Joining one single cloud for multiple users regardless of domain
    One can put content in say aws or / and azure while sharing a secure url regardless of the domain.

    Knits Defensive Layers

    Knits defensive layers by creating uniqueness of data distribution
    Corporations seeking granularity, insight, visibility and transparency account for all data via anomalous identifiers and signatures.

    Secure API

    Secure API without complex PKI
    The modules use personal tokens to serve the secret sauce via APIs consumed by corporations and clients. The system reduces user profile attributes to data nucleus aggregator( DnA). These DnAs are congregated at one point into digital data nucleic authority (DDnA).


    • Cloud and Internet keyless security

    • User privacy is protected and your ISP will never know

    • Free version for all except commercial users, businesses and enterprises

    • Advance authentication methods; MFA using PIN, biometrics, and behavioral patterns.

    • Support over 30 cloud service providers and storage providers.

    • Minimum 2048 bits End-point to end-point encryption technology

    • Uphold best practices for standards and frameworks of security in all media

    • Data security across mobile, IoT, blockchain and tablets

    • Passwordless access and authentication

    • Biometric option for access and use in other resources e.g payment

    • No need for configuration key file complexity in HSM.

    • Zero knowledge proof as part of verification and authentication mechanism

    • Cloud and internet privacy regulation and compliance to meet industry/government requirements

    • Team collaboration, governance, audit and management