Papers, MP4s, Source

Lockular's principal technology is a storage system and an access protocol rooted in blockchain that ensures an immutable record of storage access. This technology is integrated into a NFS-compliant filesystem, making it an ideal data foundation for both enterprise and personal use. The information provided here outlines the key features of this flagship filesystem product, its underlying technologies, and use-cases to date in the sectors of secure design services and secure data processing.

Our Github Link (Source Code)

Here you can find source code to the Lockular provenance suite. Principal repos include the Lockular Provenance Tracking Filsystem and Theia.Cloud.

Use the readme info within each repository to build out a secure Theia.Cloud deployment.


Core Papers

A vision for integrated Data Authentication and Data Integrity
Data Authentication is the widely accepted concept for confirming, without a doubt, the origin of data. It entails validating the source of data to guarantee that it remains unaltered and originates from a trustworthy entity.
A Provenance Tracking Filesystem
Embodying provenance tracking in an easily attachable filesystem facilitates widespread adoption.
Managing Workflow Actors
Management of Workflow Actors (WAM) is a smart contract based dApp that provides team tracking and permission'ing. The filesystem provides tracking of data held there, WAM provides tracking of the team structure pf those working with the data.

App Papers

Cloud-Based IDE for Tracking Electronic Design Provenance
A cloud based design sandbox where the creation process is tracked by file blocks. Design outputs are stored securely and downstream usage is tracked using an NFT Marketplace.
Design asset marketplaces
Smart contract based NFT Marketplaces with multi-sig.
How ITAR and CMMC is supported by Lockular’s NFT Marketplace platform
How ITAR and CMMC is supported by Lockular's NFT Marketplace platform

Patents

Blockchain based access control using time-dependent obfuscation of access tokens
There is provided a computer-implemented method for managing third-party access to data, to increase data security and/or privacy. The method comprises receiving, from a third-party computer, a request to access data, wherein the request is indicative of at least one requested operation. A validity of each of the requested operations is determined in dependence on permission data stored in a distributed public ledger. The permissions data defines, for said third-party computer, a set of permissible operations and one or more permissible data attributes associated with each of the set of permissible operations. The request and the validity are logged in the distributed public ledger.
Method and apparatus for data obfuscation
There is provided a computer-implemented method of enhancing data privacy. One or more tensors of numeric data are determined, at a processor, in dependence on input data. A transform is determined in dependence on user-associated data, which may be user input or biometric data. Each of the one or more tensors of numeric data are transformed into at least two fragments of data by applying the transform. Each of the fragments of data obfuscates the numeric data. Each of the at least two fragments of data are stored separately at a respective geographically separated storage system.
Private information storage system
This invention relates to a scheme for storage of private information on a cloud computing platform without contravention of territorial privacy laws. A method of anonymising a database of personal data is described whereby data identifiers are assigned to data items and deviation identifiers are assigned to deviations for selected data items derived from reference records. Such information can then be uploaded to a cloud based storage platform. A translation table maps the data items, data identifiers and deviation identifiers to the original data entries. This translation table is stored locally and separate to the anonymised information uploaded to the cloud. The invention further describes a method of decoding the database anonymised according to the above method.
Data processing systems and methods
This invention generally relates to data processing systems and methods, more particularly to computer systems and related methods for defining unified work flow processors which rely on data and/or services provided by a plurality of disparate underlying systems. A method of constructing a data processing operation, the data processing operation utilising data and/or services provided by a plurality of existing underlying systems, the method comprising: constructing a set of superobjects, a said superobject comprising an aggregation of data and/or services made available by said underlying systems and providing a common interface to said systems; and assembling a plurality of said superobjects to define a workflow for said data processing operation, said workflow comprising a group of linked superobjects defining a processing sequence for the superobjects of said group, to thereby construct said operation.