Authority before autonomy.

A pure intellectual property house. Identity, authority and sovereignty enforced at the infrastructure layer — not the application layer, not the policy layer, not after the fact.

Scroll

Universal Security

Every system now acts on your behalf. Vehicles drive themselves. Agents move money. Models make decisions. The question is no longer what can it do — it is who authorised it, and can that authority be revoked the instant it shouldn't exist?

IrisKey.ai is built around a single thesis: before any system is allowed to act, it must prove identity, prove authority, and prove that authority is still valid — right now, not five minutes ago.

The portfolio enforces that thesis across five domains. The core invention is a universal credential architecture that simultaneously verifies identity and all eligibility conditions before granting any operational authority — across transport, gambling, gaming, banking, and quantum tokenisation. An energy-harvesting system that runs where the grid cannot. A sovereign compute infrastructure that lives on the seabed. Each expresses the same worldview in a different layer of the stack.

We do not manufacture. We license. The portfolio is Patent Box qualified and structured for long-term sovereign, financial and industrial partners.

Technical detail available under NDA
The portfolio thesis
The portfolio thesis

The vehicle no longer trusts the key.

Stolen credentials, cloned fobs, unauthorised drivers, drink-drivers, drug-impaired drivers, fatigued drivers, fleet misuse — every one of these begins with a vehicle accepting an instruction from someone it should not have trusted.

The five-gate architecture, applied to transportation, means the vehicle verifies five things before it will operate. That the driver is biometrically who they claim to be. That they are alcohol-free and drug-free — verified through pupillary response and multi-spectral iris analysis, without a breathalyser or blood sample. That their fatigue index is within safe limits. That the vehicle is where it is permitted to be. That the device issuing the instruction is genuine. And that the credential behind all of it is still valid this second — not last week, not this morning.

The breakthrough is the fifth gate. Revocation is instant and distributed. When a licence is suspended, a fleet contract ends, or a credential is compromised, every vehicle relying on it knows immediately. No database lag. No overnight sync. No manual enforcement.

This is the infrastructure layer for autonomous fleets, insurance telematics, commercial haulage, and the generation of vehicles that must be accountable to more than their owner.

01Identity — biometric iris recognition, 99.99% accuracy
02Alcohol — pupillary response, no breathalyser required
03Drugs — multi-spectral iris analysis detects substance impairment
04Fatigue — continuous behavioural sensor monitoring
05Cargo & manifest — occupant and payload verification
Technical detail available under NDA
Five-Gate mobility
Five-Gate mobility

The transaction knows who you are before it clears.

Financial systems have spent thirty years layering fraud detection on top of transactions that have already happened. The five-gate architecture inverts the problem. Authority is established before the transaction is permitted — and withdrawn the instant it shouldn't exist.

Applied to payments, banking, gambling and regulated finance, the five gates verify: that the person is biometrically present, not a stolen credential or a bot; that they meet the jurisdictional threshold for the action — age, licence, accreditation; that they are in a geography where the action is legal; that the device is the one they registered; and that the credential behind all of it is live, right now.

Distributed revocation is the commercial breakthrough. A self-excluded gambler is stopped at every operator, instantly. A drug or alcohol-dependent individual flagged by a court order is blocked from regulated venues, instantly. A compromised card is dead across every merchant, instantly. A sanctioned party is cut off across every rail, instantly. Not by a central database — by an architecture that does not need one.

This is the infrastructure beneath the next era of regulated finance: enforceable at the credential layer, not patched on top.

Technical detail available under NDA
Five-Gate finance
Five-Gate finance

One architecture.
Every domain.

A single patented system that simultaneously verifies identity and all eligibility conditions before granting any operational authority — transport, gambling, gaming, banking, or quantum tokenisation. The same five-element architecture. The same enforcement logic. Domain-agnostic by design.

An operational authority credential is issued exclusively upon simultaneous satisfaction of: biometrically verified identity, all active eligibility evaluation streams evaluated in parallel, and cryptographic binding within a hardware secure element with non-exportable private keys. Any single stream failing denies the credential — regardless of all other streams passing.

Credential invalidation is deterministic and non-overridable. The moment authority is withdrawn — by a regulator, a fleet manager, a self-exclusion register, or a fraud authority — the platform transitions immediately to a restricted or fallback state. In a vehicle: controlled stop. In gambling: account frozen, regulator notified. In banking: transaction suspended. No override. No operator workaround. No gap between revocation and enforcement.

The revocation architecture operates offline. A locally cached revocation list enforces invalidation for up to 72 hours without live network connectivity. A self-excluded gambler is blocked at every operator simultaneously the moment the signal propagates — without a central database, without a manual process, without a second login attempt.

🚗
Transport
Sobriety + drug-free + identity + fatigue + cargo
🎰
Gambling
Age + self-exclusion + jurisdiction + stake limit
🎮
Gaming
Age + parental override + content rating + session limit
🏦
Banking
KYC + fraud score + sanctions-free + spending authority
Tokenisation
Identity-bound quantum token anchored to XRPL / Cardano
Technical detail and licensing terms available under NDA
Universal credential architecture
The credential architecture

Power where the grid cannot reach.

Sensors, credentials, vehicles, remote installations and sovereign infrastructure all share a constraint: they need continuous power in places where continuous power is not available. Batteries run down. Cables end. Solar fails at night.

The harvesting architecture pulls energy from multiple sources simultaneously — movement, thermal gradient, vibration, electromagnetic ambient — and combines them into a single reliable supply. Where one source fades, another carries the load. Where all fade, the system stores and waits.

The applications are deliberately broad. Autonomous remote sensors. Vehicle-integrated credential hardware that never needs charging. Defence and maritime installations operating beyond infrastructure. Industrial IoT at genuine scale, without the maintenance tax of battery replacement.

Energy is the silent constraint on every ambitious infrastructure project. This patent removes it.

Technical detail available under NDA
Energy harvesting
Energy harvesting

OceanGrid — beneath the sea.

The cloud sits on someone else's land, under someone else's jurisdiction, connected to someone else's grid. For nations and industries whose data cannot leave their sovereign envelope, that is no longer acceptable.

OceanGrid places distributed compute infrastructure on the seabed within national waters. The ocean cools it for free. Marine energy — wave, tidal, thermal gradient, salinity, piezoelectric — powers it continuously. A resident fleet of autonomous underwater vehicles services and maintains it without surface intervention. Dual-tier storage combines solid-state speed with archival-grade optical glass for data that must outlive the hardware.

Above the physical architecture sits a quantum-hardened governance layer that enforces sovereignty in software. Who can compute what, where, under whose authority, and with what recourse — enforced cryptographically, not contractually. When authority is revoked, compute stops. When a nation asserts jurisdiction, the architecture respects it by design.

This is sovereign cloud as infrastructure, not policy.

Technical detail available under NDA
OceanGrid — sovereign compute
OceanGrid — sovereign compute

Why this company exists.

I spent twenty-five years in the automotive industry before I invented my first patent. Around 2013, I co-founded iCapture — one of the UK's first 3G connected vehicle dashcam systems. What happened next taught me everything I now build against.

The business was taken through a coordinated partner conspiracy. The technology was misappropriated. I won a £4.5 million judgment in 2022 and am still, years later, pursuing the professional negligence proceedings that followed. The legal outcome matters less than the lesson: if you disclose before you file, and trust before you verify, the infrastructure you built becomes someone else's asset.

IrisKey.ai is built on the opposite protocol. Patent first. NDA before disclosure. License rather than manufacture. Build IP that appreciates over decades, not products that depreciate over quarters.

Automotive
iCapture
Litigation
IrisKey
The Portfolio

"Built for the generation that will inherit these systems."

— Adam McCrum, Founder & CEO
The founder
The founder