CloakFS Invisible File System Technology
U.S. Patent 12,380,069
Issued August 5, 2025
Data That Doesn't Exist — Until It Does
Dataparency LLC / Entrelid Framework
The Problem
Data Is Always Visible
$4.88M
Average Breach Cost
The financial impact of a single data breach in 2024
287
Days to Identify
Average time to detect a security breach
83%
External Actors
Breaches involving outside attackers
The Fundamental Flaw: Traditional security builds walls around data. But once attackers breach the perimeter, they can see everything.
Encryption Keys Can Be Stolen
Compromised keys expose all protected data
Edge Devices Are Vulnerable
Physical access defeats most security measures
Network Security Can Be Infiltrated
Perimeter breaches expose internal systems
Files Exist Where Hackers Expect Them
OS filesystems are predictable attack targets

(c) Copyright 2026 Dataparency LLC

2

The Solution
Make Data Invisible
CloakFS creates an ephemeral, memory-only file system constructed from D-ISP documents. Files exist only within the relationship — not in the OS filesystem where hackers expect them.
01
Relationship-Bound Access
Files require RDID tied to user login/passCode JWT. No relationship = no visibility.
02
Memory-Only Existence
File system lives in memory, disappears when session ends. Nothing on disk to find.
03
D-ISP Persistence
Underlying documents stored securely in distributed D-ISP platform with built-in backup.
Traditional vs. CloakFS
Traditional Security
  • Files visible on disk
  • Encryption keys can leak
  • Attackers see targets
  • Breach = full exposure
CloakFS Approach
  • Files don't exist to find
  • No keys to compromise
  • Nothing to target
  • No visible target = no attack vector

(c) Copyright 2026 Dataparency LLC

3

CloakFS Within the Entrelid® Framework
CloakFS operates as the file system layer within a comprehensive security architecture built on relationship-based access control.
RDID Security Core
U.S. Patents 11,531,724 & 12,380,069. Relationship Distributed Identifiers bind data to entity relationships.
D-ISP Data Platform
Entity-centric, schema-agnostic, immutable, access-controlled data store.
D-DDN Network
NATS messaging + Secure Channels for distributed deployment.
CloakFS File System
Invisible, relationship-bound file storage layer.

(c) Copyright 2026 Dataparency LLC

4

Where CloakFS Operates
Edge Deployment
Operates at the edge where traditional security is most vulnerable. Edge-native design protects forward-deployed systems.
On-Premises
Works seamlessly in private data centers with same security model as edge and cloud deployments.
Cloud Infrastructure
Deploys wherever D-DDN operates with no location constraints or security compromises.
Integration Benefits
Unified Security Model
Same RDID-based access control across all layers for both human and machine entities.
Built-in Distribution
D-DDN provides automatic backup, high availability, and access from anywhere on the network.
Zero Trust Compatible
Entity-centric security aligns with Zero Trust principles automatically without additional configuration.

(c) Copyright 2026 Dataparency LLC

5

Developer Utility
Operational Use on the Network
CloakFS is designed as an operational utility for developers working on distributed networks — not just a security add-on, but a core development resource.
Programmatic Access
  • Function Library — Link directly into programs for programmatic access to CloakFS files
  • Go Embeddable Module — Currently available for Go developers
  • Additional Language Bindings — Coming for other languages
CLI Access
Command Line Interpreter (REPL) for interactive user access. Partially developed; will be completed for both versions.

Available CLI Commands
user, openfs, mkdir, read, cat, versions, import, export, search, ls, logout, quit
Standard Development Resource
Treat secure, invisible storage as a standard development resource with no custom security layers needed.
Built-in RDID Protection
Security is integrated, not bolted on. Same API whether running at edge, on-prem, or cloud.
Bridge Capabilities
Import/Export capabilities bridge CloakFS and OS file systems seamlessly.

(c) Copyright 2026 Dataparency LLC

6

Features and Benefits
Ephemeral Architecture
Memory-only file system constructed from D-ISP documents. Access controlled by RDID dependent on user login/passCode JWT.
Unlimited Capacity
Store any number of files and hierarchical directories. Files under 5MB stored internally; larger files on configured external data source.
Multi-Instance
Create any number of CloakFS instances at will, each with an assigned owner for specific purposes.
Distribution & Access
Built-in HA
D-DDN data store is distributed with backups and high availability built in.
Network Access
Access from anywhere on the network with consistent security model.
Fast Performance
Low latency operations at approximately 10ms per write with version control by timestamp.

(c) Copyright 2026 Dataparency LLC

7

Use Cases
Personal File System
Unique FS bound to one owner through login JWT. Secure storage for passwords, usernames, configuration details, authentication responses, and sensitive personal files.
Application User Configuration
Multiple FSs bound to individual users through application login JWT. Manages password matching, user response matching, authentication, and resource availability.
Kubernetes Pod Storage
Unique FS bound per pod instance ID. Stores configuration details, image source and deployment info, connection graphs, service directory and sidecar IPs.
Additional Applications
Developer operational utility across the network
Edge device secure configuration
User shared data stores
Targeted advertising data
External program permissions
Any purpose requiring invisible, relationship-bound storage

(c) Copyright 2026 Dataparency LLC

8

Combined Capability
CloakFS + OTP — Information-Theoretic Security
Two layers of mathematically provable security protecting data at rest and in transit.
Quantum-Proof
Neither layer can be broken by quantum computing advances.
No Keys to Steal
RDID derives access from relationship, OTP keys are used once and discarded.
Defense in Depth
Even if one layer were somehow compromised, the other remains intact.
Unified Architecture
Both built on same RDID/Entrelid foundation for seamless integration.

(c) Copyright 2026 Dataparency LLC

9

Patent Protected
Patent-Protected Innovation
Primary Patent — CloakFS
U.S. Patent 12,380,069
Issued: August 5, 2025
Coverage: Cloaked User-Space File System — File invisibility and relationship-bound access architecture
Foundation Patent — D-ISP
U.S. Patent 11,531,724
Coverage: Distributed information sharing architecture with RDID security
Additional IP
Core RDID and mathematical containment innovations (pending)
Strategic Value
Competitive Barrier
Patent protection prevents direct replication of core invisible file system capabilities.
Investment Protection
17-20 year protection timeline from filing dates ensures long-term technology leadership.
Licensing Opportunity
Licensed technology access available for complementary integrations and partnerships.
Validated Innovation
USPTO grant confirms technical innovation and defensible intellectual property.

(c) Copyright 2026 Dataparency LLC

10

Summary & Contact
The only file system where hackers can't steal what they can't see
Invisible
Memory-only ephemeral files that exist only within authorized relationships
Patented
U.S. Patent 12,380,069 protects core innovation
Integrated
Entrelid Framework / RDID Security foundation
Distributed
Works anywhere on the network, from edge to cloud
Developer-Ready
Function library for programmatic access, CLI for interactive use
Defense-Grade
Combined with OTP for information-theoretic security at rest AND in transit

(c) Copyright 2026 Dataparency LLC

11

Contact Information
Dataparency LLC (dba Entrelid)
Timothy Dix, CEO
719-210-5318

Patent Information:
U.S. Patent 12,380,069 — Cloaked User-Space File System
U.S. Patent 11,531,724 — Entity Centric Database
from the makers at Dataparency LLC

(c) Copyright 2026 Dataparency LLC

12