Cipherloc Corporation (the “Company” or “Cipherloc”) was incorporated in the State of Texas on June 22, 1953 as American Mortgage Company. Effective August 27, 2014, the Company changed its name to Cipherloc Corporation. Our headquarters are located at 825 Main Street, Suite 100, Buda, Texas. Our website The information contained, or referred to, on our website is not part of this Annual Report on Form 10-K unless expressly noted.

Company profile

Michael W DeLaGarza
Fiscal year end
Former names
IRS number

CLOK stock data


Investment data

Data from SEC filings
Securities sold
Number of investors


17 May 21
24 Jun 21
30 Sep 21
Quarter (USD)
Mar 21 Dec 20 Sep 20 Jun 20
Cost of revenue
Operating income
Operating margin
Net income
Net profit margin
Cash on hand
Change in cash
Diluted EPS
Annual (USD)
Sep 20 Sep 19 Sep 18 Sep 17
Cost of revenue
Operating income
Operating margin
Net income
Net profit margin
Cash on hand
Change in cash
Diluted EPS

Financial data from CIPHERLOC earnings reports.

Cash burn rate (estimated) Burn method: Change in cash Burn method: Operating income/loss Burn method: FCF (opex + capex)
Last Q Avg 4Q Last Q Avg 4Q Last Q Avg 4Q
Cash on hand (at last report) 5.63M 5.63M 5.63M 5.63M 5.63M 5.63M
Cash burn (monthly) (positive/no burn) (positive/no burn) 362.95K 303.16K 89.66K 279.53K
Cash used (since last report) n/a n/a 1.01M 844.91K 249.89K 779.05K
Cash remaining n/a n/a 4.62M 4.78M 5.38M 4.85M
Runway (months of cash) n/a n/a 12.7 15.8 60.0 17.3

Beta Read what these cash burn values mean

Data for the last complete 13F reporting period. To see the most recent changes to ownership, click the ownership history button above.

4.3% owned by funds/institutions
13F holders
Current Prev Q Change
Total holders 1 0 NEW
Opened positions 1 0 NEW
Closed positions 0 0
Increased positions 0 0
Reduced positions 0 0
13F shares
Current Prev Q Change
Total value 1.5M 0 NEW
Total shares 3.56M 0 NEW
Total puts 0 0
Total calls 0 0
Total put/call ratio
Largest owners
Shares Value Change
Manchester Management 3.56M $1.5M NEW
Largest transactions
Shares Bought/sold Change
Manchester Management 3.56M +3.56M NEW

Financial report summary

Management Discussion
  • We are developing products and services around our patented polymorphic encryption technology designed to enable a more efficient and stronger layer of protection to be added to existing solutions. Through a licensing program, we anticipate offering the first secure commercially viable advanced “Polymorphic Encryption Core” (“PEC”) software developers kit to be used in any commercial data security industry and/or in sensitive applications.
  • Our innovative and patented polymorphic technology eliminates the flaws and inadequacies associated with today’s encryption algorithms. Instead of dealing with large monolithic blocks of data, our approach decomposes the information to be protected into multiple segments. These individual segments each have a unique encryption key, utilize different encryption algorithms, are randomly grouped into different lengths, and can be further re-encrypted. Since segments are independent from each other and are individually protected, our technology is not susceptible to computational attacks. In fact, the strength of our technology improves as compute power increases.
Content analysis
H.S. sophomore Avg
New words: accreditation, accredited, accuracy, acquisition, activity, ADDC, adjusted, advantage, affiliate, agent, agile, anniversary, appliance, appointed, Appointment, arbitration, area, Armor, Arnouse, assert, attempted, attract, beneficial, blank, brand, breach, bring, broken, built, capacity, carrying, cautioned, Chairman, Chasteen, check, classified, cloud, Code, Codification, compete, confidential, confidentiality, confidentially, configure, confirmation, consideration, contacted, contingent, convenience, Cooper, corrective, costly, create, created, cryptographic, customary, cybersecurity, database, David, decision, decrypt, Deferral, Del, deliverable, delivery, demand, demonstrating, deny, Departure, deployed, derivative, desire, desperately, Digital, directly, discovery, display, Distinguishing, duly, duty, earlier, ease, ECS, edge, eligible, eliminate, emphasize, employ, employee, employment, encoding, encountered, endorsement, enforce, enrichment, enterprise, entry, EPS, Eric, escrow, evidenced, exclusive, Exhibit, expansion, factor, failure, faith, feature, fiduciary, Finally, firm, focused, footprint, formal, found, fourth, free, freestanding, frequently, front, fullest, functional, furnished, GAAP, GATEWAY, good, governing, Government, greater, grow, hacking, hard, hardware, heading, Hedging, herewith, hope, human, implied, imply, inadvertently, Indefinite, indemnification, indexed, indirectly, infrastructure, infringed, installed, instrument, insufficient, interaction, intercepted, interface, Internet, interrupted, introduction, invoicing, IP, issuable, Judicial, lead, leadership, LeBlanc, light, line, LLP, logo, Mandatorily, Marchal, marking, Marquez, matter, meruit, messaging, minimal, modern, mutually, National, network, NIST, nominal, Noncontrolling, Nonpublic, notice, occupying, Opportunity, oral, ordinary, outlined, owner, pace, page, paired, Partnership, Paulson, penny, percentage, petition, pipeline, plaintiff, platform, Polk, precede, preemption, preemptive, prevented, preventing, produced, prohibiting, prompt, pronouncement, proportional, proportionately, proxy, publicly, put, quantum, ramped, range, ranging, rapidly, readable, receipt, Redeemable, redemption, redomicile, redomiciling, register, registered, registering, registrant, registration, relationship, release, released, relevant, reliability, reliable, reliance, remote, remove, rendered, rental, repaid, repayment, Replacement, reproduce, request, requesting, rescission, resell, reseller, resetting, resolved, Resource, resume, revise, revision, Robert, round, RR, Ryan, satisfaction, SDK, seasonality, sector, Semple, sentinel, served, service, setup, shareholder, shift, shown, similarly, situated, SM, smaller, SMC, solution, solve, sponsorship, sporadic, staffing, statement, statistical, statutory, storage, store, street, structure, subsidiary, successfully, summary, tablet, tail, TBOC, team, technique, telephone, theory, thereof, thereunto, therewith, thirty, Tom, traffic, transfer, transmit, treated, type, unable, undersigned, understanding, undue, unissued, unjust, unpaid, Unpredictability, unregistered, untrue, user, validating, validation, vary, vigorously, violated, violation, viral, waived, warrant, week, Wilkinson, work, working, written
Removed: alleging, arising, committee, comparable, convert, converted, cost, Country, direct, dissolution, distribution, document, enjoining, exempted, expended, expensed, guaranty, identification, impossible, inferred, injunction, international, investigate, land, liquidation, mineral, misrepresentation, negative, Nonemployee, personal, pertaining, policy, practical, preference, receivable, recent, reflect, representation, resulted, sued, temporary, terminology, transparent, volume, voted


Dynamic pin configurator
30 Mar 21
A method and apparatus to protect the coded signals sent over physical twisted-pair wiring or between two (2) or more LANs connected by a Wide Area Network (WAN), from unauthorized electronic circuit/wiring monitoring.
Blind Key Generator and Exchange
18 Feb 21
Operationally, the invention transmits a number to a verifiable recipient which indicates to the receiver what the key will be, without sending the key, or some related key.
Polymorphic one time pad matrix
17 Feb 20
The present invention provides a simple and efficient cipher and key generation and selection capability from a predetermined, randomly changing, fixed size matrix (N) of ciphers and keys resulting in a very high-order approximation (Nr,c→∞) of a true One Time Pad for encryption solutions such as the CipherLoc Polymorphic Key Progression Algorithmic Cipher Engine.
Virtual polymorphic hardware engine
18 Nov 19
Virtual field programmable gate array (VFPGA) duplicates and/or emulates a field programmable gate array through the use of base hardware and firmware that uses RAM as ROM or EPROM and provides control and monitoring and manipulation through the use of elementary and basic device functionality commands (machine code primitives) to accommodate the needs of polymorphic cipher engine software so that the software achieves the same results as thou it had access to programmable logic arrays, gate and logic blocks found in field programmable gate array chips.