Explanation of Multi-layered Security Architecture
Storing your digital assets with ChainUp Custody ensures that your assets are protected by our state-of-the-art security system built by world-class security engineers and experts.
banner
Comprehensive analysis of multi-dimensional security system architecture
Technical risk control
Secure your digital assets robustly
MPC technology
Multi-signature
Threshold-signatures
Transaction compliance
Compliance policies to avoid risks
AML/Compliance
Business risk control
Prevent breaches through multi-layered security system
AML/Compliance
Whitelist feature
Insurance policies
Custodian compliance
Compliance policies to avoid risks
SOC2 Audit
LAYER 1: AML/COMPLIANCE & POLICY ENGINE
Comprehensive KYT, KYC and AML screening services at ChainUp Custody
KYT: Know Your Transaction (KYT) can be defined as a process where digital assets transactions can be assessed for fraudulent or suspicious activity (e.g. money laundering) to help you monitor and track users' financial transactions to determine the authenticity and legitimacy of the transactions.
KYC: Know-your-customer (KYC) is the process of a business identifying and verifying the identity of its clients. ChainUp Custody's KYC services can help you understand your users' profile and transaction purpose, and detect suspicious transactions by building a client risk profile.
Risk monitoring mechanisms: Help you detect and reject high-risk transactions
ChainUp Custody provides automated deposit and withdrawal monitoring aimed at clamping down money laundering, terrorism funding, and other criminal behaviors by making it easy to trace transactions to their origin.
Choose your compliance partner and customize transaction policies based on risk levels
ChainUp Custody works with leading crypto compliance and anti-money laundering service provider Chainalysis, and also provides integrated KYC/AML solutions. Clients may choose different plans and vendors aligned to your needs to ensure compliance when executing fiat to crypto transactions.
LAYER 2: MPC
No single point of failure
No additional deployment
Ultra-low transaction fee
Operational flexibility
Strongest transaction encryption and security technology
Multi-party computation (MPC) is a cryptographic protocol with shared computation without compromising the security and privacy of clients' data.
Ability to provide easy and secure data access
MPC works by splitting the traditional private keys into multiple pieces, distributing them in multiple places to ensure no one person has full access to the traditional private key. The private key is always used in a distributed manner.
ChainUp Custody combines MPC technology with hardware isolation technology to distribute storage of encrypted information and exponentially enhance system security to ensure that noone besides you will be able to access your digital assets.
Automatic key-refreshing prevents leakage
MPC's algorithm mechanism allows you to refresh key information at any time to invalidate compromised information and generate new keys which reduce the risk of asset theft and ensure the security of digital assets.
MPC is chain-agnostic
Unlike the multi-signature approach, MPC is highly compatible with blockchain.
LAYER 3: MULTI-SIGNATURE
Multi-signature (multisig) wallets are smart contracts that allow multiple signatories on a single transaction. A transaction will go through if a predefined M out of N signatures submit their approvals. The process is not reliant on a single person or device.
ChainUp Custody utilizes multi-signature technology to protect assets from internal fraud or collusion, and prevent any single privileged account from stealing users' assets.
All addresses associated with multi-signature wallets, and the signatures for each transaction are transparent and traceable on blockchain.
Secure storage
Not reliant on devices
Transaction Escrow
LAYER 4: THRESHOLD SIGNATURE
Threshold signatures apply the MPC technology to establish an interactive multi-party agreement to share private keys and create a single digital signature.
Security
It is significantly harder for attackers to gain access to a private key because there is no single point of failure – multiple parties must be compromised to get access to the private key.
Low transaction fee
As only one signature is generated and needs to be verified per transaction, no additional verification cost is required and the transaction cost is significantly reduced.
High level privacy
Each party's input is kept private, hence the signatories will not be made public on the Internet
LAYER 5: WHITELIST
By whitelisting your wallet address, you prevent third parties from withdrawing funds to an unwanted wallet address. Once you define the transactions and whitelist policy, no transfers or withdrawals will leave the account without permission from the whitelist.
LAYER 6: SOC 2 COMPLIANCE
SOC 2 defines the criteria for managing clients data based on five “trust service principles”—security, availability, processing integrity, confidentiality, and privacy for Crypto Custodian.
SOC 2
in progress
PRIVACY

Access control

Two-factor authentication

Data encryption

SECURITY

Network/application firewalls

Two-factor authentication

Intrusion detection

CONFIDENTIALITY

Data encryption

Access control

Network/application firewalls

AVAILABLITY

Performance monitoring

Disaster recovery

Security incident handling

PROCESSING INTEGRITY

Quality assurance

Processing monitoring

LAYER 7: INSURANCE
ChainUp Custody's digital asset insurance is coming to you soon! ChainUp Custody's insurance includes the following coverage:
Physical Damages
Physical damages resulting from natural hazards causing the loss of private keys
Employee Theft
Loss caused by deliberate and dishonest acts of employees
Theft on Premises
Theft by a third party from the location where private keys are stored
Cybersecurity Threats
Loss caused by external hacking, malware attack, or computer fraud
ADDITIONAL FEATURES TO HELP YOU SECURE YOUR BUSINESS
01
Private data encryption
02
Key data traceability
03
User security authentication
04
Internal audit risk control
05
Full transaction process monitoring
06
Early warning system
07
Authority management system
08
Abnormal financial monitoring
Choose ChainUp Custody to eliminate internal security weaknesses
ChainUp Custody's team of experts can help you learn the best practices in building a secure custody solution, such as choosing the most suitable KYC and AML services for your digital assets. Contact us for more information.
Contact for Support
Scalable features for wallet security and transaction policies to fulfill a range of business requirements
Customize transaction risk control mechanisms using whitelisting, offline, and administrative approval processes.
Third-party vendor governance, partner selection, security system procedures.
Custom-built security system by technical experts in cryptography, finance, and security.