logo

Platform
Customers
Company
Security
Contact us
Multi-layered security architecture Explained
Storing your crypto with ChainUp Custody ensures that your assets are protected by our state-of-the-art security system that has been built by world-class security engineers and experts.
banner
Explore Multi-Dimensional Security Structure
Technical risk control
Secure your digital assets robustly
MPC technology
Multi-signature
Threshold-signatures
Trade compliance
Compliant policies for risk aversion
AML/Compliance
Business risk control
Prevent breaches by security systems
AML/Compliance
White-list
Insurance
Custodian compliance
Compliant policies for risk aversion
SOC2 Audit
LAYER 1: AML/COMPLIANCE & POLICY ENGINE
Comprehensive KYT, KYC, and anti-money laundering screening in ChainUp Custody
KYT: Know Your Transaction (KYT) can be thought of as a process by which digital assets transactions can be assessed for fraudulent or suspicious activity (e.g. money laundering) to help you monitor and track consumers' financial transactions to determine the authenticity and legitimacy of the transactions.
KYC: Know your customer (KYC) is the process of a business, identifying and verifying the identity of its clients.   ChainUp Custody could help you understand the type and purpose of the customer relationship and develop a customer risk profile, used as a baseline for detecting suspicious customer activities.
Risk monitoring mechanisms: Help you detect and reject high-risk transactions
ChainUp Custody provides automated deposit and withdrawal monitoring, aimed at clamping down on money laundering, terrorism funding, and other criminal behavior like a fraud by making it easy to trace transactions to their origin.
Choose your compliance partner and customize transaction policies based on risk levels
ChainUp Custody corporate with crypto compliance and anti-money laundering leading providers Chainalysis; ChainUp Custody’s technology also offers integrated KYC/AML solutions, You can choose different plans and vendors aligned to your needs to ensure you are compliant when executing fiat to crypto transactions
LAYER 2: MPC
No single point of failure
Need no effort to deploy
Lower transaction fee
Operational flexibility
The strongest transaction encryption and security technology
Multi-party computation (MPC) is a cryptographic protocol that shared computation without compromising the security and privacy of customers’ data.
Ability to provide easy and secure access
MPC works by splitting the traditional private keys into multiple pieces, distributing them in multiple places to ensure no one person has full access to the traditional private key. The private key is always used in a distributed manner.
ChainUp Custody combines MPC technology with Hardware Isolation Modules to protect cryptographic materials when the system is compromised and distributed across security enclaves to exponentially increase the security of the system, ensuring no one can access your digital assets but you.
Ability to provide easy and secure access
MPC's algorithm mechanism allows you to refresh key information at any time to invalidate compromised information and generate new keys which reduce the risk of asset theft and ensure the security of digital assets.
MPC is chain-agnostic
Unlike the multi-signature approach, MPC is highly compatible with blockchain.
LAYER 3: MULTI-SIGNATURE
Multi-signature (multi-sig) wallets are smart contracts that allow multiple parties to sign a single transaction. A transaction will go through if a predefined M out of N signatures submits their approvals. Not reliant on one person or one device.
ChainUp Custody can use multi-sig to protect assets from internal fraud or collusion, preventing any single privileged account from stealing the assets.
All the addresses associated with a multi-sig wallet, as well as their signing for each transaction are transparent and traceable on the chain.
Safety Storage
Don’t rely on one device
Escrow Transactions
LAYER 4: THRESHOLD SIGNATURE
Threshold signature will employ MPC to establish an interactive multi-party protocol to generate private key shares and create a single digital signature.
Security
It is significantly harder for attackers to gain access to a private key because there is no single point of failure – multiple parties must be compromised to get access to the private key.
Lower Cost
Since only one single signature is generated per transaction and only one signature has to be verified, additional verification fees can be avoided, making transactions really cheaper.
High level privacy
Every party’s input is kept private. so the signature-generating parties are not exposed or visible over the network.
LAYER 5: WHITELIST
By whitelisting your wallet address, you prevent third parties from withdrawing funds to an unwanted wallet address. Once you define the transactions and whitelist policy, no transfers or withdrawals will leave the account without permission from whitelisting.
LAYER 6: SOC 2 COMPLIANCE
SOC 2 defines criteria for managing customer data based on five “trust service principles”—security, availability, processing integrity, confidentiality, and privacy for Crypto Custodian.
SOC 2
CERTIFICATION
PRIVACY

Access control

Two-factor authentication

Encryption

SECURITY

Network/application firewalls

Two-factor authentication

Intrusion detection

CONFIDENTIALITY

Encryption

Access control

Network/application firewalls

AVAILABLITY

Performance monitoring

Disaster recovery

Security incident handling

PROCESSING INTEGRITY

Quality assurance

Processing monitoring

LAYER 7: INSURANCE
Digital asset insurance in ChainUp Custody is going to meet you soon! ChainUp Custody insurance policy will cover these events:
Physical Damages
Physical damages resulting from natural hazards causing the loss of private keys
Employee Theft
Loss caused by deliberate and dishonest acts of employees
Theft on Premises
Theft by a third party from the location where private keys are stored
Cybersecurity Threats
Loss caused by external hacking, malware attack, or computer fraud
ADDITIONAL FUNCTIONS HELP YOU RUN A SAFE BUSINESS
01
Private data encryption
02
Key data provenance
03
Safe user authentication
04
Internal auditing management
05
Transaction processing monitor
06
Early warning system
07
Authority management system
08
Abnormal accounting monitor
Choose ChainUp Custody to eliminate internal security weaknesses
ChainUp Custody have experts on staff that can help you understand best practices for our security services like KYC and AML for your digital asset offering. Please contact us for more information
Contact Support
Flexible wallet security and transaction policy feature to satisfy a range of business needs.
Enforce controls and policies using whitelists, Uncompromisingly offline, and administrative approvals.
Third-party oversight, vendor selection, security training, and procedures.
Custom-built security system by technical experts in cryptography, finance, and security.