No initialization key

No initialization key

The user can customize the smallest unit as a fragment. Whether it is a melody, a picture, a biometric electronic file or a digital signature of dongle, it can be used as a key-specific fragment. Only at the moment of signing and approving, the key is synthesized instantly through the exclusive patented non-reversible algorithm, and there is no risk of theft when initializing the private key. Private key fragments are scattered in the custody of multisig participants, and neither party can obtain the key.

Fragments loss protection

Fragments loss protection

Key fragments are backed up without fear of loss. Customized fragments are encrypted by post-quantum cryptography (PQC) and AES double-layer keys after backup, and the encrypted private key is dispatched by Multi-Party Computation (MPC) and kept by the backup key administrator, who needs to sign for backup and restoration.

Strict authentication

Strict authentication

Cooperate with domestic security chip hardware professional team, international standards conforming to international FIDO2 authentication are adopted matching biological identification, use zero knowledge management, identity authentication, authorization, bind devices, and two-factor authentication mechanism, which can strictly ensure the correctness of identity signers.

Anti-quantum encryption

Anti-quantum encryption

Combined with the quantum computing standard algorithm certified by the National Institute of Standards and Technology (NIST), the concept of quantum encryption is applied to the backup fragment protection system, which not only realizes systematic upgrade, but also sets an effective defense against future quantum computing network attacks.

Enterprise level vault applications

A safe vault to protect your virtual assets

Product features

Our solution makes you no longer tolerate the above risks, so that your assets can obtain the highest level of protection.


Intuitive operation interface

Vault initialization can be completed without complicated process, and it supports common main network coins (ETH, BTC, BNB, SOL, TRX, MATIC …) and all contract tokens (ERC20, BEP20) and NFT (ERC721/ERC1155) in the market. All currencies can initiate multi-sign-off approval, and the sign-off device can choose to bind a desk, laptop or mobile phone.


Multi-level setting and progress tracking

Multi-level threshold management can be set according to the actual signing-off scenario of the company, and each approver at a single level can be set, and the signing-off mode of M taking N is adopted, so there is no need to worry about the stagnation of approval caused by poor attendance of personnel. Once the transaction application is put forward, the time and level of both applicants and approvers are recorded in detail, so there is no need to worry that the signing and approval progress cannot be tracked.


Special role of backup key administrator

In order to avoid the key fragments cannot be controlled, namely, the special situation that multiple sign-off personnel cannot be contacted for some reason, the role of backup key administrator is designed, who is in charge of personnel's authority freezing and transfer of fragment. The transfer of encrypted fragment must be signed and approved by backup key administrator after the application procedure is put forward, so as to combine and restore fragments and transfer them to new recipients.


Treasury account supervision function

Transaction supervision warning functions such as in/out of money, large capital change, abnormal time or specific source can be set, and vault managers are automatically notified when the blockchain address meets the warning conditions.


Triple protection design of safe and rigorous treasury

The first layer of protection is rigorous identity authentication, which can be combined with FIDO dongle, two-factor authentication and device binding to ensure the correct authorized personnel; The second layer of protection is multi-sign-off fragments, which can be combined with fingerprint encryption dongle to realize that no key is stored in the system, and only the key is dynamically synthesized at the moment of sign-off to ensure that no one can steal the key; The third layer of protection is to designate the white list account. Only the account address of white list is allowed to accept the transfered assets to ensure that assets cannot be stolen.