• About Us
    • PRODUCTS

  • Distribution
  • White Papers
  • Contact

Wallet API

HSM Wallet is a secure implementation of a cryptocurrency wallet. Different from personal hardware wallets currently presented on the market, our solution is oriented towards server systems with a high number of user keys.

The hardware core of the HSM Wallet is the Entrust nShield HSM, FIPS 140-2 Level 3 certified general purpose HSM, which provides features essential for establishing a high level of security – the user’s private keys are generated through the HSM and all operations regarding them are executed in a tamper-proof HSM environment.

Private keys are generated with a True Random Number Generator based on upredcitable physical phenomenon.

All operations with private keys are completely isolated in a secure HSM environment.

Keys are stored and backedup in an encrypted blob using smart cards.

Highlights

Enhanced security

The HSM allows to create, store and utilize the private keys solely inside the isolated highly secured hardware environment.

Functionality

Supports address generation and transaction processing for different cryptocurrencies (Ethereum, Bitcoin etc.)

Key protection

All generated keys are stored encrypted and cannot be retrieved clear-text, even if you have physical access to the module.

Entire ecosystem

HSM Wallet protects the most vulnerable elements of cryptocurency ecosystem – Online Wallets & Stocks.

JSON API

Easy to integrate with your services – HSM Wallet will swiftly and reliably take care of the required set up.

Scalability

nShield architecture gives you an option to easily scale the solution’s capacity whenever needed.

Dedicated crypto key store

The wallet provider maintains a dedicated crypto key store based on a Hardware Security Module (HSM) from which there is no way to extract the keys in their unencrypted form.

Granular access to individual keys

Users gain access to their individual keys that do not leave the secure boundaries of the HSM, preventing access to the keys to any third parties including the crypto service provider.

Trusted Enviroment

All cryptographic operations concerning user keys take place in a certified tamper-resistant HSM zone, which adds another security level to critical operations with your crypto assets.

Scheme

Technical documentation

Solution brief

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Integration guide

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

n

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Document

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Contact us

Do you have any further questions? Go ahead and send us your enquiry! Our team will get back to you as soon as possible.