The custody infrastructure is a proprietary multilayered and multi-signature system developed entirely in-house. It features three security levels, including two offline levels: cold and frozen storage. Protocol-level timelocks provide enhanced protection, and the architecture allows for the integration of external actors within the authorization process to ensure distributed control. A dedicated disaster recovery framework is in place to guarantee operational continuity and asset access even in the event of major incidents. Furthermore, the multi-signature setup is covered by two international patents.
Comprehensive, real-time visibility into custodial holdings is ensured through automated verification mechanisms and on-chain Proof-of-Reserves attestation, which can be performed independently at any time by authorized operators. Ongoing audits and granular access control policies support full regulatory compliance, while advanced vault structures and multi-key frameworks reinforce system integrity and internal governance. To provide an additional layer of protection, modular insurance coverage is available and can be aligned with institutional risk profiles and operational frameworks.
A highly configurable custody infrastructure allows governance models tailored to specific operational and compliance frameworks. Full discretion is granted over how the infrastructure is managed: it can be operated independently, delegated entirely, or handled in collaboration. Deployment options include fully customized environments or turnkey solutions that meet the highest security standards and can be activated within weeks, with pre-integrated setups reducing complexity and accelerating onboarding.
The custody architecture is designed to balance robust protection with operational efficiency. Withdrawals are safeguarded by protocol-level timelocks and collaborative authorization mechanisms, while integration with liquidity providers enables real-time market access. Operational workflows remain intuitive and efficient without compromising asset security, supported by a unified control dashboard that allows authorized users, regardless of technical background, to manage activities through a single interface.
Staking capabilities are available for supported Proof-of-Stake assets, enabling participation in native yield-generation mechanisms through a secure and streamlined process. The service is fully integrated within the custody framework and designed for operational simplicity, eliminating the need for technical expertise or asset transfers to external environments. With solid safeguards and consistent performance, this solution provides a reliable way to maximize staking returns while ensuring full control and effective risk.
Banca d’Italia
Fintech Hub
”[CheckSig] develops technologies and processes that, leveraging the inherent transparency of public blockchains, enable each customer to independently verify their own crypto assets held in custody by an intermediary. This approach, called ‘Individual Proof-of-Reserves’ or IPoR, aims to become a standard of assurance and customer protection adopted throughout the market.”