The custody infrastructure is a proprietary multilayered and multi-signature system developed entirely in-house. It features three security levels, including two offline levels: cold and frozen storage. Protocol-level timelocks provide enhanced protection, and the architecture allows for the integration of external actors within the authorization process to ensure distributed control. A dedicated disaster recovery framework is in place to guarantee operational continuity and asset access even in the event of major incidents. Furthermore, the multi-signature setup is covered by two international patents.
Comprehensive, real-time visibility into custodial holdings is ensured through automated verification mechanisms and on-chain Proof-of-Reserves attestation, which can be performed independently at any time by authorized operators. Ongoing audits and granular access control policies support full regulatory compliance, while advanced vault structures and multi-key frameworks reinforce system integrity and internal governance. To provide an additional layer of protection, modular insurance coverage is available and can be aligned with institutional risk profiles and operational frameworks.
A highly configurable custody infrastructure allows governance models tailored to specific operational and compliance frameworks. Full discretion is granted over how the infrastructure is managed: it can be operated independently, delegated entirely, or handled in collaboration. Deployment options include fully customized environments or turnkey solutions that meet the highest security standards and can be activated within weeks, with pre-integrated setups reducing complexity and accelerating onboarding.
The custody architecture is designed to balance robust protection with operational efficiency. Withdrawals are safeguarded by protocol-level timelocks and collaborative authorization mechanisms, while integration with liquidity providers enables real-time market access. Operational workflows remain intuitive and efficient without compromising asset security, supported by a unified control dashboard that allows authorized users, regardless of technical background, to manage activities through a single interface.
The infrastructure natively integrates protocol-level staking functionality for Proof-of-Stake assets, enabling secure participation in native yield-generation mechanisms. Designed for simple and seamless operation, the service requires no technical expertise or asset transfers to external environments. Backed by robust security measures, this solution offers a reliable way to maximize staking rewards while maintaining full control and effective risk management.
Banca d’Italia
Fintech Hub
”[CheckSig] develops technologies and processes that, leveraging the inherent transparency of public blockchains, enable each customer to independently verify their own crypto assets held in custody by an intermediary. This approach, called ‘Individual Proof-of-Reserves’ or IPoR, aims to become a standard of assurance and customer protection adopted throughout the market.”