M-Key

M-Key is a cryptocurrency vault custody system specifically designed for government, banking, and enterprise users. It complies with international standards and effectively addresses the challenges of securely storing cryptocurrency private keys, which are often difficult to safeguard and vulnerable to cyberattacks. M-Key provides comprehensive protection for digital assets and has been adopted by numerous judicial institutions, managing cryptocurrency assets worth billions of dollars, with its technology widely recognized and trusted by users.

The system integrates proprietary keyless multi-signature technology, MPC (Multi-Party Computation) technology, and internationally certified HSM (Hardware Security Module) devices. By leveraging FIDO 2 zero-trust identity verification technology, M-Key offers a flexible multi-level approval management system, achieving the highest standards of information security.

M-Key is a cryptocurrency vault custody system specifically designed for government, banking, and enterprise users. It complies with international standards and effectively addresses the challenges of securely storing cryptocurrency private keys, which are often difficult to safeguard and vulnerable to cyberattacks. M-Key provides comprehensive protection for digital assets and has been adopted by numerous judicial institutions, managing cryptocurrency assets worth billions of dollars, with its technology widely recognized and trusted by users.

The system integrates proprietary keyless multi-signature technology, MPC (Multi-Party Computation) technology, and internationally certified HSM (Hardware Security Module) devices. By leveraging FIDO 2 zero-trust identity verification technology, M-Key offers a flexible multi-level approval management system, achieving the highest standards of information security.

Key Features:

#1 Intuitive operation interface
Vault initialization can be completed without complicated process, and it supports common main network coins (ETH, BTC, BNB, SOL, TRX, MATIC …) and all contract tokens (ERC20, BEP20) and NFT (ERC721/ERC1155) in the market. All currencies can initiate multi-sign-off approval, and the sign-off device can choose to bind a desk, laptop or mobile phone.

#2 Multi-level setting and progress tracking
Multi-level threshold management can be set according to the actual signing-off scenario of the company, and each approver at a single level can be set, and the signing-off mode of M taking N is adopted, so there is no need to worry about the stagnation of approval caused by poor attendance of personnel. Once the transaction application is put forward, the time and level of both applicants and approvers are recorded in detail, so there is no need to worry that the signing and approval progress cannot be tracked.

#3 Special role of backup key administrator
In order to avoid the key fragments cannot be controlled, namely, the special situation that multiple sign-off personnel cannot be contacted for some reason, the role of backup key administrator is designed, who is in charge of personnel’s authority freezing and transfer of fragment. The transfer of encrypted fragment must be signed and approved by backup key administrator after the application procedure is put forward, so as to combine and restore fragments and transfer them to new recipients.

#4 Treasury account supervision function
Transaction supervision warning functions such as in/out of money, large capital change, abnormal time or specific source can be set, and vault managers are automatically notified when the blockchain address meets the warning conditions.

#5 Triple protection design of safe and rigorous treasury
The first layer of protection is rigorous identity authentication, which can be combined with FIDO dongle, two-factor authentication and device binding to ensure the correct authorized personnel; The second layer of protection is multi-sign-off fragments, which can be combined with fingerprint encryption dongle to realize that no key is stored in the system, and only the key is dynamically synthesized at the moment of sign-off to ensure that no one can steal the key; The third layer of protection is to designate the white list account. Only the account address of white list is allowed to accept the transfered assets to ensure that assets cannot be stolen.

M-Key Flyer