Block-safe
Securing Sensitive Assets in Blockchain Processes

Blockchain Protect

Create, verify, and protect blockchain transactions and assets

  • Designed for blockchain-based solutions
  • Provides certified blockchain-related algorithms (BIP-32, BIP-44, SLIP-0010)
  • Blockchain specific generation of Private and Public Keys
  • Integrated DLT support
  • Includes a software simulator for evaluation and integration testing

Product Type:

Firmware

Delivery Time:

Ask our sales team
Key Benefits

Key Benefits

Icon

Certified Blockchain Algorithms

Blockchain Protect upgrades your HSM with blockchain-related algorithms to sign, verify, and approve blockchain processes. 

Icon

Built in Support for Distributed Ledger Technology (DLT)

The integrated DLT-Support enables the reliable execution of Bitcoin and Ethereum (ETH) use cases.

Icon

Highly Flexible Integration

Blockchain Protect comes with integration software supporting various industry standards and can be easily integrated with third party applications.

Details

Details

Blockchain Protect – Generate and Protect Sensitive Assets in Blockchain Processes

Blockchain Protect was designed to meet the unique requirements for blockchain-based solutions. It upgrades your HSM with blockchain-specific algorithms such as BIP-32, BIP-44, SLIP-0010 and MultiSig & Boneh–Lynn–Shacham (BLS) signing algorithm. 

The strong protection requirements of blockchain-specific elliptic curves are based on its capability to securely store and manage the encryption keys for key derivation - the public key generation in blockchain processes - inside the secure boundaries of the HSM.

Combining your General Purpose HSM with Blockchain Protect allows the effective protection of sensitive identities, keys and data used in distributed ledger technology (DLT) computing platforms with the aim to reduce time to completion, even in complex ecosystems.

Blockchain Protect complies with the latest regulations being enforced in Play like FINRA, ATS, 5AMLD and FSB and therefore can be utilized for various use cases in different industries like cross-border or interbanking transactions, KYC, or registry as well as for cryptocurrency and other digital assets.

Features

Extensive Management Functionalities

  • Role based access control (RBAC) with multi-factor authentication
  • Extensive key management
  • 2-factor authentication with smartcards
  • “m of n” authentication
  • Remote management

Software simulator included

  • HSM Simulator with all Blockchain Protect functionalities
  • Fully functional runtime including all administration and configura-tion tools
  • For evaluation, development, and integration testing of functionalities before integration to your HSM

Highly Flexible Integration Options

  • Integration software included
  • Third party integrable

Built-in Support

  • Provides support for several models for HA redundancy and per-formance scalability
  • Provides DLT platform support

Easy Customization

  • Possibility to develop own sensitive codes and IPs by utilizing Utimaco Software Development Kit (SDK)

Technical Specifications

Certified built-in Blockchain related algorithms, e.g.

  • BIP32/44
  • SLIP-010
  • MultiSig & Boneh–Lynn–Shacham (BLS) signing algorithm
  • Necessary fingerprint requirement for public key address generation
  • Provides consensus signing and verification using MultiSign & BLS
  • See u.trust General Purpose HSM Se-Series  for a full list of al-ready integrated algorithms in the standard GP HSM firmware

Highest physical and logical security

  • FIPS 140-2 Level 3 compliant HSM
  • Post-Quantum safe Dual TRNG + PRNG entropy source
  • NIST SP800-90 compliant RNG
  • Asymmetric Key derivations including BIP-32, BIP-44, SLIP-010, NIST SP800-108, ECDSA (NIST SP800-56A), DSA (ANSI X9.42)  

Supported Cryptographic Interfaces (APIs)

  • PKCS #11
  • Microsoft Crypto API (CSP)
  • Microsoft Cryptography Next Generation (CNG)
  • Microsoft SQL Extensible Key Management (SQLEKM)
  • JCE interface
  • eXtended services Interface (CXI) - Utimaco‘s high performance cryptographic interface

On-premise

Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance
  • PCIe Card

As a service

Our as-a-service options are hosted by Utimaco in certified datacenters and include everything from set-up to deployment to maintenance.

Related to this product

Add-ons

360 HSM Monitoring

Remote HSM Management and Monitoring

Find more details

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0