Securing Sensitive Assets in Blockchain Processes

Blockchain Protect

Create, verify, and protect blockchain transactions and assets

Blockchain Protect is the upgrades your Utimaco General Purpose Hardware Security Module with blockchain-specific algorithms.

  • Designed for blockchain-based solutions
  • Provides certified blockchain-related algorithms (BIP-32, BIP-44, SLIP-0010)
  • Blockchain specific generation of Private and Public Keys
  • Integrated DLT support
  • Includes a software simulator for evaluation and integration testing
Key Benefits

Key Benefits


Certified Blockchain Algorithms

Blockchain Protect upgrades your HSM with blockchain-related algorithms to sign, verify, and approve blockchain processes. 


Built in Support for Distributed Ledger Technology (DLT)

The integrated DLT-Support enables the reliable execution of Bitcoin and Ethereum (ETH) use cases.


Highly Flexible Integration

Blockchain Protect comes with integration software supporting various industry standards and can be easily integrated with third party applications.



Blockchain Protect – Generate and Protect Sensitive Assets in Blockchain Processes

Blockchain Protect was designed to meet the unique requirements for blockchain-based solutions. It upgrades your HSM with blockchain-specific algorithms such as BIP-32, BIP-44, SLIP-0010 and MultiSig & Boneh–Lynn–Shacham (BLS) signing algorithm. 

The strong protection requirements of blockchain-specific elliptic curves are based on its capability to securely store and manage the encryption keys for key derivation - the public key generation in blockchain processes - inside the secure boundaries of the HSM.

Combining your General Purpose HSM with Blockchain Protect allows the effective protection of sensitive identities, keys and data used in distributed ledger technology (DLT) computing platforms with the aim to reduce time to completion, even in complex ecosystems.

Blockchain Protect complies with the latest regulations being enforced in Play like FINRA, ATS, 5AMLD and FSB and therefore can be utilized for various use cases in different industries like cross-border or interbanking transactions, KYC, or registry as well as for cryptocurrency and other digital assets.


Extensive Management Functionalities

  • Role based access control (RBAC) with multi-factor authentication
  • Extensive key management
  • 2-factor authentication with smartcards
  • “m of n” authentication
  • Remote management

Software simulator included

  • HSM Simulator with all Blockchain Protect functionalities
  • Fully functional runtime including all administration and configura-tion tools
  • For evaluation, development, and integration testing of functionalities before integration to your HSM

Highly Flexible Integration Options

  • Integration software included
  • Third party integrable

Built-in Support

  • Provides support for several models for HA redundancy and per-formance scalability
  • Provides DLT platform support

Easy Customization

  • Possibility to develop own sensitive codes and IPs by utilizing Utimaco Software Development Kit (SDK)

Technical Specifications

Certified built-in Blockchain related algorithms, e.g.

  • BIP32/44
  • SLIP-010
  • MultiSig & Boneh–Lynn–Shacham (BLS) signing algorithm
  • Necessary fingerprint requirement for public key address generation
  • Provides consensus signing and verification using MultiSign & BLS
  • See General Purpose HSM Se-Series  for a full list of al-ready integrated algorithms in the standard GP HSM firmware

Highest physical and logical security

  • FIPS 140-2 Level 3 compliant HSM
  • Post-Quantum safe Dual TRNG + PRNG entropy source
  • NIST SP800-90 compliant RNG
  • Asymmetric Key derivations including BIP-32, BIP-44, SLIP-010, NIST SP800-108, ECDSA (NIST SP800-56A), DSA (ANSI X9.42)  

Supported Cryptographic Interfaces (APIs)

  • PKCS #11
  • Microsoft Crypto API (CSP)
  • Microsoft Cryptography Next Generation (CNG)
  • Microsoft SQL Extensible Key Management (SQLEKM)
  • JCE interface
  • eXtended services Interface (CXI) - Utimaco‘s high performance cryptographic interface


Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance
  • PCIe Card

As a service

Our as-a-service options are hosted by Utimaco in certified datacenters and include everything from set-up to deployment to maintenance.

Related to this product


360 HSM Monitoring

Remote HSM Management and Monitoring

Find more details

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail


      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.