Transaction Security Broker (TSB)
Challenge
Today's financial and digital asset applications demand the ability to implement fine-grained policies that govern various actions on transactions. These policies may involve keys based on groups, quorums, time restrictions, or any combination of these factors. The challenge lies in ensuring robust security measures while accommodating such intricate requirements.
Solution
The Securosys HSM offers a solution by granting precise control over key usage through sophisticated authorizations. The integration of Securosys Smart Key Attributes (SKA) (link to SKA page) facilitates the enforcement of these policies and rules seamlessly.
To streamline the implementation of SKA's functionalities, the Securosys Transaction Security Broker (TSB) steps in. This standalone engine provides a REST-API and internal state management, simplifying the process. It connects to an external database instance and integrates with SKA-enabled Securosys HSM, ensuring uncompromised security as all security-relevant operations occur within the HSM.
The TSB, coupled with SKA-enabled Securosys HSM, offers unparalleled granularity in controlling key actions and operations. Finance organizations can establish highly customizable policies for authorizing operations and transactions, as well as manage key blocking/unblocking and policy adjustments with ease.
Key Benefits
Advantages of TSB compared to Multi-signature:
- Algorithm independent - the same process can be used for all supported crypto assets and currencies regardless whether they support multi-signature or not
- Lower fees and better privacy because the addresses are single signature type
- Regulatory and customer flexibility thanks to decoupling of ownership and control of the keys
- Customizable compliance from simple to highly complex policies including time-restrictions
Advantages of TSB compared to Multi-Party Computation (MPC)
- Time-based policies
- Hardware tamper protection of the key material
- Redundancy without introduction of an additional risk of key exposure
- Secure storage of keys