Enterprise-Grade Security

DACC Custody Cold Wallet

Enterprise-grade digital asset cold wallet custody solution for financial institutions

Built on "Air-gapped HSM Private Key Management + Multi-approval Workflow + KYT/AML Risk Control", providing secure, compliant, and operational all-in-one custody capabilities.

Core Features

Complete private key lifecycle management

HSM Private Key Management

  • Full lifecycle managed by HSM: generation, storage, signing
  • Online + offline dual control, multi-role separation
  • Deployable in institution-specified environments

Multi-layer Authorization

  • Wallet rule engine (Requester/Approver, M-of-N)
  • Multi-identity verification (2FA, Auth App, Yubikey)
  • Hierarchical thresholds and duty separation

Compliance & Risk Control

  • Built-in KYT/AML checks and whitelist management
  • Standardized deposit/withdrawal processes
  • Auditable operation records

Why DACC

Three core advantages

Security First

Air-gapped signing architecture

  • HSM and KMS deployed in air-gapped environment
  • Transaction signing via QR Code offline data transfer
  • HSM only executes: address generation & transaction signing

Compliance Ready

Process as control

  • Built-in KYT/AML checks and whitelist management
  • Standardized deposit/withdrawal workflows
  • Multi-factor authentication and duty separation

Scalable Operations

All-in-one platform

  • User Portal + Admin Portal integrated
  • Wallet rules (Requester/Approver, M-of-N, tiered thresholds)
  • Expandable by business needs: coins, chains, workflows

How It Works

Five-step secure transaction flow

Step 1

Frontend Initiation

Requester initiates transaction per wallet permissions

Step 2

Frontend Authorization

Approver completes authorization per thresholds

Step 3

Backend Release

Supervisor + Auth App complete verification

Step 4

Air-gapped Signing

KMS/HSM signs offline (QR Code transfer)

Step 5

On-chain Broadcast

Signed transaction submitted to blockchain

Governance by Design

Role separation and multi-layer control

Frontend Roles

User Roles
Primary / Operating / View-only
Wallet Permissions
Requester / Approver / Viewer

Backend Roles

Admin Roles
AM / Supervisor / View-only
Verification Roles
Auth AM / Wallet Auth / Auth Officer / Auth Manager

Through role separation and multi-layer control design, reduce single-point risk and enhance internal control strength.

Use Cases

Applicable scenarios

Financial Institution Custody

Digital asset custody for banks, securities firms, and trust companies

High-value Asset Cold Storage

Cold storage and tiered approval for high-value assets

Regulatory Compliance

Institutional wallet operations meeting regulatory/audit requirements

RWA & Cross-border Payments

Custody infrastructure for RWA, cross-border payments, and more

Certifications & Compliance

Industry-leading security standards

SOC 2 Type I/II

Custody process & operations

Security Testing

Third-party gray-box testing

Insurance Support

SPECIE / CRIME underwriting

Licensed Operations

US, Hong Kong licensed custody

Upgrade custody from "usable" to "regulatable, auditable, scalable"

Contact DACC team for customized deployment and PoC planning