ID Verification- MPC uses multiple private key shards as opposed to a single private key, along with strong institutional-level functionality, and is designed to solve the financial security concerns of Web3 applications.
With Web3 product suite, our users can have two kinds of self-custody wallets, Asset Wallet and Web3 Wallet. Users can manage their assets while governing all interactions with Web3 applications in a multi-signature manner. Furthermore, with the Offline Recovery Tool, users can export their private key shards form the MPC network and recover the original private key.
Web3 Product Suite Details
Mobile App
Approve transactions anytime, anywhere, and manage your wallet more efficiently with the Mobile App.
The mobile app enables users to quickly add team members, assign members' permissions, configure team decision modes, and establish a standardized transaction approval flow for the team. we performs phishing site detection, contract authorization detection, and alerts our clients in real time when a risk is detected.
Browser Extension
Customers utilizing HCI products can connect to the Web3 application via the browser extension, submit transactions in the browser extension, perform multi-signature approvals through the mobile app, and generate signatures via an MPC multi-party computation to complete the upload.
There's no private key shading in the browser extension, so there is no need to be concerned about the hidden risk of private key theft.
Offline Recovery Tool
The offline recovery tool can recover the user's original private key when they are not connected to the network. We do not advise users to recover the original private key when connected to us.
APIs & SDKs (coming soon)
Customers who use APIs and SDKs for secondary development can initiate Web3 transactions automatically through APIs, customize automated trading strategies, and use mobile applications to manually approve signatures for uploading or generate signatures for uploading via the automated API Co-Singers.
Web Console (coming soon)
The Web console allows users to export detailed transaction signature histories, making reconciliation and auditing easier.
Web3 Product Suite Features & Benefits
Hardware Wallet Level of Security
We utilizes multiple MPC private key shards as opposed to a single private key. The private key is never stored on a physical device, but multiple shards calculate the signature result without ever being exposed. This provides both the security of a hardware wallet and the convenience of a hot wallet. The Safeheron plugin is used solely for connecting to Web3 applications and submitting transactions. The absence of private key shards in the plugin effectively eliminates the risk of private key shards being stolen.
Customers Have 100% Control of Their Assets
In contrast to traditional full custody services, places 100% control of assets in the hands of the customer, providing them with ease of mind to the risk of misuse and fraud.
Separate Wallet Usage and Asset Control
Through flexible permission allocation and multi-signature approvals, it is possible to achieve the separation of transaction creators and approvers. Team members no longer need to control a private key shard to initiate transactions, thus helping improve risk management for institution managers.
EOA Wallet address, With the Ability to Switch Between EVM Networks
Unlike Safe's multi-signature solution, which is not universal across all EVM networks, our EOA address solution is simple for customers to implement and eliminates the risk transfers to the wrong address due to inconsistent multi-signature addresses on different networks.
Robust Mobile Application
We offers a robust mobile service to accommodate the complex needs of today’s crypto industry. Customers can quickly complete over 95% of daily high-frequency tasks, such as initiating transfers and approving signatures using our mobile app, and complete complex low-frequency tasks through our web interface.
More Powerful and Flexible Multi-Sig Approval
The approval process not only supports multiple levels of n/m, but can also be combined with license assignment to create a more flexible and robust approval scheme.
Contract Interaction and Phishing Site Security Detection
We performs real-time phishing detection and contract approval detection during the mobile application signature approval process, and will alert users if a risk is detected.