セキュリティーセンター 今すぐ入力

クリプト金庫

Protect and store your crypto assets with a safe and approved Crypto Depository

With BCB Crypto Depository Service Institutional Investors, business and private customers are protected and can securely work with crypto assets market.

BCB offers high-level security custodian and depository services for crypto assets.

We provide a complex solution solving such existing problems as:

Cryptocurrencies are a rapidly growing global market but there is a lack of compliant custodian and depository services having a legitimate status and a proof that what they do is in line with financial regulator’s requirements. What our clients need is a technological platform and above all - record keeping and security that we can offer.

BCB customers enjoy safe environment that a Financial Institution can provide and where all parties are trustworthy and meet AML and KYC requirements.

Serious investors looking for a legal entry into the market that looks very lucrative need a trusted and reliable business-service. The semi-legal status many crypto assets have is unacceptable. BCB eliminates the risks of theft and numerous vulnerabilities that crypto assets are often exposed to.

Recently crypto assets market has 2 main options for your crypto assets storage – ‘hot’ or ‘cold’ wallets. We would like to briefly describe these options and explain why they are not the safest solution.

BCB Crypto Depository Service offers a safe and reliable storage for your crypto assets.

BCB Crypto Depository is an independent security system which is finely adjusted and eliminates any risk of human error, fire, flood, hacking, cyber-attack threats and theft that a hot or cold wallet is exposed to.

These metal plates are designed to have a randomly generated key stamped onto them to allow recovery of a certain part of a BIP32 seed. Whether for use with a software wallet, a hardware wallet or a special BCB crypto transactional system, having the recovery passphrase stamped onto corrosion-proof and fireproof metal plates minimizes the risk of loss of private keys.

One plate always contains only a part of a key and plates are kept separately in different safe boxes.

Access to the keys and their movement is being strictly controlled using best standards and practices developed by such reputable facilities as the US Mint and UK Royal Mint, enforced by ongoing security enhancement and modern technology.

All these security levels and our other systems and methods make the keys turnover system impossible to bypass using any digital or hardware tools, and protected even from attacks of armed groups.

Depository’s advanced safety is additionally enhanced through special digital storage tokens usage. These storage tokens are digital devices used for protection during the encrypting and decrypting process for the keys stored on the plates. They protect the codes with asymmetrical cryptography using large numbers that have been paired together but are not identical.

Best storage practices are also accompanied by the innovative technology and standards such as our newest DRM hardware where we have adapted certain DRM solutions for private keys protection.

All BCB servers, systems and staff use strictly confidential and encrypted secure communication channels.

BCB content protection system is enforced with DRM chips and Modchips making it even harder to bypass.

The connectivity entry point into the BCB infrastructure is also secured by a Triple Demilitarized Zone (DMZ) with a strong form of encryption that disallows sensitive information to be transmitted over untrusted networks, where the DMZs are connected through heterogeneous networks.

We adhere to the principles that allow us to provide confidence and IT Security:

  1. In our security systems we never use standard existing methods that attackers could possibly be aware of.
  2. We do not use Internet networks.
  3. We do not use any standard equipment.
  4. We only use high-tech secure military equipment. To have an idea about the level of protection it provides you can refer to the award-winning Secure Communications System by Northrop Grumman.

Nevertheless we are not allowed to disclose the types of equipment used at BCB for the security reasons.

BCB would never miss a single chance to acquire an additional security level. And we would do anything to ensure safety.

Our securely located underground data centres provide data duplication and full backups.

Crypto-shredding system immediately activated at the moment when an attack is suspected provides self-destruction of the keys and storages and communication data channel cutting before the encryption protocol used may possibly become vulnerable.

BCB’s diverse and experienced security team has experts who have been successfully providing the missile systems security. And they insure that all means of communication have their place and rationale in the normal course of everyday operations and are highly protected.

All our data channels are secured with special keys that are rotated every two hours and in a case of any unauthorised access attempt all the channels become unavailable.

BCB storage facilities are equipped with immediate Alert Broadcasting System and latest Live Streaming Surveillance System. You can check the information on CAYIN CMS servers to have an idea about such systems.

Server CMS 40 and Server CMS 80
While BCB cannot disclose the systems and equipment brands, and the information provided is for reference only.

As we cannot use standard PCs and laptops for operations of any level, and we only use special crypto client workstations with a hardened and intensively security-evaluated Unix-like system platform for tougher environments and military applications.

Our security system ensures usage of different operating systems. The key channels are protected using OpenBSD being the number one OS in the industry for security and using embedded cryptography.

BCB takes security issues VERY seriously and there is no such detail in the cyber security world that could pass without our experts’ close attention or direct involvement.

Our systems’ performance, stability and confidence is additionally supported by the most reliable network security solutions. For your reference you can check such solutions as pfSense products and firewalls. The names are provided for reference only, and BCB cannot disclose the exact brands or systems used.

BCB operations leverage the power of the leading provider of data center, cybersecurity, and infrastructure services, allowing our data to move securely among the most active finance and trade centers in North America, Asia and Europe. For security reasons we shall not disclose our direct partners. But for your reference you can check on such providers as Cyxtera data centers.

Our goal is to eliminate any type of risks including legal, compliance and other risks such as human error.

According to the BCB policy, and global infrastructure strategy, all transactions with the client’s assets are performed strictly on behalf of our client, with necessary authorisation and instructions from the crypto assets owner. We execute our clients’ orders in a clear and transparent manner, and do not use any hidden schemes such as leverage, or short term high risk loans or expose our clients’ funds to other risks.

There are strict legal requirements, best practices and standards that we have to comply with, and which prevent the Financial Institutions from hiring people who may not be appropriate for their role in this important industry. Along with ongoing staff education BCB provides careful and detailed background checks, risk scoring and gathers additional information on its employees using leading intelligence data suppliers, authorities and other sources.

Being a strong Financial Institution focused on safety in the crypto asset industry BCB provides seamless customer experience and exceptional security at all levels.

TOP