<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
About
About
Learn more about our mission, explore career opportunities, and access our resources. Discover how we’re shaping the future of cybersecurity and how you can be part of it.
Contact us
  • There are no suggestions because the search field is empty.

Challenge

Modern financial and digital asset applications require more than basic key usage. They increasingly depend on fine-grained policies and complex workflows.

Implementing these workflows directly inside each application is complex. They require state management, authorization collection, and reliable coordination, while ensuring that all security-critical checks remain inside the HSM.

Solution

The Securosys Transaction Security Broker (TSB) simplifies the implementation of advanced authorization and key-usage workflows and how applications interact with the Primus HSM. TSB is a Java-based service that communicates with the HSM over JCE while exposing a language-agnostic REST API that applications can use without installing client-side libraries. All cryptographic operations and security-critical checks remain inside the HSM, while TSB orchestrates request handling, approval logic, and workflow state.

Approvals can be provided using signing keys held on crypto tokens, in software, or through the Securosys Authorization App. The Securosys Authorization App provides approvers with a simple interface to receive notifications, review requests, and submit approvals. TSB manages communication with the app and collects approvals before forwarding authorized operations to the HSM.

TSB supports two usage modes. In its basic mode, it acts as a REST translation layer, enabling applications to perform signing, decryption, and key management operations through REST calls. In its workflow mode, TSB manages Smart Key Attribute (SKA) approval processes by collecting authorizations, coordinating multi-step workflows, and forwarding completed authorization data to the HSM. This separation ensures that all the approvals required by the SKA policy have been gathered together by TSB outside the HSM, while only the HSM itself enforces all policies

 

Key Benefits

API-circle-b&w
Simple REST API Integration
TSB provides a language-agnostic REST API to access Primus HSM functionality without client-side libraries. This simplifies integration with modern applications and services.
key-circle-people-b&w
Streamlined SKA Workflow Orchestration
TSB manages approval collection and workflow state for SKA-enabled keys, reducing complexity for applications while ensuring that all authorization checks remain inside the HSM.
locket-circle-blocks-b&w
Scalable Deployment Options
TSB can run as multiple container instances connected to the same HSM partition, enabling horizontal scaling and integration with high-availability HSM clusters.
vault-b&w
Consistent Hardware-Based Security
All cryptographic operations and SKA policy validations occur inside the secure physical boundary of the Primus HSM, ensuring key protection with tamper-resistant hardware at every stage.
blocks-lock-b&w
Flexible Deployment Inside or Outside the HSM
TSB can be deployed on external platforms or within the HSM as VaultContainers, offering architectural flexibility based on operational and regulatory needs.

Why TSB vs. Multi-signature?

  • Works with all supported crypto assets — independent of blockchain signature formats
  • Lower fees and better privacy due to single-signature on-chain addresses
  • Decouples key ownership from key usage for operational and regulatory flexibility
  • Supports advanced policy models including time-restrictions

Why TSB vs. Multi-Party Computation (MPC)?

  • Supports time-based workflows
  • Key material stays hardware-protected
  • Redundant deployment without increasing key-exposure risk
  • Simpler lifecycle management and operational model

 

Approval Process with SKA — How It Works

The approval process applies when using Smart Key Attributes with TSB.

To support SKA workflows, the Securosys Authorization App enables approvers to receive notifications, review pending tasks, and provide approvals directly from their devices. The app integrates with TSB, which orchestrates the workflow while the HSM performs all policy enforcement.

Step 1
Request Approval
A business application requests a key operation (e.g., signing) via TSB.
Step 2
Policy Retrieval
The HSM returns the SKA policy associated with the key, with a signed timestamp.
Step 3
Broadcast Request
The application fetches the approval request from TSB and broadcasts it to approvers.
Step 4
Collect Approvals
TSB collects approvals until the key’s SKA rules are met.
Step 5
Authorization Validation
TSB forwards the payload and collected approvals to the HSM.The HSM validates authorization data according to SKA attributes.
Step 6
Final Signature
If all conditions are met, the HSM signs the payload and returns the signature to TSB.

Use Cases

colourful-background-patterns-13 Multi-Quorum Transaction Approval Enable m-of-n or multi-layer approval flows for high-value financial transactions, ensuring controlled and verifiable authorization.
colourful-background-patterns-11 Time-Locked Transaction Security Enforce time-based policies to delay or restrict key operations, reducing operational risk.
colourful-background-patterns-14 Hybrid Approval Systems Combine device-based approvals, user roles, or multi-device workflows with HSM-based key protection.
colourful-background-patterns-8 Policy-Driven Key Usage Control Define complex, granular SKA policies for key usage and enforce them through TSB for digital assets, financial operations, and regulated environments.