Travel Rule Integration
CRYMBO Connect natively supports Travel Rule compliance by enabling secure exchange of Personally Identifiable Information (PII) between Virtual Asset Service Providers (VASPs), without exposing data on-chain.
The architecture is built to meet FATF and MiCA requirements while preserving privacy, scalability, and decentralization.
🔐 How It Works
- Sender broadcasts transaction on-chain
- Oracle emits
PIIRequested
event - Receiver submits encrypted PII off-chain
- Oracle emits
PIIProvided
and verifies the flow - Compliance status is recorded and events are emitted
📤 Submitting Encrypted PII
Endpoint:
POST /deposits/pii
Payload:
{
"network": "POLYGON",
"hash": "0xf7a4...4762",
"pii": "base64-encoded-encrypted-payload"
}
hash
refers to the blockchain transactionpii
is an encrypted blob (AES, hybrid, or ZK format)
Only authorized receivers or Oracle validators can decrypt the content.
🔍 Receiving PII (for the Oracle)
Endpoint:
GET /deposits/:id/pii
This endpoint is only accessible to the destination VASP or authorized validator.
🧠 Compliance Events
You can listen for the following events to orchestrate your Travel Rule flows:
Event | Description |
---|---|
PIIRequested | Oracle signals that PII is needed |
PIIProvided | Receiver has submitted the encrypted PII |
TransactionCompliant | Transaction passed validation checks |
✅ Policy Integration
Travel Rule checks can be enforced in business logic by evaluating:
- Wallet metadata (e.g.
IS_VASP = true
) - Risk scores (e.g.
RISK_SCORE > 80
) - Transfer origin/destination (cross-border, high-risk countries)
- PII delivery status (
PIIProvided
must occur beforefundsAvailable = true
)
🔐 Encryption Format
Encryption may follow hybrid encryption or ZK-wrapped payloads. A typical structure includes:
{
"fullName": "John Doe",
"idNumber": "XYZ12345",
"address": "12 Chain St, Berlin, DE"
}
The above structure is encrypted off-chain before submission.
This design allows your system to comply with global regulatory expectations while maintaining a decentralized architecture and user privacy.