The T-REX Security Token Standard
The T-REX, (The Token for Regulated EXchanges), is the institutional-grade security token standard to enable the compliant ownership and transfer of securities on a shared infrastructure.
The T-REX, (The Token for Regulated EXchanges), is the institutional-grade security token standard to enable the compliant ownership and transfer of securities on a shared infrastructure.
The source code is well crafted and follows security practices compliant with the architecture described in the whitepaper.
The infrastructure used in private markets consists of many disconnected and siloed service providers. Due to market fragmentation, analogue and arduous processes have been implemented to enforce trust. This lack of infrastructure leads to poor asset transferability and little to no liquidity.
The T-REX protocol allows market actors to apply trust, compliance and control on a shared infrastructure and achieve enhanced transferability. Actors utilizing the T-REX can unlock the tremendous benefits that come from adopting a high functioning infrastructure and improve the liquidity of securities.
Transfer rules are embedded in the securities
Issuers/agents control the tokens, even with investor direct ownership
Reduce fees with T+0 automated onchain settlement
Unlock high functioning assets and improve liquidity
The issuer keeps control of the securities and can mint, burn, block or force transfers at any time
Rules and responsibilities are coded into the tokens to ensure compliance across the lifecycle
Add additional smart contracts or upgrade the existing ones at any time
Assign roles and permissions for market participants
Enable automation and perform corporate actions on demand
Access position and transaction reports at any time and enable automated updates
Fees are drastically reduced with investor self-custody
Investors can easily assess the value of their portfolio
Upon proof of identity, lost tokens can be recovered in a new wallet
Validated identities can be used across multiple security offerings
Digital portal for investors to manage their assets after the issuance
Issuers can directly communicate with their investors, removing middlemen
With the T-REX, the compliance is programmed into the security token. Transfers to ineligible investors are impossible through the fast and secure validation system.
Yes, the security standard is open source. See the Github here. Tokeny provides the APIs and software to deploy and manage easily these security tokens.
Yes, reliable companies support this standard and it has been externally audited by cyber security firm Kaspersky. It is the most proven protocol with two years of development and evolution.
Via the investor and offering rules that are checked in every transfer. Investor rules are enabled with ONCHAINID and offering rules are enforced with the compliant T-REX smart contract templates. Also, there are many built-in functions to control the tokens and assign roles and permissions to different stakeholders.
Yes, the T-REX is ERC-20 compatible and is therefore interoperable with Ethereum and therefore with the majority of DeFi applications.
The T-REX Protocol manages compliance by leveraging the security of the blockchain with an automatic validator system. This system applies the transfer rules related to users (identities) and those related to the offering. The issuer of the securities, or its agent, always keeps control of the tokens and the transfers. ERC1400 is another approach where each trade must to be validated by a specific key generated offchain.
We firmly believe the future of finance will operate on public blockchains but by applying control and compliance through permissioned tokens and onchain identities. This is exactly what the T-REX is providing. Private blockchains will struggle to progress because they defeat the purpose of what blockchain was set out to do in terms of removing fragmentation.
Modernize your securities with the leading security token standard, the T-REX Protocol.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies should be enabled at all times so that we can save your preferences for cookie settings. These cookies do not store any personally identifiable information.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
Our website uses third-party cookies to capture and remember user preferences by collecting data such as IP addresses, cookies identifiers and website activities to improve the overall experience of your visit. If you do not accept, neither our advertising partner nor its partners will serve you personalized advertising. You may still receive advertising that is not targeted or is served by other third parties that are not affiliated with Tokeny Solutions. You can contact at policy@tokeny.com if you no longer want to receive targeted advertising from us.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
More information about our Privacy Policy