GH GambleHub

Travel Rule for crypto payments

1) What is the Travel Rule and why is it needed

Travel Rule is a regulatory requirement for virtual asset providers (VASPs) to exchange sender and recipient identities when transferring crypto assets. The goal: to reduce AML/CTF risks, simplify investigations and increase the transparency of cross-VASP transfers, while maintaining the operability of the online infrastructure.

Key ideas:
  • The data "travels" with the translation (off-chain communication channel VASP↔VASP).
  • Requirements and thresholds vary by jurisdiction; often the threshold is close to ~ 1000 (equivalent), but in a number of modes it applies to smaller amounts - fix the local norm in your policy.
  • Requirements distinguish between hosted (custodial) and unhosted (independent) wallets.

2) Objects and areas of application

VASP → VASP (hosted ↔ hosted): full exchange of data according to the standard (preferably before online broadcast).

VASP → Unhosted: collection/verification of information about the addressee and origin of funds under the local RBA policy; there is no exchange with the "counterparty-VASP."

Cross-border: Use Discovery/Directory and trust agreements to find a counterparty and secure channel.

3) What data is transmitted (minimum composition)

About Originator:
  • Name (or name. company), unique identifier of the customer (from your system),
  • Address/country or date of birth (country-specific),
  • Account/wallet number (internal ID/address),
  • Contacts (if required), VASP ID (LEI/BIC/Reg. number - where applicable).
About Beneficiary:
  • Name (if the recipient is in another VASP and verified),
  • Account/Wallet ID at beneficiary-VASP,
  • When unhosted - information collected from the client according to your RBA policy.
About translation:
  • Asset/network (BTC, ETH/chain), amount, timestamp,
  • Payment/Transfer ID, reference for TAC/sanction screening,
  • ID of the Travel Rule session/message.
💡 It is convenient to normalize the field schema through the IVMS101: a single dictionary of attributes for messages between providers.

4) Exchange standards and protocols

IVMS101 - data model (what and how to name).
TRISA/TRP/OpenVASP - network protocols and "trust networks" (PKI, mTLS, VASP directories, routing, delivery confirmation).
Commercial hubs/aggregators can implement interoperability (Gateway approach) and Discovery.

Recommendation: abstract the transport (Adapter layer) and store IVMS101 as a "canonical model" in order to freely change the provider/protocol without breaking the API.

5) Implementation architecture (reference)

Components:

1. Travel Rule Gateway (microservice): receiving/sending IVMS101 messages, signature/encryption, retrays, quotas.

2. Directory/Discovery: search for counter-VASP (registry, PKI, trust policy).

3. KYT/Sanctions Engine: address/exchange/cluster screening, pre-shipment risk assessment.

4. Compliance Engine (RBA): allow/hold/reject/request for additional data.

5. Case Management: cases, attachments, SLAs, escalations (L1/L2/L3).

6. PII Vault: secure storage of personal data (encryption, tokenization, RBAC, audit).

Flow (simplified):

1. The client creates a transfer → 2) TAC/pre-check sanctions → 3) Counterparty discovery → 4) Exchange of IVMS101 (before onchen) → 5) Decision (allow/hold) → 6) Onchein-broadcast → 7) Post-factum reporting/logging.

6) Unhosted wallets: politics and checks

Collection of information about the counterparty from the client (name/country/relation), confirmation of ownership of the address (signature with a message, small "proof transfer," verification on the exchange).
Risk rules: ban/limits for addresses with high KYT risk (mixers, "dark" markets, sanctions clusters), ban P2P sites without KYC according to your policy.
Address book/whitelisting with TTL and review.

7) Integration with TAC/Sanctions and AML

KYT (Know Your Transaction): risk assessment of addresses/exchanges, connections to N-hops with "bad" clusters, volume/route anomalies.
Sanctions: client/counterparty screening (KYC/KYB) and infrastructure (exchanges, custodians).
Positive risk → hold, document request (SoF/SoW) and/or rejection, if necessary - SAR/STR.

8) Data and privacy (GDPR/security)

Minimization: keep only the required Travel Rule fields; Separate the PII from the payment PANs/keys.
Encryption: at rest (KMS/HSM) and in transit (mTLS), key rotation.
Access: strict RBAC, action log, need-to-know principle.
Retention: by law of jurisdiction (often 5 + years); automatic expiration and deletion reports.
DSR: access/remediation/deletion procedures where applicable.

9) SLA, Retrays and Degradation

Processing SLAs (landmarks):
  • Pre-check (KUT/sanctions): ≤ 5-15 c p95.
  • Discovery + Exchange (VASP↔VASP): ≤ 60-120 c p95 (including retrays).
  • Solution (allow/hold/reject): ≤ 2-5 min p95 for auto cases; manual review High-risk - ≤ 4 hours.
Retrai/Feilover:
  • Exponential backoff + jitter; alternative endpoints.
  • Sunrise problem (counterparty does not support Travel Rule): RBA exceptions/limits, manual exchange over encrypted channel (if allowed by policy/law) or refusal.

10) UX patterns (not breaking conversion)

Prepopulation of recipient data for frequent transfers (address book).

Clear messages: "Address confirmation required "/" Recipient data needed to comply with rule."

Context checks (address signature, micro-translation) with step-by-step prompts.
Statuses and hold/check timers, transparent waits.
Alternatives: "Get on the stock exchange with KYC" if unhosted fails.

11) Metrics and quality control

Compliance:
  • Travel Rule coverage% (the share of VASP↔VASP transfers with a successful exchange IVMS101).
  • Share of unhosted with passed address verification and SoF (by threshold).
  • SLA hit rate by exchange/solutions; share of manual cases.
Risk:
  • KYT high-risk rate, sanctions refusals, SAR-conversion.
  • Repeated alerts by addresses/clusters, share "false positive" by KYT.
Business/UX:
  • Time to transfer p50/p95, refusal due to Travel Rule (impact), conversion of repeated transfers (address book).

12) Decision matrix (sketch)

ScenarioActionComment
VASP↔VASP, successful IVMS101 exchange, KYT okAllowOnchain immediately
VASP not found/not respondingHold/RetryBackoff; notify customer
Unhosted, KYT average, there is proof of ownershipAllow/LimitLimits on amount/frequency
Unhosted, KYT high/sanctionsReject & EscalateCompliance, SAR/STR by RBA
Data incomplete/inconsistentNeed MoreRequest Fields/Documents

13) Anti-patterns

Sending online before the end of the VASP↔VASP data exchange (in modes where it is required before translation).
"Deaf" blocking of all unhosted without RBA exceptions and address verification.
Lack of Discovery/Directory → unstable delivery and frequent false hold.
Storage of redundant PII without target/retension; undivided logs and PII.
A rigid tie for one protocol provider without abstraction (vendor lock-in).

14) Implementation checklist

  • Travel Rule policy: jurisdictions, thresholds, hosted/unhosted, RBA exceptions.
  • Canonical IVMS101 model and Adapter layer under TRISA/TRP/OpenVASP.
  • Directory/Discovery и PKI/mTLS; trusted VASP management.
  • Integration of TAC/sanctions into pre-check; hold/reject rules.
  • PII Vault: encryption, RBAC, auditing, retention/DSR.
  • SLA/retrays/alerts, dashboards of metrics; degradation playbooks.
  • Processes for unhosted: address verification, SoF requests, whitelisting.
  • Case management and communication templates; SAR/STR procedures.
  • Test benches: emulation of a VASP counterparty, failure scripts, load test.
  • Payments/Risk/Compliance/Support training and regular drills.

15) Summary

Travel Rule is not "about crypt," but about operational-secure data exchange between VASP. Build a gateway with IVMS101 as a canonical model, connect Discovery/Directory, integrate TAC/sanctions and RBA solutions, protect PII and specify understandable SLAs. Then VASP↔VASP transfers and working with unhosted addresses will be fast, compliant and will not destroy the conversion.

Contact

Get in Touch

Reach out with any questions or support needs.We are always ready to help!

Start Integration

Email is required. Telegram or WhatsApp — optional.

Your Name optional
Email optional
Subject optional
Message optional
Telegram optional
@
If you include Telegram — we will reply there as well, in addition to Email.
WhatsApp optional
Format: +country code and number (e.g., +380XXXXXXXXX).

By clicking this button, you agree to data processing.