Tokenized Deposits

JPMorgan Deposit Token

JPMorgan's tokenized deposit for commercial clients — distinct from Kinexys wholesale rails. Deposit tokens represent JPM commercial account balances, enabling programmable payments and 24/7 treasury operations within JPM's ecosystem.

Vendors

JPMorgan · Onyx

Compliance Center

JPM internal KYB at Identity + programmable payment terms at Negotiation. Single-bank model vs. Cari's multi-bank consortium.

Filter by shape:
|
C7 · UNKNOWNJPMorgan Deposit Token (Commercial)·5 stations(3 compliance, 2 infra)·jpmorgan · jpm-onyx
S1S2IDENTITYS3DISCOVERYS4NEGOTIATIONS5S6AUTHORIZATIONS7S8FINALITY01Bank Account03Sanctions02Attestation04Settlement05Filing
3+5 shape system
GatePre-condition — blocks if it failsMonitorConcurrent — observes without haltingObligationPost-settlement — reports after the factsolid = codedashed = policy
How to read this diagram
Each station on the rail represents a compliance or infrastructure event in the JPMorgan Deposit Token (Commercial) path. Hover any station to inspect it. The shape tells you what kind of event it is. The ring tells you how it's enforced.
Gate Monitor Obligation| Ingress Crossing Transform Settlement Venue
This path at a glance
5 stations across 5 of 8 segments. 3 are compliance checkpoints, 2 are infrastructure.
2 code-enforced3 policy-enforced
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKKINEXYS
L5 APPLICATIONJPM Access portal + JPM CIP file + JPM BSA/AML program
L4 ACCOUNTKinexys party-id ↔ JPM commercial DDA (1:1 with bank-side memo posting)

Step 1 · Commercial Client Identity (JPM Internal CIP)Policy-Enforced

"A JPM Treasury Services corporate client logging into the JPM Access portal — bank-grade due diligence already complete at relationship onboarding, ongoing monitoring under JPM's BSA/AML program."

The commercial client is an existing JPM customer with a complete CIP file (12 C.F.R. § 21.21), beneficial-ownership disclosure (31 C.F.R. § 1010.230), and ongoing-monitoring program coverage under JPM's BSA/AML framework.

The deposit token is a Kinexys party-id provisioned by JPM Treasury Services and bound to the customer's existing commercial DDA. Identity is JPM-internal — there is no consortium-bank coordination because there is no consortium; every participant in C7 is a JPM commercial customer.

L4 ACCOUNT (Kinexys party-id ↔ commercial DDA) + L5 APPLICATION (JPM Access portal + JPM CIP file) lit, policy-enforced. The single-bank model is the structural contrast with C1-C6 (Cari consortium): all attestation, all monitoring, all reconciliation runs at JPM.

Honesty marker: FDIC insurance follows the underlying deposit, not the token. The same pattern as Cari (C1) — the JPM commercial DDA carries FDIC pass-through up to category limits ($250K / depositor / institution / ownership-category); the deposit token is a ledger representation, not a separate insured instrument. Most C7 commercial clients carry balances well above FDIC limits, so insured-status is rarely the operative depositor-protection consideration; JPM's institutional credit standing and the bank's prudential framework (SLR, LCR, Basel III capital) carry the actual operational protection for institutional depositors.
Counterparty
JPM Treasury Services + JPM internal CIP
Latency
Real-time access · CIP attestation pre-existing
Finality
N/A — onboarding pre-date
Vendors
JPM Access portal · JPM Treasury Services onboarding · JPM BSA/AML program (NICE Actimize · proprietary — VERIFY) · Kinexys party-id provisioning
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKKINEXYS
L5 APPLICATIONCustomer corporate-authorization workflow + JPM Onyx programmable-payment contract-deployment surface
L3 EXECUTIONKinexys programmable-payment smart contract (time-lock · oracle-conditional · multi-sig · chained-release patterns)
◆ Enforcement Line — code-enforced at this layer

Step 2 · Programmable Payment Terms (Conditional Logic)Code-EnforcedINGESTDETECTALERT

"An escrow agreement with conditional release triggers — except encoded as smart-contract logic on the bank's permissioned ledger and released atomically on condition satisfaction."

JPM commercial clients can encode conditional payment terms directly in the Kinexys settlement contract. Common patterns: time-locked release (payment fires at a specific datetime), oracle-conditional release (payment fires when an external data oracle confirms a delivery event or a price condition), multi-signature release (payment fires when N-of-M corporate signatories approve), and chained-release (payment B fires only after payment A confirms).

The programmable-payment surface is the structural innovation that distinguishes C7 from a standard JPM Treasury Services wire; without programmability, the customer can already move funds via Kinexys (cf. W4K) or Fedwire. The terms encoding is the moment when the payment intent becomes machine-enforced rather than operations-team-managed.

L3 EXECUTION (programmable-payment contract) + L5 APPLICATION (customer authorization workflow + JPM contract-deployment surface) lit, code-enforced. C13 (market integrity) and C16 (programmable compliance) both attach — the payment logic IS the compliance artifact.

Counterparty
JPM Onyx programmable-payment contract + customer authorization
Latency
One-time encoding · execution per trigger
Finality
Term encoding final on-chain · execution conditional
Vendors
JPM Onyx programmable-payment contract · Kinexys settlement contract · External data oracles (Chainlink · custom JPM-internal oracles · VERIFY supported integrations)
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKKINEXYS
L5 APPLICATIONJPM internal compliance pipeline (NICE Actimize · proprietary — VERIFY) — single-bank outbound + inbound screening
L3 EXECUTIONKinexys settlement contract — compliance-result gate (settlement halts on internal screen failure)
◆ Enforcement Line — mixed code- and policy-enforced

Step 3 · JPM Compliance Pipeline (Internal Screen)Mixed EnforcementINGESTDETECTALERT

"JPM's internal correspondent-banking compliance desk reviewing an outbound payment — single-institution screening, all parties known to JPM."

JPM's internal compliance pipeline runs the standard outbound and inbound screens on every C7 payment. Because both counterparties are JPM commercial customers, the screening is single-bank: outbound sanctions check on the originating customer, inbound check on the receiving customer, structuring/velocity heuristics across both sides, Travel Rule data exchange (internal to JPM and therefore an operational simplification — no external IVMS101 packaging needed).

The Kinexys settlement contract enforces the compliance result code-side: payment fires only after JPM's compliance pipeline returns clear. Mixed enforcement: bank-internal screening is policy-enforced, on-chain settlement gate is code-enforced.

L3 EXECUTION (settlement-contract compliance gate) + L5 APPLICATION (JPM compliance pipeline) lit. The single-bank model collapses what would be cross-bank Travel Rule packaging in C2/C3 to an internal data exchange.

Counterparty
JPM internal compliance pipeline + Kinexys settlement contract
Latency
<1s · internal pipeline
Finality
Pre-condition — halts on any internal screen failure
Vendors
JPM internal compliance pipeline (NICE Actimize · proprietary — VERIFY) · Kinexys settlement contract
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKKINEXYS
L4 ACCOUNTOriginating + receiving JPM commercial DDAs (atomic debit/credit on Kinexys + symmetric GL memo entries)
L3 EXECUTIONKinexys settlement contract — atomic intra-JPM transfer execution
L2 CONSENSUSKinexys BFT consensus (JPM-operated validators)
L1 NETWORKKinexys network — JPM-operated permissioned ledger transport
◆ Enforcement Line — code-enforced at this layer

Step 4 · Atomic Settlement (JPM Coin on Kinexys)Code-Enforced

"An intra-bank book transfer between two JPM commercial DDAs — except executed on the Kinexys ledger with cryptographic settlement record and conditional-trigger composability."

On condition satisfaction (cf. step 2's programmable terms) and clear compliance (cf. step 3's screen), the Kinexys settlement contract executes the atomic transfer. Originating customer's JPM Coin balance debited; receiving customer's balance credited; both customers' JPM commercial DDAs reflect the symmetric memo entries on JPM's general ledger.

The settlement is a JPM book transfer at the GL layer — value never leaves JPM's balance sheet because both parties bank with JPM. This is the single-bank operational simplification: no external counterparty risk, no inter-bank settlement cycle, no Fedwire window dependency.

L1 NETWORK · L2 CONSENSUS · L3 EXECUTION · L4 ACCOUNT all lit. Final on Kinexys consensus near-instantaneously.

Counterparty
Kinexys settlement contract + JPM general ledger
Latency
Sub-second
Finality
Final on Kinexys · EOD GL reconciliation
Vendors
Kinexys settlement contract · JPM general ledger memo-entry interface · JPM-operated validator nodes
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKKINEXYS
L5 APPLICATIONJPM general ledger + JPM Treasury Services statement surface + OCC examination interface

Step 5 · Reporting & Recordkeeping (JPM Internal)Policy-EnforcedINGESTDETECTALERT

"A JPM internal reconciliation between two commercial-DDA general-ledger entries — except the canonical record is the Kinexys cryptographic transaction hash plus the GL memo entries."

Each settlement's record sits in JPM's internal books: the Kinexys transaction hash anchors the on-chain leg; the JPM general-ledger memo entries reflect the symmetric DDA debits and credits.

C11 (recordkeeping) is satisfied at JPM under existing 12 C.F.R. §§ 12.1, 12.3 (records of account); C12 (independent audit trail) is satisfied because the Kinexys cryptographic record and the GL memo entries are independently cross-verifiable.

Reporting to the customer is via the standard JPM Treasury Services statement surface; reporting to regulators (OCC primary supervisor for JPM Chase Bank N.A.) is via standard examination-cycle infrastructure. L5 APPLICATION lit, policy-enforced. Single-bank model means the reporting story is operationally simpler than any consortium pattern — JPM owns every leg of the audit trail.

Counterparty
JPM GL + JPM Treasury Services reporting + OCC interface
Latency
Real-time queryable
Finality
Final · GL + Kinexys hash canonical
Vendors
JPM general ledger · JPM Treasury Services statement surface · OCC examination interface

Resolved 5 steps across 0 chain(s). 0 threshold(s) triggered. Frameworks: Common Reporting Standard / FATCA.

Coverage notes: 5 disclosed gap(s).