ERC-3643 Permissioned RWA Tokenization Compliance and Onchain Identity Infrastructure
A practical matrix for evaluating pricing, implementation friction, compliance scope, ecosystem fit, and hidden operational costs.
Provider matrix
Pricing opacity, integration tradeoffs, and technical fit summarized for fast vendor shortlisting.
Critical questions
FAQ schema is embedded for AI search and rich result discovery.
How does ERC-3643 enforce KYC transfer restrictions without hardcoding a whitelist inside the token contract?
ERC-3643-style implementations usually separate the token from the identity and compliance layers. A typical flow is: 1) the investor gets an onchain identity contract or identity record; 2) a trusted issuer such as a KYC provider attaches claims to that identity, for example KYC_PASSED, ACCREDITED_INVESTOR, US_PERSON_FALSE, EU_RESIDENT, or QUALIFIED_PURCHASER; 3) the token contract calls a compliance module before transfer; 4) the compliance module checks the identity registry, claim topics, trusted issuer signatures, country limits, investor caps, lockup periods, and sender/receiver eligibility; 5) only if canTransfer(from, to, amount) returns true does the token execute the transfer. This is better than a single mapping(address => bool) whitelist because it supports claim expiration, multiple KYC providers, jurisdiction-specific logic, and reusable identity across multiple assets.
ERC-3643 vs ERC-1400: which standard is better for tokenized securities and RWA funds?
ERC-1400 is an older security token standard family focused on partitions, document management, controller operations, and transfer validation. It is powerful but more complex and fragmented in implementation. ERC-3643 is more narrowly optimized for permissioned tokens using onchain identity, trusted issuers, claim topics, and modular compliance rules. If the issuer needs Ethereum-compatible permissioned ERC-20 behavior with reusable investor identity and pre-transfer compliance checks, ERC-3643 is usually easier to reason about. If the issuer needs partitioned securities, complex tranches, document references, and legacy security-token semantics, ERC-1400 may still be relevant. In practice, the choice depends less on the token standard name and more on whether the stack supports investor onboarding, claim expiration, forced transfers, freeze/recovery, secondary market restrictions, custody integration, and auditability.
What is the minimal smart contract architecture for a compliant tokenized treasury or private credit fund using ERC-3643?
A minimal architecture should include: 1) Token contract: ERC-20-compatible permissioned token with mint, burn, pause, freeze, and forced transfer controls limited to issuer/operator roles; 2) Identity Registry: maps wallet addresses to verified investor identities; 3) Trusted Issuer Registry: defines which KYC/AML providers or regulated entities can issue valid claims; 4) Claim Topics Registry: defines required claims such as KYC_PASSED, NON_SANCTIONED, ACCREDITED, JURISDICTION_ALLOWED, and SUBSCRIPTION_ACCEPTED; 5) Compliance Contract: implements transfer rules such as max investors, country restrictions, holding period, lockup, investor type, and per-wallet limits; 6) Agent/Operator Roles: allow regulated administrators to freeze compromised wallets, recover tokens after key loss, or force transfer under legal order; 7) Offchain Admin System: handles subscription docs, KYC refresh, claim issuance, redemption processing, NAV updates, and investor communications. The mistake to avoid is putting all compliance logic directly into the token contract, because rule changes then require risky upgrades or redeployments.