Run and verify code for your application or service, and the data it uses and produces.

Your process execution, code, the data input & output is being certified and make available for an independent verification audit trail using Blockchain as a core layer of data protection that removes risk of fraud.

You and your customers will
Ensure the authenticity of business-critical data

Eliminates the need for a third-party guarantee of data immutabilty.

Achieve regulatory transparency

Reduces the cost and time required to conduct an audit.

Mitigate security risks

Adds a layer of data security that’s powered by mathematical proof.

How it works
Upload your code to Kensei Compute or write code in Kensei’s Compute code editor
Set up your code to trigger from other KENSEI services, HTTP endpoints, or in-app activity
KENSEI runs your code only when triggered, using only the compute resources needed.
Allow 3rd party auditors to audit your data independently upon receiving access rights from you
Upload your data into Kensei Connect via the API
Example use cases
What can you build with Kensei Compute? Learn more about the use cases below:
Secure asset transfer
Kensei Compute enables secure asset transfer protocols to build on the foundations of reliable, tamper-evident processes. Any transfer can be easily verified independently by a third-party using Kensei’s verifiable computation model.
User sends funds aligned to business contract
User receives funds according to business contract
KENSEI runs your code only when triggered, using only the compute resources needed.
Third party verifies business contract is met by both parties
Verifiable gaming (Provably-fair gaming)
Trustworthy gaming platforms can be built on top of Kensei compute. Integrating with Kensei Compute allows your gaming logic to be executed in a dependable way. Any uncertainties or disputes over gaming events can be easily resolved by replaying Kensei’s computational audit log.
Gaming engine integrates with Kensei compute
KENSEI runs your code only when triggered, using only the compute resources needed.
Regulatory body verifies traffic information
Benefits of simplified development
No servers to manage
KENSEI Compute automatically runs your code without requiring you to provision or manage infrastructure. Just write the code and upload it to Compute either as a ZIP file or container image.
Consistent performance at any scale
With KENSEI Compute, you can optimize your code execution time by choosing the right memory size for your function. You can also keep your functions initialized and hyper-ready to respond within double digit milliseconds by enabling Provisioned Concurrency.
Cost optimized with millisecond metering
With KENSEI Compute, you only pay for the compute time you consume, so you’re never paying for over-provisioned infrastructure. You are charged for every millisecond your code executes and the number of times your code is triggered.
Continuous scaling
KENSEI Compute automatically scales your application by running code in response to each event. Your code runs in parallel and processes each trigger individually, scaling precisely with the size of the workload, from a few requests per day, to hundreds of thousands per second.
Key Features
Blockchain Native Capabilites
Kensei Connect utilises native blockchain capabilities enabling you to notarise sequentially and in parallel the multiple streams of you data, that can easily be verified by any 3rd party
Independent verification
Verify notarised files either throught the build-in interface or via public sources. As long as there’s access to the blockchain, anyone can check from any device at any time.
Smooth integration via API
KENSEI Certify API enables tight integration with any appliction with the ability to tie the service’s backend into a user interface
Notarize and certify documents and data.
Part of Kensei Platform
Discover other products that exist on Kensei platform. Built for Managed Service Providers to ensure data and computational integrity.
Notarize and certify documents and
Find out more  →
Certify sequential, related data and the associated interconnections.
Find out more  →