Skip to Content

Comparative advantages over current biometric methods

The Veintree system offers authentication based on individual physical elements, yet in several aspects, it differs from other biometric methods. Here are the main features

Contact us

Non-traceability

Producing a model of the invisible aspects of the venous networks under your skin, and of the observations linked to blood flow, is an almost impossible task tp accomplish. 

If we say "almost" impossible, it is just to be on the safe side. And in any case, such attempts would be extremely time-consuming and expensive, and could only with your cooperation.

No biometric database

The absence of reference biometric databases is Veintree's second totally differenciating aspect, especially when you consider the archiving methods used by some of the best-known biometric identification solutions.
Veintree's secure servers do not store any biometric data. No reference databases are used, no image comparisons are made, no biometrics are archived.

All your data is in your hands

You may revoke your own digital locks, as well as access to any associated services at any time. 
You are the sole owner of your data and actions, the only person who decides how to manage the authorized access to the services that you use.

Non-comparative recognition of 
the hand's venous network

Authenticating individuals through their hand's venous network bypasses the disadvantages of other biometric solutions, since this method is contactless, unique, unfalsifiable, timeless, and does not refere to a biometric database for comparison needs. 
A sensor detects the venous network and blood flow within your palm, patented algorithms generates a temporary encrypted code (for the time it takes to authenticate you), and then deletes all biometric references. 
Your hands are your locks, your veins are your invisible keys

Beyond these features, Veintree's encrypted code makes all known forms of hacking, copying and falsification inoperable. 
To all this, must be added a level of protection that is resistant to quantum computing, as certified by NIST (National Institute of Standards and Technology).