Biometrics' limits and the innovation of Veintree technology

Biometrics, with their promise of security and convenience, have taken a considerable place in our lives. From fingerprints and facial recognition to voice and iris recognition, this technology is now ubiquitous in our security systems, mobile devices, and much more.

However, it is essential to recognize that there are limits to the use of biometrics. All vulnerabilities are based on the fact that biometrics involve the prior registration of personal data in a database, and later on, their direct comparison at the moment of biometric verification. If this personal data can be collected by other means, then it becomes traceable and can be used to impersonate someone by fooling biometric technology.

Here are some of the limitations of biometrics:

=> Vulnerability to tampering: Biometrics can be circumvented with certain techniques that have become increasingly sophisticated. For example, the use of artificial fingerprints to trick scanners or the use of masks to fool facial recognition systems. Additionally, generative AI is already capable of fooling biometrics… and it will continue to do so more effectively in the future.

=> Vulnerability to data theft: Biometric data, whether encrypted or not, is extremely difficult to recover once compromised. Unlike a password or PIN, you cannot simply change your fingerprint or face if your biometric data is stolen. The consequences following the theft of such data can be long-lasting and serious for the individuals concerned.

 Unlike these classic methods, Veintree’s technology cannot be considered a conventional biometric technique, as it is not traceable. It transforms the internal physical characteristics of a person’s hand, instantly recorded during enrolment, into specific, encrypted, and anonymous mathematical functions which serve as a digital lock. Even if hackers were to obtain the code making up this lock, they would be unable to exploit it.

Indeed, to open such digital locks, only the physical hand of the person from which originates the lock can function as a key. And since this encrypted key is slightly modified upon each use, each version remains unique and can only be used once, and only by the same person. 

This innovative mathematical approach guarantees that personal data is not nominative, stored, compromised, or reused. It is a technology inspired by biometrics, but based entirely on mathematical principles. It can be applied to all types of access, whether digital or physical, professional or private, with no similarities between the mathematical functions created. Only the part of the owner's body that created the lock remains the same.

This is what we call a universal lock to which you are the key.