THE CONCEPT

Five protection factors that are as essential as the fingers on your hands

The authentication system developed by Veintree is based on technical, ethical, and even hygienic values. Working together, these different elements enable you to gain secure access to corporate, medical, governmental, commercial, and other digital systems. In fact, to any system requiring authentication (and not necessarily your identification) so that you may carry out your professional and/or personal activities in the digital world.

Contac​​​​​​t us

Five factors 
of protection


Always on hand

Your hands is the starting point for the access code ( such as a single-use token), the code's encryption and your authentication, Your access key is truly "in" your hand. 

No keys to carry, no smart cards to insert or tap, no passwords or Personal Identification Numbers (PINs) to enter.

No linked database

Veintree relies on a "Zero-Trust" (or systematic verification) model,
 This is in addition to the very design of the Veintree authentication system, which already uses single-use encrypted codes based on the unique configuration of your hand's veinous network. 

Multi-factor authentication

The Veintree system verifies five distinct yet related factors within your hand, including the shape of your venous network, the positioning of individual veins as well as the rhythm of blood flow.

The verification of these five factors, which results from a patented process, makes your authentication extremely reliable.

Quantum computing resistant

The Veintree authentication system can resist any attack using quantum computing. This assertion is based on the use of algorithms which have been validated in the United States by NIST (National Institute of Standards and Technology).

Not only is Veintree's authentication system capable of resisting any future attack using quantum computing, your data is also encrypted and protected against such attacks.
Now is the time to protect your data. When hostile quantum computers eventually gain the ability to break passwords and RSA keys, it will be too late.

Ethical biometrics

Veintree's basic principle is not to identify you, but rather to reliably authenticate you.

Moreover, no biometric data is collected, therefore there is no biometric database. There are only mathematical functions that correspond to you hands, and no one but you can use your hands to enable access, thus adding another layer of security.

What non-traceability means for digital life and real life :

Fingerprints, iris biometrics, as well as facial and voice recognition data are all traceable because they can be archived without the owner's knowledge. They can then be used to create fake digital data for electronic tracing and profiling based on public biometrics sequences. 

In some countries, the possible use of fake or copied digital data seems to have allready become problematic. Obviously, it is far better not to find oneself in an Orwellian nightmare where Big Brother becomes a reality. 

The venous structure within the hand is not visible from outside without using special hardware which does not work remotely. 

Veintree uses a biometric characteristics that cannot be associated to any trace in the real world, even if the scanner's data could theoretically be intercepted, in an attempt to reuse them for identity theft attacks. 

The requirement to present the referring part of the body to a specific dedicated scanning device is the link that connects the digital life to an act of will in real life, thus preventing unauthorized use.

There is no wishful thinking involved. The time has come to obtain the protection you deserve.


Learn more


Anonymization / Pseudonymization

A pseudonymization

when safekeeping data is required.

Anonymization

without any references to Identity.

Conditional link

Allows the sharing of anonymized data for artificial Intelligence (AI) research.

CROs A solution for Clinical Research Organizations.


Cybersecurity

Digital wallet

Without any references to identity.

Natural Sign On authentication

To replace Single-Sign-On methods.

Encrypted keys

That are specific to each application.

A Decentralized architecturefor enhanced security.