based on the capture and analysis of hand vein networks to authenticate users, without identifying them.
Read more
It's all about locks and keys
Start your journey