Veintree launches its post-biometric solution based on the scanning and analysis of the venous networks serving to authenticate users, without identifying them.
From Global Security Mag article :
https://www.globalsecuritymag.fr/Veintree-lance-sa-solution-biometrique.html
Veintree's technology is forgery-proof, stores no biometric data and is resistant to cyber-attacks, even those originating from quantum computers, the most powerful developed to date. It protects users' personal data and identity in the digital world.
Origin of the concept
Founded in 2017, Veintree's concept origins began in 2010 following the devastating earthquake in Haiti. Dr. Christophe BRON and his associates Eduard TSCHAN and Patrizia COPPOLA, who where then involved in the International Federation of Red Cross and Red Crescent Societies' "Operation Earthquake", witnessed the heartbreaking consequences resulting from the severance of family ties and the inability of victims to formally identify themselves to the authorities. This striking experience inspired the founders to dedicate years of research and development to the creation of a forgery-proof solution, based on the natural physicality of hands, which enables the rapid and accurate authentication of individuals without requiring their identification.
Each key is unique
Nature created human beings to be unique, and their hands are just as unique. Inspired by this reality, the Veintree authentication system is based on digital locks created from the biometric data of a hand's venous network, and these locks can only be opened by the hand that originated the lock.
By scanning and analyzing the images and flows of the hand's venous network, Veintree's patented algorithms generate a unique encrypted key. This authentication key changes each time it is used, but always corresponds to the lock originally created by the same hand.
All biometric data is deleted
Once the biometric reading has completed its task, it is immediately deleted to prevent any attemps of identity theft. Veintree's secure servers store no biometric data, and are based on a zero-trust model. No reference databases are used, no image comparisons are made, no biometrics are archived. The keys that are created become unusable after each use, thus preserving the confidentiality of personal data. Neither the keys nor the locks store biometric data.
Authentication is dissociated from identification
The basic principle of the Veintree solution is to authenticate that a person is indeed authorized to access the rights and services associated with the digital accesses and transactions that they are carrying out (banking, commerce, permissions, etc.). At Veintree, authentication is dissociated from personal identification: personal identifiers are not included. However, for use cases where personal identification is considered necessary for authentication (for example, by an employer or a government service), this aspect is managed internally by the company or organization using the Veintree authentication system, and not by Veintree itself.
A solution that resists quantum attacks
This method of authenticating the venous network of the palm, which is resistant to cyber-attacks aimed at identity servers and Single-Sign-On methods, has also been certified as resistant to quantum attacks by NIST (the US National Institute of Standards and Technology). Its inviolability is guaranteed by the uniqueness of each individual's venous networks. The Veintree system verifies five distinct yet related factors within the hand, including the shape of the venous network, the positioning of individual veins and the rhythm of blood flow. The verification of these five factors, the result of a patented process, enables a highly reliable confirmation of authentication. The technology is also tamper-proof, as it recognizes signs of biological activity within the hand, thus making it impossible to manufacture inert copies.
The individual controls access
The security of the Veintree authentication system is further strengthened by the fact that each lock created is unique and specific to each service or application. What's more, it is always possible to easily terminate access to a previously authorized service, or delete any lock created in connection with a service. The termination of the Veintree permissions granted to any service is at the sole discretion of the person concerned. This is a form of personal digital sovereignty, an approach at the heart of Veintree's code of ethics.