Make it stand out.

Whatever it is, the way you tell your story online can make all the difference.

CLAIMS: "biometrics that cannot be replicated, stolen..." and "virtually un-hackable"

QUESTIONS:

"Anyone can make those claims until they inevitably get hacked/breached, which is why those types of claims are typically only made by liars and fools."

Most biometric solutions always encounter this kind of remarks from people who are agnostic to biometric authentication.  Let me share the facts about how our algorithm is constructed, and I hope this will help you become educated in this revolutionary hand biometric.

Yes, hackers might be able get into our database, somehow circumventing our “State-of-the-Art” security measures.  But even if they are able to breach our defensive measures and access data in our database, our algorithm is virtually hackable because there is no key or attachment to the information. Let us ask the question of what is contained in our database, i.e., what data they can get and what damage can result from their access to this data.  The answer is contained in the nature of the data, which is a set of files, each containing biometric data, such as the biometry of a person’s hand and the map of that person’s vein structure within the hand.  But each such file contains useless information because this biometric data is NOT keyed to that person, it is not attached to any of that person’s identification (no name, no address, no password, no social security number – nothing!).  Hence, there is nothing that can be done with that data.

The hacker cannot use the stolen data consisting of a person’s biometric ID contained in our database because that data is uniquely identified to a specific person’s hand when that person enrolls in our system.  Furthermore, we encrypt that biometric data (or ID), and the only decipher (that can decrypt that data) is the hand of the person registered in the database.  That is why our system provides virtually complete identity protection.

From the front-end (end-point) of our “VeriHand™” reader, the biometric pattern becomes an encrypted digital biometric ID of a person, and the digital ID created by that person at the time of enrollment will be stored in our blockchain of digital biometric IDs (our patented “Authentication Gateway”).  Once this digital biometric ID is stored in our Authentication Gateway, this pure image becomes immutable – cannot be changed.  This digital biometric ID can be read ONLY by that person's hand during the VeriHand™ verification, identification and authentication process which matches that person’s biometric ID previously registered in our system.  Moreover, the VeriHand™ reader does not touch the person’s hand – verification is “contactless” – and therefore has an advantage over laser imaging of iris and retina patterns or methods requiring touching a surface (like pressing buttons).

The nVIAsoft biometric ID is unlike finger and palm print, which can be falsified by lifting and mimicking the pattern left from the surface they touched (or even duplicated from a high-definition photo), and it is unlike voice and facial recognition that is proven many times to be susceptible to duplication (you can read many articles and videos online about duplication of facial recognition patterns and about voice recognition).

Let me give you an example: I have identical twin daughters, and they can fool the facial recognition application of the iPhone.  One twin can lock her iPhone, and the other twin can unlock it.  Siri and Alexa even recognized the two of them as being one person's voice; hence, another flaw of biometric authentication by voice recognition.

 

Since your technology is proprietary, how can you back up those claims? Do you hire any independent, 3rd parties to test your technology?  Do you have any data on false positives and false negatives when authenticating with your tech?

No, we don't have 3rd party testers yet, but we have internally tested our algorithm for false positives and false negatives numerous times, and it never fails to recognize a person’s hand that has been registered to the database and never accepted a hand that was not registered in the database.  Yet, we know that palm and fingerprint can be falsified and that facial and voice recognition can be copied.

The nVIAsoft technology enjoys a great advantage in that the entire hand vein pattern of each person is unique and cannot be copied.  It is the most complex biometric pattern representing the individual and is the axiomatic identity of every human being.  Your left and right hand have different unique designs or patterns.  We use a patented sensor to map the biometric pattern of the whole hand, which includes both fingers and palm, to gather thousands of data points from complex vein patterns across the entire hand.  The map of just the palm vein is not secure enough because it has fewer vein patterns, and therefore it is less complex and more like a short and weak password.  The entire hand is far more complex and translates into a strong authentication, like a very long password.

TO SUMARIZE OUR ANSWERS:

Unlike hacking a database of a bank or a healthcare company, where hackers access data containing the personal information of people in that database (like passwords, social security number, bank account information and even health and insurance records), the nVIAsoft technology is completely different.

While it is unlikely, it is conceivable that our database could be hacked, but because the data stored in our database is not identified as belonging to a specific person, it is meaningless to the hackers; they will get a bunch of encrypted codes of biometric ID garbage.  The biometric data is a map of biometric data of the hand of a registered individual; yet this data does not contain any personal and sensitive information and is helpful only to the person who owns the registered hand.

Our proprietary algorithm provides end-to-end protection of persons' digital identity, a first-of-its-kind technology because we are the world's first contactless hand biometric authentication coupled with the blockchain technology to store digital biometric IDs.

 

 

 

 

 

 

 

 

Thank you for your input. We understand you concerns. We and our partners are very confident on our  technology, and we are working hard to keep improving both the software and hardware components of our product.  

We studied the current biometrics and their limitation, we also found that finger and palm vein is not enough. That’s we why are confident with our technology will revolutionize the authentication industry and the reason why we are in this  campaign.

Our proprietary algorithm provides end-to-end protection of persons' digital identity, a first-of-its-kind technology because we are the world's first contactless hand biometric authentication coupled with our advanced database technology.

For more information about our product please visit us at https://www.nviasoft.com

Make it stand out.

It all begins with an idea. Maybe you want to launch a business. Maybe you want to turn a hobby into something more. Or maybe you have a creative project to share with the world. Whatever it is, the way you tell your story online can make all the difference.

Make it stand out.

It all begins with an idea. Maybe you want to launch a business. Maybe you want to turn a hobby into something more. Or maybe you have a creative project to share with the world. Whatever it is, the way you tell your story online can make all the difference.

Make it stand out.

It all begins with an idea. Maybe you want to launch a business. Maybe you want to turn a hobby into something more. Or maybe you have a creative project to share with the world. Whatever it is, the way you tell your story online can make all the difference.

“It all begins with an idea. Maybe you want to launch a business. Maybe you want to turn a hobby into something more. Or maybe you have a creative project to share with the world. Whatever it is, the way you tell your story online can make all the difference.”

— Squarespace