Cutting hedge innovations to shape the ultimate Authentication Protocol for the new Open Identity.
Blockchain, Biometrics and IoT is our holy trilogy. Crucial to create the first “open identity” ecosystem, private by design, secured and the highest user experience. We strongly believe there is not a real trade off between security and usability.
To do this, VEMINI has developed an unprecedented authentication protocol, the Decentralized Multilayered Identity Fragmentation (DMIF), which uses a specific Distributed Ledger technology associated with asymmetric encryption and an advanced biometric innovation. For these features DMIF is more performing and secure than traditional tools based on passwords, but also enhanced if compared to more innovative standards such as FIDO as it does not refer to «Proof of Knowledge» mechanisms, nor to centralized databases for the management of personal credentials.
This makes VEMINI a completely passwordless solution, therefore more secure and supported by the use of a decentralized multi-storage database for the protection of each biometric identity, reducing data breach risks.
BIOMETRIC PASSWORDLESS AUTHENTICATION
VEMINI puts its fundamentals on concepts of simplicity, security and universality. So we designed a Digital Identity specific for each individual that can be used as the unique key of access ever needed. To do so we relied on the most powerful feature of men’s uniqueness and authenticity: biometric traits.
We didn’t stop here, we designed the most secure and usable Biometric Digital Identity ever created.
Our biometric hardware uses the highest available technology based on infrared light. Palm's veins scan is the most performing typology of biometric identification, with a False Acceptance Rate of <0,001 %. We calle it SoulScan
Client is ready for enrollment
SSiD from VEMINIapp
used for enrollment
Biometric Enrollment using SoulScan
spread through DMIF
WHY VEMINI? IT'S THE DEFINITIVE SOLUTION
FOR THE IDENTITY OF THE FUTURE
One - Time in life Enrollment
Management in users control
Access Management under service provider’s control
Private by design Tamperproof Authentication