Authenticate the human, not the credential.
The major shortfall in modern information security solutions is that they are primarily dependent on user profiles for determining privileges, access, and attribution. Security largely ends after the login. Only by continuously verifying the user, can one have accurate visibility across the network.
Interested in getting your “hands on” the Veurr5 keyboard?
The Veurr5 keyboard is currently under development, however you may still participate through one-of-two options:
In the beginning there was only a password. Then, with additional users, came usernames.
Pseudo security (first factor) combined with a second authentication system.
Facial and Retinal
Incorporation of facial and retina recognition into one-time authentication.
The use of personally identifiable information and transparent verification.
The Veurr5 Difference
The disruptive technology being explored by the engineers at Veurr, Inc challenges the almost every aspect of modern security,revolutionizing how home users and corporations alike perceive, interact with, and comprehend information security.
Retinal and facial scanners are quite intrusive. Our all-key biometrics affords a passive and transparent form of human user verification.
Replace one-time authentication with continuous user verification and rest assured that only authorized users are active on the network.
Ensure that files or an entire drivespace can only be accessed by the content owner by generating encryption keys based on the owners prints.
Remember Edward Snowden? He was able to steal critical information by using a co-workers username and password. Just imagine if the Vuerr5 was in place…
Security and attribution are essential. Know the people, not the profiles, of those active on your network and exactly who is behind the activity.
No more having to lock your computer before racing to the printer or worrying about someone using your account while collaborating with a colleague.
But, why continuous fingerprints over other forms?
Here at Veurr, Inc we’ve conducted extensive research into many forms of biometric-based authentication such as retina examination, keystroke analysis, facial recognition and each has their merits. However, in the end, we found that there were three critical elements which only passive fingerprint technology could address.
The advanced biometrics and detection algorithms behind the Veurr5 keyboard are non-intrusive and transparent to the user.
The process begins and ends with each keystroke, preventing piggy-backing and theft or sharing of passwords.
The Veurr5 keyboard offers continuous, real-time human verification, as opposed to modern one-time, credential authentication.
As encryption keys are generated from the users fingerprint signatures, rest assured that only the person, not the password, may access critical information.
Unlike lengthy keystroke recognition, the algorithms behind the Veurr5 keyboard achieves detection in within 3 keystrokes or mouse click.
As a result of real-time human verification, network admins are able to achieve 100% verification of users active on their networks.