Select Account


Powered by VESlocker

VESauth is a subset of the VES APIs that leverage the innovative VESlocker technology for authentication and authorization. The VESlocker technology is a PIN based software solution that achieves hardware grade cryptographic user access, but without the extra hardware. The result is software level user access convenience with hardware level cryptographic security.

What makes VESlocker special is that it uses three pieces of information that are all stored in different locations, to elimiante the possibility of a brute force PIN hack as well as the possibility of using scanning technology to read the storage of the personal device to retrieve the VESkey. Without the PIN, which is located in the user's head, the VESkey cannot be retrieved from the device in any possible way.

Visit VESlocker for more information.

VESauth Applications

By itself, VESauth can be used for cryptographic grade authentication and authorization. In this capacity it does provide some security benefits over competitive Two Factor Authentication services. Specifically, it provides an answer to the vulnerability of Two Factors being accessible through a single device, such as the second factor code being sent via text or email to the same phone using the app or browser to authenticate.

However, where VESauth really shines is when it is being used as an extension to using VES for e2e enccryption of user data-at-rest. In this capacity VESlocker is already employed in the normal use of VES and it is simply being extended for authentication and authorization, to create even further security for the user's private data.

Crypto wallets - a use case example

A typical example of this is in the use of crypto wallets where the user must enter their PIN to log into the wallet through VES, and that action also unlocks the user's VESkey with which the wallet encryption key can be decrypted and used by the wallet. In this case, not only is the wallet fully cryptographically secured, it has two additional benefits: 1) superior user convenience of only needing a PIN to access the wallet; and 2) utilization of the multiple key redundancies of VES, including VESrecovery, to mitigate the risk of key loss.

For more information, visit the VESauth API documentation.