The humanitarian protocol uses zk-proofs to protect personal identity information
Share this article
Highly secure and accessible, palm recognition provides a great way to verify and manage your identity. The Humanity Protocol is making headlines by using palm biometrics and zk-verifications to build a secure, private and universally accessible digital identity system.
The motivation behind this concept is well thought out. However, as with other biometric methods, user privacy is a major concern. Can this technology be made secure without giving up personal rights? Could this convenience come at the cost of our privacy?
The humanitarian protocol believes that they have a solution to these concerns. To learn more about how the protocol protects privacy, why palm recognition is better than other methods, what zk-verifiers do, and how they meet regulatory regulations, we spoke to Humanity Protocol founder Terence Kwok.
Palm recognition brings a balance of security and convenience
Crypto Summary – To begin with, can you tell us a little bit about what inspired Human Protocol to research palm recognition technology? What distinct advantages does it offer over other biometric systems such as fingerprint scanning or iris recognition?
Terence Kwok – Palm recognition technology offers a better balance of security, robustness and better user experience compared to other forms of biometrics. We already know about using fingerprints and facial recognition on our devices, but palm scanning takes complex vein patterns and other unique features a step further into an individual's life cycle.
Iris scanning can provide similar benefits, but often requires specialized hardware deployed in multiple locations for mass onboarding users. Palm prints (labeled), on the other hand, can be captured quickly and conveniently with our mobile devices.
With our aim to be the human layer of Web3, we were keeping these things in mind and wanted to go for a biometric type that has more features than fingerprints, is user friendly and wearable.
Crypto Explanation – How does your system handle palm prints due to age, disability or issues like dirty, damaged palms?
Terence Kwok – Our palms are susceptible to daily wear, damage, dirt and aging – but at a much lower rate than other biometric options, especially facial recognition and fingerprints.
Our proprietary palm recognition technology is designed to address these challenges. Advanced algorithms and machine learning can ensure consistent and accurate identification of surface changes on the palm surface, such as dirt or minor damage. We are also reading the vein patterns of individuals under their palms, and this remains consistent throughout a person's life.
As with all biometric authentication methods, there may be instances where our technology may not work as intended – this includes serious damage to vascular systems.
Humanity Protocol prioritizes user control, data security and regulatory compliance
Crypto Summary – Can you share more about the specific data points extracted from the palm scan and how long this data is stored before being deleted?
Terence Kwok – In our first step, we get a high-resolution image of the palm associated with the user. Our AI model then classifies these palm prints to identify unique characteristics that confirm that the individual is what we call a “unique person” – this allows us to verify that each individual registered for PoH is unique.
We do not store this information. Biometric data is stored on multiple nodes on the Humanity Protocol and can be deleted by the user at any time.
Crypto Explainer – Can you explain the privacy measures that Humanity Protocol has in place to prevent unauthorized access or data breaches? Can users revoke access to their data or delete it from the system?
Terence Kwok – We do not store any user information on central systems. Using decentralized storage and zero-knowledge authentication, users are in control of their personal data and can choose to share it on a minimal “need to know” basis. This means that user data is not monetized, which is now a common practice by large technology companies that have access to large amounts of user data.
This decentralized architecture eliminates single points of failure as data is distributed and stored across multiple nodes. Users have full control over their data, allowing them to delete data at any time.
Crypto Explanation – How has user feedback influenced the development and implementation of this technology in terms of sentiment around biometric data?
Terence Kwok – We have received positive feedback from our community. Especially since it's known for its ease of onboarding, low barrier to entry and palm scanning over other available solutions.
For example, iris scans may seem dystopian and exotic to those who see value in a humanitarian verification solution, but don't want to travel to the nearest center with the appropriate equipment to scan their irises.
Crypto Summary – How do you comply with data privacy regulations in different countries regarding biometric data collection? Are there ongoing discussions with governments or regulatory bodies regarding the adoption of the Humanitarian Protocol?
Terence Kwok – Our legal and compliance partners have been communicating with various regulators and jurisdictions to ensure we are compliant as we build our solutions. Building this identity graph is still a very new concept and navigating it has been challenging, but we are committed to making sure we are on the right track when it comes to data protection laws.
Humanity protocol uses zk-proofs to ensure user privacy
Crypto Explainer – How Humanity Protocol for Privacy-Preserving Identity Proofing Includes Advances in ZK-Proof Technology?
Terence Kwok – Humanity Authentication allows users to verify certain identity attributes and sensitive information without revealing personal information using zk-proofs.
Using zk-proofs enables authentication by providing cryptographic proof of claims such as name, age, or any other sensitive information without exposing real information to third-party dApps or other users. This maintains a high level of security by preventing data breaches and identity theft.
Zk-proofs also improve blockchain scalability and reduce transaction costs by reducing on-chain information, making PoH scalable and suitable for handling large volumes of transactions.
Crypto Explainer – How do you see zk-proofs shaping the future of digital identity management systems with both user privacy and regulatory compliance in mind?
Terence Kwok – The current state of data management is no longer fit for purpose. Centralized data storage continues to suffer from data breaches, hacks and leaks, and adversaries in these situations are becoming increasingly sophisticated.
In the past week alone, there have been several cases where thousands of people around the world have been harmed by leaks from their healthcare providers, employers and schools. This leaves people vulnerable to identity theft and phishing attacks.
With zk-proofs, this data can be distributed and securely stored across multiple zkProofers that then verify the authenticity of each piece of data. This means that businesses do not have to store this information themselves. Regulation around this should also follow current technological developments and capabilities.
Crypto Brief – How can your system maintain a large user base with millions of users verifying their identity at once?
Terence Kwok – PoH runs on the Humanity Protocol, zkEVM Layer 2 chain. We use zk-rollups to maintain scale and increase maximum volume when expanding and onboarding more users. Ensuring scalability and efficiency has been a priority for us as we have seen huge demand from the public and received over half a million prospective applicants in a single month.
We will be stronger as we begin to introduce zkProofers into our network. This means we don't compromise safety and functionality for excellence.
Beyond the Web 3
Crypto Explanation – Humanity Protocol How do you see palm recognition technology expanding beyond Web3 applications and integrating into traditional sectors such as finance or healthcare?
Terence Kwok – In finance, our technology provides strong security for transactions and authentication, greatly reduces fraud and enhances user experience. Users can verify ownership of real-world assets, such as real estate, fine jewelry, and art, without disclosing any sensitive details such as the value or location of these assets that could be used to harm the owners.
KYC will also be smoothed, as human authentication allows financial institutions to verify who they claim to be as customers without having to store sensitive information themselves.
In healthcare, protecting patient identity ensures accurate patient identification, streamlines administrative processes, and improves the quality of patient care.
In fact, a study by the University of New South Wales emphasized that zk-factors may play a significant role in disability. With biometric authentication, schools and hospitals can identify individuals who need help or disability support and make these services accessible to them without having to disclose personally identifiable information to others.
Crypto Conclusion – To conclude, can you explain some real-world use cases proposed for the Humanity Protocol's proof-of-concept system?
Terence Kwok – For example, I might be able to show proof of funds for a large purchase without sharing my bank statements with brokers or lenders. This means I can make sure I have access to the amount of money needed to get a loan or complete the purchase while keeping this information confidential.
Another real-world use case is proving a learning disability to access restricted services in school, such as extra classes or extra time to complete assignments.
The student may not be open to revealing this sensitive information to their peers and teachers. However, students may be more open to seeking the help they need if they acknowledge that they need help because of a disability without specifying the nature of the disability.
This means simply scanning their palm and uploading the documents they need to prove they qualify for aid. This document will not be disclosed to third parties – they can only see whether the student is eligible for service.
Share this article
The information on or included in this website is obtained from independent sources that we believe to be accurate and reliable, but we make no representations or warranties as to the timeliness, completeness or accuracy of any information on or accessible from this website. . Decentralized Media, Inc. Not an investment advisor. We do not provide personalized investment advice or other financial advice. The information on this website is subject to change without notice. Some or all of the information on this website may be out of date, or may be incomplete or incorrect. We may, but are not obligated to, update any outdated, incomplete or inaccurate information.
Crypto Briefing may include articles with AI-generated content created by Crypto Briefing's own proprietary AI platform. We use AI as a tool to deliver fast, useful and actionable information without losing the insight – and control – of experienced crypto natives. All AI-added content is carefully reviewed, for accuracy, by our editors and writers, and we always draw from multiple primary and secondary sources to create our stories and articles.
You should not make an investment decision in an ICO, IEO or other investment based on the information on this website and you should never interpret or rely on any information on this website as investment advice. If you are seeking investment advice on an ICO, IEO or other investment, we strongly recommend that you consult a licensed investment advisor or other qualified financial professional. We do not receive compensation in any form for analyzing or reporting on any ICO, IEO, cryptocurrency, currency, tokenized sales, securities or commodities.
See full terms and conditions.