Loading...
private.me Docs
Get xPrint
PRIVATE.ME PLATFORM

xPrint: Biometric Template Protection

XorIDA splits biometric templates across independent storage nodes. No single node holds a usable template. Supports fingerprint, face, iris, and voice modalities.

Healthcare / Biometrics COMING SOON XorIDA Powered
Section 01

The Problem

Biometric templates stored in single databases are permanent breach targets. Unlike passwords, biometrics cannot be rotated after compromise.

When a password database is breached, users can change their passwords. When a biometric template database is breached, the damage is permanent. You cannot change your fingerprints, your iris pattern, or the geometry of your face. A biometric breach compromises the victim for life.

Centralized biometric databases at airports, banks, and government agencies store millions of templates at single points of failure. The OPM breach in 2015 exposed 5.6 million fingerprint records. Those fingerprints are still compromised today and will be forever. Traditional encryption does not solve this -- it simply moves the problem to key management.

The Old Way

Enrollment Scanner Match Scanner Central Template DB Fingerprints + Face + Iris + Voice Cannot be rotated BREACH Permanent damage No rotation possible
Section 02

The PRIVATE.ME Solution

XorIDA splits biometric templates across independent storage nodes. No single node holds a usable template. Matching happens in the split domain without ever reconstructing the full template.

Each biometric template is split into N shares distributed across independent storage nodes. During authentication, shares are collected and the match is performed on the reconstructed template in a secure enclave, then immediately discarded. No node ever holds a complete template at rest.

Because XorIDA is information-theoretic, a compromised node reveals zero information about the template. Unlike encrypted templates where a future quantum computer could decrypt, XorIDA shares are provably unrecoverable without the threshold number of shares -- today, tomorrow, and forever.

The New Way

Biometric Template XorIDA K-of-N Split Node A Node B Node C HMAC Verify
Section 03

How It Works

A secure enrollment and matching pipeline ensures biometric templates never exist in usable form at rest. Templates are split at enrollment and reconstructed ephemerally at match time.

BIOMETRIC CAPTURE TEMPLATE EXTRACT XorIDA SPLIT STORAGE NODE 1 STORAGE NODE 2 STORAGE NODE N MATCH PATH HMAC VERIFY RECONSTRUCT MATCH + DISCARD RESULT
Key Security Properties
Ephemeral reconstruction: Templates are reconstructed only during matching and immediately discarded. Multi-modal: Supports fingerprint, face, iris, and voice templates with the same split architecture. No rotation needed: Even after a node breach, re-split across new nodes without re-enrolling users.
Section 04

Use Cases

Aviation
Airport Biometric Systems

Protect traveler biometric templates at airports with threshold-based storage. No single airport system holds usable templates. Boarding gate matching uses ephemeral reconstruction.

Border Security
🏦
Financial
Banking Authentication

Replace single-database fingerprint and face authentication with split-template verification. Branch and ATM systems reconstruct templates ephemerally for each authentication.

KYC / AML
🏛
Government
National ID Programs

National biometric ID systems can distribute templates across government data centers. No single data center breach exposes the entire population's biometrics.

National Scale
🚪
Enterprise
Workforce Access Control

Corporate biometric access control with split-template storage. Employee fingerprints and face templates distributed across independent security nodes.

Physical Security
Section 05

Integration

Quick Start
import { vaultTemplate, matchSecure } from '@private.me/biometricvault';

// Vault a fingerprint template across 3 nodes (2-of-3)
const shares = await vaultTemplate(fingerprintTemplate, {
  n: 3,
  k: 2,
  modality: 'fingerprint'
});

// Secure match with ephemeral reconstruction
const match = await matchSecure(probeTemplate, {
  userId: 'user-12345',
  threshold: 0.95
});
// match.ok === true → identity verified
vaultTemplate(template: BiometricTemplate, config: { n: number, k: number, modality: string }): Promise<BiometricShare[]>
Splits a biometric template into N shares with K-of-N threshold reconstruction. Supports fingerprint, face, iris, and voice modalities. Each share is HMAC-signed. Templates are never stored in usable form -- only shares are persisted.
Section 06

Security Properties

PropertyMechanismGuarantee
No Template at RestXorIDA K-of-N split at enrollmentNo storage node holds a usable template
Ephemeral MatchReconstruct-match-discard pipelineTemplates exist in memory only during matching
Multi-ModalModality-agnostic split architectureFingerprint, face, iris, voice all supported
Quantum ResistanceInformation-theoretic security (GF(2))Permanent protection -- no future attack can break
Re-Split Without Re-EnrollThreshold reconstruction + re-splitRotate storage nodes without touching users
<1ms
Typical payload
4
Modalities supported
0 bytes
Usable data per breach
GF(2)
Quantum-proof algebra
VERIFIED BY XPROVE

Verifiable Data Protection

Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.

XPROVE AUDIT TRAIL
Every XorIDA split generates HMAC-SHA256 integrity tags. xProve chains these into a tamper-evident audit trail that proves data was handled correctly at every step. Upgrade to zero-knowledge proofs when regulators or counterparties need public verification.

Read the xProve white paper →
GET STARTED

Ready to deploy xPrint?

Talk to Ren, our AI sales engineer, or book a live demo with our team.

Book a Demo

© 2026 StandardClouds Inc. dba PRIVATE.ME. All rights reserved.

VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

xPrint generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for distributed systems without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify secure operations without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify distributed systems correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/xprint
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While xPrint is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →