Realizing Zero Trust Security Model with Vision AI

FaceLocker

AI-Powered Implicit Continuous Authentication & Visual Threat Detection 

FaceLocker is an AI-based visual security platform that continuously authenticates users 
and detects visual hacking or abnormal behavior in real time. 

By combining Implicit Continuous Authentication (ICA) and AI Visual Threat Detection, 

FaceLocker protects sensitive information from unauthorized access, insider misuse, and screen exposure 
— all without disrupting the user experience.

FaceLocker

Key Benefits

Key Benefits 01
Establish a Zero Trust Authentication Framework 

FaceLocker applies continuous authentication throughout the session, not just at login. Users are automatically re-authenticated via AI, preventing credential theft and unauthorized access. 

Key Benefits 02
Prevent Visual Hacking Attempts with Vision AI

AI Vision constantly monitors the screen environment, identifying potential threats such as camera recording, unauthorized viewers, or multiple people appearing in front of the screen. 

Key Benefits 03
Maintain Security and Usability Together 

FaceLocker works implicitly and continuously, maintaining strong security without additional authentication steps, enabling users to stay focused on their work. 

Main Faetures

Implicit Continuous
Authentication (ICA)
Prevents visual hacking in public or shared spaces by recognizing user absence, unauthorized viewers, or multiple faces
near the screen. 
When risks are detected, the system instantly locks input and output devices to keep information secure.
Policy-Based Screen Protection 
When a visual threat is detected, predefined security actions are automatically applied ;
such as screen lock, activating a Windows screen saver, or displaying watermarks.
This ensures flexible protection that adapts to each organization’s security requirements.


Log Management & Audit
All authentication and detection events are securely logged. When a visual hacking threat is detected, the webcam view and active screen are captured and stored, providing valuable data for audits and security reviews. 
Zero Trust Principle in Action
Through Implicit Continuous Authentication (ICA), FaceLocker embodies the Zero Trust principle — “Never Trust, Always Verify.”
It delivers next-generation authentication that ensures both security and user convenience. 
Visual Hacking
Prevention 
Prevents visual hacking in offices and public environments by detecting authorized user absence, unauthorized access, or multiple faces in front of the screen. 
When such conditions occur, input/output devices are immediately blocked to protect sensitive information.
Visible & Invisible Watermarks 
Provides visible watermarks that display user information when screen capture attempts occur, and invisible watermarks that embed traceable data into the display. 
These dual watermarking methods help prevent unauthorized screen recording and enable post-incident tracking. 
Multi-Camera Support 
All features are supported with built-in
standard RGB webcams. 
(Enhanced capabilities available
when using IR webcams.)
 
Windows Login Replacement 
Extends biometric authentication beyond secondary use, FaceLocker can replace traditional Windows password login, enabling passwordless primary authentication for users. 
Camera and Screen
Recording Detection
Utilizes Vision AI–based object detection to identify and block screen capture attempts made with cameras or mobile phones. 
Stops potential information leaks caused
by unauthorized recording or photography. 
Anti-Spoofing
Protects against spoofing attempts using photos or videos by verifying real-time user presence through liveness and infrared (IR) detection. 
This ensures that only genuine users are continuously authenticated during sessions. 


Account System Integration
Integrates with Microsoft Azure Active Directory, HR databases, and other enterprise systems. 
Supports both SSO and direct authentication linkage with individual business applications. 
Low Resource Consumption
FaceLocker’s lightweight AI engine operates efficiently without requiring an expensive GPU, using minimal CPU resources to ensure no disruption to existing work environments. 

Realizing Zero Trust Security Model
with Vision AI

FaceLocker

AI-Powered Implicit Continous Authentication & Visual Threat Detection 

FaceLocker is an AI-based visual security platform
that continuously authenticates users and detects
visual hacking or abnormal behavior in real time.

FaceLocker protects sensitive information from
unauthorized access, insider misuse,
and screen exposure — all without disrupting
the user experience.

FaceLocker
Key Benefits

__
Key Benefits 1

Establish a Zero Trust Authentication Framework 

FaceLocker applies continuous authentication throughout the session, not just at login.
Users are automatically re-authenticated via AI, preventing credential theft and
unauthorized access. 

__
Key Benefits 2

Prevent Visual Hacking Attempts
with Vision AI 

AI Vision constantly monitors the screen environment, identifying potential threats
such as camera recording, unauthorized viewers,
or multiple people appearing
in front of the screen. 

__
Key Benefits 3

Maintain Security and
Usability Together 

FaceLocker works implicitly and continuously, maintaining strong security without additional authentication steps, enabling users
to stay focused on their work. 

Main Features

Implicit Continuous
Authentication (ICA) 
Prevents visual hacking in public or
shared spaces by recognizing user absence, unauthorized viewers, or multiple faces near the screen. 
When risks are detected, the system instantly locks input and output devices
to keep information secure. 

Visual Hacking Prevention 
Prevents visual hacking in offices
and public environments by detecting authorized user absence, unauthorized access, or multiple faces in front of
the screen.
When such conditions occur,
input/output devices are immediately blocked to protect sensitive information. 

Camera and Mobile
Recording Detection 
Utilizes Vision AI–based object detection to identify and block screen capture attempts made with cameras or mobile phones. 
Stops potential information leaks
caused by unauthorized recording or photography. 

Policy-Based Screen Protection  
When a visual threat is detected, predefined security actions are automatically applied ; such as screen lock, activating a Windows screen saver, or displaying watermarks. 
This ensures flexible protection that adapts to each organization’s security requirements. 

Visible & Invisible Watermarks 
Provides visible watermarks that display user information when screen capture attempts occur, and invisible watermarks that embed traceable data into the display. 
These dual watermarking methods help prevent unauthorized screen recording and enable post-incident tracking. 

Anti-Spoofing 
Protects against spoofing attempts using photos or videos by verifying real-time user presence through liveness and infrared (IR) detection. 
This ensures that only genuine users 
are continuously authenticated during sessions. 

Log Management & Audit 
All authentication and detection events are securely logged. When a visual hacking threat is detected, the webcam view and active screen are captured and stored, providing valuable data for audits and security reviews. 

Multi-Camera Support 
All features are supported with 
built-in standard RGB webcams.
(Enhanced capabilities available
when using IR webcams.) 

Account System Integration 
Integrates with Microsoft Azure Active Directory, HR databases, and other enterprise systems. 
Supports both SSO and direct authentication linkage with individual business applications. 

Zero Trust Principle in Action 
Through Implicit Continuous Authentication (ICA), FaceLocker embodies the Zero Trust principle — “Never Trust, Always Verify.” 
It delivers next-generation authentication that ensures both security and user convenience. 

Windows Login Replacement 
Extends biometric authentication
beyond secondary use, FaceLocker can replace traditional Windows password login, enabling passwordless primary authentication for users.  

Low Resource Consumption 
FaceLocker’s lightweight AI engine operates efficiently without requiring
an expensive GPU, using minimal CPU resources to ensure no disruption to existing work environments. 
Configuration Overview

HA/Scale-out

FaceLocker's revolutionary cluster structure
allows for the flexible availability of resources.
FaceLocker only adds server system
even when the number of users increases
and maintains the single-user domain model,
guaranteeing continuous expansion of the client.

Related Products

Configuration Overview

HA/Scale-out

FaceLocker's revolutionary cluster structure allows for the flexible availability of resources. 

FaceLocker only adds server system even when the number of users increases and maintains the single-user domain model,
guaranteeing continuous expansion of the client.

Related Products

PNPSECURE Inc.

ceo

Tel.

E-mail

Address


Chun Oh, Park

1670-9295

sales@pnpsecure.com

182, Magokseo-ro, Gangseo-gu,

Seoul, Republick of Korea

(Magok-dong,PNPSTATION)

Copyright ⓒ 2023 pnpsecure All rights reserved.

Privacy Policy

PNPSECURE Inc.

CEO

Tel.

E-mail

Address

Chun Oh, Park

1670-9295

sales@pnpsecure.com

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of korea (Magok-dong,PNPSTATION)

Copyright ⓒ 2023 pnpsecure All rights reserved.       Privacy Policy