FaceLocker: Vision AI-Powered Authentication Security

FaceLocker provides facial recognition-based passwordless login and screen protection, enhancing security and business continuity in enterprise Zero Trust 2.0 environments.

FaceLocker: Vision AI-Powered Authentication Security
FaceLocker: Vision AI-Powered Facial Authentication Security

Table of Contents

  1. Introduction: Information Security Threats and Role of Vision AI
  2. Key Terms in Vision AI and Authentication
  3. Introducing FaceLocker
    • Core Values
    • Key Features
  4. FaceLocker Technical Architecture
    • Tech Stack
    • Client Architecture
    • Server Components
  5. Detailed Features of FaceLocker
    • Windows Login
    • Anomaly Detection and Control
    • Watermark Implementation
    • Other Key Features
  6. Zero Trust Security Model and FaceLocker
  7. Specifications, Performance, and Scalability
    • Specs
    • Performance and Scalability
  8. Compliance and Regulatory Overview
  9. Recommendations

1. Introduction: Information Security Threats and Role of Vision AI

As digitalization progresses, data leakage incidents continue to increase.
According to the 2024 Verizon Data Breach Report, a total of 30,458 security incidents were investigated, with 10,626 cases involving data breaches and 2,961 caused by social engineering attacks.

Within South Korea, information and technology leakage incidents are rising across public, private, and financial sectors. Password-based authentication vulnerabilities, insider/external filming, and remote work screen-sharing risks highlight the need for advanced protection using biometric and Vision AI technologies.

The '3M Visual Hacking Experiment' showed that 23% of total information and 53% of sensitive data could be captured from screens.
Vision AI can detect and block unauthorized data capture in real-time, providing proactive protection against visual hacking.

Vision AI enables computers to analyze and understand images and videos, extracting meaningful information similar to human visual recognition.
It can monitor user activity through webcams and sensors, verifying identity and blocking unauthorized recording or access.


2. Key Terms in Vision AI and Authentication

Vision AI (Vision Artificial Intelligence)

  • Analyzes images/videos to extract meaningful information
  • Detects faces, eyes, and motion patterns similar to human vision
  • Used for identity verification and detecting unauthorized access/recording

Face Recognition Authentication

  • Identifies individuals using facial features
  • Core component of passwordless authentication
  • Compliant with KISA K-NBTC standards, includes anti-spoofing technology

Continuous Authentication

  • Monitors user state continuously after login
  • Implements real-time policies: screen lock, watermarking, logging
  • Key method in Zero Trust 2.0 "Implicit Continuous Authentication (ICA)"

Anti-Spoofing

  • Detects and blocks attempts using photos, videos, or masks
  • Uses RGB/IR depth analysis, eye blink, and face movement detection

PassKey Authentication

  • FIDO standard-based authentication
  • Biometric data not stored on server, secure against breaches

Visual Hacking

  • Capturing sensitive information via screen observation or recording
  • Studies: 88% success rate in experiments; 53% of sensitive data visible

3. Introducing FaceLocker

FaceLocker: Vision AI-powered facial recognition and real-time anomaly detection in one platform.

FaceLocker is a Vision AI-based facial authentication and real-time anomaly detection platform.
It provides Windows login replacement (passwordless), ICA, screen exposure prevention, watermarking, PassKey alternative authentication, fulfilling Zero Trust 2.0 requirements.

Core Values

  • Passwordless + ICA: Seamless user experience with continuous monitoring
  • Unauthorized Detection & Screen Protection: Policies applied automatically when an unauthorized person or recording is detected
  • Enterprise Integration: AD/HR DB/SSO integration, VDI compatibility, centralized policy & log management
  • Compliance & Certification: KISA K-NBTC facial recognition, Zero Trust 2.0, financial biometric guidance

Key Features

  • Biometric face authentication (Passwordless + ICA)
  • Screen exposure prevention against unauthorized personnel
  • Anti-Spoofing (photo/video detection)
  • Windows login replacement
  • Enterprise account integration
  • Compliance support
  • Low system resource usage
  • Supports multiple camera types

4. FaceLocker Technical Architecture

Tech Stack

FaceLocker Tech Stack

Client Architecture

  • Windows Credential Provider (CP): Performs primary authentication, sends inference results to WinLogon
  • Windows Service (Agent Core): Background policy enforcement
  • Inference Engine (Vision AI): Real-time face authentication, liveness, anomaly detection
  • IPC Layer: Asynchronous event communication between CP ↔ Service ↔ Inference
  • Alternative Authentication Module: Supports PassKey/Google OTP/mOTP

Server Components

  • Nginx: TLS termination, load balancing
  • Web Manager (Spring Boot): Policy, user, device, license management
  • API Server: Agent communication, authentication events, policy distribution
  • Redis: Session & policy cache, temporary job queue
  • MariaDB: User, policy, log storage
  • Server Redundancy: HA setup for uninterrupted operation

5. Detailed Features of FaceLocker

Windows Login

FaceLocker's Windows Login
  • Passwordless login via face, AD integration, PassKey support
  • Continuous authentication for remote and external environments

Anomaly Detection and Control

FaceLocker' Anomaly Detection
  • Detection categories: screen recording, unauthorized presence, idle, webcam obstruction, additional monitors/webcams
  • Policy response: screen lock, login screen switch, watermark display
  • Audit tracking: user images, screen capture logs
  • Multi-display control: prevents output on non-primary monitors

Watermark Implementation

FaceLocker's Watermark Implementation
  • Visible watermark: displays user info for deterrence and traceability
  • Invisible watermark: hidden but tracks leaked images
  • Policy/operation: configurable per user/department, can combine with anomaly scenarios

Other Key Features

  • Alternative authentication (PassKey/OTP/Email)
  • VDI compatibility (VMWare, Citrix, etc.)
  • Centralized management & audit
  • Offline login (policy-based)

6. Zero Trust Security Model and FaceLocker

Zero Trust Security Model and FaceLocker
  • Requires real-time evaluation of user/device state
  • AI-MCP server-client ensemble for risk scoring, continuous authentication
  • FaceLocker logs/events serve as trust signals
  • Future development: risk scoring engine integration

Zero Trust KPI Examples

  • Session security: auto-lock events, multi-person/recording detection events
  • Account protection: password login ratio, PassKey+face login ratio
  • Organizational control: logged policy violations, top anomaly events

7. Specifications, Performance, and Scalability

Specs

Client Minimum Requirements

  • OS: Windows 10 1903+ / 11
  • CPU: Intel i5 11th Gen+
  • RAM: 8GB+
  • Graphics: Intel Iris Xe
  • Webcam: HD, UVC 1.0+
  • MacOS 11+ (planned 2025.4Q)
  • OS: RHEL 9.X+
  • CPU: Intel Xeon 2.1GHz 12Core+
  • RAM: 32GB+
  • HDD: 4TB+ (RAID recommended)
  • NIC: 1Gbps 2Port+

Performance & Scalability

  • Avg. memory usage <500MB, detection <0.5s, CPU <10%
  • Windows/MacOS support
  • Local/VDI/RDP environment
  • Deployable on-premises or cloud with HA

8. Compliance and Regulatory Overview

  • Industrial Technology Protection Act: up to 6.5B KRW fine for overseas leakage
  • Unfair Competition Prevention Act: up to 1.5B KRW fine, max 15 years imprisonment for trade secret leaks
  • Financial Security Institute: Biometric authentication guidance, internal control enforcement

9. Recommendations

FaceLocker delivers face authentication, anomaly detection, and screen recording prevention using Vision AI.
Integrates with existing enterprise authentication and PassKey for unified login.
Enhances security for remote and smart office environments and can serve as a next-gen security gateway.
For detailed features and policy options, refer to documentation or contact sales@pnpsecure.com