PG-Presence

PG-Presence. Physical Proof.

Patented optical distance bounding confirms the person is physically at the device — closing attack surfaces that no other verification product addresses.

What PG-Presence Does

Uses rapidly-changing QR codes and optical round-trip timing to verify the person is within physical proximity of the device. Verification completes in under ~100ms of optical measurement.

Meeting Screen QR challenge displayed < ~100 ms Optical capture Polyguard Mobile Captures & responds Blocked by PG-Presence Remote desktop access Screen sharing tools Hardware KVM switches Virtual camera injection Physical proximity confirmed

Closes Remote Access Attacks

Remote desktop, screen sharing, and KVM switches let an attacker control a device while a different person sits in front of the camera. PG-Presence detects the physical disconnection.

Confirms Physical Proximity

Uses rapidly-changing QR codes and optical round-trip timing to verify the person is within physical proximity of the device. Verification completes in under ~100ms of optical measurement.

Physics, Not AI

PG-Presence relies on the speed of light, not pattern recognition. A remote relay introduces latency that cannot be hidden. The laws of physics are not something an attacker can fake.

Patented Technology

PG-Presence is protected by U.S. patent and represents a fundamentally new approach to physical presence verification. No other product currently addresses this attack surface.

Attack Surfaces PG-Presence Closes

Patented optical distance bounding confirms the person is physically at the device — closing attack surfaces that no other verification product addresses.

Remote Desktop Control

An accomplice sits in front of the camera while the attacker controls the session from another location via remote desktop software.

Screen Sharing Relay

A real video feed from a real person at a remote location is relayed through screen sharing to the target device. The face is real — it simply is not in the room.

KVM Switch

Hardware-level keyboard, video, and mouse switch gives the attacker full control of a device without installing software. No software footprint to detect.

Virtual Camera Injection

A real or synthetic video feed is presented to applications as if it were a local camera. PG-Presence detects the optical disconnection.

Liveness vs. PG-Presence

Patented optical distance bounding confirms the person is physically at the device — closing attack surfaces that no other verification product addresses.

PG-Presence works through a rapidly-changing QR code displayed on the meeting screen, scanned by Polyguard Mobile. The optical round-trip timing between display and scan confirms physical proximity. A remote relay introduces frames of latency that cannot be eliminated — the speed of light is the constraint, and it is absolute.

Liveness vs. PG-Presence

Capability

Capability Liveness Detection PG-Presence
2D photo spoofing
Video replay
3D mask Most prevent
Remote desktop control
Screen sharing relay
KVM switch
Virtual camera injection

Optical Distance Bounding

Optical Distance Bounding

PG-Presence works through a rapidly-changing QR code displayed on the meeting screen, scanned by Polyguard Mobile. The optical round-trip timing between display and scan confirms physical proximity. A remote relay introduces frames of latency that cannot be eliminated — the speed of light is the constraint, and it is absolute.

See PG-Presence in Action

Experience physical presence verification in our sandbox environment.