Appearance Recognition in BluSKY 2025
Appearance Recognition in BluSKY - Safe · Private · Your Choice
At BluB0X, your privacy and security are our top priorities. Our appearance recognition technology in BluSKY is designed to make access safer and more convenient-while keeping you fully in control of how it’s used.
Proof of Presence vs. Biometric Data
Like many modern security systems, BluSKY captures a proof-of-presence photo when someone uses a Person Reader. This is part of the security protocol:
- It shows who was physically present at the moment of entry.
- It links the photo to the access event (badge swipe, phone credential, QR code, PIN, or face recognition).
- It allows security teams to detect if someone is using a badge or credential that does not match the person presenting it.
- What BluSKY does not do: we do not store or use face measurements-like the distance between your eyes, or a “blueprint” of your face-that could be reverse-engineered. Instead, appearance recognition works by converting your image into a secure, dynamic code that has no meaning outside the system.
You’re in Control
Every individual decides for themselves whether to use appearance recognition.
- Opt in or out at any time: Simply present your credential at a Person Reader and say you’d like to use your face-or not use it.
- Use it your way: You can choose appearance recognition by itself or in combination with your other credentials, like a card, phone, QR code, or PIN.
- Your comfort level matters: If you prefer to use only your card or phone, you can do that. If you want the convenience of face-based check-in, that’s available too.
Why People Choose It
Opting into appearance recognition makes access and check-in fast, seamless, and secure.
- No fumbling for your badge or phone.
- Instant recognition at any Person Reader.
- Enrollment happens automatically-nothing extra to do.
- It’s safe, private, and completely your choice.
✅ Bottom line: BluSKY’s appearance recognition provides the convenience of using your face as your identity, without the privacy risks of traditional biometrics. You remain in control, your data cannot be reverse-engineered, and proof-of-presence photos serve only as part of the building or facility’s security protocol.