
5Ver. 1.01
Two Factor Authentication (2FA)
In 2FA, the Rock ensures an extra level of security while still providing a frictionless experience to
gain access to more sensitive areas. A user must present both their face to the Rock and their badge
to the tethered badge reader before gaining entry to an area. Rocks operating in 2FA require users
to enroll at a designated enrollment station where they are guided through the enrollment process.
User profiles will be synced with all Rock’s across the organization. Once the user is enrolled, the user
may request access to an area by approaching the Rock. The Rock’s 3D imaging technology identifies
the user as they move close to the door. The user will be asked to present their badge to the tethered
reader before the Rock will use their credentials to match the user to the on-board database and
successfully authenticate.
– 2 Tailgating Intelligence
Tailgating
The Rock’s Tailgating Intelligence is powered by AI and machine learning. Tailgating occurs when an
authenticated user is followed by a non-authenticated person. The Rock detects all the faces within a
space, uses AI and machine learning to keep track of authenticated each user. If an un-authenticated
user follows an authenticated user through the door, the Rock will label the un-authenticated user as
a tailgater, log this as a Tailgating event along with a still picture of this person.
Crossing
Unauthorized Entry
When a user opens the door from the inside is exiting, a security breach may occur if un-
authenticated user gains entry before the door closes. In this case, the Rock will keep track of users
approaching the door and whether they are authenticated. If an un-authenticated person enters
before the door is closed, the Rock will label the un-authenticated user as a Crosser. The system will
log this as a Crossing event along with a still picture of this person.
Any time the Rock cannot authenticate a person who is able to gain entry through a door, the Rock
will label the un-authenticated user as an Unauthorized Entry. This event is rare if the door is locked
but will happen in situations where someone may prop the door open or is holding the door open to
allow a person to enter. It is also triggered in 2FA when a known person enters without badging in. The
system will log this as an Unauthorized event along with a still picture of this person.
– 3 Mask Intelligence
The Rock’s Mask intelligence provides the ability to authenticate and restrict access to users if a user
is not wearing a mask. When a user approaches the Rock to gain entry, if the user is not wearing a
mask, the Rock will authenticate then prompt the user to put on a face covering before allowing entry.
If the user is wearing a mask when they approach the Rock, the user is required to lower their mask
briefly for the Rock to authenticate than place their covering back in place. Only if a user has a face
covering on before entering will the Rock complete the authentication process.
Learn About the Rock
How does it work?
Explore the Rock’s Features
– 1 Access Control
Single Factor Authentication (1FA)
The Alcatraz Rock provides 3D facial recognition in single factor (1FA) or dual-factor (2FA) mode with
features that include detection for tailgating, crossing, and unauthorized entry. The Rock is continuously
learning each user through AI and machine learning to significantly increase physical security and provide
detection based on security need.
The Rock provides a frictionless and touchless experience for users to gain access to an area. Once a
user completes an enrollment process with the Rock, the user will be authenticated by simply approaching
the Rock. The camera on the Rock will capture facial biometrics using 3D imaging technology. The Rock
performs a series of liveness test in real time to ensure that the user is a real person and not a picture or
video. Once the liveness is verified, the Rock will match the user to its database. If a match occurs, the
Rock will provide the Access Control Panel (ACS) with the badge number of the user for authorization. The
entire process takes a fraction of a second by utilizing edge processing.
The Rock supports single factor authentication (1FA) and single factor authentication face only
(1FAF). Both offer a complete frictionless experience to authenticate user. In 1FA, the Rock is
tethered to a badge reader and can be configured to allow auto-enrollment or manual enrollment.
Auto-enrollment is an innovative biometric enrollment process which involves the Rock capturing
biometrics data when the user presents their credential. The Rock performs two tasks for auto-
enrollment simultaneously. The Rock will pass the badge number to the ACS and at the same time
associate the user’s credential with their profile. After several transactions, usually four or more
separated by a minimum of 5 minutes, the Rock will determine that acceptable data has been
collected to fuse the credential to the user’s profile.
Manual enrollment provides a traditional enrollment experience where the user is enrolled in a single
transaction. The Rock is able to capture the biometric data to fuse to their profile by requesting the
user to present their badge and following icons on the Rock’s display. The icons will guide the user
through the process with a series of actions that include looking right, left, up, down.
Once a user has enrolled with the rock, there is no need to present a badge to gain access to an area.
Subsequent request for entry only requires that the user approach the Rock for authentication. The
user optionally can present their badge to the reader but is not required since enrollment has been
completed.
In 1FAF, the Rock offers a frictionless and credential-less experience with face-only authentication.
The Rock is generally placed in locations where there are no tethered badge readers. Users may not
auto-enroll but are guided through the enrollment process at a designated enrollment station.
In both 1FA or 1FAF, once enrolled, the user’s profile will be synced with all Rock’s across the
organization.