1. Access Control
Single Factor Authentication (1FA)
The Rock supports single factor authentication (1FA) and single factor authentication face only (1FAF). Both offer a complete frictionless experience to authenticate user. In 1FA, the Rock is tethered to a badge reader and can be configured to allow auto-enrollment or manual enrollment.
Auto-enrollment is an innovative biometric enrollment process which involves the Rock capturing biometrics data when the user presents their credential. The Rock performs two tasks for auto-enrollment simultaneously. The Rock will pass the badge number to the ACS and at the same time associate the user’s credential with their profile. After several transactions, usually four or more separated by a minimum of 5 minutes, the Rock will determine that acceptable data has been collected to fuse the credential to the user’s profile.
Manual enrollment provides a traditional enrollment experience where the user is enrolled in a single transaction. The Rock is able to capture the biometric data to fuse to their profile by requesting the user to present their badge and following icons on the Rock’s display. The icons will guide the user through the process with a series of actions that include looking right, left, up, down.
Once a user has enrolled with the rock, there is no need to present a badge to gain access to an area. Subsequent request for entry only requires that the user approach the Rock for authentication. The user optionally can present their badge to the reader but is not required since enrollment has been completed.
In 1FAF, the Rock offers a frictionless and credential-less experience with face-only authentication. The Rock is generally placed in locations where there are no tethered badge readers. Users may not auto-enroll but are guided through the enrollment process at a designated enrollment station.
In both 1FA or 1FAF, once enrolled, the user’s profile will be synced with all Rock’s across the organization.
2. Two Factor Authentication (2FA)
In 2FA, the Rock ensures an extra level of security while still providing a frictionless experience to gain access to more sensitive areas. A user must present both their face to the Rock and their badge to the tethered badge reader before gaining entry to an area. Rocks operating in 2FA require users to enroll at a designated enrollment station where they are guided through the enrollment process. User profiles will be synced with all Rock’s across the organization. Once the user is enrolled, the user may request access to an area by approaching the Rock. The Rock’s 3D imaging technology identifies the user as they move close to the door. The user will be asked to present their badge to the tethered reader before the Rock will use their credentials to match the user to the on-board database and successfully authenticate.
3. Tailgating Intelligence
The Rock’s Tailgating Intelligence is powered by AI and machine learning. Tailgating occurs when an authenticated user is followed by a non-authenticated person. The Rock detects all the faces within a space, uses AI and machine learning to keep track of authenticated each user. If an un-authenticated user follows an authenticated user through the door, the Rock will label the un-authenticated user as a tailgater, log this as a Tailgating event along with a still picture of this person.
When a user opens the door from the inside is exiting, a security breach may occur if un-authenticated user gains entry before the door closes. In this case, the Rock will keep track of users approaching the door and whether they are authenticated. If an un-authenticated person enters before the door is closed, the Rock will label the un-authenticated user as a Crosser. The system will log this as a Crossing event along with a still picture of this person.
Any time the Rock cannot authenticate a person who is able to gain entry through a door, the Rock will label the un-authenticated user as an Unauthorized Entry. This event is rare if the door is locked but will happen in situations where someone may prop the door open or is holding the door open to allow a person to enter. It is also triggered in 2FA when a known person enters without badging in. The system will log this as an Unauthorized event along with a still picture of this person.
4. Mask Intelligence
The Rock’s Mask intelligence provides the ability to authenticate and restrict access to users if a user is not wearing a mask. When a user approaches the Rock to gain entry, if the user is not wearing a mask, the Rock will authenticate then prompt the user to put on a face covering before allowing entry. If the user is wearing a mask when they approach the Rock, the user is required to lower their mask briefly for the Rock to authenticate than place their covering back in place. Only if a user has a face covering on before entering will the Rock complete the authentication process.
5. Video Streaming (OnVIF)
The Rock supports communication and interoperability of products from different manufacturers through ONVIF (Open Network Video Interface Forum). Profile S, sending video data over IP networks, and Profile T, for advanced video streaming, are both supported. The Rock supports sending events including Tamper and Tailgating events using Profile T.
The Rock includes a 1080P, HDR color camera that can be connected to a VMS (Video Management System) that is ONVIF compliant.