Overview
Syllabus
Intro
Developing the Rock
Our approach
Facial authentication requirements
Spoof detection (liveness check)
The most common physical security breach
What is tailgating?
Challenges to make tailgating accurate
Backend for the fleet
Cloud first to on premise pivot
How Alcatraz overcomes the integration challenges
On premises deployments
Privacy by Design
Testing in Alcatraz Al
Face Detection & Recognition
Data Collection for ML Algorithm Training
Data Collection - Execution
Training ML Algorithms
Spoof Attack Levels
Spoofing prevention
Testing the platform
Taught by
ISTA Conference