DRUZA 2.0 platform

Identification and behavior patterns


Through the tracking system, data on an employee collected within 3 - 5 weeks make it possible to draw up his exact psychophysiological pattern, any deviation from which signals an emergency (event) or the transition of the beacon to another person. The neural network of behavior patterns allows you to aggregate the analysis to analysis for the team based on the patterns of behavior of groups of employees.

Personal identification methods in the system
The system is designed for the basic inclusion of the following types of personal identification in the processes:
Face recognition
Smart video surveillance
Personal beacon tracking
Behavior patterns
Real-time identification problem
Analysis of the market situation and weaknesses of similar products in the industry
The identification system is not perfect at the moment. The most difficult thing is to identify the employee in real-time. The only straightforward physical way to do this is through genetic analysis. But this is unacceptable for many parameters.
The only technology today that solves this problem is "Behavior Patterns"

Behavior patterns are a unique tool that provides accurate employee identification. Thanks to tracking and statistical data on the employee, collected over 3-5 weeks, the system is able to draw up an accurate psychophysiological pattern of the employee, any deviation from which signals an "event" or the transition of the beacon to another person.
Behavior patterns classification
The project provides for the development of identification by patterns of behavior. The analytical system creates, places in the database, and updates data on employee movements. This allows you to very accurately determine a person by his behavior.
Job patterns
• Schedule. Visiting the same work points every day
• Execution of works. Turnaround time. The relationship between the parameters place / movement / workflow
Biometric patterns
• Walking speed
• Personal time tracks
• Lunch time tracks
Psychological patterns
• Communication
• Communication in a team
The combination of all types of personality patterns makes it possible to compose an accurate portrait. The logical extension of this system is a similar systematization of data on the divisions of the team. At the moment, this identification system is the most promising.
Security service and 3 access perimeters
In secure facilities, areas with a high level of access may be fenced off not only by their identification perimeter but also by surrounding security perimeters with a lower threshold of access. An example of a system of access to a restricted area with nested levels (from 1 to 3):
1. External public perimeter
a. Psychological filter
b. Face recognition
2. Internal technical perimeter
a. Beacon access level filter
b. Face recognition
3. Internal specially protected perimeter
a. Beacon access level filter
b. Face recognition
c. Identification by pattern of behavior