Context recording

Download Report

Transcript Context recording

6 October 2011
Core 4 Secure Applications
‘Instant Knowledge’
Programme Achievements
Nigel Jefferies
Huawei
www.mobilevce.com
© 2009 Mobile VCE
Instant Knowledge:
Secure Autonomous Business Collaboration
Capture and share
 tacit knowledge
within and across enterprises




www.mobilevce.com
© 2009 Mobile VCE
autonomically
dynamically
guaranteeing privacy and
respecting security policies
Instant Knowledge:
Secure Autonomous Business Collaboration
Capture and share
 tacit knowledge
within and across enterprises




autonomically
dynamically
guaranteeing privacy and
respecting security policies
In summary – “Find an Expert”
www.mobilevce.com
© 2009 Mobile VCE
Phone as a Social Sensor
www.mobilevce.com
© 2009 Mobile VCE
Pictorially…
www.mobilevce.com
© 2009 Mobile VCE
A history lesson…
Doesn’t work
www.mobilevce.com
© 2009 Mobile VCE
Lethargy
Ignorance
Effortless
Timeliness
Autonomic
Timely
Research Areas
 Establishing User Requirements and Behaviour
 Autonomous Interpersonal Networking
 Pro-active Distributed Recommender System
 Secure Policy-Based Information Access
 Privacy-Enhancing Sharing Protocols
www.mobilevce.com
© 2009 Mobile VCE
Building a toolbox
 Context recording
 Device, application, user
All available as
Industry Briefs
 Autonomous social network creation
 Who knows who
 Profile generators
 Analysis of user skillset based on output
 Recommender
 Pointers to relevant individuals based on context,
relationship and task
 UI recording and analysis
 Privacy tools
www.mobilevce.com
© 2009 Mobile VCE
 Centralised management system
 Distributed system
Context recording
www.mobilevce.com
© 2009 Mobile VCE
 Phone: number, date/time call started, duration,
incoming/outgoing/missed
 SMS: number, date/time sent, length,
incoming/outgoing
 Proximity: device MAC, device name, Bluetooth
class
 WiFi: SSID, BSSID, IP address, data rate
 Cell ID: cell ID, location area code
 Application/sub-activity
 Battery state, charger plugged in or not
 Touch screen, hardware keys, virtual keys
 Headphones
 Orientation change (portrait or landscape)
 GPS usage
Context recording
Web
Browser
Rails
Server
www.mobilevce.com
© 2009 Mobile VCE
Context
Database
REST
Clue
Database
REST Client
Context
Manager
N810
Generators
Autonomous social network creation
 Recording and measuring ties between users
 Sample implementation
 IK GUI Client
 OpenFire XMPP
 Network Visualiser
 Graphing and analysis tools
www.mobilevce.com
© 2009 Mobile VCE
Network Viewer
www.mobilevce.com
© 2009 Mobile VCE
Network Viewer
www.mobilevce.com
© 2009 Mobile VCE
Network Viewer
www.mobilevce.com
© 2009 Mobile VCE
Running IK System
www.mobilevce.com
© 2009 Mobile VCE
Running IK System
www.mobilevce.com
© 2009 Mobile VCE
Running IK System
www.mobilevce.com
© 2009 Mobile VCE
www.mobilevce.com
© 2009 Mobile VCE
Profile extraction
 Automatic skills profile generation
 Text gathered from application, or from body of
documents
 Word documents, emails, wi-ki entries, etc
 Deployed on Thales’ internal wiki
www.mobilevce.com
© 2009 Mobile VCE
Pro-Active Distributed Recommender System
 The IK system is designed to automatically
recommend people based on keywords
 We can extract keywords from any application
running on the N810
 Two versions of the demonstrator
 First takes input from applications such as email running
on Nokia N810, sends this to server and receives a list of
recommendations
 Second uses additional context information and integrated
with relational analyser to provide higher quality
recommendations
www.mobilevce.com
© 2009 Mobile VCE
Improving De-centralised Recommenders
 Developed probabilistic recommendation
algorithms to cope with very sparse data sets
 Developed new low-rank approximation method
which radically reduces the amount of
computation to obtain a recommendation and
hides private information on individual
preference
 Analysed clustering methods for reducing
computational complexity of recommenders
 Developed new multi-agent algorithm for
coalition formation to improve performance of
decentralised recommender
www.mobilevce.com
© 2009 Mobile VCE
UI recording and analysis
 Screen capture at 5 frames per second, half
resolution
 Screen touched: location and pressure
 Hardware keys, virtual keys
 Orientation change
 Can effectively recreate entire user-phone
interaction experience
 Minimal impact on phone responsiveness &
battery life
www.mobilevce.com
© 2009 Mobile VCE
UI Recording Tool
UI Events
Screen
State
Context
Clues
UI Event
Recorder
Screen
Recorder
Context
Recorder
Events
Images
Context
Observer
Playback
www.mobilevce.com
© 2009 Mobile VCE
www.mobilevce.com
© 2009 Mobile VCE
N810 implementation
- Also available on
Android (see video)
Privacy & Security
 New ID management systems and protocols
allowing varying levels of privacy
 Additions to centralised schemes to allow
pseudonymity
 Hierarchy of systems to provide k-anonymity in
distributed systems
www.mobilevce.com
© 2009 Mobile VCE
IK privacy – centralised solution
Identity management (IdM)
IK managed
Leverage existing enterprise IdM
IK Policy Enforcement
IK communications
Recorded transaction pseudonyms
Unlinkability
www.mobilevce.com
© 2009 Mobile VCE
Reversible pseudonymity
Unobservability
IK privacy – single sign on service
PDP
7. Decision
5.Evaluate
6. Obtain
Identity
Provider
Local policy
Enterprise
policy
IK user
IK client
www.mobilevce.com
© 2009 Mobile VCE
IK service
3. Logon
4. Query
8. Response
SSO
PDP
1. Request access
Assertion
consumer
service
PEP
2. SAML query
8. Response
IK server (recommender)
IK Privacy – distributed solution
 Improve robustness against compromise:
 Rather than a single IK service collecting IK user data,
multiple IK services each serve a subset of enterprise IK
users
 Hierarchical IK system, in which a parent IK service
aggregates IK context data from a subset of child IK
services
 Recommendations can be requested from both the local IK
service and top level IK service
 Provides an upgrade path from a centralised system:
 Each IK service can use the same recommender algorithms
 The height of the hierarchy determines the strength of
anonymity achieved
 Scalable
www.mobilevce.com
© 2009 Mobile VCE
IK Privacy – distributed solution
IK service
IK service
IK service
IK service
IK service
ID provider
ID provider
ID provider
ID provider
ID provider
ID provider
ID provider
IK
service
IK
service
IK
service
IK
service
IK
service
IK
service
IK
service
www.mobilevce.com
© 2009 Mobile VCE
Conclusions
Novel components in six key areas:
 Context recording
 Autonomous social network creation
 Profile generators
 Recommender
 UI recording and analysis
 Privacy tools
What applications can you create?
www.mobilevce.com
© 2009 Mobile VCE
www.mobilevce.com
© 2009 Mobile VCE