Context recording
Download
Report
Transcript Context recording
6 October 2011
Core 4 Secure Applications
‘Instant Knowledge’
Programme Achievements
Nigel Jefferies
Huawei
www.mobilevce.com
© 2009 Mobile VCE
Instant Knowledge:
Secure Autonomous Business Collaboration
Capture and share
tacit knowledge
within and across enterprises
www.mobilevce.com
© 2009 Mobile VCE
autonomically
dynamically
guaranteeing privacy and
respecting security policies
Instant Knowledge:
Secure Autonomous Business Collaboration
Capture and share
tacit knowledge
within and across enterprises
autonomically
dynamically
guaranteeing privacy and
respecting security policies
In summary – “Find an Expert”
www.mobilevce.com
© 2009 Mobile VCE
Phone as a Social Sensor
www.mobilevce.com
© 2009 Mobile VCE
Pictorially…
www.mobilevce.com
© 2009 Mobile VCE
A history lesson…
Doesn’t work
www.mobilevce.com
© 2009 Mobile VCE
Lethargy
Ignorance
Effortless
Timeliness
Autonomic
Timely
Research Areas
Establishing User Requirements and Behaviour
Autonomous Interpersonal Networking
Pro-active Distributed Recommender System
Secure Policy-Based Information Access
Privacy-Enhancing Sharing Protocols
www.mobilevce.com
© 2009 Mobile VCE
Building a toolbox
Context recording
Device, application, user
All available as
Industry Briefs
Autonomous social network creation
Who knows who
Profile generators
Analysis of user skillset based on output
Recommender
Pointers to relevant individuals based on context,
relationship and task
UI recording and analysis
Privacy tools
www.mobilevce.com
© 2009 Mobile VCE
Centralised management system
Distributed system
Context recording
www.mobilevce.com
© 2009 Mobile VCE
Phone: number, date/time call started, duration,
incoming/outgoing/missed
SMS: number, date/time sent, length,
incoming/outgoing
Proximity: device MAC, device name, Bluetooth
class
WiFi: SSID, BSSID, IP address, data rate
Cell ID: cell ID, location area code
Application/sub-activity
Battery state, charger plugged in or not
Touch screen, hardware keys, virtual keys
Headphones
Orientation change (portrait or landscape)
GPS usage
Context recording
Web
Browser
Rails
Server
www.mobilevce.com
© 2009 Mobile VCE
Context
Database
REST
Clue
Database
REST Client
Context
Manager
N810
Generators
Autonomous social network creation
Recording and measuring ties between users
Sample implementation
IK GUI Client
OpenFire XMPP
Network Visualiser
Graphing and analysis tools
www.mobilevce.com
© 2009 Mobile VCE
Network Viewer
www.mobilevce.com
© 2009 Mobile VCE
Network Viewer
www.mobilevce.com
© 2009 Mobile VCE
Network Viewer
www.mobilevce.com
© 2009 Mobile VCE
Running IK System
www.mobilevce.com
© 2009 Mobile VCE
Running IK System
www.mobilevce.com
© 2009 Mobile VCE
Running IK System
www.mobilevce.com
© 2009 Mobile VCE
www.mobilevce.com
© 2009 Mobile VCE
Profile extraction
Automatic skills profile generation
Text gathered from application, or from body of
documents
Word documents, emails, wi-ki entries, etc
Deployed on Thales’ internal wiki
www.mobilevce.com
© 2009 Mobile VCE
Pro-Active Distributed Recommender System
The IK system is designed to automatically
recommend people based on keywords
We can extract keywords from any application
running on the N810
Two versions of the demonstrator
First takes input from applications such as email running
on Nokia N810, sends this to server and receives a list of
recommendations
Second uses additional context information and integrated
with relational analyser to provide higher quality
recommendations
www.mobilevce.com
© 2009 Mobile VCE
Improving De-centralised Recommenders
Developed probabilistic recommendation
algorithms to cope with very sparse data sets
Developed new low-rank approximation method
which radically reduces the amount of
computation to obtain a recommendation and
hides private information on individual
preference
Analysed clustering methods for reducing
computational complexity of recommenders
Developed new multi-agent algorithm for
coalition formation to improve performance of
decentralised recommender
www.mobilevce.com
© 2009 Mobile VCE
UI recording and analysis
Screen capture at 5 frames per second, half
resolution
Screen touched: location and pressure
Hardware keys, virtual keys
Orientation change
Can effectively recreate entire user-phone
interaction experience
Minimal impact on phone responsiveness &
battery life
www.mobilevce.com
© 2009 Mobile VCE
UI Recording Tool
UI Events
Screen
State
Context
Clues
UI Event
Recorder
Screen
Recorder
Context
Recorder
Events
Images
Context
Observer
Playback
www.mobilevce.com
© 2009 Mobile VCE
www.mobilevce.com
© 2009 Mobile VCE
N810 implementation
- Also available on
Android (see video)
Privacy & Security
New ID management systems and protocols
allowing varying levels of privacy
Additions to centralised schemes to allow
pseudonymity
Hierarchy of systems to provide k-anonymity in
distributed systems
www.mobilevce.com
© 2009 Mobile VCE
IK privacy – centralised solution
Identity management (IdM)
IK managed
Leverage existing enterprise IdM
IK Policy Enforcement
IK communications
Recorded transaction pseudonyms
Unlinkability
www.mobilevce.com
© 2009 Mobile VCE
Reversible pseudonymity
Unobservability
IK privacy – single sign on service
PDP
7. Decision
5.Evaluate
6. Obtain
Identity
Provider
Local policy
Enterprise
policy
IK user
IK client
www.mobilevce.com
© 2009 Mobile VCE
IK service
3. Logon
4. Query
8. Response
SSO
PDP
1. Request access
Assertion
consumer
service
PEP
2. SAML query
8. Response
IK server (recommender)
IK Privacy – distributed solution
Improve robustness against compromise:
Rather than a single IK service collecting IK user data,
multiple IK services each serve a subset of enterprise IK
users
Hierarchical IK system, in which a parent IK service
aggregates IK context data from a subset of child IK
services
Recommendations can be requested from both the local IK
service and top level IK service
Provides an upgrade path from a centralised system:
Each IK service can use the same recommender algorithms
The height of the hierarchy determines the strength of
anonymity achieved
Scalable
www.mobilevce.com
© 2009 Mobile VCE
IK Privacy – distributed solution
IK service
IK service
IK service
IK service
IK service
ID provider
ID provider
ID provider
ID provider
ID provider
ID provider
ID provider
IK
service
IK
service
IK
service
IK
service
IK
service
IK
service
IK
service
www.mobilevce.com
© 2009 Mobile VCE
Conclusions
Novel components in six key areas:
Context recording
Autonomous social network creation
Profile generators
Recommender
UI recording and analysis
Privacy tools
What applications can you create?
www.mobilevce.com
© 2009 Mobile VCE
www.mobilevce.com
© 2009 Mobile VCE