© 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei
© 2009 Mobile VCE Instant Knowledge: Secure Autonomous Business Collaboration Capture and share tacit knowledge within and across enterprises autonomically dynamically guaranteeing privacy and respecting security policies
© 2009 Mobile VCE Instant Knowledge: Secure Autonomous Business Collaboration Capture and share tacit knowledge within and across enterprises autonomically dynamically guaranteeing privacy and respecting security policies In summary – “Find an Expert”
© 2009 Mobile VCE Phone as a Social Sensor
© 2009 Mobile VCE Pictorially…
© 2009 Mobile VCE A history lesson… Effortless Autonomic Timely Doesn’t work Lethargy Ignorance Timeliness
© 2009 Mobile VCE Research Areas Establishing User Requirements and Behaviour Autonomous Interpersonal Networking Pro-active Distributed Recommender System Secure Policy-Based Information Access Privacy-Enhancing Sharing Protocols
© 2009 Mobile VCE Building a toolbox Context recording Device, application, user Autonomous social network creation Who knows who Profile generators Analysis of user skillset based on output Recommender Pointers to relevant individuals based on context, relationship and task UI recording and analysis Privacy tools Centralised management system Distributed system All available as Industry Briefs
© 2009 Mobile VCE Context recording Phone: number, date/time call started, duration, incoming/outgoing/missed SMS: number, date/time sent, length, incoming/outgoing Proximity: device MAC, device name, Bluetooth class WiFi: SSID, BSSID, IP address, data rate Cell ID: cell ID, location area code Application/sub-activity Battery state, charger plugged in or not Touch screen, hardware keys, virtual keys Headphones Orientation change (portrait or landscape) GPS usage
© 2009 Mobile VCE Context recording Rails Server Context Database REST REST Client Context Manager Clue Database Generators Web Browser N810
© 2009 Mobile VCE Autonomous social network creation Recording and measuring ties between users Sample implementation IK GUI Client OpenFire XMPP Network Visualiser Graphing and analysis tools
© 2009 Mobile VCE Network Viewer
© 2009 Mobile VCE Network Viewer
© 2009 Mobile VCE Network Viewer
© 2009 Mobile VCE Running IK System
© 2009 Mobile VCE Running IK System
© 2009 Mobile VCE Running IK System
© 2009 Mobile VCE
© 2009 Mobile VCE Profile extraction Automatic skills profile generation Text gathered from application, or from body of documents Word documents, s, wi-ki entries, etc Deployed on Thales’ internal wiki
© 2009 Mobile VCE Pro-Active Distributed Recommender System The IK system is designed to automatically recommend people based on keywords We can extract keywords from any application running on the N810 Two versions of the demonstrator First takes input from applications such as running on Nokia N810, sends this to server and receives a list of recommendations Second uses additional context information and integrated with relational analyser to provide higher quality recommendations
© 2009 Mobile VCE Improving De-centralised Recommenders Developed probabilistic recommendation algorithms to cope with very sparse data sets Developed new low-rank approximation method which radically reduces the amount of computation to obtain a recommendation and hides private information on individual preference Analysed clustering methods for reducing computational complexity of recommenders Developed new multi-agent algorithm for coalition formation to improve performance of decentralised recommender
© 2009 Mobile VCE UI recording and analysis Screen capture at 5 frames per second, half resolution Screen touched: location and pressure Hardware keys, virtual keys Orientation change Can effectively recreate entire user-phone interaction experience Minimal impact on phone responsiveness & battery life
© 2009 Mobile VCE UI Recording Tool UI Event Recorder Context Recorder Screen Recorder Observer Playback Events Images Context Screen State UI Events Context Clues
© 2009 Mobile VCE N810 implementation - Also available on Android (see video)
© 2009 Mobile VCE Privacy & Security New ID management systems and protocols allowing varying levels of privacy Additions to centralised schemes to allow pseudonymity Hierarchy of systems to provide k-anonymity in distributed systems
© 2009 Mobile VCE IK privacy – centralised solution Identity management (IdM) IK managedLeverage existing enterprise IdM IK communications Recorded transaction pseudonyms Reversible pseudonymity Unlinkability Unobservability IK Policy Enforcement
© 2009 Mobile VCE IK privacy – single sign on service Identity Provider PDP SSO 5.Evaluate 7. Decision IK user IK client Local policy 1. Request access 2. SAML query IK service Assertion consumer service IK server (recommender) 3. Logon 4. Query 6. Obtain 8. Response Enterprise policy PDP PEP 8. Response
© 2009 Mobile VCE IK Privacy – distributed solution Improve robustness against compromise: Rather than a single IK service collecting IK user data, multiple IK services each serve a subset of enterprise IK users Hierarchical IK system, in which a parent IK service aggregates IK context data from a subset of child IK services Recommendations can be requested from both the local IK service and top level IK service Provides an upgrade path from a centralised system: Each IK service can use the same recommender algorithms The height of the hierarchy determines the strength of anonymity achieved Scalable
© 2009 Mobile VCE IK Privacy – distributed solution IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service
© 2009 Mobile VCE Conclusions Novel components in six key areas: Context recording Autonomous social network creation Profile generators Recommender UI recording and analysis Privacy tools What applications can you create?
© 2009 Mobile VCE