Download presentation
Presentation is loading. Please wait.
Published byAbel Williamson Modified over 9 years ago
1
www.mobilevce.com © 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei
2
www.mobilevce.com © 2009 Mobile VCE Instant Knowledge: Secure Autonomous Business Collaboration Capture and share tacit knowledge within and across enterprises autonomically dynamically guaranteeing privacy and respecting security policies
3
www.mobilevce.com © 2009 Mobile VCE Instant Knowledge: Secure Autonomous Business Collaboration Capture and share tacit knowledge within and across enterprises autonomically dynamically guaranteeing privacy and respecting security policies In summary – “Find an Expert”
4
www.mobilevce.com © 2009 Mobile VCE Phone as a Social Sensor
5
www.mobilevce.com © 2009 Mobile VCE Pictorially…
6
www.mobilevce.com © 2009 Mobile VCE A history lesson… Effortless Autonomic Timely Doesn’t work Lethargy Ignorance Timeliness
7
www.mobilevce.com © 2009 Mobile VCE Research Areas Establishing User Requirements and Behaviour Autonomous Interpersonal Networking Pro-active Distributed Recommender System Secure Policy-Based Information Access Privacy-Enhancing Sharing Protocols
8
www.mobilevce.com © 2009 Mobile VCE Building a toolbox Context recording Device, application, user Autonomous social network creation Who knows who Profile generators Analysis of user skillset based on output Recommender Pointers to relevant individuals based on context, relationship and task UI recording and analysis Privacy tools Centralised management system Distributed system All available as Industry Briefs
9
www.mobilevce.com © 2009 Mobile VCE Context recording Phone: number, date/time call started, duration, incoming/outgoing/missed SMS: number, date/time sent, length, incoming/outgoing Proximity: device MAC, device name, Bluetooth class WiFi: SSID, BSSID, IP address, data rate Cell ID: cell ID, location area code Application/sub-activity Battery state, charger plugged in or not Touch screen, hardware keys, virtual keys Headphones Orientation change (portrait or landscape) GPS usage
10
www.mobilevce.com © 2009 Mobile VCE Context recording Rails Server Context Database REST REST Client Context Manager Clue Database Generators Web Browser N810
11
www.mobilevce.com © 2009 Mobile VCE Autonomous social network creation Recording and measuring ties between users Sample implementation IK GUI Client OpenFire XMPP Network Visualiser Graphing and analysis tools
12
www.mobilevce.com © 2009 Mobile VCE Network Viewer
13
www.mobilevce.com © 2009 Mobile VCE Network Viewer
14
www.mobilevce.com © 2009 Mobile VCE Network Viewer
15
www.mobilevce.com © 2009 Mobile VCE Running IK System
16
www.mobilevce.com © 2009 Mobile VCE Running IK System
17
www.mobilevce.com © 2009 Mobile VCE Running IK System
18
www.mobilevce.com © 2009 Mobile VCE
19
www.mobilevce.com © 2009 Mobile VCE Profile extraction Automatic skills profile generation Text gathered from application, or from body of documents Word documents, emails, wi-ki entries, etc Deployed on Thales’ internal wiki
20
www.mobilevce.com © 2009 Mobile VCE Pro-Active Distributed Recommender System The IK system is designed to automatically recommend people based on keywords We can extract keywords from any application running on the N810 Two versions of the demonstrator First takes input from applications such as email running on Nokia N810, sends this to server and receives a list of recommendations Second uses additional context information and integrated with relational analyser to provide higher quality recommendations
21
www.mobilevce.com © 2009 Mobile VCE Improving De-centralised Recommenders Developed probabilistic recommendation algorithms to cope with very sparse data sets Developed new low-rank approximation method which radically reduces the amount of computation to obtain a recommendation and hides private information on individual preference Analysed clustering methods for reducing computational complexity of recommenders Developed new multi-agent algorithm for coalition formation to improve performance of decentralised recommender
22
www.mobilevce.com © 2009 Mobile VCE UI recording and analysis Screen capture at 5 frames per second, half resolution Screen touched: location and pressure Hardware keys, virtual keys Orientation change Can effectively recreate entire user-phone interaction experience Minimal impact on phone responsiveness & battery life
23
www.mobilevce.com © 2009 Mobile VCE UI Recording Tool UI Event Recorder Context Recorder Screen Recorder Observer Playback Events Images Context Screen State UI Events Context Clues
24
www.mobilevce.com © 2009 Mobile VCE N810 implementation - Also available on Android (see video)
25
www.mobilevce.com © 2009 Mobile VCE Privacy & Security New ID management systems and protocols allowing varying levels of privacy Additions to centralised schemes to allow pseudonymity Hierarchy of systems to provide k-anonymity in distributed systems
26
www.mobilevce.com © 2009 Mobile VCE IK privacy – centralised solution Identity management (IdM) IK managedLeverage existing enterprise IdM IK communications Recorded transaction pseudonyms Reversible pseudonymity Unlinkability Unobservability IK Policy Enforcement
27
www.mobilevce.com © 2009 Mobile VCE IK privacy – single sign on service Identity Provider PDP SSO 5.Evaluate 7. Decision IK user IK client Local policy 1. Request access 2. SAML query IK service Assertion consumer service IK server (recommender) 3. Logon 4. Query 6. Obtain 8. Response Enterprise policy PDP PEP 8. Response
28
www.mobilevce.com © 2009 Mobile VCE IK Privacy – distributed solution Improve robustness against compromise: Rather than a single IK service collecting IK user data, multiple IK services each serve a subset of enterprise IK users Hierarchical IK system, in which a parent IK service aggregates IK context data from a subset of child IK services Recommendations can be requested from both the local IK service and top level IK service Provides an upgrade path from a centralised system: Each IK service can use the same recommender algorithms The height of the hierarchy determines the strength of anonymity achieved Scalable
29
www.mobilevce.com © 2009 Mobile VCE IK Privacy – distributed solution IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service
30
www.mobilevce.com © 2009 Mobile VCE Conclusions Novel components in six key areas: Context recording Autonomous social network creation Profile generators Recommender UI recording and analysis Privacy tools What applications can you create?
31
www.mobilevce.com © 2009 Mobile VCE
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.