DE102017211913A1 - Method for controlling an electronic device - Google Patents

Method for controlling an electronic device

Info

Publication number
DE102017211913A1
DE102017211913A1 DE102017211913.6A DE102017211913A DE102017211913A1 DE 102017211913 A1 DE102017211913 A1 DE 102017211913A1 DE 102017211913 A DE102017211913 A DE 102017211913A DE 102017211913 A1 DE102017211913 A1 DE 102017211913A1
Authority
DE
Germany
Prior art keywords
electronic device
user
information
context information
method according
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
DE102017211913.6A
Other languages
German (de)
Inventor
Antonios Karatzoglou
Jan Zibuschka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Robert Bosch GmbH
Original Assignee
Robert Bosch GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Robert Bosch GmbH filed Critical Robert Bosch GmbH
Priority to DE102017211913.6A priority Critical patent/DE102017211913A1/en
Publication of DE102017211913A1 publication Critical patent/DE102017211913A1/en
Application status is Pending legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Abstract

The present invention comprises a method for controlling an electronic device (100), comprising the steps of detecting (S101) context information (P1, P2, P3) of the electronic device (100); detecting (S102) time information (Z1, Z2, Z3, Z4, Z5); and configuring (S103) the security parameters for controlling security functions of the electronic device based on the context information (P1, P2, P3) and the time information (Z1, Z2, Z3, Z4, Z5).

Description

  • The present invention relates to a method for controlling an electronic device by a configuration of security parameters, an electronic device, a computer program and a machine-readable storage medium.
  • State of the art
  • The publication EP 1 782 569 B1 relates to location-aware security services in a wireless network. Mobile networks may be such networks. The method includes calculating a security value associated with the requesting security level of a node based on a position of the requesting node.
  • The publication DE 10 2010 047 257 A1 relates to a mobile-based transaction system with a mobile phone, a transaction terminal and a system server for processing a cashless payment transaction. Within a multilevel security system, a location comparison of the location of a user or of the client within a mobile radio network and / or the location of the subscriber in a satellite positioning system takes place in a second level.
  • The publication DE 10 2012 220 130 A1 concerns access to secure facilities by means of biometric authentication with multiple factors. Stationary sensor units can be used to provide highly accurate contextual information (time and location) for the authentication process.
  • The publication EP 1 310 077 B1 relates to cryptographic techniques for secure distribution of data and information over a decentralized public network, and more particularly to network-based administration, management, distribution and use of conditional credentials or codes in network-based security key management systems.
  • Disclosure of the invention
  • Service providers and companion systems and applications (applications) use a variety of context and personal information on electronic devices to tailor services provided to the particular situation and user in order to optimize human-machine interaction. Typically, for a contextual and in-person system, the more information this has, the higher the quality of service it can offer to the user.
  • A first aspect relates to a method of controlling an electronic device, comprising the steps of detecting context information of the electronic device; detecting a time information; and configuring the security parameters to control security functions of the electronic device based on the context information and the time information. The method with the mentioned features has the technical advantage that the security parameters of the electronic device can be adapted both as a function of the context and as a function of time. This improves the privacy and privacy of users who use the electronic device. The user is able to sacrifice some quality of service in order to protect his privacy or increase the security of the electronic device. These circumstances can be caused by location and time. The method may be implemented, for example, in software or hardware or a hybrid of software and hardware in the electronic device.
  • In a technically advantageous embodiment of the method, the time information may include a time, a periodicity or a duration of the stay of the electronic device at a position. This method has, for example, the technical advantage that the security parameters can be adjusted according to specific times.
  • In a further technically advantageous embodiment of the method, the context information may include a position of the electronic device, an activity of the user and / or a psychological, emotional or mental state of the user. For example, this method has the technical advantage that the security parameters can be adapted to suit the context.
  • In a further technically advantageous embodiment of the method, an operation, a data transmission or a service of the electronic device can be terminated by the configuration of the safety parameters. For example, this method has the technical advantage of increasing the safety of the electronic device by deactivating the electronic device or certain parts thereof.
  • In a further technically advantageous embodiment of the method, the time information can be determined on the basis of the context information. For example, the time information, at which times safety parameters are to be changed, are determined based on a position of the electronic device. This procedure has For example, the technical advantage that depending on the context information, such as a position of the electronic device, automatically associated time information can be retrieved.
  • In a further technically advantageous embodiment of the method, the context information can be stored in a database. For example, this technique has the technical advantage that the context information can be retrieved quickly.
  • In a further technically advantageous embodiment of the method, the electronic device may be a mobile phone, a tablet PC, a motor vehicle, a smart home system, a household appliance, a clock, a drone or a service robot. The electronic device may be a wearable, such as a smartwatch or a fitness tracker bracelet, or an IoT-enabled device in general. For example, this method has the technical advantage of protecting sensitive electronic devices.
  • According to a second aspect, a computer program may be provided which is set up to carry out the method according to the first aspect. The computer program may be executed on a computer having a processor for executing the computer program and an electronic data store for storing the computer program and other data.
  • According to a third aspect, a machine-readable storage medium may be provided, on which the computer program according to the second aspect is stored. The storage medium is for example a USB memory stick or a CD-ROM on which the computer program is stored.
  • According to a fourth aspect, there may be provided an electronic device configured to perform the method of the first aspect.
  • Embodiments of the invention are illustrated in the drawings and explained in more detail in the following description. Show it
    • 1 a time-dependent criticality;
    • 2 a time interval dependent criticality;
    • 3 a schematic representation of an overall system;
    • 4 a schematic flow diagram of a method; and
    • 5 a block diagram of the method.
  • 1 shows a criticality K of privacy (privacy) as a function of the time t as time information and the position P as context information of an electronic device 100 , The criticality K indicates how great the requirements are, the privacy measures of the electronic device 100 are to be made. The higher the criticality K, the greater security measures are for the electronic device 100 to take. The criticality K of privacy changes according to the position P of the electronic device 100 and the time t. At the position P3 changes over time t the criticality K of data protection. For example, t5 is currently at the position P3 has a high criticality K in the "critical" state, while at time t1 a low criticality K is in the "non-critical" state. At time t2, a mean criticality K is present in the state "semi-critical".
  • The privacy measures may be based on security parameters for controlling security functions of the electronic device 100 be adjusted. The security parameters are in a persistent data store in the electronic device 100 stored and can be modified there as required. The stored safety parameters are read out by applications and used to configure services.
  • The security parameters include, for example, parameters that disable a location service or parameters that disable data transfer. However, the safety parameters may also include parameters pertaining to obfuscation techniques. The location information is transmitted on a more abstract level. The semantics behind the place are also considered, the so-called semantic trajectory. In this case, not only GPS coordinates and cell information of the mobile radio network (mobile mast cell ID) are considered, but also the information of the location type (Location Type).
  • Examples of different semantic levels of abstraction may be that a user visits a particular chain restaurant, visits a chain restaurant, visits a fast food restaurant, visits a restaurant, visits a dining area, or visits a leisure destination. A location-based service can also achieve good results with more abstract information that the user is visiting just any food source.
  • For example, the security parameters can adjust the level of abstraction (from the specific to the abstract). Furthermore, the security parameters can be adjusted to suit a user in a large group of users disappears, as in the case of k-anonymity.
  • The electronic device 100 is for example a mobile phone with a display 101 , For example, if the mobile phone is in a certain location in the morning, the security parameters for the mobile phone are different than if it is in the same location in the evening. If the mobile phone is in a different location, the time dependency of the security parameters also changes. For this purpose, the mobile phone determines, for example, the location via a GPS unit and the current time via the integrated clock. For example, if the phone detects that it is in the position P3 The security parameters are set differently depending on the time of day. In general, the electronic device 100 be formed by other electronic devices instead of a mobile phone.
  • The temporal change of the criticality K of the privacy of the privacy can be based on various geographic, societal and sociological factors. For example, a stay at a certain place in the evening should be judged differently than in the morning. For example, at certain locations in the evening, suppression or obfuscation of the recorded location information may be desired for privacy reasons, whereas in the morning it would not be necessary. In this case, the security parameters are set, for example, such that a transmission of a position of the electronic device 100 omitted at certain times. The criticality K can be obtained from a semantic interpretation of the place.
  • 2 shows a criticality K of the privacy of the privacy depending on a length of stay D as time information and the position P as context information of the electronic device 100 , The criticality K at the position P1 is constantly low for each length of stay D. The criticality of the position P3 changes, however, depending on the duration of residence D. For example, the criticality K increases depending on the length of stay D in the range of 1 hour to 10 hours. The amount of time that the electronic device 100 therefore, can also present critical and personal information.
  • For example, the longer a mobile phone stays in a particular location, the stricter the security parameters are set. However, if the mobile phone is in a different location, the security parameters remain unchanged even with a longer stay. For this purpose, the mobile determines, for example via a GPS unit, the location and the integrated clock the length of stay at this location. For example, if the phone detects that it is in the position P3 the safety parameters are set differently depending on the length of stay. Instead of a time or duration of stay, the time information may also include a frequency and periodicity, such as regular stays at a particular location.
  • 3 shows a schematic representation of an overall system 200 , The main component of the overall system system 200 is a unit 201 for the privacy-sensitive, semantic interpretation of time information (PSSIT - Privacy Sensitive Semantic Interpretation of Time).
  • In the unit 201 for privacy-sensitive, semantic interpretation of time information will be in step S201 entered a time information. The time information is, for example, a time, a duration, a frequency or periodicity of a stay. The time information as input to the overall system 200 serves to interpret privacy and security and to represent them semantically. To achieve this, the time information is evaluated together with further context information. The context information is, for example, a position of the electronic device 100 that in step S202 will enter a current activity of the user in step S203 enter, or a psychological, emotional or mental state of the user in step S204 will enter. This can be defined as the result of a self-trained rule machine. The rules are based, among other things, on corresponding rules that psychologists use to evaluate personality tests, for example.
  • The time and context information is provided by means of a processing unit 203 derived from a data flow by a sensor device 205 and / or a communication device connected to the Internet 207 is detected. The sensor device 205 is for example a GPS unit for determining the position of the user. The sensor device 205 however, it may also be an Activity Recognition Program that uses the sensor data of a smartphone, or a wearable, to infer an activity of the user. Furthermore, image data from cameras and radio-based scanning systems used in smart homes and environments can be used. In addition, the system can access users' calendars or emails to infer high-level activities. The sensor device 205 may be for determining the psychological, emotional or mental state of the user. these can be formed by mood tracking apps in the field of Affective Computing. It tries on the basis of rules (self-taught (unsupervised) or supervised)) to determine the state of mind of the user, his mood and his emotions. This allows the machine to be given emotional intelligence so that it can react accordingly.
  • For example, if a user attended six meetings and worked overtime on one day, the user is likely to be tired and likely to be tired. In addition, there are methods by which a system can recognize, for example from the driving behavior or from image data of the eyes, a driver's fatigue. In addition, it is possible to use image data from the attitude and movement of a person to close their mood. In addition, a text of a user and his type of wording, such as newly written emails, or spoken elements can be viewed to obtain the emotions and state of the user.
  • In addition, an optional set of knowledge bases, such as a database, may be accessed 209 General Knowledge Base (CSKB - Common Sense Knowledge Base), a database 211 for ethnographic and sociographic knowledge (ESKB - Ethno + Sociographical Knowledge Base) and / or a database 213 for a privacy aware user model (PAUMKB - Privacy Aware User Model). The knowledge representation technique of the databases 209 . 211 , and 213 may be in an ontological or other semantic structure. The databases 209 . 211 and 213 are able to identify themselves using an optional knowledge acquisition component 215 (KAC - Knowledge Acquisition Component) to expand autonomously.
  • Database 213 for the privacy-conscious user model includes personal information about the user. This information may include demographic information, a personality profile and / or a psychological, mental and emotional profile of the user. The privacy and security preferences of the user are given special consideration by the Privacy-Aware User Model. This information may be input by the user himself or by the overall system 200 fully or partially automated learning independently.
  • The learning is done using a learning component 217 (Learner Component), which learns user-specific privacy preferences from a user's behavior. The learning component 217 uses context information for this 219 , a behavior or actions 221 the user, a user interface 223 via a dialog box and / or boundary conditions 225 the application. The user interface 223 For example, through the dialog box, it directly supports the learning process through manual input or confirmation from the user.
  • The database for general knowledge 209 It covers basic knowledge and rules, which in principle describes the world and its processes based on common sense and usually knows a normal person. Database 209 for general knowledge is through the database 211 for ethnographic and sociographic knowledge, which further models and provides ethnological and sociographic knowledge and rules.
  • The unit 201 For the privacy-sensitive, semantic interpretation of time information, the knowledge from the databases fuses 209 . 211 , and 213 with the derived information from the processing unit 203 to provide both a subjective and personal interpretation of the semantic time information based on the database 213 as well as an objective, sociographic interpretation of the semantic time information based on the databases 209 and 211 for privacy and security criticality.
  • The semantic time interpretation and representation takes place in the unit 201 for privacy-sensitive, semantic interpretation of time information using a reasoner 225 instead of drawing logical conclusions. The reasoner 225 can be probabilistic, deterministic, logic or rule based. The task of the reasoner 225 is to map the time information privacy-sensitive, for example, on a scale from "critical" to "not critical". The reasoner 225 communicates with a unit 227 capable of performing a method of modifying the knowledge representation. The unit 201 to the privacy-sensitive, semantic interpretation of time information learns and develops together with the databases 209 . 211 and 213 continuously.
  • The output of the unit 201 then becomes another processing unit 227 and then to an actuator 229 forwarded. The actuator 229 is able to perform various actions, such as (re-) configuring or changing the privacy and security settings of the electronic device 100 or applications on the electronic device 100 by setting security parameters. Another action is to notify the user by notification window. In addition, the electronic device 100 temporarily stop operation or data transfer.
  • The units 201 . 203 and 227 may be implemented by software modules included in the electronic device 100 be executed or by appropriate hardwired circuits of the electronic device 100 , The overall system 200 can be implemented in a mobile phone, a motor vehicle, a smart home system or a household appliance.
  • 4 shows a schematic flowchart for the method. First, the capture of context information and the time of detection or availability of the information takes place. Subsequently, a selection of a criticality by means of in the overall system 200 stored model that maps the previously acquired information to a value that describes a criticality.
  • Optionally, further knowledge is used, for example about the user, the environment or the world (User, Context and World Knowledge), to optimize the value. Optionally, the model or one or more of the databases 209 . 211 , and 213 be updated on the basis of the information collected and processed.
  • The resulting action is to configure the security parameters of the electronic device 100 , a showing a warning on a display 101 or a shutdown of at least parts of the electronic device 101 instead of. The method comprises the steps S201 . S202 . S203 and S204 ,
  • In step S201 First of all, preprocessing takes place. The pre-processing includes, for example, recording sensor data and determining the context information. In step S202 a semantic interpretation of the criticality of the current situation (context) takes place with respect to the privacy of the user by retrieving knowledge from one or more databases 209 for general knowledge and the learned Privacy-Aware User Models.
  • In step S203 During the first run the Privacy-Aware User Models will be created or adjusted. An on-line learning (modeling and analysis) of the behavior of the user regarding his privacy attitudes / preferences and their dependence on the time and the respective situation of the user on the basis of the semantic interpretation from step S202 , This results in a continuous adaptation of the model.
  • In step S204 An online adjustment of the privacy settings of the system or the application is made. If this happens (Y), the next step is performed. If this does not happen (N), step again S201 running, creating an online learning loop.
  • 5 shows a block diagram of the method for controlling the electronic device 100 , The method includes the step S101 of an apprehension S101 the context information of the electronic device 100 and the step S102 acquiring the time information. Subsequently, in the step S103 the safety parameters for controlling safety functions of the electronic device 100 configured based on the context information and the time information.
  • The method takes into account, among other factors, the time information and provides the user with a personalized and time-sensitive assistance, based on which a configuration of the safety parameters of a device is possible. The assistance can be automated or semi-automated, such as dialog-based with a confirmation by the user. The method may be adaptable and adaptable to the particular user and his environment, for example geographically, as well as ethno-sociographically. The procedure may be on an electronic device 100 be executed with a processor and a data memory or a corresponding hardware circuit.
  • The procedure simplifies the configuration of electronic devices 100 , such as IoT systems (loT - Internet of Things), but at the same time promotes the transparency and interventionability by the user. This represents a significant added value for the user. A time-dependent different consideration of context information is achieved in determining the privacy criticality in the processing of personal information. Knowledge about social norms, such as alcohol consumption or eating during Lent, or relationships, such as places where such consumption typically occurs, may be taken into account.
  • The scope of the present invention is given by the claims and is not limited by the features illustrated in the specification or shown in the figures. Therefore, the method within the scope of the claims can be further improved to increase the efficiency of the communication, the speed of the calculations or the robustness against certain cryptographic attacks.
  • All features explained and shown in connection with individual embodiments of the invention may be provided in different combinations in the subject matter of the invention be to simultaneously realize their beneficial effects.
  • QUOTES INCLUDE IN THE DESCRIPTION
  • This list of the documents listed by the applicant has been generated automatically and is included solely for the better information of the reader. The list is not part of the German patent or utility model application. The DPMA assumes no liability for any errors or omissions.
  • Cited patent literature
    • EP 1782569 B1 [0002]
    • DE 102010047257 A1 [0003]
    • DE 102012220130 A1 [0004]
    • EP 1310077 B1 [0005]

Claims (10)

  1. A method of controlling an electronic device (100), comprising the steps of: - detecting (S101) context information (P1, P2, P3) of the electronic device (100); - detecting (S102) time information (Z1, Z2, Z3, Z4, Z5); and - Configuring (S103) the security parameters for controlling security functions of the electronic device (100) based on the context information (P1, P2, P3) and the time information (Z1 Z2, Z3, Z4, Z5).
  2. Method according to Claim 1 wherein the time information (Z1, Z2, Z3, Z4, Z5) comprises a time, a periodicity or a duration of the electronic device (100) at a position (P1, P2, P3).
  3. Method according to one of the preceding claims, wherein the context information (P1, P2, P3) comprises a position of the electronic device (100), an activity of the user and / or a psychological, emotional or mental state of the user.
  4. Method according to one of the preceding claims, wherein an operation, a data transmission or a service of the electronic device (100) is terminated by the configuration of the safety parameters.
  5. Method according to one of the preceding claims, wherein the time information is determined on the basis of the context information.
  6. Method according to one of the preceding claims, wherein the context information is stored in a database.
  7. Method according to one of the preceding claims, wherein the electronic device (100) is a mobile phone, a tablet PC, a motor vehicle, a smart home system, a household appliance, a clock, a drone or a service robot.
  8. Computer program that is set up, the procedure according to one of Claims 1 to 7 perform.
  9. Machine-readable storage medium on which the computer program is based Claim 8 is stored.
  10. Electronic device (100) adapted to perform the method of any of Claims 1 to 7 perform.
DE102017211913.6A 2017-07-12 2017-07-12 Method for controlling an electronic device Pending DE102017211913A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE102017211913.6A DE102017211913A1 (en) 2017-07-12 2017-07-12 Method for controlling an electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE102017211913.6A DE102017211913A1 (en) 2017-07-12 2017-07-12 Method for controlling an electronic device

Publications (1)

Publication Number Publication Date
DE102017211913A1 true DE102017211913A1 (en) 2019-01-17

Family

ID=64745538

Family Applications (1)

Application Number Title Priority Date Filing Date
DE102017211913.6A Pending DE102017211913A1 (en) 2017-07-12 2017-07-12 Method for controlling an electronic device

Country Status (1)

Country Link
DE (1) DE102017211913A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1310077B1 (en) 2000-08-15 2008-01-09 Viaquo Corporation Method and apparatus for a web-based application service model for security management
DE102010047257A1 (en) 2010-03-03 2011-09-08 Patrick Ams Mobile radio-based transaction system for use in e.g. airport for transaction of money, has server provided to develop cashless money transfer by participants, where location alignment is carried out between locations of participants
DE102012220130A1 (en) 2011-11-20 2013-05-23 International Business Machines Corporation Access to secure facilities
EP1782569B1 (en) 2004-07-07 2013-09-25 Nariste Networks Pty Ltd Location-enabled security services in wireless network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1310077B1 (en) 2000-08-15 2008-01-09 Viaquo Corporation Method and apparatus for a web-based application service model for security management
EP1782569B1 (en) 2004-07-07 2013-09-25 Nariste Networks Pty Ltd Location-enabled security services in wireless network
DE102010047257A1 (en) 2010-03-03 2011-09-08 Patrick Ams Mobile radio-based transaction system for use in e.g. airport for transaction of money, has server provided to develop cashless money transfer by participants, where location alignment is carried out between locations of participants
DE102012220130A1 (en) 2011-11-20 2013-05-23 International Business Machines Corporation Access to secure facilities

Similar Documents

Publication Publication Date Title
KR101889415B1 (en) Power management of mobile clients using location-based services
AU2012202777B2 (en) Retrieving contact information based on image recognition searches
KR101979401B1 (en) Ranking nearby destinations based on visit likelihoods and predicting future visits to places from location history
US8997213B2 (en) Protecting personal information upon sharing a personal computing device
US20190141494A1 (en) Systems and Methods for Proactively Identifying and Surfacing Relevant Content on an Electronic Device with a Touch-Sensitive Display
US10097973B2 (en) Systems and methods for proactively identifying and surfacing relevant content on a touch-sensitive device
US8800056B2 (en) Guided implicit authentication
KR101778180B1 (en) Method, apparatus and computer program product for improving a user experience with or performance of a device based on an enriched user profile
US20120011477A1 (en) User interfaces
US8560515B2 (en) Automatic generation of markers based on social interaction
US9606643B2 (en) Extended above the lock-screen experience
US20120079265A1 (en) Multi-mode handheld wireless device
Frank et al. Mining permission request patterns from android and facebook applications
DE202011110865U1 (en) Personalized location tags
US20130097162A1 (en) Method and system for generating and presenting search results that are based on location-based information from social networks, media, the internet, and/or actual on-site location
US9152477B1 (en) System and method for communication among mobile applications
EP2698016B1 (en) Adaptive notifications
CN105320425B (en) The presentation of user interface based on context
US8844005B2 (en) Authentication based on user behavior
CN102033744B (en) Method and device for controlling use of context information of a user
US9367878B2 (en) Social content suggestions based on connections
US9898663B2 (en) Collaboration facilitator for wearable devices
EP2904471A1 (en) Data and user interaction based on device proximity
Naeini et al. Privacy expectations and preferences in an IoT world
US20170140285A1 (en) Enhanced Computer Experience From Activity Prediction