1 tool of the trade – pervasive and embedded mobile systems chapter 8 of mobile commerce and...
Post on 26-Dec-2015
215 Views
Preview:
TRANSCRIPT
1
Tool of the Trade – Pervasive and embedded mobile systems
Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips
2
Pervasive 普遍的 , 蔓延的 , 滲透的 Computing
Defining pervasive computing Technologies within the pervasive computing domain Networked pervasive computing Embedded systems ergonomics Wearable computing Biometric systems Biometric issues and systems security Biometric system applications Biometric systems integration Digital signatures Automobile telematics and vehicle telemetry Universal Information Appliances (UIAs) Obstacles
3
Defining pervasive computing
Used interchangeably with the term ‘ubiquitous到處存在的 computing’
Freed from the PC desktop, and embedded in static and mobile devices that are in communication with one another via wireless telecommunications
Within the pervasive computing systems environment, computing is spread and distributed throughout are predominately mobile.
4
Key concepts for pervasive computing
Mobility 移動性 indicates the quality of being mobile; able to move about easily, speedily, unfixed, and changing rapidly
Embedding 嵌入 indicates the process of including, subsuming 包容 and engendering 形成 objects with physical and logical qualities
Ubiquity 到處存在 indicates the quality of existence everywhere, and all around, often the same time
5
Characteristics of pervasive computing
Numerous, casually accessible, often invisible computing devices;
Frequently mobile or embedded in the systems environment;
Connected to an increasingly ubiquitous network infrastructure
6
Technologies within the pervasive computing domain
Technological and conceptual drives: Intelligent, mobile and portable devices; Intelligent agent applications triggered by
sensing the environment; Distributed networking environments mediated
by wireless telecommunications Convenient, unobtrusive 客氣的 access to
relevant information anywhere and any time; Richness of location-based information and
applications
7
Desirable characteristics of embedded smart devices
Unobtrusively embedded Completely connected Intuitive intelligence Effortlessly portable and mobile Constantly on and available
8
Areas of applications
Smart rooms Wearable computing Automotive telemetry Information appliances
9
Technologies for pervasive computing
Gesture recognition Speech recognition Intuitive interfaces Hardware circuitry
10
Networked pervasive computing
Translate and integrate conventional computer networks into the pervasive systems domain Creating environments for networking and other
technology convergence 集中 in pervasive computing
Changing information systems, processes and procedures to enable a higher level of integration
Creating proactive and sensor-based systems as well as reactive systems environments
Creating open systems environments that enable a deeper level of user interaction with systems.
11
Factors for convergence in networked pervasive computing
Embedding common software applications in the world around us
Embedding natural-language speech recognition devices into mediated user environments;
Using lower power, or self-powering, devices that require little maintenance;
Ensuring robust transmission and security within the networked environment
12
1st generation pervasive computing - Applications
Traditional networked systems are used in new and innovative ways Gyms and fitness suites that equip exercise machines with Internet
access so that people using exercise bikes and rowing machines may engage with the Internet while sedentary
Elevators in office building and hotels that have embedded display screens to enable the people using them to have constant access to Internet-provided daily news, or to advertising data tailored to the perceived needs of different captive audiences
Household appliances that are connected to information and applications. ( ie microwave cookers that can download recipes and automatically set the correct time and temperature necessary to produce a perfectly cooked meal )
Elevators that are instinctively aware of their own performance parameters and maintenance lifecycles, so that faults and service intervals can be automatically communicated back to the provider of the elevator;
Broadband and digitally enabled television sets which enable access to the Internet and encourage interactive involvement with products an services.
13
2nd generation pervasive computing (and beyond)
Toward device integration, such as the use of portable, unobtrusive information appliances that are on, or about, a human being.
Many connections are initiated reactively as the person moves about (and interacts with) their world.
Biometrics and wearable computing Create a PAN rather a LAN environment
that allows effective device integration and human computer interaction
14
Embedded systems ergonomics
Common ergonomic factors: Convenience often depends upon the
purpose and location of technology. Interleaved with human behaviour such
as cultural attitude to business and technology, and geographical region
Devices should fit in with human lifestyles, allowing interpersonal pervasive computing.
15
Wearable computing
1st generation: eyeglasses and wristwatches that contain powerful computing applications (portable, mobile and conveniently worn by people)
2nd generation: embedding of small devices into clothing or more (surgical implanting of computer chips into the skin, organs, and body of a human being)
16
Wearable computing – 6 attributes Unmonopolizing of the user’s attention: It does not
cut you off from the outside world like a virtual reality game.
Unrestrictive to the user: you can do other things while using it.
Observable by the user: It can get your attention continuously if you want it to.
Controllable by the user: You can grab control of it at any time you wish.
Attentive to the environment: Environmentally aware, multimodal, multisensory.
Communicative to others: Can be used as a communications medium when you want it to.
17
Biometric systems
Automated computing systems to identify people by their physiological or behavioural characteristics
Biometrics is concerned with measuring human characteristics for the purpose of identifying human beings.
18
Features measured in biometrics:
Facial characteristics and feature identification
Fingerprint identification Hand geometry measurement and
identification Handwriting appraisal and identification Iris and retinal identification Voice measurement and authentication
19
Three ways to identify a human being
Something the user knows: PIN Something the user has: smart card Something the user is: fingerprint
biometric security naturalistic, convenient, and sits well with
the general concept of pervasive computing
20
Fingerprints
Use pattern-matching of fingertips Pattern-matching devices Fingerprint matching is a relatively
cost-effective security technique. E.g. area access
21
Hand geometry
Involve analyzing and measuring the shape and natural characteristics of the hand
E.g. auditing and monitoring staff movement through a building, time and attendance recording and monitoring, and secure area admittance
22
Facial features
Involve analyzing facial features and characteristics (3-dimentaional recognition)
Rely on digital imaging of human features to develop a facial image of a human user for the purposes of identification
Possess high levels of statistical accuracy E.g. ‘tricksters’ of casinos - to match and
identify those on its database
23
Eye features
2 areas: iris analysis and retina analysis Retina biometrics
Involve scanning and analyzing the layer of blood vessels situated at the back of the eye
The pattern, size and distribution of the blood vessels form a unique human identifier.
The back of the eye is scanned using a low-intensity light source to determine the unique patterns of the retina.
The user has to place their face accurately into the coupler device so that they can focus on a given source of light at the correct angle => intrusive
Iris biometrics Use simpler camera scanning equipment No close contact between the iris and scanning equipment
24
Voice features
2 forms: wave modulation of a human voice, and “voice-to-print” (voice is translated to text)
Less accurate: because ambient noise and mood can affect verification
Less developed as to eye or facial biometrics
25
Signature features
Involve the analysis of the written human signature, either in real time or historical time
Signature include speed, flow, and pressure (in real time) as well as the shape and nature of the final signature (in historical analysis)
Used for thousands of years
26
Biometric issues and systems security - factors
Ease of use Intrinsic error effects Device accuracy User acceptance Cost to benefit Stability of technology Required security level
27
Biometric issues and systems security
Two different methods to assess biometric accuracy: False Acceptance Rate (FAR)
– the percentage of impostors incorrectly matched to a genuine and valid user’s biometric template;
False Rejection Rate (FRR) – the percentage of incorrectly rejected genuine and valid users
FRR
FAR
Crossover Error Rate (CER)
0
28
Biometric systems applications
To restrict or permit access to secure physical zones
To control virtual access within computerized system environments (To authenticate financial transactions
Areas: in military buildings and other areas of high danger, such as laboratories in the pharmaceutical industry
Advantages: reduction in the number of human beings, for environments of high-volume access control additional security – 2 or 3 factor authentication Enable personnel to be security coded into different levels
in a military (and government) buildings
29
Biometric systems integration
4 elements of a biometric system infrastructure The integration of the devices and technologies used to
physically recognize a human feature The capture, storage and enrolment of human being’s
characteristics and features into a digitized database The retrieval of the biometric template from the storage
devices and the subsequent verification of the unique biometric characteristics of the person
An audit trail record of user interaction with a secure system
Trust and reliability are essential aspects in biometric systems adoption.
30
Digital signatures
Similar manner to hand-written signatures
Use PKI to verify the identity of a sender of a message
Refer to Cryptography Notes
31
Automobile telematics and vehicle telemetry The use of embedded computerized systems in
automobiles Telematics is the convergence of wireless technology,
Global Positioning Systems (GPS), onboard electronics and information entertainment services.
The use of wireless technology to remotely monitor the performance of a vehicle
Applications: Ro remotely inform a network operator of an airbag being
deployed and even guide emergency services to the location of an accident via GPS technology
Automatic phone messaging to inform an automobile owner that their car alarm is sounding
To lock and open automobiles, access Internet data, and locate the movement of the automobile
Safety and security issues
32
Universal Information Appliances (UIAs)
Always on, always connected to its environment, and portable enough to be unobtrusively carried around by its owner
No such device! Three features of UIAs
Dynamic user interface design – a device consideration
Open wireless infrastructure – a communications consideration
Software system integration – an applications consideration
33
UIAs characteristics
Be convenient to the user Enhance the user’s productivity Fit seamlessly into a user’s lifestyle
34
Obstacles in pervasive computing
Need UIAs Environmental obstacles
Regional, national, social and cultural differences in the adoption and user of technologies
Uncommon technology standards and a a lack of open systems
Untested business opportunities and lack of awareness of customer and user preferences
Human resistance to unnatural technologies and applications
35
Successful pervasive computing systems
Wireless network infrastructures (hardware)
Enabling and intelligent applications (software)
Portability, connectivity, and convenience (mobility)
top related