Before we can discuss how we can allow the user to use cognitive services which are in the cloud to search and interact with personal documents, apps and devices without exposing those items to unauthorized access, we need to briefly go over some key concepts of the basic philosophy behind Daneel.
Key concepts to understand to use Daneel’s cognitive system
Daneel is a multi-agent, auto-adaptative organizational memory. Nodes within the memory represent symbols. These symbols can represent words in the common language or algorithms. Morphological structures can link nodes together to form new nodes which are abstractions of the underlying nodes.
Data is not passive anymore
Some of these algorithm backed nodes can interface with deterministic processes that exist outside of Daneel’s structure. For example, the nodes “current” + “weather” + “Montreal” might be represented by a morphological node which is backed by an algorithm whose purpose is to call an API at theweathernetwork.com to get current weather conditions in Montreal at the moment.
Autonomous organizational structure means more power
Some algorithm backed nodes can be used to link to other organizational memory structures, for example Daneel could encompass data centers in different parts of the world. If Daneel North America does not have the knowledge to address a particular user input, it would be able to ‘ask’ a neighbouring data center using the same process to see if it contains the right answer.
It is in this last type of node that the answer to how to search and interact through personal documents, apps and devices while maintaining privacy is found. Each document, app and device which belongs to a user would expose a partial graph which contains the contexts (morphological nodes representing the symbols found within the documents) and algorithm backed nodes (which give Daneel the capacity of taking actions through apps and devices).
In the cloud, the user would be represented by a node as well. This node would be linked to the partial graphs ONLY when the user accesses the organizational memory through an authenticated device. When the user submits a query to Daneel, all nodes including those which are connected through the user`s node (the partial graphs exposing personal documents, applications and devices) are considered within the sphere of possible nodes which make up the ‘answer’ graph(s).
When the user is NOT connected to Daneel through an authenticated device then Daneel is NOT able to find personal documents or access apps and devices that belong to the user’s private space. By the same token…neither can anyone else.
Security brought to another level
In a future article we will discuss how we can push this concept of security on a user’s private objects by using graphs, ontology versioning and new encryption techniques to safeguard against any traditional hacker tricks.