This application claims priority under the Paris Convention and 35 USC 119 to Indian Patent Application Serial No. 202221028558 filed May 18, 2022, that is incorporated herein by reference.
The disclosure relates generally to peer to peer (P2P) systems and in particular to a P2P system for encrypted data.
Peer-to-Peer (P2P) file-sharing is the mechanism adopted by file-sharing apps to enable people to share files among themselves, at little or no cost. The file sharing mechanism, while simple and cost-effective, does not provide a way to share licensed files between peers in a secure and legal manner. At present, although several digital rights management (DRM) technologies are available, there is no DRM solution that allows secure sharing of licensed files from one device to another in a pure peer-to-peer (P2P) scenario. The reason for not having such a solution may be attributed to the fear of unfettered distribution of DRM-protected content. However, incidences of illegal transfer of licensed or copyright-protected files keep surfacing from time to time.
These current content distribution systems do have a mechanism for distribution of encrypted/secured content using a digital rights management (DRM) system. Currently, all DRM technologies use a mechanism for license generation, which is served from the cloud. The logic for the distribution of DRM-protected content is closely monitored by a central authority, which hinders scalability. If the license server or designated authority is down or unreachable, a user cannot transfer a protected piece of content from one endpoint (PC, media device, service, etc.) to another which is problematic. The DRM technologies have protection policies. Though necessary, these protection policies complicate the matter since device-specific licensing, multi-use restrictions, etc. prevent users from sharing content among legitimate consumers of the same service(s).
Today, when a user wishes to play any content, such as a song or a video, which is protected by DRM, the user client has to involve a central licensing authority (CLA) to issue or validate the license for rendering the content on multiple devices. The CLA may be the content owner or an independent third party. Its intervention is required for the DRM content to be successfully shared across devices. For instance, if a user wishes to transfer or access a song from Device A to Device B, a CLA has to interface with Device B to issue an appropriate license or validate the existing one for playing the content.
Peer to Peer (P2P) content distribution for encrypted data uses smarter mathematical models to make an individual license work for multiple devices, file formats, and platforms. Technologies for peer-to-peer data exchange over networks have been in existence virtually since the beginning of computer networking in the 1980s. Nowadays, in its most generic form, the term peer-to-peer is used to distinguish a network architecture from client-server, which has been a dominant architecture in both pre-Internet network applications and on the Internet itself. The idea of client-server is that resources (such as files) are on a server computer, and clients can only obtain resources through servers. For instance, if client C1 wants to fetch resource R from client C2, then it needs to go through a server to do so, thereby, requiring the server to have a list of resources that includes resource R and C2 as its location. In a server-based architecture, the more demand for a file, the more bandwidth cost it entails. In a peer to peer (P2P) system, the more a file is requested, the more nodes are seeding it, lowering the delivery cost per-file distributed. The role of the audience in the equation for P2P is inverted.
Although P2P on the Internet did not come into being until 1999, IP owners had been long concerned with digital networks being the conduits for unauthorized file copying. Most industry-observers identify the year 1994, as the year when digital rights management began to emerge as a field of its own. Though the early contributors to the DRM field did not necessarily envision the Internet to be as dominant a force as it has become now, 1994 can still be regarded as the year that saw the beginning of the commercialization of the Internet. IP owners in the mid-1990s saw online rights management as an effort toward replication of the business model of the offline world. As a crude example, the “rights management” properties of a printed book result directly from its physical characteristics, e.g., it is difficult to copy books in their entirety and virtually impossible to change their contents in place. Publishers sought technologies that would bring similar behavior to the online digital world. Early DRM solutions, such as IBM's Cryptolope and EPR's (later InterTrust's) DigiBox, attempted to provide that behavior. Just as P2P is an Internet application of pre-existing network architectures, DRM technology is really an extension of techniques that had long been used in operating systems to control users' access to system resources.
There are different types of DRM implementations, but all of them conform to a common architecture as shown in
IP owners have been using DRM to implement new business models, which are not just analogs of existing offline models. Such models represent the brightest future for online content distribution. However, they have only been modestly successful, because it takes a lot of time and effort to get users comfortable with new ways of consuming content. As a result, DRM is starting to take off as a component of online content models in niche markets, such as the online music distribution of Apple's iTunes, RealNetworks's Rhapsody, and Napster 2.0; eBooks and ePeriodicals from various publishers; and online film download services like MovieLink and Cinemallow.
DRM has had a hard time developing as a market, for several reasons. Online replication of offline business models has been rough from the perspective of user convenience. There is also an ingrained notion about consumer behavior (and, some feel in legal precedents as well) that people should be allowed to do what they wish with digital content, without the fear of being controlled or monitored. DRM technology can monitor and control. At the same time, the networked digital paradigm has introduced the concept of “do what you wish” to allow rampant, unrestricted, perfect copying; IP owners need to be able to control that. Therefore, DRM continues to develop toward giving users convenient, seamless experiences along with guarantees of privacy.
There has recently been an explosion of mobile data as shown in
Latency refers to the delay users experience, measured in millliseconds, as data makes a round trip through a network. LTE Networks can operate with a latency up to 10 ms even on the 1800 MHz spectrum, which is widely accepted as a standard across global telecom operators. Nonetheless, due to network congestion, the latency is 4-7 times higher than optimal, across countries. Globally, the average latency across even 4G networks has not crossed the sub-30 milliseconds milestone. The most recent statistics for average global latency stands at 40 ms, while the average latency in developing nations is far worse. India ranks 131 in global mobile internet speed ranking behind countries like Syria, Kenya and Angola and India has latency of 52 milliseconds v/s global average of 37 milliseconds. Close to 90% of the rural internet population and 60% of Urban internet users in India face network issues like high load time, poor signal and delay in receiving information. The use cases of a railway network or a metro/bus or an airplane where you will have unreliable connectivity also forms a use case where such a solution will enable support. During the COVID-19 pandemic, a mobile experience report suggests that the average deterioration of Internet speed was pegged at an average of 15-20% across 42 countries that the survey was carried out across, during the period March 2020-May 2020. According to Cisco forecasts and practical experiences of mobile operators, the world is facing the “mobile data apocalypse” in which cellular networks do not, yet, have enough capacity to serve for such an exponential growth of data.
Mobile data needs reasonable DRM usage support. The term “fair use” is a loaded one; it has a specific meaning under U.S. copyright law (its analog in the U.K., Canada, and Australia is “fair dealing”). Consumer advocates and others have extended the meaning to include few other reasonable usage expectations. The legal term refers to usage of content that are valid defenses to charges of copyright infringement. Users must conform to broad legal guidelines, but ultimately a judge and jury decides on whether the usage is fair. Therefore, it is impossible to create an automated system to proactively decide whether to allow usage based on the legal fair-use criteria. “Reasonable usage expectation” is subjective. If a user buys a piece of content, he/she may well expect the content to be rendered (display, play, or print) on any device that he/she owns.
The global market for Digital Rights Management (DRM) that is estimated at US$3.3 billion in the year 2020, is projected to reach a revised size of US$8.2 Billion by 2027—growing at a CAGR of 13.7% over the analysis period 2020-2027. The media and entertainment DRM, one of the segments analyzed in the report, is projected to record a 14.6% CAGR to reach US$5.5 billion by the end of the analysis period. After an early analysis of the business implications of the pandemic and its induced economic crisis, growth in the enterprise DRM segment is readjusted to a revised 12.9% CAGR for the next 7-year period. In the global Software DRM segment, USA, Canada, Japan, China, and Europe will drive the 10.4% CAGR estimated for this segment. These regional markets that account for a combined market size of US$465.5 million in the year 2020, will reach a projected size of US$930.5 million by the end of the analysis period. China will remain among the fastest growing in this cluster of regional markets. Led by countries, such as Australia, India, and South Korea, the market in Asia-Pacific is forecasted to reach US$1.2 billion by the year 2027, while Latin America will expand at a 12.7% CAGR through the analysis period.
DRM systems should be able to support a user's reasonable content usage expectations; this should include acting independently of individual formats and playback software or devices, and facilitating any necessarily format conversions or transcoding. In addition, the DRM solution should be able to serve the user requirement in an under-connected or unconnected environment. As we said above that 70% of India's internet users face problems with connectivity and experience delays and latency it becomes very important to have capability to generate DRM at the user interface without having to transfer the DRM using the internet. This capability of self-generated DRM in an under-connected or unconnected environment will enable users to view the content piece without having to worry about the connectivity issues.
Need for Lightweight DRM Protected Content Super-Distribution
At 1.5 trillion, the Indian media and entertainment sector is one of the largest industries in the world, but continues to battle a serious piracy problem with $2.8 billion of its annual revenue lost due to piracy. P2P piracy is still prominent around the globe and plays a central role in distributing content to the online piracy ecosystem. The high-quality video content in greatest demand on piracy sites is first released on the P2P network. In fact, web video sites source a significant proportion (28%) of their high-quality movie and TV video content from P2P sites. Irdeto tracked more than 800 million monthly downloads between January 2017 and May 2018 through its P2P Business Intelligence tracker. This is where global activity for more than 400 popular movie and TV titles is monitored. March 2018 was the peak in activity when nearly 977 million infringing copies of movies and TV shows were downloaded globally from P2P sites. Like the case for live streaming, the US again leads the world in the number of users accessing illegal content, with some significant differences in the countries also ranked high on P2P piracy.
The top five countries for P2P downloads between January 2017 and May 2018 are as follows: USA—1.71 billion; RUSSIA—1.64 billion; BRAZIL—1.17 billion; INDIA—965 million and NETHERLANDS—636 million. Demand for high quality video content drives P2P piracy, and India accounts for 60% of piracy visits via P2P sites, the report said. India also ranked fourth in downloading Blu-ray files (171 million), surpassing China (50.8 million) and catching up with the US (180 million). Superdistribution has been mentioned in the same breath as DRM since the early days of DRM, when a few DRM technology vendors attempted to support it. The Superdistribution scheme to make its own economic offers is prohibitive. For example, one peer may want to sell content items individually at a profit, while another may want to sell them at cost, another may want to loan them, and yet another may want to make a repository of items available on a monthly subscription basis. The nearest that most DRM schemes have gotten to “Superdistribution” is a URL included in encrypted files that takes users who are not authorized to access the content to a website where they can purchase rights. This is inadequate and the peers should be able to define their own business models.
Consumers are willing to pay for content that meets their needs. Given the sheer volume of music, video, and other digital media being generated, securing download rights is a challenge, even for large providers. If services can deliver high-quality streaming content on demand, data shows that consumers are willing to pay—the OTT video streaming service market is predicted to reach $30 billion by 2020. Catering to such an audience and providing them with reasonable modes of Content Pricing will be the need of the hour.
Although known to computer scientists and networking professionals for decades, peer-to-peer (P2P) systems only became widely popular in the late 1990s with the Napster case and, then, with the U.S. Court's decision in MGM v. Grokster in 2005. P2P has been seen as a bane of the content industry due to copyright infringements and consequential revenue losses.
Napster Example—Throughout the 80s and 90s, the client-server model flourished as the power of CPUs available to consumers was still small (albeit rising). Most file transfers happened over landline telephone, with FTP and USENET gaining usage along the period, and the IRC being invented in 88. In the late 90s, new data compression technologies (MP3, MPEG) came into mainstream use and were probably the last straw. This Internet zeitgeist began shifting back to peer to peer (see
Gnutella Example—Gnutella is a large P2P network as shown in
Bit-Torrent example—Bit Torrent appeared in 2005 as an application layer network protocol used to distribute files. Nodes here can download and upload a file at the same time. This does not necessarily mean that a node finishes its download before uploading. Complete downloaded blocks can be uploaded to other nodes on the network. The serving capacity increases as the number of downloads increase making the system self-scaling. Client-server architecture is also adapted here as nodes contact the server to locate other nodes that they may connect to.
A torrent file must first be acquired for one to begin a download. The torrent files are found on the web and contain information about the files that are contained in the torrent, the location—address/hostname of the torrent's tracker. The tracker is a computer, which acts as a server, and maintains a list of nodes that are participating in the system (i.e. computers that are currently downloading or uploading file data).
Once a computer has established a connection to one other node in the system, it can begin downloading data. Faster download occurs based on the increased number of node connections, hence the likelihood of obtaining a complete copy of the file. A typical Bit-Torrent system needs to have at least one seeder that has a complete copy of the data being shared. When a copy has been uploaded by the seeder to other nodes, the seeder may leave the network. However, for successful ongoing data-sharing, at least one complete copy must remain available across the nodes in the network. Plenty of research and practice has shown that the above systems are scalable and efficient for Internet content distribution. However, existing systems are mostly used for distributing non-copyright protected digital objects or pirated goods. They are not leveraged to distribute the majority of legal media objects because the current BT protocol does not provide copyright protection mechanisms. These known systems that has a technical problem in that none of these systems have a technical mechanism/DRM system to address the sharing of DRM digital content.
Thus, it is desirable to provide a P2P encrypted data transfer system that utilizes the peer to peer architecture with DRM to provide encrypted data transfer. The P2P encrypted data transfer system provide legal digital content P2P sharing and overcomes the technical problems of the known system above and it is to this end that the disclosure is directed.
The disclosure is particularly applicable to a P2P encrypted data transfer system implemented in a CDN having edge servers and it is in this context that the disclosure will be described. It will be appreciated, however, that the P2P encrypted data transfer system and method has greater utility, such as to be used in any system in which it is desirable to provide secure encrypted mobile data transfer using a peer to peer architecture. Furthermore, the system may be implemented without a CDN system and may be used with any secured asset in which a secured music or other file example is used below for illustration purposes. The piece of content may be an audio, video or image file, but may also be a PDF format file, an executable (such as EXE) format file, an archive (such as TAR) format file and the like as the system and method are applicable to various file types.
Before a user can share secured asset content via a P2P file-sharing system and method, the content must be encapsulated by a dedicated Server using DRM rights and encryption or encoding. Non-encapsulated content is prevented from being sent between peers by a capsule control 601 (preferably a computer system with a processor and a plurality of lines of computer code/instructions that implement the capsule control) that is part of the elements 602-606 shown in
In one example, each of the source peer 608A and destination peer 68B operations may be implemented as an application running on a user's computing device (smartphone, mobile device, personal computer, laptop, tablet, etc.) that has a plurality of lines of computer code/instructions executed by a processor of the user's computing device so that the user's computing device/processor are configured to perform the operations of the source peer and/or destination peer. Also note that the term “server” or “peer” is simply a name designating the function of each element, but that each element may be more generally the computer system described above. Also note that the digital content discussed herein may be any type of digital content including music, videos, audio, games, books and/or other digital content.
The one or more content servers 604 may each be at a location where the digital content is stored originally. The digital content, using a well-known streaming platform's front-end, can be downloaded to users' devices. Such content servers 604 could be any origin servers, web servers (file servers), or any CDN services being employed by content owners. Examples of these devices and content servers are provided below in
Each source peer 608A may be a computer or computing device (a user's mobile phone or smartphone, laptop, tablet, etc.) that contains the digital content as well as a valid DRM Content License that was provided by the cloud license server 606 as shown in
Each source peer 608A can act as two things—a Content Server (similar to the content server 604) and a License Server (similar to the License server 606). Each source peer 608A has the business logic and capabilities to ensure that it can pass on valid playable Content and can transmute the Content License of the source peer 608A to one that can be used by peer device's content playback system to render the content for it as shown in
Each destination peer 608B may be a computing system, device, smartphone, laptop computer, etc. that receives the encrypted content from the source peer 608A. It's primary role is to furnish its own details to the source peer, for platform, subscription and other possible validations. Post validations, the destination peer 608B has to perform some straightforward state management such as progress indicators/calculations, checksum matching, etc, in order to ensure safe, secure and complete acquisition of the content & licenses. The received content and licenses can and will be used to render UI/UX to customers, for consumption. The destination peer 608B is also responsible for notifying the actual online API endpoints of the OTT Streaming Service, about the transactions and consumption which occurred when it was offline, whenever it comes online. It is up to the business logic implementation, as to whether to discard the local licenses and obtain a fresh licenses from the online API Endpoints of the service, or continue to use the local peer generated licenses till their validity as discussed below in more detail. As shown in
The destination peer 608B may request a license added security. The source peer license may be generated offline (and may not have the updated logic). As a result, once the destination device gets access to the License server 606, it can request a fresh, updated license. In some examples, the updated license is not required but is optional. The source peer license would work in such examples but the update may be dependent on business logic and security requirements, which may differ from application to application.
The Edge Servers 704 can be one of two types—a static edge server 706A or a mobile edge server 706B. The Static Edge server 706A has wired high speed connectivity to the CDN infrastructure 702-703. The Mobile Edge Server 706B does not have wired high speed connectivity to the CDN Infrastructure, but instead gets intermittent high speed connectivity to the CDN Infrastructure via a dedicated WiFi SSID at each Static Edge Server 706A and also gets intermittent connectivity to the Infrastructure (not necessarily high speed) using cellular data services offered by a telecom provider.
Unlike a regular CDN, which works on a pull based caching model, the CDN system 700 works on a hybrid pull and push based model. Furthermore, an Edge Server (Static & Mobile) 704 may be collocated at a Place of Interest (POI) which is characterized by a specific user demographic and Service access patterns. Based on the above, an Edge server 704 within the CDN 700 can be instructed to get a list of content that it needs to cache. Whenever the Edge server 704 has high speed connectivity to the CDN Infrastructure, the Edge Server 704 starts downloading content (including encrypted content) from the previous tier and updating internal data structures to indicate that the content has been downloaded, and also update various other telemetry information. As each Edge Server 704 starts serving data to users, the consumption data is fed to Machine learning algorithms to generate content lists based on the user demographics and Service access patterns at the Edge Server.
Each of the Edge server 704 also has a last mile over Wi-Fi, configured to cover the entire POI, which is used to serve content that is cached in the edge server 704 to the subscriber/client devices over the wireless connection where the client device may be a mobile computing device, a laptop computer, a tablet computer and the like.
The CDN edge servers 704 create a local network with self-contained DNS and DHCP services to enable the subscribers mobile devices to connect to the CDN system 700. For the P2P system, an Edge first mechanism creates a local area network (LAN) in which copyright-protected encrypted files can be legally transferred between peers. Edge servers are deployed to community premises to establish local WiFi networks. In this system, people within the premises/POI can connect their computing devices to the WiFi network to share digital rights management or DRM-protected files in which the computing devices can act as the source and destinations peers shown in
In the method 800, mobile platform-agnostic and time-bound licenses are generated to enable their storage and usage across mobile OSs like Android, iOS, Web, etc. within a stipulated period. These licenses can be transferred to other legitimate peers, based on a predefined set of rules. The content and licenses can be restricted to be accessible via the Application frameworks they were designed to run in only. In some examples, rules can be pre-defined at the Source peer level—around how many peers the Source can serve without getting connected, how many days the source can serve without getting connected, what geographies can the source serve licenses in, etc. Rules can also be pre-defined at the Destination peer level—around how many days can the Destination peer keep playing the licensed file without getting connected, how many playbacks can the Destination peer complete without getting connected, what geographies can the Destination peer playback the file, etc. In some examples, a combination of both pre-defined at a Source level and pre-defined at a Destination peer level can also be implemented. Once a Source peer validates the legitimacy of a Destination peer, the Source peer can generate a license, using license-generation algorithms. These algorithms are standard ones that can be embedded in our code to generate licenses that may be a plurality of lines of instructions/computer code executed by the device acting as the source peer 608A in the method 800.
The method 800 shall use a custom license sharing pipeline wherein once an encrypted content is shared via verified Application such as the method identifies the legitimacy of the client using built-in Android Platform+iOS Platform+proprietary Application specific validations. Here, OS specific APIs will be used to establish the peer to peer connection, so the authenticity of client and connection is already verified, additional logic to verify more checks as per business requirements would be employed by custom server and client code in the proprietary app.
Upon successful authentication, the method 800 runs procedures having known algorithms that can transmute existing licenses issued to the Source peer for making them compatible with the Destination peer(s) 606B. All of the above processes may be carried out on the source device 608A and is not dependent on Internet connectivity or access to the actual Licensing or Application server 606 in the Cloud. When the app on the destination peer 608B is reopened on the device at a time when Internet connection is available (an online environment process 606)—the transmuted licenses can be purged, and fresh licenses can be issued from the Cloud on behalf of the Destination peer(s) 608B.
Thus, as an example, using the P2P Encrypted data transfer technique 800, User A will be able to transfer File C to User B over a local Wi-Fi network or using the device hotspot functionality. The App on User B's device will be able to list File C in the Downloads section of the App and User B will be able to play File C on his device, all without requiring internet access. In addition to this, the Netflix App on User B's device will also be able to list and stream File C (without transferring it to User B's device) from User A's device over a local Wi-Fi network or using the device hotspot functionality on User A's device.
The offline environment pre-content transfer process 802 may include a request for content 810 from the destination peer 608B to the source peer 608A that has the licenses for the digital content to be shared with the destination peer 608B. In response to the content request, the source peer 608A may request content application (particular type of media player) and platform (iOS, Android, etc.) verification details 812 from the destination peer 608B. The destination peer 608B may send the verification details that may be used to generate the digital content licenses 814. These are the standard Media player and OS defined verifications processes that need to be completed for data transfer and playback to be carried out.
Authenticated User
A user's onboarding on the P2P-file transfer ecosystem described above begins (816) once the user is authenticated via one-time password (OTP) or if the user is pre-authenticated by the Partner app Pre-authentication via Partner app is subject to submission of verified user details, like name, mobile number, and email address. Once the content transfer begins, the system may start the Peer License generation process on the source peer which will perform license transmutations to make it compatible to destinations peers using the information from the prior steps 818. The destination peer 608B may then acknowledge content transfer complete 820. The Source peer may then transfer transmutated licenses securely to the destination application and start license processing and validation 822. The destination peer may then acknowledge the completion of license transfer and the application can start license processing and validation 824. The mobile number authenticated by a Partner app acts as the primary identifier for the user in the ecosystem. All further payments-related information is mapped against the user using this mobile number/userID combination.
The online environment 806 may include the destination peer 608B communicating to the cloud license server 606 that once destination peer is fully online and opens respective applications, it can purge the transmuted licenses and request fresh ones from cloud license servers (826). Then the cloud license server 606 may respond with the device specifics in a regular online environment 828.
User Rights Expression Model
The P2P system and method for encrypted data transfer may have a user rights expression model that defines the rights of each user.
The realization of the scheme in
Rights Negotiation System
The Rights Negotiation System consists of two applications: a client Software Development Kit (SDK) (executed by the source peer 608A and part of the license negotiation client) and a server (the license server 606 in
In some examples, the client application (for the license negotiations) runs on the user's mobile phone along with the installed Client Application, being equipped with the SDK. The Partner Application may be the same app as the client app, for example just another customer using the app, which may mean a Content Provider App.
The user journey may begin with the user retrieving DRM-content that requires licensing and the particular digital content may be stored in his application on the computing device. The system may allow the user to choose whether he or she wants to negotiate a license for the content and share the digital content and license with peers. Depending upon the User's choice, along with the content, the SDK may share the User′ profile and negotiation parameters to the server.
The license negotiation server (that may be the license server 606 in one embodiment) may include a server application (a plurality of lines of computer code/instructions executed by a processor of the server) that contains the logic required for the negotiation process. It is mainly responsible for processing the incoming-request profiles as well as for maintaining a catalog of available content providers. The server application must be able to interpret request profiles and form a set of rules for content-transfer that is specific to the user receiving the content.
For example, to start, in the beginning a mechanism may be established which identifies both parties' current session and transfer requests uniquely. Rules may be established such as, but not limited to, no transferring of content that is restricted to certain geographies, or with a certain parental rating, etc.
For example, an over-the-top (OTT) application at the backend level can specify different logic for source mode and destination mode of their mobile application. Sample limitations/rules can be set such as:
1. Offline P2P transfer to a maximum of 50 clients per disconnected session and/or distribution restricted to only 7 days—post which the client will mandatorily need to connect to the OTT Backend.
2. In destination mode—a limitation can be placed on the number of views and/or the duration of the views can be set. For example—a limitation to be able to consume offline transferred content up to 2 times or for a max of 2 days.
The server may generate an offer profile that is returned to the client and the returned offer-profiles must match the received request profile. Content providers are also required to return their offer-profiles within a determined time interval. The recipient user shall then receive and use the content as per the agreed Rights/Licenses. The validation of the appropriate use of the content may occur, in the CDN embodiment in
The above P2P encrypted data transfer process and system may be used in the following manner between two users, User A and User B. The scenario for the use case is that the two users are travelling via a two hour flight from City A to City B. Both users have an active over the top (OTT) Video Streaming subscription which allows the user to stream content without any playback restrictions (similar to most of the current market incumbents). In this example, User B forgot to download a movie before getting onto the flight, and now have no internet to view/download the same, but, User B on the other hand has a bunch of movies lying around on his OTT Video Streaming Application, which he is currently consuming as well.
The P2P encrypted data transfer process allows a user to consume the same content that you technically are also eligible to consume, but forgot/missed out on downloading due to some reason or the other. The P2P encrypted data transfer process is able to facilitate this while maintaining the content DRM protection since the Content Licenses are only available for use by the holder of the content, but the P2P Encrypted Data Transfer process overcomes this technical problem with current DRM systems as described above. When an offline P2P encrypted data transfer activity is requested, at the beginning itself, security protocols and identity management is setup—which uniquely and securely identifies both the parties, ensuring that they can exchange subscription details, which will enable the source peer in making decisions regarding whether the requested content is transferrable or not. The source peer will try to figure out the entitlements of the destination peer—using the subscription details and do decision making as to the type of content allowed to play over the level of subscription the destination peer holds, regional restrictions, et al.
Using the P2P System and the encrypted data transfer method, a User device (Receiving device that acts as a destination peer) will be able to access (equivalent to a stream for a video) an encrypted file using any local data transfer protocol (local Wi-Fi/Bluetooth/NFC/others) from another user device (Transmitting device acting as a source peer) and the Receiving device will be able to utilize the file using the corresponding Application or service to which the file belongs. In another embodiment, a user device (Receiving device that acts as the destination peer) will be able to transfer (equivalent to a download for a video) an encrypted file using any local data transfer protocol (local Wi-Fi/Bluetooth/NFC/others) from another user device (Transmitting device acting as a source peer) and the Receiving device will be able to utilize the file using the corresponding Application or service to which the file belong. Both of the above can be accomplished even when both the user devices have internet connectivity, either of the two devices have internet connectivity or neither of the two devices have internet connectivity.
The foregoing description, for purpose of explanation, has been with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated.
The system and method disclosed herein may be implemented via one or more components, systems, servers, appliances, other subcomponents, or distributed between such elements. When implemented as a system, such systems may include and/or involve, inter alia, components such as software modules, general-purpose CPU, RAM, etc. found in general-purpose computers. In implementations where the innovations reside on a server, such a server may include or involve components such as CPU, RAM, etc., such as those found in general-purpose computers.
Additionally, the system and method herein may be achieved via implementations with disparate or entirely different software, hardware and/or firmware components, beyond that set forth above. With regard to such other components (e.g., software, processing components, etc.) and/or computer-readable media associated with or embodying the present inventions, for example, aspects of the innovations herein may be implemented consistent with numerous general purpose or special purpose computing systems or configurations. Various exemplary computing systems, environments, and/or configurations that may be suitable for use with the innovations herein may include, but are not limited to: software or other components within or embodied on personal computers, servers or server computing devices such as routing/connectivity components, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, consumer electronic devices, network PCs, other existing computer platforms, distributed computing environments that include one or more of the above systems or devices, etc.
In some instances, aspects of the system and method may be achieved via or performed by logic and/or logic instructions including program modules, executed in association with such components or circuitry, for example. In general, program modules may include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular instructions herein. The inventions may also be practiced in the context of distributed software, computer, or circuit settings where circuitry is connected via communication buses, circuitry or links. In distributed settings, control/instructions may occur from both local and remote computer storage media including memory storage devices.
The software, circuitry and components herein may also include and/or utilize one or more type of computer readable media. Computer readable media can be any available media that is resident on, associable with, or can be accessed by such circuits and/or computing components. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and can accessed by computing component. Communication media may comprise computer readable instructions, data structures, program modules and/or other components. Further, communication media may include wired media such as a wired network or direct-wired connection, however no media of any such type herein includes transitory media. Combinations of the any of the above are also included within the scope of computer readable media.
In the present description, the terms component, module, device, etc. may refer to any type of logical or functional software elements, circuits, blocks and/or processes that may be implemented in a variety of ways. For example, the functions of various circuits and/or blocks can be combined with one another into any other number of modules. Each module may even be implemented as a software program stored on a tangible memory (e.g., random access memory, read only memory, CD-ROM memory, hard disk drive, etc.) to be read by a central processing unit to implement the functions of the innovations herein. Or, the modules can comprise programming instructions transmitted to a general-purpose computer or to processing/graphics hardware via a transmission carrier wave. Also, the modules can be implemented as hardware logic circuitry implementing the functions encompassed by the innovations herein. Finally, the modules can be implemented using special purpose instructions (SIMD instructions), field programmable logic arrays or any mix thereof which provides the desired level performance and cost.
As disclosed herein, features consistent with the disclosure may be implemented via computer-hardware, software, and/or firmware. For example, the systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them. Further, while some of the disclosed implementations describe specific hardware components, systems and methods consistent with the innovations herein may be implemented with any combination of hardware, software and/or firmware. Moreover, the above-noted features and other aspects and principles of the innovations herein may be implemented in various environments. Such environments and related applications may be specially constructed for performing the various routines, processes and/or operations according to the invention or they may include a general-purpose computer or computing platform selectively activated or reconfigured by code to provide the necessary functionality. The processes disclosed herein are not inherently related to any particular computer, network, architecture, environment, or other apparatus, and may be implemented by a suitable combination of hardware, software, and/or firmware. For example, various general-purpose machines may be used with programs written in accordance with teachings of the invention, or it may be more convenient to construct a specialized apparatus or system to perform the required methods and techniques.
Aspects of the method and system described herein, such as the logic, may also be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (“PLDs”), such as field programmable gate arrays (“FPGAs”), programmable array logic (“PAL”) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits. Some other possibilities for implementing aspects include: memory devices, microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc. Furthermore, aspects may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types. The underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (“MOSFET”) technologies like complementary metal-oxide semiconductor (“CMOS”), bipolar technologies like emitter-coupled logic (“ECL”), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, and so on.
It should also be noted that the various logic and/or functions disclosed herein may be enabled using any number of combinations of hardware, firmware, and/or as data and/or instructions embodied in various machine-readable or computer-readable media, in terms of their behavioral, register transfer, logic component, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) though again does not include transitory media. Unless the context clearly requires otherwise, throughout the description, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.
Although certain presently preferred implementations of the invention have been specifically described herein, it will be apparent to those skilled in the art to which the invention pertains that variations and modifications of the various implementations shown and described herein may be made without departing from the spirit and scope of the invention. Accordingly, it is intended that the invention be limited only to the extent required by the applicable rules of law.
While the foregoing has been with reference to a particular embodiment of the disclosure, it will be appreciated by those skilled in the art that changes in this embodiment may be made without departing from the principles and spirit of the disclosure, the scope of which is defined by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
202221028558 | May 2022 | IN | national |
Number | Name | Date | Kind |
---|---|---|---|
7127713 | Davis | Oct 2006 | B2 |
7307956 | Kaplan et al. | Dec 2007 | B2 |
7395355 | Afergan et al. | Jul 2008 | B2 |
7505944 | Moulart et al. | Mar 2009 | B2 |
7752258 | Lewin et al. | Jul 2010 | B2 |
7860950 | Menon et al. | Dec 2010 | B2 |
7891007 | Waxman et al. | Feb 2011 | B2 |
7921259 | Elazary et al. | Apr 2011 | B2 |
8359473 | Sorotokin et al. | Jan 2013 | B1 |
8365301 | Miller | Jan 2013 | B2 |
8375456 | Li et al. | Feb 2013 | B2 |
8407472 | Hao et al. | Mar 2013 | B2 |
8516529 | LaJoie et al. | Aug 2013 | B2 |
8737357 | Denny et al. | May 2014 | B2 |
8746553 | Burdett | Jun 2014 | B2 |
8838480 | Damola et al. | Sep 2014 | B2 |
8843758 | Dharmarajan et al. | Sep 2014 | B2 |
8868678 | Hildreth et al. | Oct 2014 | B2 |
8937903 | Bari et al. | Jan 2015 | B2 |
9001682 | Kovvali et al. | Apr 2015 | B2 |
9003436 | Tidwell et al. | Apr 2015 | B2 |
9021106 | Manion et al. | Apr 2015 | B2 |
9105021 | Tobin | Aug 2015 | B2 |
9110902 | Dorwin | Aug 2015 | B1 |
9118462 | Khambete | Aug 2015 | B2 |
9173158 | Varma | Oct 2015 | B2 |
9197696 | Jakatdar et al. | Nov 2015 | B1 |
9213809 | Lindquist et al. | Dec 2015 | B2 |
9282352 | McDysan et al. | Mar 2016 | B2 |
9367857 | Linden et al. | Jun 2016 | B2 |
9374619 | Andreasen et al. | Jun 2016 | B2 |
9419845 | Wainner et al. | Aug 2016 | B2 |
9497496 | Corley et al. | Nov 2016 | B1 |
9565117 | Dahod et al. | Feb 2017 | B2 |
9584598 | Phillips et al. | Feb 2017 | B2 |
9613190 | Ford et al. | Apr 2017 | B2 |
9661374 | Erdmann et al. | May 2017 | B1 |
9674239 | Wong et al. | Jun 2017 | B2 |
9697366 | Dorwin et al. | Jul 2017 | B1 |
9871850 | Brandwine et al. | Jan 2018 | B1 |
9875493 | Nuzzi | Jan 2018 | B2 |
9904934 | Kumar et al. | Feb 2018 | B1 |
9911154 | Baker et al. | Mar 2018 | B2 |
10009741 | Burcham et al. | Jun 2018 | B1 |
10019724 | Patel | Jul 2018 | B2 |
10045070 | Markley et al. | Aug 2018 | B2 |
10049349 | Grassadonia et al. | Aug 2018 | B1 |
10055721 | Mocko et al. | Aug 2018 | B1 |
10085063 | Hainline | Sep 2018 | B2 |
10097503 | Bergman | Oct 2018 | B2 |
10110710 | Cook et al. | Oct 2018 | B2 |
10134026 | Koeppel | Nov 2018 | B1 |
10142444 | Reynolds et al. | Nov 2018 | B2 |
10200480 | Zhang et al. | Feb 2019 | B2 |
10248975 | Garcia-Martinez et al. | Apr 2019 | B2 |
10298402 | Isles et al. | May 2019 | B2 |
10447659 | Roberts-Hoffman et al. | Oct 2019 | B2 |
10470060 | Paranjpe et al. | Nov 2019 | B1 |
10496979 | Taveau et al. | Dec 2019 | B2 |
10554748 | Sivasubramanian et al. | Feb 2020 | B2 |
10572634 | Chowdhury et al. | Feb 2020 | B2 |
10630769 | Carver et al. | Apr 2020 | B2 |
10693813 | Jacob Da Silva et al. | Jun 2020 | B1 |
10715411 | Jacob Da Silva et al. | Jul 2020 | B1 |
10878404 | Lu et al. | Dec 2020 | B2 |
10931778 | Paranjpe et al. | Feb 2021 | B2 |
20010023180 | Sauer | Sep 2001 | A1 |
20020023002 | Staehelin | Feb 2002 | A1 |
20020143798 | Lisiecki et al. | Oct 2002 | A1 |
20020194171 | Judd et al. | Dec 2002 | A1 |
20040093419 | Weihl et al. | May 2004 | A1 |
20040205162 | Parikh | Oct 2004 | A1 |
20040232221 | Beenau | Nov 2004 | A1 |
20050021462 | Teague et al. | Jan 2005 | A1 |
20050027543 | Labrou | Feb 2005 | A1 |
20050177624 | Oswald et al. | Aug 2005 | A1 |
20060036493 | Aufricht et al. | Feb 2006 | A1 |
20060242069 | Peterka | Oct 2006 | A1 |
20070094691 | Gazdzinski | Apr 2007 | A1 |
20070106626 | Mundie et al. | May 2007 | A1 |
20070124662 | Streuter et al. | May 2007 | A1 |
20070226365 | Hildreth | Sep 2007 | A1 |
20070255617 | Maurone et al. | Nov 2007 | A1 |
20080010192 | Rackley, III | Jan 2008 | A1 |
20080049630 | Kozisek et al. | Feb 2008 | A1 |
20080102947 | Hays et al. | May 2008 | A1 |
20080103977 | Khosravy et al. | May 2008 | A1 |
20080162589 | Rodeheffer et al. | Jul 2008 | A1 |
20080107264 | Van Wie et al. | Aug 2008 | A1 |
20080215747 | Menon et al. | Sep 2008 | A1 |
20080222281 | Dilley et al. | Sep 2008 | A1 |
20080262941 | Feiner | Oct 2008 | A1 |
20090030765 | Cameron et al. | Jan 2009 | A1 |
20090094160 | Webster et al. | Apr 2009 | A1 |
20090132365 | Gruenhagen et al. | May 2009 | A1 |
20090132395 | Lam et al. | May 2009 | A1 |
20090157537 | Miller | Jun 2009 | A1 |
20090164286 | Gupta et al. | Jun 2009 | A1 |
20090164329 | Bishop | Jun 2009 | A1 |
20090164330 | Bishop | Jun 2009 | A1 |
20090254661 | Fullagar et al. | Oct 2009 | A1 |
20090287515 | Mehta et al. | Nov 2009 | A1 |
20090323693 | Yin et al. | Dec 2009 | A1 |
20100074267 | Ladd | Mar 2010 | A1 |
20100121715 | Shiojinna | May 2010 | A1 |
20110078079 | Shin | Mar 2011 | A1 |
20110082724 | Le Chevalier et al. | Apr 2011 | A1 |
20110087602 | Rutman | Apr 2011 | A1 |
20110161462 | Hussain et al. | Jun 2011 | A1 |
20110314145 | Raleigh et al. | Dec 2011 | A1 |
20120054837 | Yoon | Mar 2012 | A1 |
20120072995 | Crawford | Mar 2012 | A1 |
20120096106 | Blumofe et al. | Apr 2012 | A1 |
20120166618 | Dahod et al. | Jun 2012 | A1 |
20120215915 | Sakata et al. | Aug 2012 | A1 |
20120231844 | Coppinger | Sep 2012 | A1 |
20120330769 | Arceo | Dec 2012 | A1 |
20130013688 | Wang et al. | Jan 2013 | A1 |
20130024363 | Cunescu et al. | Jan 2013 | A1 |
20130085864 | Ahmed et al. | Apr 2013 | A1 |
20130107732 | O'Donnell et al. | May 2013 | A1 |
20130110984 | Raciborski et al. | May 2013 | A1 |
20130132504 | Kohli et al. | May 2013 | A1 |
20130238503 | Patel | Sep 2013 | A1 |
20130346305 | Mendes | Dec 2013 | A1 |
20140082126 | Kim et al. | Mar 2014 | A1 |
20140094159 | Raleigh et al. | Apr 2014 | A1 |
20140095320 | Sivarannakrishnan et al. | Apr 2014 | A1 |
20140101781 | Bouknight | Apr 2014 | A1 |
20140115606 | Hamzata et al. | Apr 2014 | A1 |
20140229277 | Khambete et al. | Aug 2014 | A1 |
20140279047 | Wang et al. | Sep 2014 | A1 |
20140282725 | Brandstetter | Sep 2014 | A1 |
20140373049 | Carr et al. | Dec 2014 | A1 |
20150143397 | Bies | May 2015 | A1 |
20150172135 | Coppola et al. | Jun 2015 | A1 |
20150237512 | Chang et al. | Aug 2015 | A1 |
20150278796 | Jiang et al. | Oct 2015 | A1 |
20150302181 | Fahn | Oct 2015 | A1 |
20150310421 | Xie | Oct 2015 | A1 |
20150339318 | O'Toole et al. | Nov 2015 | A1 |
20150339667 | Dua | Nov 2015 | A1 |
20150341705 | Rauhe et al. | Nov 2015 | A1 |
20150350018 | Hui et al. | Dec 2015 | A1 |
20150371215 | Zhou | Dec 2015 | A1 |
20160034876 | Speiser | Feb 2016 | A1 |
20160042344 | Thimmana et al. | Feb 2016 | A1 |
20160011718 | Jajara | Apr 2016 | A1 |
20160191651 | Balakrishnan et al. | Jun 2016 | A1 |
20160210622 | Yang et al. | Jul 2016 | A1 |
20160248879 | Fliam et al. | Aug 2016 | A1 |
20160300272 | Ao et al. | Oct 2016 | A1 |
20160328740 | Chan et al. | Nov 2016 | A1 |
20160337206 | Bugenhagen et al. | Nov 2016 | A1 |
20160371716 | Aitenbichler | Dec 2016 | A1 |
20170032345 | Gideon et al. | Feb 2017 | A1 |
20170142024 | Fromentoux et al. | May 2017 | A1 |
20170155739 | Ao | Jun 2017 | A1 |
20170178090 | Sarin | Jun 2017 | A1 |
20170187837 | Ao | Jun 2017 | A1 |
20170223029 | Sharma et al. | Aug 2017 | A1 |
20170228766 | Mahajan | Aug 2017 | A1 |
20170255924 | White | Sep 2017 | A1 |
20170262902 | Weston et al. | Sep 2017 | A1 |
20180068290 | Xia | Mar 2018 | A1 |
20180068293 | Dunne | Mar 2018 | A1 |
20180077258 | Newton et al. | Mar 2018 | A1 |
20180124143 | Bologh | May 2018 | A1 |
20180124646 | Thubert et al. | May 2018 | A1 |
20180184132 | Mao | Jun 2018 | A1 |
20180184477 | Paredes et al. | Jun 2018 | A1 |
20180232732 | Rodrigues et al. | Aug 2018 | A1 |
20180310279 | Pathak et al. | Oct 2018 | A1 |
20180317067 | Ameixieira | Nov 2018 | A1 |
20180352279 | Chow et al. | Dec 2018 | A1 |
20190028743 | He et al. | Jan 2019 | A1 |
20190069003 | Panagos et al. | Feb 2019 | A1 |
20190114631 | Madhu et al. | Apr 2019 | A1 |
20190122202 | Sun | Apr 2019 | A1 |
20190130386 | Bhat | May 2019 | A1 |
20190139029 | Kadiwala | May 2019 | A1 |
20190141561 | Altay et al. | May 2019 | A1 |
20190166395 | Li | May 2019 | A1 |
20190197539 | Chang | Jun 2019 | A1 |
20190268392 | Santangelo et al. | Aug 2019 | A1 |
20190274082 | Vemuri et al. | Sep 2019 | A1 |
20190289059 | Vanahalli et al. | Sep 2019 | A1 |
20200034172 | Wu et al. | Jan 2020 | A1 |
20200082404 | Zhang et al. | Mar 2020 | A1 |
20200126062 | Sun | Apr 2020 | A1 |
20200153932 | Bao et al. | May 2020 | A1 |
20200167742 | Zhai et al. | May 2020 | A1 |
20200167746 | Yu et al. | May 2020 | A1 |
20200220942 | Paranjpe et al. | Jul 2020 | A1 |
20200221365 | Paranjpe et al. | Jul 2020 | A1 |
20200242616 | Waughtal | Jul 2020 | A1 |
20200242626 | Agarwal et al. | Jul 2020 | A1 |
20200250644 | Oberholtzer | Aug 2020 | A1 |
20210065174 | Singh | Mar 2021 | A1 |
20210097521 | Kumar | Apr 2021 | A1 |
20210103910 | Subramaniam | Apr 2021 | A1 |
20210243072 | Peterson | Aug 2021 | A1 |
20210289039 | Paranjpe et al. | Sep 2021 | A1 |
20220020016 | Scott | Jan 2022 | A1 |
20220224594 | Peterson | Jul 2022 | A1 |
Number | Date | Country |
---|---|---|
101741869 | Apr 2013 | CN |
103782571 | May 2014 | CN |
106790552 | May 2017 | CN |
107852609 | Mar 2018 | CN |
107645475 | Dec 2019 | CN |
2815541 | Dec 2014 | EP |
3 557 843 | Oct 2019 | EP |
201921000982 | Jan 2020 | IN |
2019210008950 | Oct 2020 | IN |
100572478 | Dec 2006 | KR |
20070067005 | Jun 2007 | KR |
20130102792 | Sep 2013 | KR |
101574074 | Dec 2015 | KR |
WO2006133655 | Dec 2006 | WO |
WO2008022339 | Feb 2008 | WO |
WO2009101600 | Aug 2009 | WO |
WO2012000438 | Jan 2012 | WO |
WO2012131287 | Oct 2012 | WO |
WO2013052028 | Apr 2013 | WO |
WO2013123162 | Aug 2013 | WO |
WO2013170864 | Nov 2013 | WO |
WO2015090360 | Jun 2015 | WO |
WO2015181591 | Dec 2015 | WO |
WO2016043839 | Mar 2016 | WO |
WO2018027984 | Feb 2018 | WO |
WO2018158729 | Apr 2018 | WO |
WO2018087275 | May 2018 | WO |
WO2018215681 | Nov 2018 | WO |
WO2019123273 | Jun 2019 | WO |
WO2020144701 | Jul 2020 | WO |
Entry |
---|
US 8,782,123 B2, 07/2014, Seed et al. (withdrawn) |
Bhardwaj et al., “AppFlux: Taming App Delivery Streaming,” Georgia Institute of Technology, pp. 1-14, Oct. 2015. |
Kalva et al.“Techniques for Improving the Capacity of Video-on Demand Systems,” Proceeds of 29th Annual Hawaii International Conference on System Sciences, 1996, pp. 309-315. |
Lai et al., “A Hierarchical Network Storage Architecture for Video-on-Demand Services,” IEEE Transactions on Broadcasting, vol. 43:2, (Jun. 1997), pp. 145-154. |
Little, T.D.C. et al., “Prospects for Interactive Video-on-Demand,” Multimedia Communications Laboratory, MCL Technical Report, (Feb. 15, 1994), pp. 1-22. |
“How to Auto Switch between WiFi and Mobile the Smart Way,” (Dec. 2018), 6 pages, Speedicyhttps://speedify.com/blog. |
Kos et al., “CATV Broadband Technologies, EC-VIP-MC 2003, 4th EURASIP Conference,” (2003), pp. 829-834. |
Alloush et al., “Initial use cases, scenarios and requirements,” CogNet, (Nov. 30, 2015), Ver. 0.9, pp. 1-107. |
Velasco et al., “A Service-Oriented Hybrid Access Network and Cloud Architecture,” pp. 8. |
Bulander et al., “Comparison of Different Approaches for Mobile Advertising,” The Second IEEE International Workshop on Mobile Commerce and Services (WMCS '05) Jul. 19, 2005, Munich, Germany, IEEE Computer Society, pp. 174-182, 10 pages. |
Callejo et al., “Opportunities and Challenges of Ad-based Measurements from the Edge of the Network,” © 2017 Association for Computing Machinery. ACM ISBN 978-1-4503-5569-8/17/11, Dec. 1, 2017, Palo Alto, CA, USA © 2017 Association for Computing Machinery. ACM ISBN 978-1-4503-5569-8/17/11, 7 pages. https://doi.org/10.1145/3152434.3152895. |
Khan et al., “CAMEO:A Middleware for Mobile Advertisement Delivery,” Network Architecture and Design]:Wireless Communication, Research performed by author as a Research Fellow at Singapore Management University, Jun. 25-28, 2013, 13 pages. |
Toubiana et al., “Adnostic: Privacy Preserving Targeted Advertising,” NYU.edu and stanford.edu, supported by the NSF Portia and Muri Presidio projects, 23 pages, Mar. 2010. |
Adi et al., “Secured Multi-Identity Mobile Infrastructure and Offline Mobile-Assisted Micro-Payment Application,” WCNC 2004 / IEEE Communications Society, 4 pages. |
Kiran et al., “Building Robust m-Commerce Payment System on Offline Wireless Network,”Dept of Electronics & Communication Eng. Sai Vidya Institute of Technology and Electronics & Communication Eng. UVCE, 3 pages, 2011. |
Van Damme et al., “Offline NFC Payments with Electronic Vouchers,” Dept. Electrical Engineering-ESAT/SCD/IBBT-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, 3001 Heverlee-Leuven, Belgium, MobiHeld'09, Aug. 17, 2009, Barcelona, Spain, 6 pages. |
Wikipedia, the Free Encyclopedia, Distributed Computing, Internet Archive WayBack Machine Capture date of Dec. 10, 2013, Internet Archive WayBack Machine (Year: 2013), 11 pages. |
Mu, Su. “Application networking for pervasive content delivery.” (2008). https://core.ac.uk/download/pdf/48630854.pdf. Disclosing CDN Components with a Network (Fig 2.2, p. 16 with Section “2.4.1 Open Pluggable Edge Service” from pp. 26-28). |
Frangoudis,“An architecture for on-demand service deployment, over a telco CDN,” IEEE ICC 2016 Next-Gen IRISA/University of Rennes 1, France, Aalto University, Finland, 6 pgs. |
Frangoudis et al. “CDN-as-a-Service Provision over a Telecom Operator's Cloud,” IEEE Transactions on Network and Service Management, IEEE, Dec. 9, 2017, 4(3), pp. 702-716, 16 pgs. |
Griwodz et al. “Content Distribution Infrastructures,” Jul. 2, 2004, Dagstuhl Seminar Proceedings 04201 http://drops.dagstuhl.de/opus/volltexte/2006/502, 6 pgs. |
Hamzeh et al. “Residential Network Architectures and Services,” Cable Networks, Services, and Management, 1st Edition, 2015 Edited by Mehmet Toy, 372 pgs. |
Huang, Shufeng, “A HyperNet Architecture” (2014), Theses and Dissertations—Computer Science. 18., https://uknowledge.uky.edu/cs_etds/18, 165 pgs. |
Ravindran, “A Management Framework for Service Personalization,” 2002, SOMA Networks Dept. of Electrical and Computer Engineering, Ryerson University, Toronto, Canada, 13 pgs. |
Tyson, “A Topology Aware Clustering Mechanism” 2007, Computing Department Lancaster University, 6 pages. |
Yala, “QoE-Aware Computing Resource Allocation for CDN-as-a-Service Provision” Irisa/University of Rennes 1, France, Eurecom Institute, Sophia Antipolis, France, 2016, 6 pgs. |
Egorov, et al., “NuCypher KMS: Decentralized key management system” NuCypher and NICS Lab, Universidad de Malaga, Spain, Nov. 15, 2017, 21 pages. |
Agile I.T., “Azure Rights Management” webpage, https://www.agileit.com/azure-rights-management/, 9 pages. |
Arkko, et al., “MIKEY: Multimedia Internet KEYing”, Network Working Group, Ericsson Research, Aug. 2004, 66 pages. |
Number | Date | Country | |
---|---|---|---|
20230376573 A1 | Nov 2023 | US |