This invention relates to wireless digital communication. More particularly, the invention relates to management of data in such systems.
Mobile wireless communications have progressed from closed platforms in primarily voice based cellular phones to becoming embedded in a variety of open platforms which support data and voice such as smartphones, notebook computers and personal digital assistants (PDAs).
Presently, cell phones have only a small amount of memory, in which the user related dynamic data can be stored. As advanced services are being implemented on cell phones and cellular networks, there is an increasing need to store more and more user related dynamic data on the cell phone. Examples of such data are applications, games, music files, image database, etc.
Also, presently, mobile wireless devices which are data capable can download ring tones, music files or applications when the user is in an active data session. However, when the user is ready to download, the network conditions may not be optimal, either in terms of resource availability or in terms of cost of download. On the other hand, when the network is optimal, the user may not find it convenient to start a download session. In this sense, the user may wish to make a selection of a file transfer function at a time when the execution of the file transfer is inopportune. The time of execution may not be optimal because of considerations of availability of services, cost of services, interference with active use of the cell phone, and battery usage.
Similarly, network maintenance communications are generally provided on user request. While it is possible to provide such communication in response to system requests, it is impractical to predict times of inactivity and convenient times for subscribers to receive such communication. Therefore, communications are often executed in response to user requests, rather than at optimum times. Routine updates are often not performed on a regular basis because the execution of frequent updates could be inconvenient.
Accordingly, it is desirable to have alternate approaches to transfer data and/or store data for wireless devices.
In one embodiment of the present invention, file transfers are performed in a wireless communication network between a wireless transmit/receive unit (WTRU) and a location external to the WTRU. This allows the user or the WTRU to transfer the data under predetermined conditions. In another embodiment, file transfer is performed by determining conditions for file transfer using the WTRU. The file transfer takes place subject to the determined conditions, and using the WTRU to automatically request the file transfer in response to the existence of the determined conditions.
A wireless transmit/receive unit (“WTRU”) includes but is not limited to a user equipment (UE), mobile station, fixed or mobile subscriber unit, pager, or any other type of device capable of operating in a wireless environment. These exemplary types of wireless environments include, but are not limited to, wireless local area networks (WLANs) and public land mobile networks. A “base station” includes but is not limited to a Node B, site controller, access point or other interfacing device in a wireless environment. In many cases, communication can be effected through a variety of network services.
In an embodiment, a WTRU allows a user to select criteria for background file transfer execution. The criteria can include preferred network services, time of day, geographic area, cost of services, available network security levels, availability of external storage, and other functions related to the operation of the WTRU. The user may then classify file transfers. When the existing conditions meet the classification, the transfer is executed.
Background file transfer execution can occur at a time and place which does not require active participation by the user. The transfer can occur with or without the user running other processes, such as voice or data communication. Background file transfer can also be executed during times when the user is not actively involved with the operation of the WTRU. By way of example, it is common for network services to have reduced utilization at certain hours, and it is common for people to have rechargeable WTRUs connected to a power supply at that time. If the WTRU is able to receive signals, files may be transferred in the background in the sense that the user is not actively participating.
The user can make requests of particular transfers at one time, and have the execution of the transfer take place at another time and place. Thus, for example, the user may select a particular music file or ring tone, but not wish to download the file at that time. This would avoid the file transfer consuming user resources or being effected at a less than optimum cost to the user. Rather than requiring that the user to execute the file request at an optimum time and place for the file transfer, the user may execute the request, at least on the WTRU, and the WTRU will effect the transfer at a time and place selected in accordance with predetermined criteria. The predetermined criteria can be used to manage transfer of files so that the transfer can occur at a time and place which is more convenient in terms of cost, functionality, use of the WTRU and use of network resources.
Transfer requests may also be initiated by the network. Network initiated transfer requests may be used, for example, to provide program updates, network-related data and other housekeeping functions.
When the transfer is taking place or is about to take place, an alert signal (visual or auditory) can be provided to notify the user that the transfer is completed. It is also possible to provide a log or a detailed session record of the session, which can be stored in the WTRU upon completion of the transfer. The log will have details that can be generated by the WTRU itself (such as number of attempts etc) and also details that have to be furnished by the network (cost and amount of data etc). Alternatively, the session record details may be appended to the downloaded data itself or be sent as a message (e.g. SMS) by the network to the WTRU and stored separately in a download log.
In a further embodiment, the WTRU tracks usage events and uses this information to create default parameters, such as time of transfer. If a predetermined set of user activity events are absent during a particular time of day, the WTRU can retain this information in a database so as to indicate times of inactivity. This information can be combined with detected times of low network usage or user input of preferred times and events, such as battery recharge periods, which can be used as criteria for indicating when the transfer of files should be executed. The user may then select to have the transfer of files occur on an automatic basis in accordance with the default parameters or parameters which have been modified by the user. Further factors include identified costs assigned to different services used for file transfer and user selection of services to be used for file transfer.
When the user requests a file transfer, a selection is made as to whether the file should be transferred as soon as possible or in accordance with the criteria for background transfer. If background transfer is desired, the request for file transfer is stored in memory, and a request for execution is made in accordance with the predetermined criteria.
Selection of time and mode of background transfers can be manual or automatic. As an example of automatic selection of time and mode, the WTRU can maintain a database of user activities. The database would indicate time of no activity, so that, if a user seldom engages the WTRU in certain hours, the WTRU can set those times for background transfers. Those times would be combined with availability of services meeting predetermined parameters, and other conditions, such as battery charge status. For example, a configuration in which a battery is being recharged can be used to indicate a quiescent use time during which file transfers would not require battery power. Examples of criteria would include particular wireless networks, time of day, geographic area, cost of services, and available network or application security levels.
The ability to perform unattended data transfers permits execution of the transfer in a manner which can be performed at low cost, but which would be impractical if executed manually. This can be achieved by executing the transfer on network services which are underutilized at the time of transfer. By way of example, a cellular voice channel may have less than optimal data rates, but may be underutilized in early morning hours. While data transfer rates would be especially slow, it is possible, for example, to use data transfer protocols which are compatible with the voice channel to reliably perform the data transfer, given enough time. It is presumed that the user would not be actively using the voice channel at the times selected, and the network facilities would be underutilized at the time of the transfer. It may also be the case that the WTRU is connected to an external power source at that time, so that power usage would not be a factor.
1 It is also possible to transfer data packets during the silence periods in a voice conversation. In instances where the user has established a duplex communication link between himself and the network for voice communication, the actual voice communication is often simplex, so that the downlink is typically quiet when the uplink voice link is busy. During these times, network can download data to the WTRU without a requirement to provide extra radio resources. This can result in cost savings to the network or to the user. This use of silence periods for data transfer is particularly advantageous in cases in which a secondary data channel is unavailable, or in cases in which a combined voice and data channel is used.
Additionally, network report information may be used as file transfer criteria. To illustrate, the WTRU queries the network to report the loading level. Alternatively, the WTRU sends a probe data packet and estimates the load by measuring the response time, or the WTRU senses network activity. Likewise, cost of services can be determined through a process of network interrogation.
Regular functions can also be assigned background transfer. For example programming updates for the WTRU can be performed at regular intervals, but only when the predetermined criteria are met. This allows changes to be made on a regular basis to the WTRU's program and database relevant to network changes without adversely affecting the network or the WTRU.
The invention permits a background data session to be initiated by the WTRU in a way that is transparent to the user, in that the WTRU performs the requested download and terminates the session. If the complete download is not successful, additional attempts are made either until completely successful or until a maximum number of retrials is reached as set by the user.
If the user of the WTRU 31 decides to execute a file transfer, for example from a remote location or from the network, as represented by data store 47, the user issues the file transfer request. According to the invention, the file transfer request may be deferred according to the factors described infra. In the example depicted, the user decided to request the file transfer while communicating through auxiliary network 36 (base station 21). The transfer may be more optimal if actually executed through a “hot spot” 41, 42, through the user's home network (base stations 23, 24, or at a more convenient time). The request for transfer is stored by the WTRU in memory 49 and executed when the desired conditions are met.
In the case of “hot spots”, a file transfer may be more expeditious at a “hot spot” 41, 42 but may or may not be more costly. In accordance with the present invention, a determination is made whether to select the “hot spot” 41, 42 for deferred transfer in accordance with the conditions selected for deferred transfer. Thus, while immediate transfer may be optimum at the hot spot, the invention is capable of redirecting the transfer in accordance with what would be optimum given the possibility of meeting predetermined conditions prior to file transfer.
Upon receiving a file transfer request (step 81), the file transfer request is categorized (step 82) as to whether the transfer will be deferred according to the sensed conditions (step 83). When the condition is sensed (step 84), the requested file (step 81) is executed (step 85). The sensing may include data already stored by the WTRU or may include the results of a query of the network (step 91) or a network probe to determine network conditions (step 92). The query or probe generates a network response (step 93) which becomes one of the sensed conditions (step 83).
In another embodiment, a WTRU accesses storage memory external to the WTRU for storing data. The data stored in the external memory may include user data, personalized data and program data. In one particular embodiment of the invention, the external memory access is achieved through a local memory port intended to communicate with an external data storage device. The external memory access may be achieved through an external physical device such as a memory drive or a computer, or a storage device associated with the WTRU. In an alternate embodiment, the external memory access is achieved through a wireless communication link. The wireless communication link can provide memory access to either external user equipment or a network supplied data storage facility.
In the sense of this invention, “external” means connected through a data port or other communication link. In some cases the physical location of the external storage will be in the WTRU's chassis. Such internal mounting of external storage is considered to be within the scope of the present invention.
Data used by a WTRU is made accessible by providing an external data conduit connecting external memory to the WTRU. The external memory device is added to a WTRU and managed as virtual memory structure when appropriate. Typical implementations of a local external memory would include a memory stick connected to the cell phone via a port configured to accept memory stick devices, or a memory device connected via a data port such as a USB port. For network memory, the location for the user associated memory can be anywhere accessible to the network may be provided either by the network or by the user (home personal computer) or third party.
The use of external memory facilitates easy replacement of a WTRU. A WTRU includes various functions, many of which are programmed. The program functions include a personalized part, and an impersonal part. The personalized part may include functions such as an address book, voice tags, voice recognized phone commands, ring tones, screen savers, voice mail greetings, etc. The impersonal part may include functions such as communication protocols, hardware functions, software functions related to the network, etc. When a user wants to replace a cell phone with a new one, he/she would like to carry over the personalized part as easily as possible. While it would be convenient to include the impersonal part, such as a “PRL”, the transfer of the impersonal part is generally accommodated by an initialization procedure. Using the external memory permits the user to transfer all of a predetermined set of personalized data outside the WTRU for later retrieval. The later retrieval can be to the same WTRU, a different WTRU or a diverse device. The transfer of personalization data from one WTRU to another permit transfer of the personal preferences and other data between WTRUs without a need for extensive manual programming.
According to one embodiment of the invention, a tagged cataloging of applications is implemented. The tagged cataloging may be accomplished by simple tag or meta tag, and allows applications to be moved either by the user or automatically by a server from one component of the memory to another.
The invention allows reduced cost of upgrade to customer, encourages operator's customers to stay with operator (reduces churn), and facilitates exchange of models of WTRUs.
This application claims the benefit of U.S. provisional application Nos. 60/545,669 filed on Feb. 18, 2004, and 60/546,135 filed on Feb. 20, 2004, which are incorporated by reference as if fully set forth.
Number | Date | Country | |
---|---|---|---|
60545669 | Feb 2004 | US | |
60546135 | Feb 2004 | US |