WO2004063937A2 - Downloading data files - Google Patents

Downloading data files Download PDF

Info

Publication number
WO2004063937A2
WO2004063937A2 PCT/GB2003/005406 GB0305406W WO2004063937A2 WO 2004063937 A2 WO2004063937 A2 WO 2004063937A2 GB 0305406 W GB0305406 W GB 0305406W WO 2004063937 A2 WO2004063937 A2 WO 2004063937A2
Authority
WO
WIPO (PCT)
Prior art keywords
file
mobile communications
communications device
route
parts
Prior art date
Application number
PCT/GB2003/005406
Other languages
French (fr)
Other versions
WO2004063937A3 (en
Inventor
Nicolas Bernard Sauvage
Original Assignee
Ttp Com Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ttp Com Limited filed Critical Ttp Com Limited
Priority to AU2003290248A priority Critical patent/AU2003290248A1/en
Publication of WO2004063937A2 publication Critical patent/WO2004063937A2/en
Publication of WO2004063937A3 publication Critical patent/WO2004063937A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/14Multichannel or multilink protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections

Definitions

  • This invention relates to a method of, and a system for, downloading data files to a communications device, and in particular to a method of, and system for, downloading large data files (such as game files or music files) to a mobile communications device such as a mobile phone or a Personal Digital Assistant (PDA).
  • a mobile communications device such as a mobile phone or a Personal Digital Assistant (PDA).
  • PDA Personal Digital Assistant
  • NON Network Operator Network
  • BREW Network Operator Network
  • Ex-En from In-Fusio for GSM networks
  • downloads can be very slow, being limited by the bandwidth capability of the network concerned, and expensive (network usage costs normally being charged on top of the price of the file being downloaded).
  • the aim of the invention is to provide a method of, and a system for, downloading large data files to a communications device more rapidly and/or less expensively than known methods and systems.
  • the present invention provides a method of transferring a data file from a service provider to a mobile communications device, the method comprising the steps of splitting the file into first and second parts, transmitting the first and second file parts over respective first and second communications routes from the service provider to the mobile communications device, and reassembling the file from the first and second file parts at the mobile communications device.
  • the first file part is big in size and could, for example, be larger than the second file part.
  • the first file part is at least an order of magnitude larger than the second file part, and more preferably the first file part is more than 99% of the data file.
  • the first communications route is a lower cost route than the second communications route.
  • the first communications route includes first and second parts, the first part of the first route being an Internet connection between the service provider and a computer, and the second part of the first route being a short-range communications link between the computer and the mobile communications device.
  • the first communications route includes first and second parts, the first part of the first route being from a dedicated server associated with the service provider to a dedicated base station, and the second part of the first route being a short-range communications link between the dedicated base station and the mobile communications device.
  • the dedicated server is likely to contain a large number of data files, and means are provided for updating the data files, for example by using the Internet or a phone line.
  • the second part of the first communications route may be constituted by a wireless connection.
  • the wireless connection uses the Bluetooth protocol.
  • the wireless connection could also use any wireless protocol in the 802.11 family.
  • the second communications route is a network operator network associated with the service provider.
  • the file is split into the first and second parts using an algorithm that ensures neither of the file parts can be used by a user of the mobile communications device until the file has been reassembled.
  • files such as the first file parts which are readily accessible for downloading from the Internet, cannot be used by an end-user without the corresponding second file part, for which the service provider can charge/bill for before, during and/or after sending that file part.
  • the service provider may also charge or bill on a regular basis, for example, monthly or yearly.
  • the user of the mobile communications device is charged for the data file when the second file part is transmitted.
  • an encryption key is sent to the user of the mobile communications device with the second file part, and the encryption key is subsequently usable by the mobile communications device for encryption of the second file part for transmission to another mobile communications device.
  • an encryption key is sent to the user of the mobile communications device with the second file part, and the encryption key is subsequently usable by the mobile communications device for encryption of a complete re-assembled file part for transmission to another mobile communications device.
  • the user of said another mobile communications device accesses the service provider to obtain a key for decrypting the received encrypted second part (the second file part or the re-assembled file part), the service provider sending charging/billing data with said key.
  • the service provider sends charging/billing data with said key.
  • that user can then, or before the transfer, obtain the corresponding first file part, either from the Internet or from the dedicated base station, so as to be able to reassemble the data file.
  • the complete re-assembled file is received encrypted, that user only needs to receive the key to be able to decrypt the file.
  • the invention also provides a data file transfer system comprising a service provider and a mobile communications device, the service provider comprising a memory for storing a data file, means for splitting the data file into first and second parts, and means for transmitting the first and second file parts over respective first and second communications routes to the mobile communications device, and the mobile communications device having means for reassembling the file from the first and second file parts.
  • the memory of the service provider is such as to store a large number of data files.
  • the first communications route includes first and second parts, and the system further comprises an intermediate device, the first part of the first route being between the service provider and the intermediate device, and the second part of the first route being a short-range communications link between the intermediate device and the mobile communications device.
  • the intermediate device is a computer.
  • the first part of the first route is an Internet connection.
  • the intermediate device is a dedicated base station for storing a plurality of first file parts.
  • the system further comprises a dedicated server associated with the service provider, the dedicated server including a memory for storing a large number of data files.
  • the short-range communications link uses the 802.11b protocol or any other protocol from the 802.11 family, or a universal serial bus.
  • a service provider 1 has a library of files (only one of which - identified by the reference numeral 2 - is shown). These files are data files such as game files or music files.
  • Each of the files in the library of the service provider 1 is split into two parts, one of which is stored in the NON 3 of that service provider, the other being stored on the Internet 4.
  • the file 2 is stored in parts A and B respectively on the NON 3 and on the Internet 4.
  • part A contains 1% or less of the data of the file 2
  • part B contains 99% or more of the data.
  • the file 2 is split into the two parts A and B using any suitable algorithm, such as that described below.
  • each of the parts A and B is useless (that is to say the data it contains cannot be used for the initial purpose of the file 2) without the data from the other part.
  • the user needs to know the parameters that were used to split the file 2 in the first place.
  • a further desirable property of the split/merge algorithm, although not essential, is that the process by which the parts A and B are merged should be relatively quick.
  • a mobile communications device 5 wants to download the file 2 from the service provider 1, this is accomplished by directly downloading the part A from the NON 3, and by downloading the part B from the Internet 4, for example, by the user's PC 6.
  • the PC 6 can then be linked to the mobile communications device 5, either via a cable such as a USB cable or wirelessly, for example, using Bluetooth or the wireless protocol 802.1 lb.
  • the part B cannot be used on its own.
  • the part A is also needed, as is the merge process (using the algorithm and its inputs). Only then, is it possible for the end-user to use the original file 2. the end-user will, therefore, need to access the NON 3 to receive the part A. It should be noted that this can be before, after, or during the download of the part B.
  • the inputs used for the split algorithm are also sent, so that the mobile device 5 can merge the parts A and B.
  • These two parts may be merged immediately in the device 5, or stored in separate memory locations for future use.
  • it is preferable to merge the parts A and B immediately for example when the merge process can take longer than the end-user is prepared to wait each time the complete file is accessed. This is particularly the case for large files such as music files.
  • the file is then stored in memory, and an identification of that file is available for browsing by other end-users in what is known as a public list of files.
  • an encryption key K is sent to the end-user at the same time as the part A is sent.
  • the key K will only be used to encrypt the file when the file is sent to, or requested by, another user, as is described below.
  • the algorithm inputs are stored with the part A.
  • the parts A and B and the algorithm inputs are only merged when the end-user wants to use the file. Merging then takes place, and the merged file is placed in the memory of the mobile communication device 5 just before the file is executed/read.
  • the parts A and B may be stored in a different areas of memory in the mobile communications device 5, the part A preferably being stored in a safer part of the memory.
  • the part B is stored, and an identification of that part file is made available in the public list of file for browsing by other end-users.
  • part B could be stored in a removable memory card, such as an MMC card.
  • the drawing also shows a mobile communications device 7 of another end-user. If that end-user wants to obtain the file 2, this can be obtained from the mobile communications device 5.
  • the mobile communications device 7 uses a browser to browse the public list of files stored in the device 5, and then to request a particular file (say the file 2) of interest.
  • a particular file say the file 2 of interest.
  • that device will encrypt the entire file using the key K, and then transmit the encrypted file to the device 7.
  • the user of the device 7, after having received the encrypted file will access the NON 3 to receive a key to decrypt the file. When accessing the NON 3, that user will be authenticated and charged/billed for the file.
  • the mobile communications device 7 of that user will need to send information about the file that has been transferred and from whom it is received, in order to permit the system to give that other user the correct key to decrypt the file.
  • This key may be the key K or another key.
  • that user receives a second key K2.
  • This key K2 will be used to encrypt the file again, so that that user can pass the file on to yet another end-user.
  • This further end-user will then need to contact the NON 3 to obtain a key to decrypt the file, and a further key K3 for encrypting the file for sending on to yet another end-user.
  • the further end-user When accessing the NON 3, the further end-user will be authenticated and charged/billed for the file, again after sending information about the file transferred, and from whom it is received. In this way, the file can be passed on through multiple users, each of which can then decrypt the file and use it.
  • the file can be re-assembled and encrypted before being sent to the mobile communications device 7 of the other end user, or only the part B is sent to the mobile communications device 7 of the other end-user.
  • that user will access the NON 3 to request the part A.
  • that user's mobile communications device 7 will be authenticated, and that user will be charged/billed for the file.
  • the process can be replicated to further end-users, all of which can replicate to other end-users and so on.
  • the file 2 is first RS A encrypted. Assuming, for the sake of simplicity, that the file part B is 10% of the file 2, 1/lOfh of the bits have to be removed. In order to do this every 20th bit is then removed from the file 2, and the remaining 5% of that file is removed from random locations. If any random location defines a sequence of consecutive bits on a random length, that random length has a maximum of 0.5% of the total length of the file. The off-set of where bits are removed randomly, and the length over which random bit lengths are removed is appended at the end of the remaining file (that is to say that part of the file which remains after the 10% has been removed).
  • a 32 bit mask is then created, and the data is XORed with the 32 bit mask, 16 bits of the XORed mask being placed at the beginning of the remaining file, and 16 bits at the end.
  • the user of the mobile communications device 5 downloads the part A, it reads the mask and inverts the XOR process.
  • the device 5 then contacts the NON 3, and requests the missing data from the table extracted from the end of the file, that is to say the 5% of the data which was randomly removed from the file 2. Those missing pieces are then inserted at the right places, after which every 20th bit, that is to say the 5% of the data which was removed as every 20th bit from the file 2, is requested from the NON 3 and inserted at the appropriate place. Finally, the file is decrypted.
  • the file part B could be stored at a dedicated base station rather than on the Internet 4.
  • the part files B could easily be downloaded to the mobile communications device of an end user using, for example, Bluetooth or some other suitable wireless protocol.
  • An advantage of this arrangement is that users could be provided with the locations of dedicated base stations, so that users can readily access the files of interest.
  • Another advantage of this arrangement is that, where the part files B are applications such as game files, those part files could be up-dated, on a regular basis, by a service provider server so that users can update their files. That server would contain a large number of data files. The server would then place the parts A and the parameters used for file splitting onto the NON 3 and the parts B onto the dedicated base stations.
  • Each base station may be a server (or a PC) having a hard disc for file storage.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A method of transferring a data file (2) from a service provider (1) to a mobile communications device (5) comprises the steps of splitting the file into first and second parts (A and B), transmitting the first and second file parts over respective first and second communications routes (3 and 4) from the service provider to the mobile communications device, and reassembling the file from the first and second file parts at the mobile communications device.

Description

Downloading Data Files
This invention relates to a method of, and a system for, downloading data files to a communications device, and in particular to a method of, and system for, downloading large data files (such as game files or music files) to a mobile communications device such as a mobile phone or a Personal Digital Assistant (PDA).
It is known to download such data files from a Network Operator Network (NON) to a mobile communications device (for example, BREW from Qualcomm for CDMA networks, or Ex-En from In-Fusio for GSM networks). Where data files are large, as is the case with game files and music files, such downloads can be very slow, being limited by the bandwidth capability of the network concerned, and expensive (network usage costs normally being charged on top of the price of the file being downloaded).
The aim of the invention is to provide a method of, and a system for, downloading large data files to a communications device more rapidly and/or less expensively than known methods and systems.
The present invention provides a method of transferring a data file from a service provider to a mobile communications device, the method comprising the steps of splitting the file into first and second parts, transmitting the first and second file parts over respective first and second communications routes from the service provider to the mobile communications device, and reassembling the file from the first and second file parts at the mobile communications device.
Advantageously, the first file part is big in size and could, for example, be larger than the second file part. Preferably, the first file part is at least an order of magnitude larger than the second file part, and more preferably the first file part is more than 99% of the data file. In a preferred embodiment the first communications route is a lower cost route than the second communications route.
Conveniently, the first communications route includes first and second parts, the first part of the first route being an Internet connection between the service provider and a computer, and the second part of the first route being a short-range communications link between the computer and the mobile communications device.
Alternatively, the first communications route includes first and second parts, the first part of the first route being from a dedicated server associated with the service provider to a dedicated base station, and the second part of the first route being a short-range communications link between the dedicated base station and the mobile communications device. In this case, the dedicated server is likely to contain a large number of data files, and means are provided for updating the data files, for example by using the Internet or a phone line.
In either case, the second part of the first communications route may be constituted by a wireless connection. Preferably, the wireless connection uses the Bluetooth protocol. The wireless connection could also use any wireless protocol in the 802.11 family.
Preferably, the second communications route is a network operator network associated with the service provider.
In a preferred embodiment, the file is split into the first and second parts using an algorithm that ensures neither of the file parts can be used by a user of the mobile communications device until the file has been reassembled. In this way, files such as the first file parts which are readily accessible for downloading from the Internet, cannot be used by an end-user without the corresponding second file part, for which the service provider can charge/bill for before, during and/or after sending that file part. The service provider may also charge or bill on a regular basis, for example, monthly or yearly. Advantageously, the user of the mobile communications device is charged for the data file when the second file part is transmitted.
Preferably, an encryption key is sent to the user of the mobile communications device with the second file part, and the encryption key is subsequently usable by the mobile communications device for encryption of the second file part for transmission to another mobile communications device. Alternatively, an encryption key is sent to the user of the mobile communications device with the second file part, and the encryption key is subsequently usable by the mobile communications device for encryption of a complete re-assembled file part for transmission to another mobile communications device.
Conveniently, the user of said another mobile communications device accesses the service provider to obtain a key for decrypting the received encrypted second part (the second file part or the re-assembled file part), the service provider sending charging/billing data with said key. In the case where only the second file part is received, that user can then, or before the transfer, obtain the corresponding first file part, either from the Internet or from the dedicated base station, so as to be able to reassemble the data file. In the case where the complete re-assembled file is received encrypted, that user only needs to receive the key to be able to decrypt the file.
The invention also provides a data file transfer system comprising a service provider and a mobile communications device, the service provider comprising a memory for storing a data file, means for splitting the data file into first and second parts, and means for transmitting the first and second file parts over respective first and second communications routes to the mobile communications device, and the mobile communications device having means for reassembling the file from the first and second file parts.
Preferably, the memory of the service provider is such as to store a large number of data files. In a preferred embodiment, the first communications route includes first and second parts, and the system further comprises an intermediate device, the first part of the first route being between the service provider and the intermediate device, and the second part of the first route being a short-range communications link between the intermediate device and the mobile communications device.
Advantageously, the intermediate device is a computer. In this case, the first part of the first route is an Internet connection. Alternatively, the intermediate device is a dedicated base station for storing a plurality of first file parts.
Preferably, the system further comprises a dedicated server associated with the service provider, the dedicated server including a memory for storing a large number of data files.
In a preferred embodiment, the short-range communications link uses the 802.11b protocol or any other protocol from the 802.11 family, or a universal serial bus.
The invention will now be described in greater detail, by way of example, with reference to the accompanying drawing, the single figure of which is a schematic representation of a system for downloading large data files from a service provider to a mobile communications device.
Referring to the drawing, a service provider 1 has a library of files (only one of which - identified by the reference numeral 2 - is shown). These files are data files such as game files or music files. Each of the files in the library of the service provider 1 is split into two parts, one of which is stored in the NON 3 of that service provider, the other being stored on the Internet 4. For example, the file 2 is stored in parts A and B respectively on the NON 3 and on the Internet 4. Typically, for a game file, part A contains 1% or less of the data of the file 2, and part B contains 99% or more of the data. The file 2 is split into the two parts A and B using any suitable algorithm, such as that described below. The main requirement of the algorithm used is that each of the parts A and B is useless (that is to say the data it contains cannot be used for the initial purpose of the file 2) without the data from the other part. Moreover, the way the file 2 is split into the two parts A and B, and the way the two parts are merged to provide a usable file for a user to use inputs that are unique to the file 2, so that knowledge of the algorithm used to split the file 2 is not sufficient to merge the two parts A and B to reconstitute that file. In other words, in order to merge the downloaded parts A and B, the user needs to know the parameters that were used to split the file 2 in the first place. A further desirable property of the split/merge algorithm, although not essential, is that the process by which the parts A and B are merged should be relatively quick.
If the user of a mobile communications device 5 wants to download the file 2 from the service provider 1, this is accomplished by directly downloading the part A from the NON 3, and by downloading the part B from the Internet 4, for example, by the user's PC 6. The PC 6 can then be linked to the mobile communications device 5, either via a cable such as a USB cable or wirelessly, for example, using Bluetooth or the wireless protocol 802.1 lb.
As mentioned earlier, the part B cannot be used on its own. The part A is also needed, as is the merge process (using the algorithm and its inputs). Only then, is it possible for the end-user to use the original file 2. the end-user will, therefore, need to access the NON 3 to receive the part A. It should be noted that this can be before, after, or during the download of the part B.
When the end-user accesses the NON 3 to obtain the part A, that user will be authenticated and charged/billed for the file, (most likely using a Public Key Infrastructure (PKI) infrastructure, to ensure that part of the Digital Rights Management (DRM) issues are being taken care of.
During the download of the part A, the inputs used for the split algorithm are also sent, so that the mobile device 5 can merge the parts A and B. These two parts may be merged immediately in the device 5, or stored in separate memory locations for future use. In some cases, it is preferable to merge the parts A and B immediately, for example when the merge process can take longer than the end-user is prepared to wait each time the complete file is accessed. This is particularly the case for large files such as music files. The file is then stored in memory, and an identification of that file is available for browsing by other end-users in what is known as a public list of files. In this case, an encryption key K is sent to the end-user at the same time as the part A is sent. The key K will only be used to encrypt the file when the file is sent to, or requested by, another user, as is described below. Where the parts A and B are stored separately on the mobile communications device 5, the algorithm inputs are stored with the part A. The parts A and B and the algorithm inputs are only merged when the end-user wants to use the file. Merging then takes place, and the merged file is placed in the memory of the mobile communication device 5 just before the file is executed/read. In this case, the parts A and B may be stored in a different areas of memory in the mobile communications device 5, the part A preferably being stored in a safer part of the memory. Here again, the part B is stored, and an identification of that part file is made available in the public list of file for browsing by other end-users. Advantageously, part B could be stored in a removable memory card, such as an MMC card.
The drawing also shows a mobile communications device 7 of another end-user. If that end-user wants to obtain the file 2, this can be obtained from the mobile communications device 5. In order to do this, the mobile communications device 7 uses a browser to browse the public list of files stored in the device 5, and then to request a particular file (say the file 2) of interest. Thus, where the parts A and B of the file were merged straightaway in the mobile communications device 5, that device will encrypt the entire file using the key K, and then transmit the encrypted file to the device 7. The user of the device 7, after having received the encrypted file, will access the NON 3 to receive a key to decrypt the file. When accessing the NON 3, that user will be authenticated and charged/billed for the file. The mobile communications device 7 of that user will need to send information about the file that has been transferred and from whom it is received, in order to permit the system to give that other user the correct key to decrypt the file. This key may be the key K or another key. At the same time, that user receives a second key K2. This key K2 will be used to encrypt the file again, so that that user can pass the file on to yet another end-user. This further end-user will then need to contact the NON 3 to obtain a key to decrypt the file, and a further key K3 for encrypting the file for sending on to yet another end-user. When accessing the NON 3, the further end-user will be authenticated and charged/billed for the file, again after sending information about the file transferred, and from whom it is received. In this way, the file can be passed on through multiple users, each of which can then decrypt the file and use it.
Where the parts A and B were stored separately on the mobile communications device 5, the file can be re-assembled and encrypted before being sent to the mobile communications device 7 of the other end user, or only the part B is sent to the mobile communications device 7 of the other end-user. In the case only part B is sent, on receiving the part B, that user will access the NON 3 to request the part A. When accessing the NON 3, that user's mobile communications device 7 will be authenticated, and that user will be charged/billed for the file. As before, the process can be replicated to further end-users, all of which can replicate to other end-users and so on.
In order to produce the part A, the file 2 is first RS A encrypted. Assuming, for the sake of simplicity, that the file part B is 10% of the file 2, 1/lOfh of the bits have to be removed. In order to do this every 20th bit is then removed from the file 2, and the remaining 5% of that file is removed from random locations. If any random location defines a sequence of consecutive bits on a random length, that random length has a maximum of 0.5% of the total length of the file. The off-set of where bits are removed randomly, and the length over which random bit lengths are removed is appended at the end of the remaining file (that is to say that part of the file which remains after the 10% has been removed). A 32 bit mask is then created, and the data is XORed with the 32 bit mask, 16 bits of the XORed mask being placed at the beginning of the remaining file, and 16 bits at the end. When the user of the mobile communications device 5 downloads the part A, it reads the mask and inverts the XOR process. The device 5 then contacts the NON 3, and requests the missing data from the table extracted from the end of the file, that is to say the 5% of the data which was randomly removed from the file 2. Those missing pieces are then inserted at the right places, after which every 20th bit, that is to say the 5% of the data which was removed as every 20th bit from the file 2, is requested from the NON 3 and inserted at the appropriate place. Finally, the file is decrypted.
In a modified arrangement, the file part B could be stored at a dedicated base station rather than on the Internet 4. In this case, the part files B could easily be downloaded to the mobile communications device of an end user using, for example, Bluetooth or some other suitable wireless protocol. An advantage of this arrangement is that users could be provided with the locations of dedicated base stations, so that users can readily access the files of interest. Another advantage of this arrangement is that, where the part files B are applications such as game files, those part files could be up-dated, on a regular basis, by a service provider server so that users can update their files. That server would contain a large number of data files. The server would then place the parts A and the parameters used for file splitting onto the NON 3 and the parts B onto the dedicated base stations. Each base station may be a server (or a PC) having a hard disc for file storage.

Claims

Claims
1. A method of transferring a data file from a service provider to a mobile communications device, the method comprising the steps of splitting the file into first and second parts, transmitting the first and second file parts over respective first and second communications routes from the service provider to the mobile communications device, and reassembling the file from the first and second file parts at the mobile communications device.
2. A method as claimed in claim 1, wherein the first file part is larger than the second file part.
3. A method as claimed in claim 2, wherein the first file part is at least an order of magnitude larger than the second file part.
4. A method as claimed in claim 2 or claim 3, wherein the first file part is more than 99% of the data file.
5. A method as claimed in any one of claims 1 to 4, wherein the first communications route is a lower cost route than the second communications route.
6. A method as claimed in any one of claims 1 to 5, wherein the first communications route includes first and second parts, the first part of the first route being an Internet connection between the service provider and a computer, and the second part of the first route being a short-range communications link between the computer and the mobile communications device.
7. A method as claimed in any one of claims 1 to 5, wherein the first communications route includes first and second parts, the first part of the first route being from a dedicated server associated with the service provider to a dedicated base station, and the second part of the first route being a short-range communications link between the dedicated base station and the mobile communications device.
8. A method as claimed in claim 7, wherein the dedicated server contains a large number of data files, and means are provided for updating the data files.
9. A method as claimed in any one of claims 6 to 8, wherein the second part of the first communications route is constituted by a wireless connection.
10. A method as claimed in claim 9, wherein the wireless connection uses the Bluetooth protocol.
11. A method as claimed in claim 9, wherein the wireless connection uses the 802.1 lb protocol or any other protocol from the 802.11 family.
12. A method as claimed in any one of claims 1 to 11, wherein the second communications route is a network operator network associated with the service provider.
13. A method as claimed in any one of claims 1 to 12, wherein the file is split into the first and second parts using an algorithm that ensures neither of the file parts can be used by a user of the mobile communications device until the file has been reassembled.
14. A method as claimed in any one of claims 1 to 13, wherein the user of the mobile communications device is charged/billed for the data file when the second file part is transmitted.
15. A method as claimed in any one of claims 1 to 14, wherein an encryption key is sent to the user of the mobile communications device with the second file part, and wherein the encryption key is subsequently usable by the mobile communications device for encryption of the second file part for transmission to another mobile communications device.
16. A method as claimed in any one of claims 1 to 14, wherein an encryption key is sent to the user of the mobile communications device with the second file part, and wherein the encryption key is subsequently usable by the mobile communications device for encryption of a complete re-assembled file part for transmission to another mobile communications device.
17. A method as claimed in claim 15 or claim 16, wherein the user of said another mobile communications device accesses the service provider to obtain a key for decrypting the received encrypted file part, the service provider sending charging data with said key.
18. A data file transfer system comprising a service provider and a mobile communications device, the service provider comprising a memory for storing a data file, means for splitting the data file into first and second parts, and means for transmitting the first and second file parts over respective first and second communications routes to the mobile communications device, and the mobile communications device having means for reassembling the file from the first and second file parts.
19. A system as claimed in claim 18, wherein the memory of the service provider is such as to store a large number of data files.
20. A system as claimed in claim 18 or claim 19, wherein the first communications route includes first and second parts, and the system further comprises an intermediate device, the first part of the first route being between the service provider and the intermediate device, and the second part of the first route being a short-range communications link between the intermediate device and the mobile communications device.
21. A system as claimed in claim 20 wherein the intermediate device is a computer.
22. A system as claimed in claim 21, wherein the first part of the first route is an Internet connection.
23. A system as claimed in claim 20, wherein the intermediate device is a dedicated base station for storing a plurality of first file parts.
24. A system as claimed in any one of claims 20 to 23, further comprising a dedicated server associated with the service provider, the dedicated server including a memory for storing a large number of data files.
25. A system as claimed in any one of claims 18 to 24, wherein the short-range communications link uses the Bluetooth protocol.
26. A system as claimed in any one of claims 18 to 24, wherein the short-range communications link uses the 802.11b protocol or any other protocol from the 802.11 family.
27. A system as claimed in any one of claims 18 to 24, wherein the short-range communications link is a universal serial bus.
PCT/GB2003/005406 2003-01-08 2003-12-12 Downloading data files WO2004063937A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003290248A AU2003290248A1 (en) 2003-01-08 2003-12-12 Downloading data files

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0300415A GB2397201A (en) 2003-01-08 2003-01-08 Downloading data files in two parts
GB0300415.7 2003-01-08

Publications (2)

Publication Number Publication Date
WO2004063937A2 true WO2004063937A2 (en) 2004-07-29
WO2004063937A3 WO2004063937A3 (en) 2005-02-03

Family

ID=9950842

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2003/005406 WO2004063937A2 (en) 2003-01-08 2003-12-12 Downloading data files

Country Status (3)

Country Link
AU (1) AU2003290248A1 (en)
GB (1) GB2397201A (en)
WO (1) WO2004063937A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8290527B2 (en) 2004-07-30 2012-10-16 Airvana, Corp. Power control in a local network node (LNN)
US8503342B2 (en) 2004-07-30 2013-08-06 Airvana Llc Signal transmission method from a local network node
US9876670B2 (en) 2004-07-30 2018-01-23 Commscope Technologies Llc Local network node

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2908199B1 (en) * 2006-11-06 2009-01-16 Ubicmedia Soc Par Actions Simp METHOD AND DEVICE FOR CONTROLLED EDITING AND BROADCAST OF COMPRESSED MULTIMEDIA FILES
US8787918B2 (en) 2007-08-28 2014-07-22 Lsi Corporation Transmitting data over a mobile telecommunication network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999038302A1 (en) * 1998-01-22 1999-07-29 Maxon Systems Inc. (London) Ltd. Secure data communication system
WO2002047352A2 (en) * 2000-10-27 2002-06-13 Listen.Com Delivering media data to portable computing devices

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5920566A (en) * 1997-06-30 1999-07-06 Sun Microsystems, Inc. Routing in a multi-layer distributed network element
SE0000707D0 (en) * 1999-05-04 2000-03-01 Magnus Agervald System for transmitting data via multiple communication paths
GB2378609B (en) * 2001-07-10 2004-08-18 Telecom Fm Developments Ltd A method and apparatus for routing telecommunications traffic
GB2382268B (en) * 2001-11-16 2005-07-13 Hutchison Whampoa Three G Ip Streaming sevices in radio networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999038302A1 (en) * 1998-01-22 1999-07-29 Maxon Systems Inc. (London) Ltd. Secure data communication system
WO2002047352A2 (en) * 2000-10-27 2002-06-13 Listen.Com Delivering media data to portable computing devices

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8290527B2 (en) 2004-07-30 2012-10-16 Airvana, Corp. Power control in a local network node (LNN)
US8311570B2 (en) 2004-07-30 2012-11-13 Airvana Llc Method and system of setting transmitter power levels
US8503342B2 (en) 2004-07-30 2013-08-06 Airvana Llc Signal transmission method from a local network node
US9876670B2 (en) 2004-07-30 2018-01-23 Commscope Technologies Llc Local network node

Also Published As

Publication number Publication date
GB2397201A (en) 2004-07-14
AU2003290248A8 (en) 2004-08-10
GB0300415D0 (en) 2003-02-05
WO2004063937A3 (en) 2005-02-03
AU2003290248A1 (en) 2004-08-10

Similar Documents

Publication Publication Date Title
JP4903706B2 (en) Method for distributing content together with digital rights to portable device and portable device
RU2395166C2 (en) Method for provision of access to coded content of one of multiple subscriber systems, device for access provision to coded content and method for generation of protected content packets
CN109995513B (en) Low-delay quantum key mobile service method
JP5894155B2 (en) Method of file transmission based on distributed storage in a wireless communication system
EP1452027B1 (en) Access to encrypted broadcast content
KR101299934B1 (en) Method of providing rights data objects
US20070124583A1 (en) Method for storing and transfer of rights objects between devices and device exploiting the method
RU2006139426A (en) PROTECTION OF INTEGRITY OF STREAM CONTENT
US20080114687A1 (en) Method and apparatus for moving, dividing, or merging copyrighted content
CN1739076A (en) Method for transmitting encrypted user data objects
CN103873454A (en) Authentication method and equipment
WO2006038622A1 (en) Content distribution system
CN101150851A (en) Method, server and mobile station for transmitting data from server to mobile station
JPWO2006025241A1 (en) Data transmission device, data reception device, server, transmission / reception device, data sharing system, data transmission program, data reception program, data sharing program, data transmission / reception program, and computer-readable recording medium
JP2007156523A (en) Information terminal device
JP2004240655A (en) Contents distribution system, contents distribution method, communication terminal, program and storage medium
CN102065135B (en) Peer to peer data acquisition method, system and server
JP2008124649A (en) Method of transferring content with right
WO2004063937A2 (en) Downloading data files
JP2010233104A (en) Radio communication system, radio control server, communication terminal, and control program
CN103391527B (en) Implementation method, equipment and the system that in wireless access hotspot device, function is shared
CN109450849B (en) Cloud server networking method based on block chain
CN101222749B (en) Method and starting method for transferring user's contract information to visiting network
CN105635177A (en) Method, device and system for transmitting encrypted data
JP2004102826A (en) Content data processing method, cellular phone terminal and server

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP