WO2021171240A1 - Method and system for storing and accessing content - Google Patents
Method and system for storing and accessing content Download PDFInfo
- Publication number
- WO2021171240A1 WO2021171240A1 PCT/IB2021/051612 IB2021051612W WO2021171240A1 WO 2021171240 A1 WO2021171240 A1 WO 2021171240A1 IB 2021051612 W IB2021051612 W IB 2021051612W WO 2021171240 A1 WO2021171240 A1 WO 2021171240A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- devices
- network
- nodes
- smart
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/061—Improving I/O performance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/0644—Management of space entities, e.g. partitions, extents, pools
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/065—Replication mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- THIS INVENTION relates to a method and system for storing and accessing content; in particular, but not exclusively, it relates to a method and system for storing and accessing multimedia content within a closed network topology structure in a decentralized server environment.
- GUI designates a graphical user interface, which permits users to interact with electronic devices through graphical icons and visual indicators, instead of text-based user interfaces;
- HDD designates hard disk drive, and specifically embraces solid state drives (“SSDs”) or similar internal memory storage component within that definition;
- node means a group of media content devices in a network, typically, but not exclusively, grouped by geographical area;
- tablette designates a wireless, portable personal computer with a touch screen interface
- IP telephone designates a voice over internet protocol (“IP”) telephone, that is used for transmitting - over an IP network, such as the Internet, instead of traditional public switched telephone networks.
- IP voice over internet protocol
- peer-to-peer file-transfer services are known in the industry as peer-to-peer file-transfer services.
- peer-to-peer file-transfer services As useful as these prior art services are, they suffer from a number of disadvantages and limitations. For example, in order for these peer-to-peer services to function a voluntary and willing peer has to become part of the network, and a number of necessary preconditions thereafter had to be met, including that peers’ computers had to be both powered-up and also connected to the internet. Failing that, it would be impossible to operate in an offline state, thus rendering the service entirely useless.
- a torrent file is a computer file containing metadata about files and also a list of the network locations of participating peer computers in the network.
- a torrent file does not contain the actual content of the file to be distributed; it only contains information about those files.
- Torrent files are also capable of being manipulated, altered and even deleted by the user.
- a BitTorrentTM network has servers that keep track of on-line participants and which torrent data those participants share, and those files are shared directly between peers.
- Such peer-to-peer file transfer systems are notoriously inconsistent and unreliable, primarily because they belong to an open network of peers that are neither controlled nor managed by a software managing system.
- a further, associated problem is that of internet-traffic congestion.
- an integrated HDD is provided.
- One partitioned part of the HDD is allocated to the customer for his own use, in order to record media content of his choice.
- the other partitioned part of the HDD is reserved for the cable company’s own use, to store pre-determined content, as decided by the cable company (a good example being the “Catch-up” capability of Multichoice’sTM ExploraTM decoder package).
- the customer while able to access such content on the reserved partitioned portion, is unable to edit that content.
- the partitioned HDD is thus relatively limited in application, as the data stored is static (from the user’s perspective), and is available only to that user.
- this invention relates to a method of and system for storing and accessing content by combining a controlled and managed transactional blockchain method, with a controlled and managed peer to peer segmented file storage method, within a predetermined closed network environment structure.
- loT Internet of Things
- This controlled method for storing and accessing content is possible because it functions within a closed network of hundreds or thousands of smart devices or so called loT devices connected via the internet; these devices act as conventional consumer telecommunication electronics products, such as a home or office network router, an IPTV set top box, a smart tablet, a VoIP phone, mobile phone, etc.
- the method comprises the steps of:
- the segmentation algorithm may be configured to replicate at least some file segments of a file, for storage on devices located in at least two nodes.
- the software management tool at launch of the system may be hosted entirely or partially at a management centre. Later the management tool will be hosted entirely by the segmented filing network.
- the method may further include the steps of:
- the segmentation optimisation algorithm may be a function of criteria selected from the list consisting of: the size of the file; the number of available user devices in accessible nodes in the network, the relative data transfer rate available to each device; and a combination of these.
- the load-leveling algorithm may be a function of criteria selected from the list consisting of: the location of each of the series of segments of the requested file; the list of available user devices in the network of devices, the relative data transfer rate available to each device; and a combination of these.
- the load-leveling algorithm may use artificial intelligence, with reference to received data which it then distributes in accordance with a machine-based learning model.
- the method may further include the step of adding a checksum to each segment in order to test the data integrity in each of the file segments.
- the step of distributing the respective file segments in accordance with the segmentation algorithm may involve the management software tool downloading and storing the respective file segments directly into the partitioned HDD in the node of the identified users in the network of devices.
- the management software tool is preconfigured to distribute at least some segments of files to multiple devices in multiple nodes in the networks, in order to maximise the statistical availability of files on demand by users.
- the method may further include the step of replicating the software management tool in at least two or more discreet nodes.
- the software management tool may be replicated onto the HDD of at least some devices in at least some nodes.
- the device is configured to be connected to both a media screen and to connecting means for the device to the internet.
- the media screen GUI may be selected on a group consisting of a television screen, a computer screen, a tablet, a mobile telephone.
- the device is itself is an loT device as a smart Network Router, smart media player device, smart TV device, smart mobile telephone, or smart tablet, etc.
- the connecting means may be selected from the group consisting of: Network Routers, VoIP telephone, Internet connectivity, WI-FI or similar wireless connection, network cable or similar hard connection.
- a system for storing and accessing content comprising:
- a load-leveling algorithm hosted at the management centre, for determining an optimal download path via accessible nodes and for facilitating downloading of the file segments directly between the requesting user’s device and the devices associated with the identified accessible nodes.
- the system may further include an encryption key application hosted on the HDD of each device, for encrypting each file before uploading, and also for decrypting file segments once these are downloaded on the user’s device.
- the system may further include a media screen.
- the system may further include connecting means for the device to the internet.
- the system may include a replicated software management tool, the two copies of the software management tool being located in at least two or more discreet nodes.
- the media screen GUI may be selected on a group consisting of a television screen, a computer screen, a tablet, a mobile telephone.
- the device is itself is an loT device like a smart Network Router, smart media player device, smart TV device, smart mobile telephone, alternatively or smart tablet, etc.
- the connecting means may be selected from the group consisting of: a Smart Router, VoIP telephone, internet connectivity, wi-fi or similar wireless connection, network cable or similar hard connection.
- Figure 1 is a flow diagram illustrating a preferred method of storing and accessing content
- Figure 2 is a diagrammatic representation of a preferred system for storing and accessing content, corresponding to the method depicted in Figure 1 ;
- Figure 3 is a diagrammatic representation of a method of and system for storing and accessing content, such as multimedia content, within a closed network topology structure within a decentralized server environment, according to a further aspect of the invention.
- Figure 4 is a diagrammatic representation of a closed network topology node structure used within the closed network topology structure shown in Figure 3.
- a method for accessing content is disclosed and is referred to generally by numeral 10, in Figure 1.
- the corresponding system for accessing multimedia content is also disclosed and is referred to generally by numeral 20, in Figure 2.
- Figures 1 and 2 side by side.
- the flow chart in Figure 1 has been depicted over three discreet partitions A, B and C.
- the location of each step into particular partitions is deliberate: a step appearing in Partition A indicates that it is an action taken by a user 30; a step appearing in Partition B indicates that it is an action taken on execution of the software management tool 140, on a server 150, remote from any user 30.
- a step appearing in Partition A indicates that it is an action taken by a user 30;
- Partition B indicates that it is an action taken on execution of the software management tool 140, on a server 150, remote from any user 30.
- a step appearing in Partition A indicates that it is an action taken by a user 30
- Partition B indicates that it is an action taken on execution of the software management tool 140,
- a node indicates that it is an action taken on execution of an application on the FIDD of a device 80 in a node (of the type shown in Figures 3 and 4).
- a node is a group of devices 80 in a network 230, as best shown in Figure 3, in this case grouped by geographical area
- the device 80 is a smart media player, although it is specifically envisaged that in other embodiments of the invention (not depicted here) it is specifically envisaged that the device 80 will take the form, more generally, of a computing device having an operating system. A more detailed description of the device 80 appears below.
- the commencement point is of multimedia entertainment corporation 40 distributing a content management device 80 to each of its clients, namely user 30 (step 90).
- Each device 80 includes a built-in FIDD 70 (not specifically depicted) which, in turn, is partitioned to include a partition, that is inaccessible to the user 30.
- Each device 80 has internet connectivity means.
- the device 80 incorporates both a network cable input 110 and a wi-fi aerial 120 - either of which means may be used in order to connect the device 80 to the internet 130.
- the device 80 is connected to VoIP phone 141 , in order to maintain continuous, uninterrupted internet connectivity; the advantage of maintaining continuous connectivity will become clear from the explanation that follows. It will be appreciated that a series of users 30 will connect their respective devices 80 to the internet 130, forming a network 230 of connected devices 80.
- the software management tool 140 which manages the processes of uploading, storing, and ultimately downloading content, in the manner described in detail below.
- the software management tool 140 which comprises a suite of computer programs, is hosted on a server 150 located in a management centre 160 that is remote of all users 30 and of corporation 40.
- the device 80 is also connected to a television 170 via an HDMI cable 180.
- the device 80 is pre programed to include a GUI, that is navigated by user 30 on television 170 using control unit 200.
- User 30 selectively saves a file (not depicted) on the portion of the HDD 70 that is partitioned in favour of the user 30 for his own use.
- the system 20 is configured, in step 190, to permit a user 30 to upload a file directly to server 150. In practice, this is achieved by user 30 navigating the GUI menu to upload that file.
- a flash memory device a “memory stick”; not depicted
- that memory stick may be inserted directly into a USB port on television 170.
- the file is accessed from there via the GUI.
- television 170 is a Smart TV, which enables the user 30 to download content over the internet directly onto that Smart TV’s hard drive - that content, in turn, may be uploaded for distribution in the manner described above.
- representatives of the corporation 40 itself are also able to upload a file (not depicted) via a computer interface (not depicted) directly to server 150 without the need to navigate the GUI.
- Hard-coded into the HDD of device 80 is an encryption key application 290 that serves to encrypt each file (step 300) before uploading.
- a television 170 is illustrated in the accompanying figures, it is considered, equally, in other embodiments of the invention, a computer screen, a tablet, or a mobile telephone may be used as a comparably equivalent media player (none are depicted in the accompanying figures).
- the cellphone will serve as the device 80 itself, with the encryption key application 290 loaded onto that cellphone and, similarly, a portion of the cellphone’s HDD will be partitioned in the same manner as described above.
- That file is uploaded for storage on a central server 150 located at the management centre 160 (or, to be more accurate: the encrypted file is uploaded for storage).
- the software management tool 140 runs a segmentation optimisation algorithm 210 that is designed to segment that file optimally.
- the manner of segmentation is context dependent, based on a number of prevailing factors in the network 230 at the time of uploading the file (step 190), namely: the size of the file the number of available user devices 80 in the network 230, and the relative data transfer rate available to each device 80.
- the file is split into segments (not depicted) and each respective segment is transferred, over internet 130 for storage on the respective nodes in the HDD of the respective devices 80 in network 230 that were identified in the optimisation calculation (step 220).
- step 320 (not specifically depicted), a checksum is added to each segment, in order to test and ensure the integrity of each segment.
- the software management tool 140 is preconfigured to distribute and store at least some file segments to multiple nodes in the network 230 simultaneously, in order to maximise the statistical availability of files on demand by users 30. Simply put: the redundancy of multiple storage sites for the same file segment is secondary in importance to ensuring the availability of all file segments to cater for demand by other users 30 in the network 230.
- the software management tool 140 will make it available for downloading by other users 30 in the network 230, by displaying it in the GUI.
- user 30 wishing to download that file will select the file using the control unit 200 to navigate the GUI. That triggers a request that is sent over the internet 130 to the management centre 160 to download that file.
- the software management tool 140 then runs a load-leveling algorithm 260 in step 270, the purpose of which is to assess the state of resources available in the network 230 in order to determine an optimal download path via accessible nodes.
- the solution to the algorithm is based on a number of prevailing factors in the network 230 at the time of uploading the file (step 190), namely: the location of each of the series of segments of the requested file; the list of available user 30 devices 80 in the network 230, and the relative data transfer rate available to each device 80. It will be recognised that the software management tool 140 will need to determine: (i) into how many segments the file was segmented originally (steps 190 & 220) and (ii) on which devices 80 in network 230 each segment can be located. It will also be appreciated that the redundancy (described above) of storing file segments on multiple devices 80 results in a relatively fast and efficient method of accessing content, even in environments of poor connectivity or high traffic rates.
- file segments are stored in the partitioned HDD of devices 80 located in different nodes (ie: different geographical areas).
- nodes ie: different geographical areas.
- This is quite deliberate: it maximises the statistical probability of at least one copy of a file segment being accessible on a device 80 located in at least one node, at all times - even if, for example, an entire node is inaccessible owing to uncontrolled external factors, such as a widespread power outage.
- the software management tool 140 is specifically programmed to replicate file segments across increasingly more nodes, in order to amplify the advantage. In this fashion, the invention aims to achieve a virtually perpetually available network on which files may be stored and accessed.
- each file segment is, necessarily, considerably smaller in size than a complete file means that the transfer of file segments over a network 230 will, necessarily, be more efficient that the conventional prior art methods, which transferring complete files. It will also be appreciated from what has been set out above that, the greater the number of devices 80 in the network 230, the larger the amount of available space in the system 20 in which to store files (or, more accurately, file segments).
- software management tool 140 itself will be replicated on a server located in another node, in order to amplify this same advantage yet further.
- the software management tool 140 is pre-programmed to replicate itself automatically when the number of devices 80 in a node reaches a particular threshold.
- the software management tool 140, or components of it - typically the segmentation algorithm 210 and/or the load leveling algorithm 260 will themselves be replicated on the HDD of at least some devices 80 in at least some nodes.
- step 280 and immediately after this load-leveling algorithm 260 is executed (step 270), a request is sent to all devices 80 from the server 150 in management centre 160 - specifically that request is a command to each of the identified accessible nodes to retrieve the relevant file segments. Then, in step 330, the identified file segments are transferred, over internet 130 to the partitioned section in the HDD of the requesting user 30’s device 80. There, the series of file segments will be recompiled and then decrypted in step 310, at which point the (complete) file will be available to access by the requesting user 30.
- the system 20 for storing and accessing content comprises: the series of devices 80 in the network 230, each device including a FIDD 70 that has a partitioned portion that is inaccessible to the user 30, the software management tool 140 that is hosted at management centre 160 remote from all users 30, the segmentation optimisation algorithm 210, and the load leveling algorithm 260.
- the series of devices 80 in the network 230 each device including a FIDD 70 that has a partitioned portion that is inaccessible to the user 30, the software management tool 140 that is hosted at management centre 160 remote from all users 30, the segmentation optimisation algorithm 210, and the load leveling algorithm 260.
- the system 20 also includes encryption key application 290, hosted on the HDD of each device 80, for encrypting each file before uploading (step 190) and also for decrypting file segments once these are downloaded on the requesting user’s device 80 (step 280).
- encryption key application 290 hosted on the HDD of each device 80, for encrypting each file before uploading (step 190) and also for decrypting file segments once these are downloaded on the requesting user’s device 80 (step 280).
- the various devices may act as a micro server, and in particular as a mini server.
- a new type of virtual data centre may be provided.
- These mini-servers incorporate the latest technologies, including blockchain, crypto storage, Al, loT, EoP, and LTE, making them ready to be cyber- linked to form a global Virtual Storage Data Centre (VSDC) that is unlimited, decentralized, democratic and perpetual.
- VSDC Virtual Storage Data Centre
- a perpetual Switch ON feature for the full entire network is envisaged, as the Al (Artificial intelligence) algorithm will not allow a Switch OFF feature of the system to be activated, at least when two or more devices are being connected.
Abstract
At a high level, this invention relates to an AI-based method of and system for storing and accessing content by combining a controlled and managed transactional blockchain method, with a controlled and managed peer to peer segmented file storage method, within a predetermined closed network environment structure. The includes embedding and installing a hardware and software module on an IoT (Internet of Things) device to be deployed, managed and controlled within a closed network environment structure. This controlled method for storing and accessing content is possible because it functions within a closed network of hundreds or thousands of smart devices or so called IoT devices connected via the internet; these devices act as conventional consumer telecommunication electronics products, such as a home or office network router, an IPTV set top box, a smart tablet, a VoIP phone, mobile phone, etc.
Description
METHOD AND SYSTEM FOR STORING AND ACCESSING CONTENT
FIELD OF THE INVENTION
THIS INVENTION relates to a method and system for storing and accessing content; in particular, but not exclusively, it relates to a method and system for storing and accessing multimedia content within a closed network topology structure in a decentralized server environment.
BACKGROUND TO THE INVENTION
In this specification, the following acronyms and definitions are used:
• “content” designates digital content that is capable of being transmitted over a computer network - without restriction to the type of electronic file, nor the subject matter of any file;
• “GUI” designates a graphical user interface, which permits users to interact with electronic devices through graphical icons and visual indicators, instead of text-based user interfaces;
• “HDD” designates hard disk drive, and specifically embraces solid state drives (“SSDs”) or similar internal memory storage component within that definition;
• “node” means a group of media content devices in a network, typically, but not exclusively, grouped by geographical area;
• “tablet” designates a wireless, portable personal computer with a touch screen interface; and
• “VoIP telephone” designates a voice over internet protocol (“IP”) telephone, that is used for transmitting - over an IP network, such as the Internet, instead of traditional public switched telephone networks.
Each of these terms is well understood and commonly used in the art.
In recent times, consumers have been spoiled for choice when it comes to selecting multimedia entertainment packages and, in particular, methods of obtaining multimedia content. Several systems and methods have been introduced to permit individual users to download content in a computer network over the internet. Some of the best known of these are the peer-to-peer file transfer applications Napster™, Kazaa™ and LimeWire™. While there are differences between the three, for present purposes, they have a number of common traits (apart from the fact that all are now defunct), namely that they were all online file-sharing services, which permitted registered members to search for a particular file that might be stored in any one of the computers associated with another registered member also running the same application. If and when that file was located, the searching member was then able to download a copy of that file onto his computer. These services are known in the industry as peer-to-peer file-transfer services. As useful as these prior art services are, they suffer from a number of disadvantages and limitations. For example, in order for these peer-to-peer services to function a voluntary and willing peer has to become part of the network, and a number of necessary preconditions thereafter had to be met, including that peers’ computers had to be both powered-up and also connected to the internet. Failing that, it would be impossible to operate in an offline state, thus rendering the service entirely useless.
Many prior art peer-to-peer file transfer services utilise a BitTorrent™ file distribution system. A torrent file is a computer file containing metadata about files and also a list of the network locations of participating peer computers in the network. A torrent file does not contain the actual content of the file to be distributed; it only contains information about those files. Torrent files are also capable of being manipulated, altered and even deleted by the user. At its simplest level, a BitTorrent™ network has servers that keep track of on-line participants and which torrent data those participants share, and those files are shared directly between peers. Such peer-to-peer file transfer systems are notoriously inconsistent and unreliable, primarily because they belong to an open network of peers that are neither controlled nor managed by a software managing system.
A further, associated problem is that of internet-traffic congestion. It will be appreciated that, if only a finite, relatively small, number of copies of a particular file was made available to peers, and the demand for the file among peers far outstripped the available supply, congestion would inevitably follow. This problem, which is often described in the field as the problem of latency, is exacerbated, further, in those environments in which data transfer speeds are relatively low.
In the context of television entertainment, a number of subscription services from cable television companies are also well-known. For example: companies such as Tivo™ and Multichoice™ offer decoder unit- based services. In their traditional decoder units, an integrated HDD is provided. One partitioned part of the HDD is allocated to the customer for his own use, in order to record media content of his choice. The other partitioned part of the HDD is reserved for the cable company’s own use, to store pre-determined content, as decided by the cable company (a good example being the “Catch-up” capability of Multichoice’s™ Explora™ decoder package). The customer, while able to access such content on the reserved partitioned portion, is unable to edit that content. The partitioned HDD is thus relatively limited in application, as the data stored is static (from the user’s perspective), and is available only to that user.
Other entertainment companies, such as Netflix™ and ShowMax™ offer a wide variety of entertainment content. An advantage of their service offerings, to at least some extent, is that they do not rely on storage space capacity on any user’s entertainment unit. Instead, these offerings rely on internet connectivity, as content is simply stored in the cloud, with users downloading or stream content on demand. This has severe restrictions and limitations: it has already been explained above how congestion in internet traffic is undesirable. In addition, these services are rendered largely ineffective in environments with low data transfer speeds. While each of the examples provided here is in the context of multimedia entertainment content, the technology applies equally to content of any description that is intended for dissemination in a network of peers. This includes, for example, the content of business documents of a multinational corporation in which employees are separated across offices and across continents.
Finally, another problem associated with each of the prior art solutions described above is their vulnerability to “hacking” i.e. computer security breaches. More specifically, it is a constant problem in all of these cases, that hackers who are able to access these centralized server, closed networks are able to access and copy multimedia content, simply by copying-over the multimedia files. This is a particular concern when users wish to use these solutions to upload their own multimedia content, but do not want to risk that content being accessed by hackers. A more recent technology called blockchain architecture has emerged and is used to remedy the cybersecurity shortfalls affecting torrent files and centralized server environments (including them being unregulated, unmanaged and unsecure). This technology, in one application, is used to run the popular transactional money transfer platform called Bitcoin™. However, the security offered by this technology is used only as a transactional decentralized server and has made this money transfer transaction application without any reliable transactional time period or reliable transaction between peers, as hundreds and thousands of computers worldwide are connected to this open blockchain network without any management and peer control network. Furthermore, this technology chain cannot function if a voluntary and willing peer does not subscribe to such service.
OBJECT OF THE INVENTION It is an object of the present invention to provide a method and system for accessing and storing content, such as multimedia content, that will overcome, at least partially, the disadvantages of the prior art described above. SUMMARY OF THE INVENTION
At a high level, this invention relates to a method of and system for storing and accessing content by combining a controlled and managed transactional blockchain
method, with a controlled and managed peer to peer segmented file storage method, within a predetermined closed network environment structure.
This includes embedding and installing a hardware and software module on an loT (Internet of Things) device to be deployed, managed and controlled within a closed network environment structure.
This controlled method for storing and accessing content is possible because it functions within a closed network of hundreds or thousands of smart devices or so called loT devices connected via the internet; these devices act as conventional consumer telecommunication electronics products, such as a home or office network router, an IPTV set top box, a smart tablet, a VoIP phone, mobile phone, etc.
Therefore, voluntary file sharing peers and voluntary blockchain miners are no longer applicable with this new method, as the loT devices connected within the predetermined closed network structure are innately compelled to act or function as a peer or miner. The storing and accessing of content is thus a background or secondary function for these devices, without interfering with their primary function.
In an embodiment, the method comprises the steps of:
• providing a content management device to each of a series of users, each device including a HDD, a partition of which is inaccessible to the user;
• connecting at least some of the devices to the internet, so as to establish a network of connected devices;
• utilising a software management tool to upload content, at least part of the software management tool being hosted remote from all users;
• running a segmentation optimisation algorithm in order to segment that file and allocate those file segments optimally between nodes;
• distributing the respective file segments in accordance with the segmentation algorithm, and storing the respective file segments on selected devices located in the selected nodes;
• providing a content menu to the users;
• receiving a request at the management centre from a user to download a
particular content file;
• running a load-leveling algorithm, hosted at the management centre, in order to determine an optimal download path via accessible nodes;
• sending a request to the identified accessible nodes to retrieve the relevant file segments; and
• downloading the file segments directly between the requesting user’s device and the devices associated with the accessible nodes, rendering the file accessible to the requesting user. Preferably, the segmentation algorithm may be configured to replicate at least some file segments of a file, for storage on devices located in at least two nodes.
The software management tool at launch of the system may be hosted entirely or partially at a management centre. Later the management tool will be hosted entirely by the segmented filing network.
The method may further include the steps of:
• providing an encryption key application on the HDD of each device, for encrypting each file before uploading; and · downloading and reassembling file segments and decrypting the file on the user’s device.
The segmentation optimisation algorithm may be a function of criteria selected from the list consisting of: the size of the file; the number of available user devices in accessible nodes in the network, the relative data transfer rate available to each device; and a combination of these.
The load-leveling algorithm may be a function of criteria selected from the list consisting of: the location of each of the series of segments of the requested file; the list of available user devices in the network of devices, the relative data transfer rate available to each device; and a combination of these. In one version, the load-leveling algorithm may use artificial intelligence, with reference to received data which it then distributes in accordance with a machine-based learning model.
The method may further include the step of adding a checksum to each segment in order to test the data integrity in each of the file segments. The step of distributing the respective file segments in accordance with the segmentation algorithm may involve the management software tool downloading and storing the respective file segments directly into the partitioned HDD in the node of the identified users in the network of devices. Preferably, the management software tool is preconfigured to distribute at least some segments of files to multiple devices in multiple nodes in the networks, in order to maximise the statistical availability of files on demand by users.
The method may further include the step of replicating the software management tool in at least two or more discreet nodes.
The software management tool, alternatively part of the software management tool may be replicated onto the HDD of at least some devices in at least some nodes. Preferably, the device is configured to be connected to both a media screen and to connecting means for the device to the internet.
The media screen GUI may be selected on a group consisting of a television screen, a computer screen, a tablet, a mobile telephone.
In an embodiment of the invention, the device is itself is an loT device as a smart Network Router, smart media player device, smart TV device, smart mobile telephone, or smart tablet, etc. The connecting means may be selected from the group consisting of: Network Routers, VoIP telephone, Internet connectivity, WI-FI or similar wireless connection, network cable or similar hard connection.
According to a second aspect of the invention, there is provided a system for
storing and accessing content, the system comprising:
• a series of content management devices, a device being issued to each of a series of users, each device including a HDD, a partition of which is inaccessible to the user;
• a network environment, in which each of the series of devices is connectable to the internet;
• a software management tool for uploading content files, the software management tool being hosted at a management centre remote from all users;
• a segmentation optimisation algorithm for segmenting files and allocating those file segments optimally;
• a load-leveling algorithm, hosted at the management centre, for determining an optimal download path via accessible nodes and for facilitating downloading of the file segments directly between the requesting user’s device and the devices associated with the identified accessible nodes.
The system may further include an encryption key application hosted on the HDD of each device, for encrypting each file before uploading, and also for decrypting file segments once these are downloaded on the user’s device.
The system may further include a media screen.
The system may further include connecting means for the device to the internet.
The system may include a replicated software management tool, the two copies of the software management tool being located in at least two or more discreet nodes.
The media screen GUI may be selected on a group consisting of a television screen, a computer screen, a tablet, a mobile telephone.
In an embodiment of the invention, the device is itself is an loT device like a smart Network Router, smart media player device, smart TV device, smart mobile telephone, alternatively or smart tablet, etc.
The connecting means may be selected from the group consisting of: a Smart Router, VoIP telephone, internet connectivity, wi-fi or similar wireless connection, network cable or similar hard connection.
BRIEF DESCRIPTION OF THE DRAWINGS
In order to describe the invention, embodiments thereof are described hereunder, purely as examples, without limiting the scope of the invention, wherein:
Figure 1 is a flow diagram illustrating a preferred method of storing and accessing content;
Figure 2 is a diagrammatic representation of a preferred system for storing and accessing content, corresponding to the method depicted in Figure 1 ;
Figure 3 is a diagrammatic representation of a method of and system for storing and accessing content, such as multimedia content, within a closed network topology structure within a decentralized server environment, according to a further aspect of the invention; and
Figure 4 is a diagrammatic representation of a closed network topology node structure used within the closed network topology structure shown in Figure 3.
DETAILED DESCRIPTION OF THE DRAWINGS
Referring to the figures, which depict preferred embodiments of the invention, a method for accessing content, is disclosed and is referred to generally by numeral 10, in Figure 1. The corresponding system for accessing multimedia content is also disclosed and is referred to generally by numeral 20, in Figure 2. It is instructive to review Figures 1 and 2 side by side. It will also be noted that the flow chart in
Figure 1 has been depicted over three discreet partitions A, B and C. The location of each step into particular partitions is deliberate: a step appearing in Partition A indicates that it is an action taken by a user 30; a step appearing in Partition B indicates that it is an action taken on execution of the software management tool 140, on a server 150, remote from any user 30. Finally, a step appearing in Partition
C indicates that it is an action taken on execution of an application on the FIDD of a device 80 in a node (of the type shown in Figures 3 and 4). A node, of course, is a group of devices 80 in a network 230, as best shown in Figure 3, in this case grouped by geographical area In the embodiment depicted in the Figures, the device 80 is a smart media player, although it is specifically envisaged that in other embodiments of the invention (not depicted here) it is specifically envisaged that the device 80 will take the form, more generally, of a computing device having an operating system. A more detailed description of the device 80 appears below. The method 10 and system 20 will be described, first, in the context of a preferred embodiment of the invention, namely: the storing and accessing of multimedia entertainment content. The commencement point is of multimedia entertainment corporation 40 distributing a content management device 80 to each of its clients, namely user 30 (step 90). Each device 80 includes a built-in FIDD 70 (not specifically depicted) which, in turn, is partitioned to include a partition, that is inaccessible to the user 30. Each device 80 has internet connectivity means. For example, in Figure 2, the device 80 incorporates both a network cable input 110 and a wi-fi aerial 120 - either of which means may be used in order to connect the device 80 to the internet 130. In a preferred embodiment, the device 80 is connected to VoIP phone 141 , in order to maintain continuous, uninterrupted internet connectivity; the advantage of maintaining continuous connectivity will become clear from the explanation that follows. It will be appreciated that a series of users 30 will connect their respective devices 80 to the internet 130, forming a network 230 of connected devices 80.
Before discussing the device 80 further, it is necessary, first to describe the software management tool 140, which manages the processes of uploading, storing, and ultimately downloading content, in the manner described in detail below. The software management tool 140, which comprises a suite of computer programs, is
hosted on a server 150 located in a management centre 160 that is remote of all users 30 and of corporation 40.
Returning to the use of the device 80: in the embodiment depicted, the device 80 is also connected to a television 170 via an HDMI cable 180. The device 80 is pre programed to include a GUI, that is navigated by user 30 on television 170 using control unit 200. User 30 selectively saves a file (not depicted) on the portion of the HDD 70 that is partitioned in favour of the user 30 for his own use. The system 20 is configured, in step 190, to permit a user 30 to upload a file directly to server 150. In practice, this is achieved by user 30 navigating the GUI menu to upload that file. Conveniently, that is achieved by first storing the file onto a flash memory device (a “memory stick”; not depicted) and inserting that memory stick into a USB port (not depicted) on the device 80. Alternatively, that memory stick may be inserted directly into a USB port on television 170. The file is accessed from there via the GUI. Further alternatively, in another embodiment of the invention (not depicted) television 170 is a Smart TV, which enables the user 30 to download content over the internet directly onto that Smart TV’s hard drive - that content, in turn, may be uploaded for distribution in the manner described above. Additionally, representatives of the corporation 40 itself are also able to upload a file (not depicted) via a computer interface (not depicted) directly to server 150 without the need to navigate the GUI. Hard-coded into the HDD of device 80 is an encryption key application 290 that serves to encrypt each file (step 300) before uploading. While a television 170 is illustrated in the accompanying figures, it is considered, equally, in other embodiments of the invention, a computer screen, a tablet, or a mobile telephone may be used as a comparably equivalent media player (none are depicted in the accompanying figures). In the non-illustrated embodiment in which a cellphone is used, it will be appreciated that the cellphone will serve as the device 80 itself, with the encryption key application 290 loaded onto that cellphone and, similarly, a portion of the cellphone’s HDD will be partitioned in the same manner as described above.
That file is uploaded for storage on a central server 150 located at the management centre 160 (or, to be more accurate: the encrypted file is uploaded for storage). Once uploaded to the server 150, in step 220, the software management tool 140 runs a segmentation optimisation algorithm 210 that is designed to segment that file optimally. More specifically: the manner of segmentation is context dependent, based on a number of prevailing factors in the network 230 at the time of uploading the file (step 190), namely: the size of the file the number of available user devices 80 in the network 230, and the relative data transfer rate available to each device 80. In step 240, and immediately after this segmentation computation is performed (step 220), the file is split into segments (not depicted) and each respective segment is transferred, over internet 130 for storage on the respective nodes in the HDD of the respective devices 80 in network 230 that were identified in the optimisation calculation (step 220). It will be appreciated by the expert in the field that this process will be conducted without the knowledge of any of the users 30 of the devices 80 identified here, as the process is conducted entirely centrally, from the management centre 160. This is, in and of itself, a paradigm shift over the prior art solutions described above. Furthermore, in practice, in step 320 (not specifically depicted), a checksum is added to each segment, in order to test and ensure the integrity of each segment.
In a preferred embodiment of the invention, the software management tool 140 is preconfigured to distribute and store at least some file segments to multiple nodes in the network 230 simultaneously, in order to maximise the statistical availability of files on demand by users 30. Simply put: the redundancy of multiple storage sites for the same file segment is secondary in importance to ensuring the availability of all file segments to cater for demand by other users 30 in the network 230.
It will also be appreciated that, the larger the number of users 30 and devices 80 participating in network 230, the greater the volume of storage space that will be available.
Once the file has been uploaded and stored (steps 190, 220 and 240), the software management tool 140 will make it available for downloading by other users 30 in the network 230, by displaying it in the GUI. In step 250, user 30 wishing to
download that file will select the file using the control unit 200 to navigate the GUI. That triggers a request that is sent over the internet 130 to the management centre 160 to download that file. On receipt of that request, the software management tool 140 then runs a load-leveling algorithm 260 in step 270, the purpose of which is to assess the state of resources available in the network 230 in order to determine an optimal download path via accessible nodes. The solution to the algorithm is based on a number of prevailing factors in the network 230 at the time of uploading the file (step 190), namely: the location of each of the series of segments of the requested file; the list of available user 30 devices 80 in the network 230, and the relative data transfer rate available to each device 80. It will be recognised that the software management tool 140 will need to determine: (i) into how many segments the file was segmented originally (steps 190 & 220) and (ii) on which devices 80 in network 230 each segment can be located. It will also be appreciated that the redundancy (described above) of storing file segments on multiple devices 80 results in a relatively fast and efficient method of accessing content, even in environments of poor connectivity or high traffic rates. In fact, it is specifically envisaged in the operation of the software management tool 140 that file segments are stored in the partitioned HDD of devices 80 located in different nodes (ie: different geographical areas). This is quite deliberate: it maximises the statistical probability of at least one copy of a file segment being accessible on a device 80 located in at least one node, at all times - even if, for example, an entire node is inaccessible owing to uncontrolled external factors, such as a widespread power outage. In fact, as the number of devices 80 in a network 230 increases, the software management tool 140 is specifically programmed to replicate file segments across increasingly more nodes, in order to amplify the advantage. In this fashion, the invention aims to achieve a virtually perpetually available network on which files may be stored and accessed. In addition, the fact that each file segment is, necessarily, considerably smaller in size than a complete file means that the transfer of file segments over a network 230 will, necessarily, be more efficient that the conventional prior art methods, which transferring complete files. It will also be appreciated from what has been set out above that, the greater the number of devices 80 in the network 230, the larger the amount of available space in the system 20 in which to store files (or, more
accurately, file segments).
Finally, on this point, it is further envisaged in other embodiments of the invention (not depicted) that software management tool 140 itself will be replicated on a server located in another node, in order to amplify this same advantage yet further. In a preferred embodiment of the invention, the software management tool 140 is pre-programmed to replicate itself automatically when the number of devices 80 in a node reaches a particular threshold. Additionally, and also in other embodiments of the invention (not depicted), it is specifically envisaged that the software management tool 140, or components of it - typically the segmentation algorithm 210 and/or the load leveling algorithm 260, will themselves be replicated on the HDD of at least some devices 80 in at least some nodes. (This will be conducted in precisely the same fashion as has been illustrated in steps 220 & 240 described above). Intelligence that is hardcoded into the software management tool 140 will include rules to regulate that process of self-replication. This includes intelligence for determining the boundaries of each specific node. An advantage of achieving these types of replication is that they necessarily overcome, at least partially, the problem of latency that is commonly experienced in networks over relatively large geographical distances between management centres 160 and users 30. All of these advantages, together, help to establish a system 20 that, for all practical purposes, is virtually always available for use.
In step 280, and immediately after this load-leveling algorithm 260 is executed (step 270), a request is sent to all devices 80 from the server 150 in management centre 160 - specifically that request is a command to each of the identified accessible nodes to retrieve the relevant file segments. Then, in step 330, the identified file segments are transferred, over internet 130 to the partitioned section in the HDD of the requesting user 30’s device 80. There, the series of file segments will be recompiled and then decrypted in step 310, at which point the (complete) file will be available to access by the requesting user 30. It will be appreciated by the expert in the field that this process, too, will be conducted without the knowledge of the users 30 of any of the devices 80 identified here, as the process is conducted entirely centrally, from the management centre 160. The invention represents a significant shift away from traditional prior art file transfer systems (in which many
users would request a file from the same server) to an innovative solution in which one user 30 will retrieve file segments from multiple sources, in multiple nodes.
It will also be appreciated that one of the advantages of the invention lies in the fact that the system 20 is remarkably less prone to hacking, owing to the fact that hackers could never be certain of how many file segments each file is segmented, nor on which devices 80 and in which nodes those file segments might be located. Furthermore, the added layer of security achieved through implementation of the encryption key 290 (for encryption-decryption) makes the system 10 and method 20 all the more secure. Further, still, implementation of the load-leveling algorithm
260 ensures that no one link is overloaded.
From the specific description that is provided above, it will be evident to the person skilled in the art that the system 20 for storing and accessing content is disclosed and comprises: the series of devices 80 in the network 230, each device including a FIDD 70 that has a partitioned portion that is inaccessible to the user 30, the software management tool 140 that is hosted at management centre 160 remote from all users 30, the segmentation optimisation algorithm 210, and the load leveling algorithm 260. Each of these elements of the system have been described in detail above.
In a preferred embodiment of the invention, the system 20 also includes encryption key application 290, hosted on the HDD of each device 80, for encrypting each file before uploading (step 190) and also for decrypting file segments once these are downloaded on the requesting user’s device 80 (step 280).
It has already been established how the invention is particularly useful in a community of users 30. However, it is also very important to mention that the benefits of the invention are available to a single user 30 in isolation. More specifically: it is perfectly conceivable that a user 30 will upload a file in the manner described above (steps 190 & 220), and also to direct the software management tool 140 that the contents of that file are not to be shared with other users 30. In the result, the file segments will still be distributed and stored on multiple devices 80 and in multiple nodes, in the manner described above (step 240). However, the file will remain
available for downloading exclusively to that single user 30 who uploaded the file. Moreover, the operation of the encryption key 290 renders this an exceptionally secure method of storing files, and also of retrieving the same efficiently once uploaded.
While the method 10 and system 20 have been described here in the context of storing and accessing of multimedia entertainment content, it will be appreciated by the expert in the field that it could be applied equally to other contexts, including the storing and accessing of data files of any description. Here, it will be noted how the encryption aspect of the invention is so successful, as the content of the respective files, itself, is never handled in the operation of the invention - in this way, the content is hidden from the server 150. In truth, it will be seen that the invention concerns the downloading and storage of multiple, segmented partial files. Thus, any hacker would not be aware readily of the number of segments into which any given file has been segmented, nor where each segment may be located, nor the content of the file. This demonstrates a tremendous advantage over the prior art.
In addition, it will also be noted how the operation of the intelligence algorithms 210 & 260 also serve to achieve further advantages over the prior art. Moreover, it is stressed how the management of (segmented) files is conducted centrally, and anonymously in the network 230, quite unlike the prior art solutions, in which individual users 30 are able to manipulate files and/or search criteria (for example: selectively powering-down devices).
In one version, the various devices may act as a micro server, and in particular as a mini server. By cyber-linking and deploying an unlimited number of these devices in households and office environments, a new type of virtual data centre may be provided. These mini-servers incorporate the latest technologies, including blockchain, crypto storage, Al, loT, EoP, and LTE, making them ready to be cyber- linked to form a global Virtual Storage Data Centre (VSDC) that is unlimited, decentralized, democratic and perpetual. Regarding the perpetuality feature in particular, a perpetual Switch ON feature for the full entire network is envisaged, as the Al (Artificial intelligence) algorithm will not allow a Switch OFF feature of the
system to be activated, at least when two or more devices are being connected.
It will be appreciated by the person skilled in the art that numerous embodiments of the invention could be performed without departing from the scope of the invention as defined in the consistory statements above.
Claims
1. A method for storing and accessing content, the method comprising: providing a content management device to each of a series of users, each device including a HDD, a partition of which is inaccessible to the user; connecting at least some of the devices to the internet, so as to establish a network of connected devices; utilising a software management tool to upload content, at least part of the software management tool being hosted remote from all users; running a segmentation optimisation algorithm in order to segment that file and allocate those file segments optimally between nodes; distributing the respective file segments in accordance with the segmentation algorithm, and storing the respective file segments on selected devices located in the selected nodes; providing a content menu to the users; receiving a request at the management centre from a user to download a particular content file; running a load-leveling algorithm, hosted at the management centre, in order to determine an optimal download path via accessible nodes; sending a request to the identified accessible nodes to retrieve the relevant file segments; and downloading the file segments directly between the requesting user’s
device and the devices associated with the accessible nodes, rendering the file accessible to the requesting user.
2. The method of claim 1 , wherein the segmentation algorithm may be configured to replicate at least some file segments of a file, for storage on devices located in at least two nodes.
3. The method of either claim 1 or claim 2, wherein the software management tool at launch of the system is hosted entirely or partially at a management centre.
4. The method of any one of the preceding claims, which further includes the steps of: providing an encryption key application on the HDD of each device, for encrypting each file before uploading; and downloading and reassembling file segments and decrypting the file on the user’s device.
5. The method of any one of the preceding claims, wherein the segmentation optimisation algorithm i s a function of criteria selected from the list comprising: the size of the file; the number of available user devices in accessible nodes in the network, the relative data transfer rate available to each device; o r a combination of these.
6. The method of any one of the preceding claims, wherein the load-leveling algorithm is a function of criteria selected from the list comprising: the location of each of the series of segments of the requested file; the list of available user devices in the network of devices, the relative data transfer rate available to each device; and a combination of these.
7. The method of any one of the preceding claims, which further includes the step of adding a checksum to each segment in order to test the data integrity in
each of the file segments.
8. The method of any one of the preceding claims, wherein the step of distributing the respective file segments in accordance with the segmentation algorithm involves the management software tool downloading and storing the respective file segments directly into the partitioned HDD in the node of the identified users in the network of devices.
9. The method of claim 8, wherein the management software tool is preconfigured to distribute at least some segments of files to multiple devices in multiple nodes in the networks, in order to maximise the statistical availability of files on demand by users, and includes the further step of replicating the software management tool in at least two or more discreet nodes.
10. The method of any one of the preceding claims, wherein the software management tool, alternatively part of the software management tool, is replicated onto the HDD of at least some devices in at least some nodes.
11. The method of any one of the preceding claims, wherein the device is configured to be connected to both a media screen and to connecting means for the device to the internet, the media screen being selected f ro m a group comprising a television screen, a computer screen, a tablet, and a mobile telephone.
12. The method of any one of the preceding claims, wherein the device is an loT device, selected from a group comprising a smart Network Router, smart media player device, smart TV device, smart mobile telephone, or smart tablet.
13. The method of claim 11 , wherein the connecting means i s selected from the group comprising Network Routers, VoIP telephone, Internet connectivity, WI-FI or similar wireless connection, network cable or similar hard connection.
14. A system for storing and accessing content, the system comprising: a series of content management devices, a device being issued to each of a series of users, each device including a HDD, a partition of which is inaccessible to the user; a network environment, in which each of the series of devices is connectable to the internet; a software management tool for uploading content files, the software management tool being hosted at a management centre remote from all users; a segmentation optimisation algorithm for segmenting files and allocating those file segments optimally; and a load-leveling algorithm, hosted at the management centre, for determining an optimal download path via accessible nodes and for facilitating downloading of the file segments directly between the requesting user’s device and the devices associated with the identified accessible nodes.
15. The system of claim 14, which further includes an encryption key application hosted on the HDD of each device, for encrypting each file before uploading, and also for decrypting file segments once these are downloaded on the user’s device.
16. The system of either claim 14 or claim 15, which further includes a media screen and connecting means for the device to the internet.
17. The system of any one of claims 14 to 16, which includes a replicated software management tool, the two copies of the software management tool being located in at least two or more discreet nodes.
18. The system of any one of claims 14 to 17, wherein the device is itself an loT device, selected from a group comprising a smart Network Router, smart media player device, smart TV device, smart mobile telephone, alternatively or smart tablet.
19. The system of claim 16, wherein the connecting means i s selected from the group co m pri s i n g a Smart Router, VoIP telephone, internet connectivity, wi-fi or similar wireless connection, network cable or similar hard connection.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZA202001189 | 2020-02-26 | ||
ZA2020/01189 | 2020-02-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021171240A1 true WO2021171240A1 (en) | 2021-09-02 |
Family
ID=77490741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2021/051612 WO2021171240A1 (en) | 2020-02-26 | 2021-02-26 | Method and system for storing and accessing content |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2021171240A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020083118A1 (en) * | 2000-10-26 | 2002-06-27 | Sim Siew Yong | Method and apparatus for managing a plurality of servers in a content delivery network |
US20020133491A1 (en) * | 2000-10-26 | 2002-09-19 | Prismedia Networks, Inc. | Method and system for managing distributed content and related metadata |
US20080215873A1 (en) * | 2004-05-26 | 2008-09-04 | Mount Sinai School Of Medicine Of New York University | System and method for presenting copy protected content to a user from a portable storage device |
US20100142421A1 (en) * | 2008-09-04 | 2010-06-10 | Ludger Schlicht | Markets for a mobile, broadband, routable internet |
US20120233522A1 (en) * | 2011-03-08 | 2012-09-13 | Rackspace Us, Inc. | Method for handling large object files in an object storage system |
-
2021
- 2021-02-26 WO PCT/IB2021/051612 patent/WO2021171240A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020083118A1 (en) * | 2000-10-26 | 2002-06-27 | Sim Siew Yong | Method and apparatus for managing a plurality of servers in a content delivery network |
US20020133491A1 (en) * | 2000-10-26 | 2002-09-19 | Prismedia Networks, Inc. | Method and system for managing distributed content and related metadata |
US20080215873A1 (en) * | 2004-05-26 | 2008-09-04 | Mount Sinai School Of Medicine Of New York University | System and method for presenting copy protected content to a user from a portable storage device |
US20100142421A1 (en) * | 2008-09-04 | 2010-06-10 | Ludger Schlicht | Markets for a mobile, broadband, routable internet |
US20120233522A1 (en) * | 2011-03-08 | 2012-09-13 | Rackspace Us, Inc. | Method for handling large object files in an object storage system |
Non-Patent Citations (1)
Title |
---|
GUPTA ET AL.: "iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments", SOFTWARE: PRACTICE AND EXPERIENCE, vol. 47, no. 9, 7 June 2016 (2016-06-07), pages 1275 - 1296, XP080706371, Retrieved from the Internet <URL:https://arxiv.org/pdf/1606.02007.pdf> [retrieved on 20210508] * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11218367B2 (en) | Community internet drive | |
US11102290B2 (en) | Peer-to-peer network prioritizing propagation of objects through the network | |
JP5526137B2 (en) | Selective data transfer storage | |
US20050216473A1 (en) | P2P network system | |
US20070180079A1 (en) | Method and system for peer-to-peer stream | |
CN104735044A (en) | Streaming media live broadcast method and system | |
Liu et al. | Designing hydra with centralized versus decentralized control: A comparative study | |
WO2021171240A1 (en) | Method and system for storing and accessing content | |
US20110276669A1 (en) | Method and System for Peer-to-Peer Stream | |
US8478823B2 (en) | Selective data forwarding storage | |
US10749980B1 (en) | Autonomous storage device and methods for distributing content | |
JP2009230686A (en) | Content management server and content management program | |
US20230376573A1 (en) | Peer to peer (p2p) encrypted data transfer/offload system and method | |
Binder | Content Delivery Network Interconnect | |
Muñoz-Gea et al. | Optimizing content placement in a peer-assisted VoD architecture | |
Birman et al. | Network perspective | |
Samsudin et al. | The Ranking Peer for Hybrid Peer-to-Peer Real Time Video Streaming | |
KR20140016545A (en) | Download contents relay system and providing method thereof | |
Gkamas et al. | Integrating the Kaltura video platform with the Photodentro Video repository: A case study | |
Fernández | Self-hosted cloud platform using descentralized downloads | |
Pallelra | Measurement and Enhancement of Peer-to-Peer based File Synchronization with Cloud Assistance | |
Jayalalithaa et al. | Dynamic Xml Dataset Based On Multi-Channel Bus Architecture for Multimedia Cloud | |
KR20090002334A (en) | P2p machine loaded embeded linux module and contents support method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21761899 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21761899 Country of ref document: EP Kind code of ref document: A1 |