WO2021171240A1 - Method and system for storing and accessing content - Google Patents

Method and system for storing and accessing content Download PDF

Info

Publication number
WO2021171240A1
WO2021171240A1 PCT/IB2021/051612 IB2021051612W WO2021171240A1 WO 2021171240 A1 WO2021171240 A1 WO 2021171240A1 IB 2021051612 W IB2021051612 W IB 2021051612W WO 2021171240 A1 WO2021171240 A1 WO 2021171240A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
devices
network
nodes
smart
Prior art date
Application number
PCT/IB2021/051612
Other languages
French (fr)
Inventor
Alvaro Bernardo TAFUR CASTILLO
Frederik Johannes THIRION
Original Assignee
Tafur Castillo Alvaro Bernardo
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tafur Castillo Alvaro Bernardo filed Critical Tafur Castillo Alvaro Bernardo
Publication of WO2021171240A1 publication Critical patent/WO2021171240A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/061Improving I/O performance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/065Replication mechanisms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • THIS INVENTION relates to a method and system for storing and accessing content; in particular, but not exclusively, it relates to a method and system for storing and accessing multimedia content within a closed network topology structure in a decentralized server environment.
  • GUI designates a graphical user interface, which permits users to interact with electronic devices through graphical icons and visual indicators, instead of text-based user interfaces;
  • HDD designates hard disk drive, and specifically embraces solid state drives (“SSDs”) or similar internal memory storage component within that definition;
  • node means a group of media content devices in a network, typically, but not exclusively, grouped by geographical area;
  • tablette designates a wireless, portable personal computer with a touch screen interface
  • IP telephone designates a voice over internet protocol (“IP”) telephone, that is used for transmitting - over an IP network, such as the Internet, instead of traditional public switched telephone networks.
  • IP voice over internet protocol
  • peer-to-peer file-transfer services are known in the industry as peer-to-peer file-transfer services.
  • peer-to-peer file-transfer services As useful as these prior art services are, they suffer from a number of disadvantages and limitations. For example, in order for these peer-to-peer services to function a voluntary and willing peer has to become part of the network, and a number of necessary preconditions thereafter had to be met, including that peers’ computers had to be both powered-up and also connected to the internet. Failing that, it would be impossible to operate in an offline state, thus rendering the service entirely useless.
  • a torrent file is a computer file containing metadata about files and also a list of the network locations of participating peer computers in the network.
  • a torrent file does not contain the actual content of the file to be distributed; it only contains information about those files.
  • Torrent files are also capable of being manipulated, altered and even deleted by the user.
  • a BitTorrentTM network has servers that keep track of on-line participants and which torrent data those participants share, and those files are shared directly between peers.
  • Such peer-to-peer file transfer systems are notoriously inconsistent and unreliable, primarily because they belong to an open network of peers that are neither controlled nor managed by a software managing system.
  • a further, associated problem is that of internet-traffic congestion.
  • an integrated HDD is provided.
  • One partitioned part of the HDD is allocated to the customer for his own use, in order to record media content of his choice.
  • the other partitioned part of the HDD is reserved for the cable company’s own use, to store pre-determined content, as decided by the cable company (a good example being the “Catch-up” capability of Multichoice’sTM ExploraTM decoder package).
  • the customer while able to access such content on the reserved partitioned portion, is unable to edit that content.
  • the partitioned HDD is thus relatively limited in application, as the data stored is static (from the user’s perspective), and is available only to that user.
  • this invention relates to a method of and system for storing and accessing content by combining a controlled and managed transactional blockchain method, with a controlled and managed peer to peer segmented file storage method, within a predetermined closed network environment structure.
  • loT Internet of Things
  • This controlled method for storing and accessing content is possible because it functions within a closed network of hundreds or thousands of smart devices or so called loT devices connected via the internet; these devices act as conventional consumer telecommunication electronics products, such as a home or office network router, an IPTV set top box, a smart tablet, a VoIP phone, mobile phone, etc.
  • the method comprises the steps of:
  • the segmentation algorithm may be configured to replicate at least some file segments of a file, for storage on devices located in at least two nodes.
  • the software management tool at launch of the system may be hosted entirely or partially at a management centre. Later the management tool will be hosted entirely by the segmented filing network.
  • the method may further include the steps of:
  • the segmentation optimisation algorithm may be a function of criteria selected from the list consisting of: the size of the file; the number of available user devices in accessible nodes in the network, the relative data transfer rate available to each device; and a combination of these.
  • the load-leveling algorithm may be a function of criteria selected from the list consisting of: the location of each of the series of segments of the requested file; the list of available user devices in the network of devices, the relative data transfer rate available to each device; and a combination of these.
  • the load-leveling algorithm may use artificial intelligence, with reference to received data which it then distributes in accordance with a machine-based learning model.
  • the method may further include the step of adding a checksum to each segment in order to test the data integrity in each of the file segments.
  • the step of distributing the respective file segments in accordance with the segmentation algorithm may involve the management software tool downloading and storing the respective file segments directly into the partitioned HDD in the node of the identified users in the network of devices.
  • the management software tool is preconfigured to distribute at least some segments of files to multiple devices in multiple nodes in the networks, in order to maximise the statistical availability of files on demand by users.
  • the method may further include the step of replicating the software management tool in at least two or more discreet nodes.
  • the software management tool may be replicated onto the HDD of at least some devices in at least some nodes.
  • the device is configured to be connected to both a media screen and to connecting means for the device to the internet.
  • the media screen GUI may be selected on a group consisting of a television screen, a computer screen, a tablet, a mobile telephone.
  • the device is itself is an loT device as a smart Network Router, smart media player device, smart TV device, smart mobile telephone, or smart tablet, etc.
  • the connecting means may be selected from the group consisting of: Network Routers, VoIP telephone, Internet connectivity, WI-FI or similar wireless connection, network cable or similar hard connection.
  • a system for storing and accessing content comprising:
  • a load-leveling algorithm hosted at the management centre, for determining an optimal download path via accessible nodes and for facilitating downloading of the file segments directly between the requesting user’s device and the devices associated with the identified accessible nodes.
  • the system may further include an encryption key application hosted on the HDD of each device, for encrypting each file before uploading, and also for decrypting file segments once these are downloaded on the user’s device.
  • the system may further include a media screen.
  • the system may further include connecting means for the device to the internet.
  • the system may include a replicated software management tool, the two copies of the software management tool being located in at least two or more discreet nodes.
  • the media screen GUI may be selected on a group consisting of a television screen, a computer screen, a tablet, a mobile telephone.
  • the device is itself is an loT device like a smart Network Router, smart media player device, smart TV device, smart mobile telephone, alternatively or smart tablet, etc.
  • the connecting means may be selected from the group consisting of: a Smart Router, VoIP telephone, internet connectivity, wi-fi or similar wireless connection, network cable or similar hard connection.
  • Figure 1 is a flow diagram illustrating a preferred method of storing and accessing content
  • Figure 2 is a diagrammatic representation of a preferred system for storing and accessing content, corresponding to the method depicted in Figure 1 ;
  • Figure 3 is a diagrammatic representation of a method of and system for storing and accessing content, such as multimedia content, within a closed network topology structure within a decentralized server environment, according to a further aspect of the invention.
  • Figure 4 is a diagrammatic representation of a closed network topology node structure used within the closed network topology structure shown in Figure 3.
  • a method for accessing content is disclosed and is referred to generally by numeral 10, in Figure 1.
  • the corresponding system for accessing multimedia content is also disclosed and is referred to generally by numeral 20, in Figure 2.
  • Figures 1 and 2 side by side.
  • the flow chart in Figure 1 has been depicted over three discreet partitions A, B and C.
  • the location of each step into particular partitions is deliberate: a step appearing in Partition A indicates that it is an action taken by a user 30; a step appearing in Partition B indicates that it is an action taken on execution of the software management tool 140, on a server 150, remote from any user 30.
  • a step appearing in Partition A indicates that it is an action taken by a user 30;
  • Partition B indicates that it is an action taken on execution of the software management tool 140, on a server 150, remote from any user 30.
  • a step appearing in Partition A indicates that it is an action taken by a user 30
  • Partition B indicates that it is an action taken on execution of the software management tool 140,
  • a node indicates that it is an action taken on execution of an application on the FIDD of a device 80 in a node (of the type shown in Figures 3 and 4).
  • a node is a group of devices 80 in a network 230, as best shown in Figure 3, in this case grouped by geographical area
  • the device 80 is a smart media player, although it is specifically envisaged that in other embodiments of the invention (not depicted here) it is specifically envisaged that the device 80 will take the form, more generally, of a computing device having an operating system. A more detailed description of the device 80 appears below.
  • the commencement point is of multimedia entertainment corporation 40 distributing a content management device 80 to each of its clients, namely user 30 (step 90).
  • Each device 80 includes a built-in FIDD 70 (not specifically depicted) which, in turn, is partitioned to include a partition, that is inaccessible to the user 30.
  • Each device 80 has internet connectivity means.
  • the device 80 incorporates both a network cable input 110 and a wi-fi aerial 120 - either of which means may be used in order to connect the device 80 to the internet 130.
  • the device 80 is connected to VoIP phone 141 , in order to maintain continuous, uninterrupted internet connectivity; the advantage of maintaining continuous connectivity will become clear from the explanation that follows. It will be appreciated that a series of users 30 will connect their respective devices 80 to the internet 130, forming a network 230 of connected devices 80.
  • the software management tool 140 which manages the processes of uploading, storing, and ultimately downloading content, in the manner described in detail below.
  • the software management tool 140 which comprises a suite of computer programs, is hosted on a server 150 located in a management centre 160 that is remote of all users 30 and of corporation 40.
  • the device 80 is also connected to a television 170 via an HDMI cable 180.
  • the device 80 is pre programed to include a GUI, that is navigated by user 30 on television 170 using control unit 200.
  • User 30 selectively saves a file (not depicted) on the portion of the HDD 70 that is partitioned in favour of the user 30 for his own use.
  • the system 20 is configured, in step 190, to permit a user 30 to upload a file directly to server 150. In practice, this is achieved by user 30 navigating the GUI menu to upload that file.
  • a flash memory device a “memory stick”; not depicted
  • that memory stick may be inserted directly into a USB port on television 170.
  • the file is accessed from there via the GUI.
  • television 170 is a Smart TV, which enables the user 30 to download content over the internet directly onto that Smart TV’s hard drive - that content, in turn, may be uploaded for distribution in the manner described above.
  • representatives of the corporation 40 itself are also able to upload a file (not depicted) via a computer interface (not depicted) directly to server 150 without the need to navigate the GUI.
  • Hard-coded into the HDD of device 80 is an encryption key application 290 that serves to encrypt each file (step 300) before uploading.
  • a television 170 is illustrated in the accompanying figures, it is considered, equally, in other embodiments of the invention, a computer screen, a tablet, or a mobile telephone may be used as a comparably equivalent media player (none are depicted in the accompanying figures).
  • the cellphone will serve as the device 80 itself, with the encryption key application 290 loaded onto that cellphone and, similarly, a portion of the cellphone’s HDD will be partitioned in the same manner as described above.
  • That file is uploaded for storage on a central server 150 located at the management centre 160 (or, to be more accurate: the encrypted file is uploaded for storage).
  • the software management tool 140 runs a segmentation optimisation algorithm 210 that is designed to segment that file optimally.
  • the manner of segmentation is context dependent, based on a number of prevailing factors in the network 230 at the time of uploading the file (step 190), namely: the size of the file the number of available user devices 80 in the network 230, and the relative data transfer rate available to each device 80.
  • the file is split into segments (not depicted) and each respective segment is transferred, over internet 130 for storage on the respective nodes in the HDD of the respective devices 80 in network 230 that were identified in the optimisation calculation (step 220).
  • step 320 (not specifically depicted), a checksum is added to each segment, in order to test and ensure the integrity of each segment.
  • the software management tool 140 is preconfigured to distribute and store at least some file segments to multiple nodes in the network 230 simultaneously, in order to maximise the statistical availability of files on demand by users 30. Simply put: the redundancy of multiple storage sites for the same file segment is secondary in importance to ensuring the availability of all file segments to cater for demand by other users 30 in the network 230.
  • the software management tool 140 will make it available for downloading by other users 30 in the network 230, by displaying it in the GUI.
  • user 30 wishing to download that file will select the file using the control unit 200 to navigate the GUI. That triggers a request that is sent over the internet 130 to the management centre 160 to download that file.
  • the software management tool 140 then runs a load-leveling algorithm 260 in step 270, the purpose of which is to assess the state of resources available in the network 230 in order to determine an optimal download path via accessible nodes.
  • the solution to the algorithm is based on a number of prevailing factors in the network 230 at the time of uploading the file (step 190), namely: the location of each of the series of segments of the requested file; the list of available user 30 devices 80 in the network 230, and the relative data transfer rate available to each device 80. It will be recognised that the software management tool 140 will need to determine: (i) into how many segments the file was segmented originally (steps 190 & 220) and (ii) on which devices 80 in network 230 each segment can be located. It will also be appreciated that the redundancy (described above) of storing file segments on multiple devices 80 results in a relatively fast and efficient method of accessing content, even in environments of poor connectivity or high traffic rates.
  • file segments are stored in the partitioned HDD of devices 80 located in different nodes (ie: different geographical areas).
  • nodes ie: different geographical areas.
  • This is quite deliberate: it maximises the statistical probability of at least one copy of a file segment being accessible on a device 80 located in at least one node, at all times - even if, for example, an entire node is inaccessible owing to uncontrolled external factors, such as a widespread power outage.
  • the software management tool 140 is specifically programmed to replicate file segments across increasingly more nodes, in order to amplify the advantage. In this fashion, the invention aims to achieve a virtually perpetually available network on which files may be stored and accessed.
  • each file segment is, necessarily, considerably smaller in size than a complete file means that the transfer of file segments over a network 230 will, necessarily, be more efficient that the conventional prior art methods, which transferring complete files. It will also be appreciated from what has been set out above that, the greater the number of devices 80 in the network 230, the larger the amount of available space in the system 20 in which to store files (or, more accurately, file segments).
  • software management tool 140 itself will be replicated on a server located in another node, in order to amplify this same advantage yet further.
  • the software management tool 140 is pre-programmed to replicate itself automatically when the number of devices 80 in a node reaches a particular threshold.
  • the software management tool 140, or components of it - typically the segmentation algorithm 210 and/or the load leveling algorithm 260 will themselves be replicated on the HDD of at least some devices 80 in at least some nodes.
  • step 280 and immediately after this load-leveling algorithm 260 is executed (step 270), a request is sent to all devices 80 from the server 150 in management centre 160 - specifically that request is a command to each of the identified accessible nodes to retrieve the relevant file segments. Then, in step 330, the identified file segments are transferred, over internet 130 to the partitioned section in the HDD of the requesting user 30’s device 80. There, the series of file segments will be recompiled and then decrypted in step 310, at which point the (complete) file will be available to access by the requesting user 30.
  • the system 20 for storing and accessing content comprises: the series of devices 80 in the network 230, each device including a FIDD 70 that has a partitioned portion that is inaccessible to the user 30, the software management tool 140 that is hosted at management centre 160 remote from all users 30, the segmentation optimisation algorithm 210, and the load leveling algorithm 260.
  • the series of devices 80 in the network 230 each device including a FIDD 70 that has a partitioned portion that is inaccessible to the user 30, the software management tool 140 that is hosted at management centre 160 remote from all users 30, the segmentation optimisation algorithm 210, and the load leveling algorithm 260.
  • the system 20 also includes encryption key application 290, hosted on the HDD of each device 80, for encrypting each file before uploading (step 190) and also for decrypting file segments once these are downloaded on the requesting user’s device 80 (step 280).
  • encryption key application 290 hosted on the HDD of each device 80, for encrypting each file before uploading (step 190) and also for decrypting file segments once these are downloaded on the requesting user’s device 80 (step 280).
  • the various devices may act as a micro server, and in particular as a mini server.
  • a new type of virtual data centre may be provided.
  • These mini-servers incorporate the latest technologies, including blockchain, crypto storage, Al, loT, EoP, and LTE, making them ready to be cyber- linked to form a global Virtual Storage Data Centre (VSDC) that is unlimited, decentralized, democratic and perpetual.
  • VSDC Virtual Storage Data Centre
  • a perpetual Switch ON feature for the full entire network is envisaged, as the Al (Artificial intelligence) algorithm will not allow a Switch OFF feature of the system to be activated, at least when two or more devices are being connected.

Abstract

At a high level, this invention relates to an AI-based method of and system for storing and accessing content by combining a controlled and managed transactional blockchain method, with a controlled and managed peer to peer segmented file storage method, within a predetermined closed network environment structure. The includes embedding and installing a hardware and software module on an IoT (Internet of Things) device to be deployed, managed and controlled within a closed network environment structure. This controlled method for storing and accessing content is possible because it functions within a closed network of hundreds or thousands of smart devices or so called IoT devices connected via the internet; these devices act as conventional consumer telecommunication electronics products, such as a home or office network router, an IPTV set top box, a smart tablet, a VoIP phone, mobile phone, etc.

Description

METHOD AND SYSTEM FOR STORING AND ACCESSING CONTENT
FIELD OF THE INVENTION
THIS INVENTION relates to a method and system for storing and accessing content; in particular, but not exclusively, it relates to a method and system for storing and accessing multimedia content within a closed network topology structure in a decentralized server environment.
BACKGROUND TO THE INVENTION
In this specification, the following acronyms and definitions are used:
• “content” designates digital content that is capable of being transmitted over a computer network - without restriction to the type of electronic file, nor the subject matter of any file;
• “GUI” designates a graphical user interface, which permits users to interact with electronic devices through graphical icons and visual indicators, instead of text-based user interfaces;
• “HDD” designates hard disk drive, and specifically embraces solid state drives (“SSDs”) or similar internal memory storage component within that definition;
• “node” means a group of media content devices in a network, typically, but not exclusively, grouped by geographical area;
• “tablet” designates a wireless, portable personal computer with a touch screen interface; and
• “VoIP telephone” designates a voice over internet protocol (“IP”) telephone, that is used for transmitting - over an IP network, such as the Internet, instead of traditional public switched telephone networks.
Each of these terms is well understood and commonly used in the art. In recent times, consumers have been spoiled for choice when it comes to selecting multimedia entertainment packages and, in particular, methods of obtaining multimedia content. Several systems and methods have been introduced to permit individual users to download content in a computer network over the internet. Some of the best known of these are the peer-to-peer file transfer applications Napster™, Kazaa™ and LimeWire™. While there are differences between the three, for present purposes, they have a number of common traits (apart from the fact that all are now defunct), namely that they were all online file-sharing services, which permitted registered members to search for a particular file that might be stored in any one of the computers associated with another registered member also running the same application. If and when that file was located, the searching member was then able to download a copy of that file onto his computer. These services are known in the industry as peer-to-peer file-transfer services. As useful as these prior art services are, they suffer from a number of disadvantages and limitations. For example, in order for these peer-to-peer services to function a voluntary and willing peer has to become part of the network, and a number of necessary preconditions thereafter had to be met, including that peers’ computers had to be both powered-up and also connected to the internet. Failing that, it would be impossible to operate in an offline state, thus rendering the service entirely useless.
Many prior art peer-to-peer file transfer services utilise a BitTorrent™ file distribution system. A torrent file is a computer file containing metadata about files and also a list of the network locations of participating peer computers in the network. A torrent file does not contain the actual content of the file to be distributed; it only contains information about those files. Torrent files are also capable of being manipulated, altered and even deleted by the user. At its simplest level, a BitTorrent™ network has servers that keep track of on-line participants and which torrent data those participants share, and those files are shared directly between peers. Such peer-to-peer file transfer systems are notoriously inconsistent and unreliable, primarily because they belong to an open network of peers that are neither controlled nor managed by a software managing system. A further, associated problem is that of internet-traffic congestion. It will be appreciated that, if only a finite, relatively small, number of copies of a particular file was made available to peers, and the demand for the file among peers far outstripped the available supply, congestion would inevitably follow. This problem, which is often described in the field as the problem of latency, is exacerbated, further, in those environments in which data transfer speeds are relatively low.
In the context of television entertainment, a number of subscription services from cable television companies are also well-known. For example: companies such as Tivo™ and Multichoice™ offer decoder unit- based services. In their traditional decoder units, an integrated HDD is provided. One partitioned part of the HDD is allocated to the customer for his own use, in order to record media content of his choice. The other partitioned part of the HDD is reserved for the cable company’s own use, to store pre-determined content, as decided by the cable company (a good example being the “Catch-up” capability of Multichoice’s™ Explora™ decoder package). The customer, while able to access such content on the reserved partitioned portion, is unable to edit that content. The partitioned HDD is thus relatively limited in application, as the data stored is static (from the user’s perspective), and is available only to that user.
Other entertainment companies, such as Netflix™ and ShowMax™ offer a wide variety of entertainment content. An advantage of their service offerings, to at least some extent, is that they do not rely on storage space capacity on any user’s entertainment unit. Instead, these offerings rely on internet connectivity, as content is simply stored in the cloud, with users downloading or stream content on demand. This has severe restrictions and limitations: it has already been explained above how congestion in internet traffic is undesirable. In addition, these services are rendered largely ineffective in environments with low data transfer speeds. While each of the examples provided here is in the context of multimedia entertainment content, the technology applies equally to content of any description that is intended for dissemination in a network of peers. This includes, for example, the content of business documents of a multinational corporation in which employees are separated across offices and across continents. Finally, another problem associated with each of the prior art solutions described above is their vulnerability to “hacking” i.e. computer security breaches. More specifically, it is a constant problem in all of these cases, that hackers who are able to access these centralized server, closed networks are able to access and copy multimedia content, simply by copying-over the multimedia files. This is a particular concern when users wish to use these solutions to upload their own multimedia content, but do not want to risk that content being accessed by hackers. A more recent technology called blockchain architecture has emerged and is used to remedy the cybersecurity shortfalls affecting torrent files and centralized server environments (including them being unregulated, unmanaged and unsecure). This technology, in one application, is used to run the popular transactional money transfer platform called Bitcoin™. However, the security offered by this technology is used only as a transactional decentralized server and has made this money transfer transaction application without any reliable transactional time period or reliable transaction between peers, as hundreds and thousands of computers worldwide are connected to this open blockchain network without any management and peer control network. Furthermore, this technology chain cannot function if a voluntary and willing peer does not subscribe to such service.
OBJECT OF THE INVENTION It is an object of the present invention to provide a method and system for accessing and storing content, such as multimedia content, that will overcome, at least partially, the disadvantages of the prior art described above. SUMMARY OF THE INVENTION
At a high level, this invention relates to a method of and system for storing and accessing content by combining a controlled and managed transactional blockchain method, with a controlled and managed peer to peer segmented file storage method, within a predetermined closed network environment structure.
This includes embedding and installing a hardware and software module on an loT (Internet of Things) device to be deployed, managed and controlled within a closed network environment structure.
This controlled method for storing and accessing content is possible because it functions within a closed network of hundreds or thousands of smart devices or so called loT devices connected via the internet; these devices act as conventional consumer telecommunication electronics products, such as a home or office network router, an IPTV set top box, a smart tablet, a VoIP phone, mobile phone, etc.
Therefore, voluntary file sharing peers and voluntary blockchain miners are no longer applicable with this new method, as the loT devices connected within the predetermined closed network structure are innately compelled to act or function as a peer or miner. The storing and accessing of content is thus a background or secondary function for these devices, without interfering with their primary function.
In an embodiment, the method comprises the steps of:
• providing a content management device to each of a series of users, each device including a HDD, a partition of which is inaccessible to the user;
• connecting at least some of the devices to the internet, so as to establish a network of connected devices;
• utilising a software management tool to upload content, at least part of the software management tool being hosted remote from all users;
• running a segmentation optimisation algorithm in order to segment that file and allocate those file segments optimally between nodes;
• distributing the respective file segments in accordance with the segmentation algorithm, and storing the respective file segments on selected devices located in the selected nodes;
• providing a content menu to the users;
• receiving a request at the management centre from a user to download a particular content file;
• running a load-leveling algorithm, hosted at the management centre, in order to determine an optimal download path via accessible nodes;
• sending a request to the identified accessible nodes to retrieve the relevant file segments; and
• downloading the file segments directly between the requesting user’s device and the devices associated with the accessible nodes, rendering the file accessible to the requesting user. Preferably, the segmentation algorithm may be configured to replicate at least some file segments of a file, for storage on devices located in at least two nodes.
The software management tool at launch of the system may be hosted entirely or partially at a management centre. Later the management tool will be hosted entirely by the segmented filing network.
The method may further include the steps of:
• providing an encryption key application on the HDD of each device, for encrypting each file before uploading; and · downloading and reassembling file segments and decrypting the file on the user’s device.
The segmentation optimisation algorithm may be a function of criteria selected from the list consisting of: the size of the file; the number of available user devices in accessible nodes in the network, the relative data transfer rate available to each device; and a combination of these.
The load-leveling algorithm may be a function of criteria selected from the list consisting of: the location of each of the series of segments of the requested file; the list of available user devices in the network of devices, the relative data transfer rate available to each device; and a combination of these. In one version, the load-leveling algorithm may use artificial intelligence, with reference to received data which it then distributes in accordance with a machine-based learning model. The method may further include the step of adding a checksum to each segment in order to test the data integrity in each of the file segments. The step of distributing the respective file segments in accordance with the segmentation algorithm may involve the management software tool downloading and storing the respective file segments directly into the partitioned HDD in the node of the identified users in the network of devices. Preferably, the management software tool is preconfigured to distribute at least some segments of files to multiple devices in multiple nodes in the networks, in order to maximise the statistical availability of files on demand by users.
The method may further include the step of replicating the software management tool in at least two or more discreet nodes.
The software management tool, alternatively part of the software management tool may be replicated onto the HDD of at least some devices in at least some nodes. Preferably, the device is configured to be connected to both a media screen and to connecting means for the device to the internet.
The media screen GUI may be selected on a group consisting of a television screen, a computer screen, a tablet, a mobile telephone.
In an embodiment of the invention, the device is itself is an loT device as a smart Network Router, smart media player device, smart TV device, smart mobile telephone, or smart tablet, etc. The connecting means may be selected from the group consisting of: Network Routers, VoIP telephone, Internet connectivity, WI-FI or similar wireless connection, network cable or similar hard connection.
According to a second aspect of the invention, there is provided a system for storing and accessing content, the system comprising:
• a series of content management devices, a device being issued to each of a series of users, each device including a HDD, a partition of which is inaccessible to the user;
• a network environment, in which each of the series of devices is connectable to the internet;
• a software management tool for uploading content files, the software management tool being hosted at a management centre remote from all users;
• a segmentation optimisation algorithm for segmenting files and allocating those file segments optimally;
• a load-leveling algorithm, hosted at the management centre, for determining an optimal download path via accessible nodes and for facilitating downloading of the file segments directly between the requesting user’s device and the devices associated with the identified accessible nodes.
The system may further include an encryption key application hosted on the HDD of each device, for encrypting each file before uploading, and also for decrypting file segments once these are downloaded on the user’s device.
The system may further include a media screen.
The system may further include connecting means for the device to the internet.
The system may include a replicated software management tool, the two copies of the software management tool being located in at least two or more discreet nodes.
The media screen GUI may be selected on a group consisting of a television screen, a computer screen, a tablet, a mobile telephone.
In an embodiment of the invention, the device is itself is an loT device like a smart Network Router, smart media player device, smart TV device, smart mobile telephone, alternatively or smart tablet, etc. The connecting means may be selected from the group consisting of: a Smart Router, VoIP telephone, internet connectivity, wi-fi or similar wireless connection, network cable or similar hard connection.
BRIEF DESCRIPTION OF THE DRAWINGS
In order to describe the invention, embodiments thereof are described hereunder, purely as examples, without limiting the scope of the invention, wherein:
Figure 1 is a flow diagram illustrating a preferred method of storing and accessing content;
Figure 2 is a diagrammatic representation of a preferred system for storing and accessing content, corresponding to the method depicted in Figure 1 ;
Figure 3 is a diagrammatic representation of a method of and system for storing and accessing content, such as multimedia content, within a closed network topology structure within a decentralized server environment, according to a further aspect of the invention; and
Figure 4 is a diagrammatic representation of a closed network topology node structure used within the closed network topology structure shown in Figure 3.
DETAILED DESCRIPTION OF THE DRAWINGS
Referring to the figures, which depict preferred embodiments of the invention, a method for accessing content, is disclosed and is referred to generally by numeral 10, in Figure 1. The corresponding system for accessing multimedia content is also disclosed and is referred to generally by numeral 20, in Figure 2. It is instructive to review Figures 1 and 2 side by side. It will also be noted that the flow chart in Figure 1 has been depicted over three discreet partitions A, B and C. The location of each step into particular partitions is deliberate: a step appearing in Partition A indicates that it is an action taken by a user 30; a step appearing in Partition B indicates that it is an action taken on execution of the software management tool 140, on a server 150, remote from any user 30. Finally, a step appearing in Partition
C indicates that it is an action taken on execution of an application on the FIDD of a device 80 in a node (of the type shown in Figures 3 and 4). A node, of course, is a group of devices 80 in a network 230, as best shown in Figure 3, in this case grouped by geographical area In the embodiment depicted in the Figures, the device 80 is a smart media player, although it is specifically envisaged that in other embodiments of the invention (not depicted here) it is specifically envisaged that the device 80 will take the form, more generally, of a computing device having an operating system. A more detailed description of the device 80 appears below. The method 10 and system 20 will be described, first, in the context of a preferred embodiment of the invention, namely: the storing and accessing of multimedia entertainment content. The commencement point is of multimedia entertainment corporation 40 distributing a content management device 80 to each of its clients, namely user 30 (step 90). Each device 80 includes a built-in FIDD 70 (not specifically depicted) which, in turn, is partitioned to include a partition, that is inaccessible to the user 30. Each device 80 has internet connectivity means. For example, in Figure 2, the device 80 incorporates both a network cable input 110 and a wi-fi aerial 120 - either of which means may be used in order to connect the device 80 to the internet 130. In a preferred embodiment, the device 80 is connected to VoIP phone 141 , in order to maintain continuous, uninterrupted internet connectivity; the advantage of maintaining continuous connectivity will become clear from the explanation that follows. It will be appreciated that a series of users 30 will connect their respective devices 80 to the internet 130, forming a network 230 of connected devices 80.
Before discussing the device 80 further, it is necessary, first to describe the software management tool 140, which manages the processes of uploading, storing, and ultimately downloading content, in the manner described in detail below. The software management tool 140, which comprises a suite of computer programs, is hosted on a server 150 located in a management centre 160 that is remote of all users 30 and of corporation 40.
Returning to the use of the device 80: in the embodiment depicted, the device 80 is also connected to a television 170 via an HDMI cable 180. The device 80 is pre programed to include a GUI, that is navigated by user 30 on television 170 using control unit 200. User 30 selectively saves a file (not depicted) on the portion of the HDD 70 that is partitioned in favour of the user 30 for his own use. The system 20 is configured, in step 190, to permit a user 30 to upload a file directly to server 150. In practice, this is achieved by user 30 navigating the GUI menu to upload that file. Conveniently, that is achieved by first storing the file onto a flash memory device (a “memory stick”; not depicted) and inserting that memory stick into a USB port (not depicted) on the device 80. Alternatively, that memory stick may be inserted directly into a USB port on television 170. The file is accessed from there via the GUI. Further alternatively, in another embodiment of the invention (not depicted) television 170 is a Smart TV, which enables the user 30 to download content over the internet directly onto that Smart TV’s hard drive - that content, in turn, may be uploaded for distribution in the manner described above. Additionally, representatives of the corporation 40 itself are also able to upload a file (not depicted) via a computer interface (not depicted) directly to server 150 without the need to navigate the GUI. Hard-coded into the HDD of device 80 is an encryption key application 290 that serves to encrypt each file (step 300) before uploading. While a television 170 is illustrated in the accompanying figures, it is considered, equally, in other embodiments of the invention, a computer screen, a tablet, or a mobile telephone may be used as a comparably equivalent media player (none are depicted in the accompanying figures). In the non-illustrated embodiment in which a cellphone is used, it will be appreciated that the cellphone will serve as the device 80 itself, with the encryption key application 290 loaded onto that cellphone and, similarly, a portion of the cellphone’s HDD will be partitioned in the same manner as described above. That file is uploaded for storage on a central server 150 located at the management centre 160 (or, to be more accurate: the encrypted file is uploaded for storage). Once uploaded to the server 150, in step 220, the software management tool 140 runs a segmentation optimisation algorithm 210 that is designed to segment that file optimally. More specifically: the manner of segmentation is context dependent, based on a number of prevailing factors in the network 230 at the time of uploading the file (step 190), namely: the size of the file the number of available user devices 80 in the network 230, and the relative data transfer rate available to each device 80. In step 240, and immediately after this segmentation computation is performed (step 220), the file is split into segments (not depicted) and each respective segment is transferred, over internet 130 for storage on the respective nodes in the HDD of the respective devices 80 in network 230 that were identified in the optimisation calculation (step 220). It will be appreciated by the expert in the field that this process will be conducted without the knowledge of any of the users 30 of the devices 80 identified here, as the process is conducted entirely centrally, from the management centre 160. This is, in and of itself, a paradigm shift over the prior art solutions described above. Furthermore, in practice, in step 320 (not specifically depicted), a checksum is added to each segment, in order to test and ensure the integrity of each segment.
In a preferred embodiment of the invention, the software management tool 140 is preconfigured to distribute and store at least some file segments to multiple nodes in the network 230 simultaneously, in order to maximise the statistical availability of files on demand by users 30. Simply put: the redundancy of multiple storage sites for the same file segment is secondary in importance to ensuring the availability of all file segments to cater for demand by other users 30 in the network 230.
It will also be appreciated that, the larger the number of users 30 and devices 80 participating in network 230, the greater the volume of storage space that will be available.
Once the file has been uploaded and stored (steps 190, 220 and 240), the software management tool 140 will make it available for downloading by other users 30 in the network 230, by displaying it in the GUI. In step 250, user 30 wishing to download that file will select the file using the control unit 200 to navigate the GUI. That triggers a request that is sent over the internet 130 to the management centre 160 to download that file. On receipt of that request, the software management tool 140 then runs a load-leveling algorithm 260 in step 270, the purpose of which is to assess the state of resources available in the network 230 in order to determine an optimal download path via accessible nodes. The solution to the algorithm is based on a number of prevailing factors in the network 230 at the time of uploading the file (step 190), namely: the location of each of the series of segments of the requested file; the list of available user 30 devices 80 in the network 230, and the relative data transfer rate available to each device 80. It will be recognised that the software management tool 140 will need to determine: (i) into how many segments the file was segmented originally (steps 190 & 220) and (ii) on which devices 80 in network 230 each segment can be located. It will also be appreciated that the redundancy (described above) of storing file segments on multiple devices 80 results in a relatively fast and efficient method of accessing content, even in environments of poor connectivity or high traffic rates. In fact, it is specifically envisaged in the operation of the software management tool 140 that file segments are stored in the partitioned HDD of devices 80 located in different nodes (ie: different geographical areas). This is quite deliberate: it maximises the statistical probability of at least one copy of a file segment being accessible on a device 80 located in at least one node, at all times - even if, for example, an entire node is inaccessible owing to uncontrolled external factors, such as a widespread power outage. In fact, as the number of devices 80 in a network 230 increases, the software management tool 140 is specifically programmed to replicate file segments across increasingly more nodes, in order to amplify the advantage. In this fashion, the invention aims to achieve a virtually perpetually available network on which files may be stored and accessed. In addition, the fact that each file segment is, necessarily, considerably smaller in size than a complete file means that the transfer of file segments over a network 230 will, necessarily, be more efficient that the conventional prior art methods, which transferring complete files. It will also be appreciated from what has been set out above that, the greater the number of devices 80 in the network 230, the larger the amount of available space in the system 20 in which to store files (or, more accurately, file segments).
Finally, on this point, it is further envisaged in other embodiments of the invention (not depicted) that software management tool 140 itself will be replicated on a server located in another node, in order to amplify this same advantage yet further. In a preferred embodiment of the invention, the software management tool 140 is pre-programmed to replicate itself automatically when the number of devices 80 in a node reaches a particular threshold. Additionally, and also in other embodiments of the invention (not depicted), it is specifically envisaged that the software management tool 140, or components of it - typically the segmentation algorithm 210 and/or the load leveling algorithm 260, will themselves be replicated on the HDD of at least some devices 80 in at least some nodes. (This will be conducted in precisely the same fashion as has been illustrated in steps 220 & 240 described above). Intelligence that is hardcoded into the software management tool 140 will include rules to regulate that process of self-replication. This includes intelligence for determining the boundaries of each specific node. An advantage of achieving these types of replication is that they necessarily overcome, at least partially, the problem of latency that is commonly experienced in networks over relatively large geographical distances between management centres 160 and users 30. All of these advantages, together, help to establish a system 20 that, for all practical purposes, is virtually always available for use.
In step 280, and immediately after this load-leveling algorithm 260 is executed (step 270), a request is sent to all devices 80 from the server 150 in management centre 160 - specifically that request is a command to each of the identified accessible nodes to retrieve the relevant file segments. Then, in step 330, the identified file segments are transferred, over internet 130 to the partitioned section in the HDD of the requesting user 30’s device 80. There, the series of file segments will be recompiled and then decrypted in step 310, at which point the (complete) file will be available to access by the requesting user 30. It will be appreciated by the expert in the field that this process, too, will be conducted without the knowledge of the users 30 of any of the devices 80 identified here, as the process is conducted entirely centrally, from the management centre 160. The invention represents a significant shift away from traditional prior art file transfer systems (in which many users would request a file from the same server) to an innovative solution in which one user 30 will retrieve file segments from multiple sources, in multiple nodes.
It will also be appreciated that one of the advantages of the invention lies in the fact that the system 20 is remarkably less prone to hacking, owing to the fact that hackers could never be certain of how many file segments each file is segmented, nor on which devices 80 and in which nodes those file segments might be located. Furthermore, the added layer of security achieved through implementation of the encryption key 290 (for encryption-decryption) makes the system 10 and method 20 all the more secure. Further, still, implementation of the load-leveling algorithm
260 ensures that no one link is overloaded.
From the specific description that is provided above, it will be evident to the person skilled in the art that the system 20 for storing and accessing content is disclosed and comprises: the series of devices 80 in the network 230, each device including a FIDD 70 that has a partitioned portion that is inaccessible to the user 30, the software management tool 140 that is hosted at management centre 160 remote from all users 30, the segmentation optimisation algorithm 210, and the load leveling algorithm 260. Each of these elements of the system have been described in detail above.
In a preferred embodiment of the invention, the system 20 also includes encryption key application 290, hosted on the HDD of each device 80, for encrypting each file before uploading (step 190) and also for decrypting file segments once these are downloaded on the requesting user’s device 80 (step 280).
It has already been established how the invention is particularly useful in a community of users 30. However, it is also very important to mention that the benefits of the invention are available to a single user 30 in isolation. More specifically: it is perfectly conceivable that a user 30 will upload a file in the manner described above (steps 190 & 220), and also to direct the software management tool 140 that the contents of that file are not to be shared with other users 30. In the result, the file segments will still be distributed and stored on multiple devices 80 and in multiple nodes, in the manner described above (step 240). However, the file will remain available for downloading exclusively to that single user 30 who uploaded the file. Moreover, the operation of the encryption key 290 renders this an exceptionally secure method of storing files, and also of retrieving the same efficiently once uploaded.
While the method 10 and system 20 have been described here in the context of storing and accessing of multimedia entertainment content, it will be appreciated by the expert in the field that it could be applied equally to other contexts, including the storing and accessing of data files of any description. Here, it will be noted how the encryption aspect of the invention is so successful, as the content of the respective files, itself, is never handled in the operation of the invention - in this way, the content is hidden from the server 150. In truth, it will be seen that the invention concerns the downloading and storage of multiple, segmented partial files. Thus, any hacker would not be aware readily of the number of segments into which any given file has been segmented, nor where each segment may be located, nor the content of the file. This demonstrates a tremendous advantage over the prior art.
In addition, it will also be noted how the operation of the intelligence algorithms 210 & 260 also serve to achieve further advantages over the prior art. Moreover, it is stressed how the management of (segmented) files is conducted centrally, and anonymously in the network 230, quite unlike the prior art solutions, in which individual users 30 are able to manipulate files and/or search criteria (for example: selectively powering-down devices).
In one version, the various devices may act as a micro server, and in particular as a mini server. By cyber-linking and deploying an unlimited number of these devices in households and office environments, a new type of virtual data centre may be provided. These mini-servers incorporate the latest technologies, including blockchain, crypto storage, Al, loT, EoP, and LTE, making them ready to be cyber- linked to form a global Virtual Storage Data Centre (VSDC) that is unlimited, decentralized, democratic and perpetual. Regarding the perpetuality feature in particular, a perpetual Switch ON feature for the full entire network is envisaged, as the Al (Artificial intelligence) algorithm will not allow a Switch OFF feature of the system to be activated, at least when two or more devices are being connected.
It will be appreciated by the person skilled in the art that numerous embodiments of the invention could be performed without departing from the scope of the invention as defined in the consistory statements above.

Claims

1. A method for storing and accessing content, the method comprising: providing a content management device to each of a series of users, each device including a HDD, a partition of which is inaccessible to the user; connecting at least some of the devices to the internet, so as to establish a network of connected devices; utilising a software management tool to upload content, at least part of the software management tool being hosted remote from all users; running a segmentation optimisation algorithm in order to segment that file and allocate those file segments optimally between nodes; distributing the respective file segments in accordance with the segmentation algorithm, and storing the respective file segments on selected devices located in the selected nodes; providing a content menu to the users; receiving a request at the management centre from a user to download a particular content file; running a load-leveling algorithm, hosted at the management centre, in order to determine an optimal download path via accessible nodes; sending a request to the identified accessible nodes to retrieve the relevant file segments; and downloading the file segments directly between the requesting user’s device and the devices associated with the accessible nodes, rendering the file accessible to the requesting user.
2. The method of claim 1 , wherein the segmentation algorithm may be configured to replicate at least some file segments of a file, for storage on devices located in at least two nodes.
3. The method of either claim 1 or claim 2, wherein the software management tool at launch of the system is hosted entirely or partially at a management centre.
4. The method of any one of the preceding claims, which further includes the steps of: providing an encryption key application on the HDD of each device, for encrypting each file before uploading; and downloading and reassembling file segments and decrypting the file on the user’s device.
5. The method of any one of the preceding claims, wherein the segmentation optimisation algorithm i s a function of criteria selected from the list comprising: the size of the file; the number of available user devices in accessible nodes in the network, the relative data transfer rate available to each device; o r a combination of these.
6. The method of any one of the preceding claims, wherein the load-leveling algorithm is a function of criteria selected from the list comprising: the location of each of the series of segments of the requested file; the list of available user devices in the network of devices, the relative data transfer rate available to each device; and a combination of these.
7. The method of any one of the preceding claims, which further includes the step of adding a checksum to each segment in order to test the data integrity in each of the file segments.
8. The method of any one of the preceding claims, wherein the step of distributing the respective file segments in accordance with the segmentation algorithm involves the management software tool downloading and storing the respective file segments directly into the partitioned HDD in the node of the identified users in the network of devices.
9. The method of claim 8, wherein the management software tool is preconfigured to distribute at least some segments of files to multiple devices in multiple nodes in the networks, in order to maximise the statistical availability of files on demand by users, and includes the further step of replicating the software management tool in at least two or more discreet nodes.
10. The method of any one of the preceding claims, wherein the software management tool, alternatively part of the software management tool, is replicated onto the HDD of at least some devices in at least some nodes.
11. The method of any one of the preceding claims, wherein the device is configured to be connected to both a media screen and to connecting means for the device to the internet, the media screen being selected f ro m a group comprising a television screen, a computer screen, a tablet, and a mobile telephone.
12. The method of any one of the preceding claims, wherein the device is an loT device, selected from a group comprising a smart Network Router, smart media player device, smart TV device, smart mobile telephone, or smart tablet.
13. The method of claim 11 , wherein the connecting means i s selected from the group comprising Network Routers, VoIP telephone, Internet connectivity, WI-FI or similar wireless connection, network cable or similar hard connection.
14. A system for storing and accessing content, the system comprising: a series of content management devices, a device being issued to each of a series of users, each device including a HDD, a partition of which is inaccessible to the user; a network environment, in which each of the series of devices is connectable to the internet; a software management tool for uploading content files, the software management tool being hosted at a management centre remote from all users; a segmentation optimisation algorithm for segmenting files and allocating those file segments optimally; and a load-leveling algorithm, hosted at the management centre, for determining an optimal download path via accessible nodes and for facilitating downloading of the file segments directly between the requesting user’s device and the devices associated with the identified accessible nodes.
15. The system of claim 14, which further includes an encryption key application hosted on the HDD of each device, for encrypting each file before uploading, and also for decrypting file segments once these are downloaded on the user’s device.
16. The system of either claim 14 or claim 15, which further includes a media screen and connecting means for the device to the internet.
17. The system of any one of claims 14 to 16, which includes a replicated software management tool, the two copies of the software management tool being located in at least two or more discreet nodes.
18. The system of any one of claims 14 to 17, wherein the device is itself an loT device, selected from a group comprising a smart Network Router, smart media player device, smart TV device, smart mobile telephone, alternatively or smart tablet.
19. The system of claim 16, wherein the connecting means i s selected from the group co m pri s i n g a Smart Router, VoIP telephone, internet connectivity, wi-fi or similar wireless connection, network cable or similar hard connection.
PCT/IB2021/051612 2020-02-26 2021-02-26 Method and system for storing and accessing content WO2021171240A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA202001189 2020-02-26
ZA2020/01189 2020-02-26

Publications (1)

Publication Number Publication Date
WO2021171240A1 true WO2021171240A1 (en) 2021-09-02

Family

ID=77490741

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2021/051612 WO2021171240A1 (en) 2020-02-26 2021-02-26 Method and system for storing and accessing content

Country Status (1)

Country Link
WO (1) WO2021171240A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020083118A1 (en) * 2000-10-26 2002-06-27 Sim Siew Yong Method and apparatus for managing a plurality of servers in a content delivery network
US20020133491A1 (en) * 2000-10-26 2002-09-19 Prismedia Networks, Inc. Method and system for managing distributed content and related metadata
US20080215873A1 (en) * 2004-05-26 2008-09-04 Mount Sinai School Of Medicine Of New York University System and method for presenting copy protected content to a user from a portable storage device
US20100142421A1 (en) * 2008-09-04 2010-06-10 Ludger Schlicht Markets for a mobile, broadband, routable internet
US20120233522A1 (en) * 2011-03-08 2012-09-13 Rackspace Us, Inc. Method for handling large object files in an object storage system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020083118A1 (en) * 2000-10-26 2002-06-27 Sim Siew Yong Method and apparatus for managing a plurality of servers in a content delivery network
US20020133491A1 (en) * 2000-10-26 2002-09-19 Prismedia Networks, Inc. Method and system for managing distributed content and related metadata
US20080215873A1 (en) * 2004-05-26 2008-09-04 Mount Sinai School Of Medicine Of New York University System and method for presenting copy protected content to a user from a portable storage device
US20100142421A1 (en) * 2008-09-04 2010-06-10 Ludger Schlicht Markets for a mobile, broadband, routable internet
US20120233522A1 (en) * 2011-03-08 2012-09-13 Rackspace Us, Inc. Method for handling large object files in an object storage system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GUPTA ET AL.: "iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments", SOFTWARE: PRACTICE AND EXPERIENCE, vol. 47, no. 9, 7 June 2016 (2016-06-07), pages 1275 - 1296, XP080706371, Retrieved from the Internet <URL:https://arxiv.org/pdf/1606.02007.pdf> [retrieved on 20210508] *

Similar Documents

Publication Publication Date Title
US11218367B2 (en) Community internet drive
US11102290B2 (en) Peer-to-peer network prioritizing propagation of objects through the network
JP5526137B2 (en) Selective data transfer storage
US20050216473A1 (en) P2P network system
US20070180079A1 (en) Method and system for peer-to-peer stream
CN104735044A (en) Streaming media live broadcast method and system
Liu et al. Designing hydra with centralized versus decentralized control: A comparative study
WO2021171240A1 (en) Method and system for storing and accessing content
US20110276669A1 (en) Method and System for Peer-to-Peer Stream
US8478823B2 (en) Selective data forwarding storage
US10749980B1 (en) Autonomous storage device and methods for distributing content
JP2009230686A (en) Content management server and content management program
US20230376573A1 (en) Peer to peer (p2p) encrypted data transfer/offload system and method
Binder Content Delivery Network Interconnect
Muñoz-Gea et al. Optimizing content placement in a peer-assisted VoD architecture
Birman et al. Network perspective
Samsudin et al. The Ranking Peer for Hybrid Peer-to-Peer Real Time Video Streaming
KR20140016545A (en) Download contents relay system and providing method thereof
Gkamas et al. Integrating the Kaltura video platform with the Photodentro Video repository: A case study
Fernández Self-hosted cloud platform using descentralized downloads
Pallelra Measurement and Enhancement of Peer-to-Peer based File Synchronization with Cloud Assistance
Jayalalithaa et al. Dynamic Xml Dataset Based On Multi-Channel Bus Architecture for Multimedia Cloud
KR20090002334A (en) P2p machine loaded embeded linux module and contents support method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21761899

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21761899

Country of ref document: EP

Kind code of ref document: A1