CN104486294B - A kind of mobile unloading data transmission method with privacy protection function - Google Patents

A kind of mobile unloading data transmission method with privacy protection function Download PDF

Info

Publication number
CN104486294B
CN104486294B CN201410688219.5A CN201410688219A CN104486294B CN 104486294 B CN104486294 B CN 104486294B CN 201410688219 A CN201410688219 A CN 201410688219A CN 104486294 B CN104486294 B CN 104486294B
Authority
CN
China
Prior art keywords
content
node
transit node
packet
request
Prior art date
Application number
CN201410688219.5A
Other languages
Chinese (zh)
Other versions
CN104486294A (en
Inventor
周雅琴
李向阳
毛续飞
张兰
朱彤
Original Assignee
无锡清华信息科学与技术国家实验室物联网技术中心
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 无锡清华信息科学与技术国家实验室物联网技术中心 filed Critical 无锡清华信息科学与技术国家实验室物联网技术中心
Priority to CN201410688219.5A priority Critical patent/CN104486294B/en
Publication of CN104486294A publication Critical patent/CN104486294A/en
Application granted granted Critical
Publication of CN104486294B publication Critical patent/CN104486294B/en

Links

Abstract

The present invention discloses a kind of mobile unloading data transmission method with privacy protection function; this method introduces believable agent node; transit node is distributed to after data are encrypted by agent node; avoid transit node from knowing the address of user's request content, at the same use secret protection content distribution algorithm can ensure packet transit node is distributed in a manner of low overhead, be wirelessly transferred during be not revealed to third party and damage the reliability of data transfer on wireless channel.The present invention makes mobile subscriber ensure that the privacy informations such as the personal record browsed, request content are not revealed to third party while can effectively improve Internet data transmission rate; at the same time; in view of the limited dynamic with wireless network of mobile terminal resource; reduce the influence to the efficiency of data transfer as far as possible while Privacy Preservation Mechanism is introduced, the safe and reliable transmission of data is ensure that in a manner of low overhead.

Description

A kind of mobile unloading data transmission method with privacy protection function

Technical field

The present invention relates to wireless communication technology field, more particularly to a kind of mobile unloading data with privacy protection function Transmission method.

Background technology

The increased popularity of smart mobile phone and tablet personal computer at present, allow users to by mobile operator network service bodies Test ubiquitous linking Internet and abundant application (APP).These movement APP, including video stream application, photo share should With, cloud storage service etc..Wherein, Video Applications are particularly subject to the welcome of user, have been won greatly for current content and service provider The customer group of amount, and cause mobile video flow to be increasingly becoming main flow.It is interior in order to attract more users, improve Consumer's Experience Hold service provider and HD video is often provided.And HD video needs higher network data transmission rate to ensure user's body Test, huge challenge is brought to mobile operator networks.The violent growth of mobile operator network traffics and the height of network are moved State variation characteristic causes mobile operator needs to spend very high cost to meet the needs of each every user of period.It is although mobile Operator is making great efforts the capacity of raising network, but is shown according to Cisco's survey report, the growth of mobile operator network traffics The growth of network capacity will be caught up with quickly and so that network capacity reaches saturation state.On the other hand, mobile network uses at present Family is often faced with limited data set meal, needs to defray enormous cost to be excessively used once set meal limit is exceeded.This Both sides, which constrains, causes user to be difficult to the mobile network service for experiencing ubiquitous high quality in inexpensive manner.Therefore, Mobile unloading (Mobile Offloading) is arisen at the historic moment.

Mobile Offloading can be by effectively improving mobile fortune using the wave point of the multiple isomeries of mobile device Seek business's network bandwidth.During a typical offloading, the equipment of mobile network's quality of connection difference can incite somebody to action Its data traffic is unloaded to the good equipment of other mobile network's quality of connection to obtain higher data transmission rate.The white skin of Cisco Book predicts that the five-year movement offloading flows will occupy more than the 50% of total mobile flow.There are some passes in the prior art In offloading system work process.In these operative scenarios, a mobile device is the neighbour near requester requests Their internet connection can be shared in time by occupying mobile node i.e. transit node.For example, it is assumed that requestor and transit node pair Same content is interested, it is desirable to by free cooperation get off shared video content, accelerate speed of download;In addition, it can also lead to Design incentive mechanism is crossed, pays the certain expense of partner, encourages to download with idle transit node help.

But offloading work at present is intended only to be used to improve device data transmission rate, does not examine Consider the potential safety hazard during actual transmissions.Relative to traditional network transmission, offloading data transmission procedure is very The information of privacy or individual is easily exposed to the public, causes serious privacy leakage problem.In typical offloading During, requestor needs content address consigning to forward node, so that it can correctly obtain the content of request and be transmitted to Requestor.This also implies that transit node possesses address and the content of request.In addition, supervised on wireless forwarding channel The malicious node listened also is likely to know content without the mandate or license of Content owner.Therefore secret protection here Target be dual:The network address of access content and the content of request are in itself.For the former, if being exposed to the of malice Tripartite, then they may be used for the personal lifestyle information for inferring user, such as preference, personal habits, financial information etc.;It is right In the latter, the individual privacy information for causing user is directly revealed if no protection mechanism, such as photo, video etc..And And if user recognize it is middle so serious potential safety hazard be present, may select not use offloading, such one The applications and popularization of offloading in practice will be had a strong impact on.

The content of the invention

It is an object of the invention to by a kind of mobile unloading data transmission method with privacy protection function, to solve The problem of background section above is mentioned.

To use following technical scheme up to this purpose, the present invention:

A kind of mobile unloading data transmission method with privacy protection function, this method are based on by asking user, content The mobile uninstalling system that service provider, agent node and transit node are formed is realized, is comprised the following steps that:

A. ask user to send one by mobile network to ask to content and service provider;

B. after content and service provider receives the request, the metadata of request content is returned into request user;

C. ask user that metadata is uploaded into agent node after the metadata is received;

D. agent node calculates transmission cost, and checks that can request user have enough reimbursement of expense this time data biography It is defeated, if can not, NACK (negative acknowledge character) message is sent, refusal request user, ACK (determining character) message is otherwise sent, connects By request user;

E. user is asked after ACK message is received, by the transit node transmission solicited message into its coverage, and with The transit node chosen establishes locality connection;

F. simultaneously, agent node is from the contents of content and service provider cache requests, and the packet of request content is entered Transit node is distributed to after row pretreatment and coding encrypting;

G. the packet received is transmitted to request user by transit node.

Especially, the metadata in the step B includes the URL (URL) and size letter of request content Breath.

Especially, the agent node selects third-party server, independently of content and service provider.

Especially, the agent node includes accounting module, secret protection content distribution module and scheduling feature module;Institute Accounting module is stated to be used to record data volume and corresponding expense of the transit node for request user's forwarding;In the secret protection Hold the content that distribution module is used to pre-process and coding encrypting is asked, and be distributed to transit node;The scheduling feature module For being transmitted scheduling to transit node.

Especially, the step F is specifically included:Agent node is adopted from the contents of content and service provider cache requests With the content distribution algorithm of secret protection by the packet delivery of request content to transit node;Wherein, the secret protection Content distribution algorithm includes both of which:Partial encryption (Fountain coding before are carried out after fountain coding Partial encryption, FCBPE) and progress fountain coding (the Fountain coding after after selective encryption Selective encryption, FCASE).

Especially, the Partial encryption that carried out after fountain coding specifically includes:Agent node is to request content first Packet carries out fountain coding, wherein, the packet includes K bag;By estimating bag-losing ratio, agent node is correspondingly therefrom Selected section packet is encrypted, and is then distributed to transit node again;When transit node is successfully received (1+ ε) K data Bao Shi, agent node stop to transit node packet distribution, wherein, ε is any constant more than zero;Work as Network Packet Loss Rate is PlWhen, the number of data packets that agent node needs to encrypt is (Pl+ε)K/(1-Pl)。

Especially, the Partial encryption that carried out after fountain coding also includes:For real-time data flow, then needing will be original Content be split into data block, then again to the data block carry out fountain coding.

Especially, the fountain coding that carried out after selective encryption specifically includes:By selective encryption algorithm to regarding Part and parcel is encrypted in frequency content, and is used as private portions, and remaining content is as open part;After selective encryption Input of the content as fountain coding;The packet delivery that agent node exports fountain coder is to transit node, then in Trochanterion is transmitted to request user, until request user receives the packet for the content for recovering encryption enough.

Especially, the selective encryption algorithm selects the selective encryption algorithm based on AES, and the AES is to video DC and the AC coefficient for flowing I frames and motion vector carry out AES encryption.

Mobile unloading data transmission method proposed by the present invention with privacy protection function introduces believable agent node, Transit node is distributed to after data are encrypted by agent node, avoids transit node from knowing the ground of user's request content Location, at the same use secret protection content distribution algorithm can ensure packet be distributed in a manner of low overhead transit node, Third party is not revealed to during being wirelessly transferred and damages the reliability of data transfer on wireless channel.The present invention makes movement User ensures the privacies such as the personal record browsed, request content while can effectively improve Internet data transmission rate Information is not revealed to third party, at the same time, it is contemplated that the limited dynamic with wireless network of mobile terminal resource, is introducing The influence to the efficiency of data transfer is reduced while Privacy Preservation Mechanism as far as possible, data are ensure that in a manner of low overhead Safe and reliable transmission.

Brief description of the drawings

Fig. 1 is the mobile unloading data transmission method flow chart provided in an embodiment of the present invention with privacy protection function;

Fig. 2 is the content distribution algorithm flow chart of secret protection under FCBPE patterns provided in an embodiment of the present invention;

Fig. 3 is the content distribution algorithm flow chart of secret protection under FCASE patterns provided in an embodiment of the present invention.

Embodiment

The invention will be further described with reference to the accompanying drawings and examples.It is understood that tool described herein Body embodiment is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that for the ease of retouching State, part related to the present invention rather than full content are illustrate only in accompanying drawing, it is unless otherwise defined, used herein all Technology and scientific terminology it is identical with the implication that is generally understood that of those skilled in the art for belonging to the present invention.Herein at this The term used in the description of invention is intended merely to describe the purpose of specific embodiment, it is not intended that in limiting this hair It is bright.Term as used herein " and/or " include the arbitrary and all combinations of one or more related Listed Items.

It refer to shown in Fig. 1, Fig. 1 is that the mobile unloading data provided in an embodiment of the present invention with privacy protection function pass Transmission method flow chart.

The mobile unloading data transmission method with privacy protection function is based on by asking user, content to take in the present embodiment The mobile uninstalling system for provider, agent node, transit node and the base station composition of being engaged in is realized.The request user, transit node Residing network environment is WiFi/Bluetooth (bluetooth).This has the mobile unloading data transmission method of privacy protection function Comprise the following steps that:

1. when need from content and service provider download content when, request user by mobile network send one ask to Content and service provider.

After 2. content and service provider receives the request, the metadata of request content is returned into request user.Wherein, The metadata includes the URL and size information of request content.

3. ask user that metadata is uploaded into agent node after the metadata is received.

4. agent node calculates transmission cost, and checks that can request user have enough reimbursement of expense this time data biography It is defeated, if can not, NACK message is sent, refusal request user, ACK message is otherwise sent, receives request user.In content service Agent node is introduced between provider and transit node, agent node distributes content to transit node, can prevent middle trochanter Point obtains the address of content and original request content, reaches the purpose of secret protection.The agent node include accounting module, Secret protection content distribution module and scheduling feature module.The accounting module is used to record transit node for request user's forwarding Data volume and corresponding expense.The secret protection content distribution module is asked interior for pretreatment and coding encrypting Hold, and be distributed to transit node.The scheduling feature module is used to be transmitted transit node scheduling.The institute in the present embodiment State agent node and select third-party server, independently of content and service provider, can handle and be provided towards different content service The request of business.Therefore, content and service provider need not change existing infrastructure to support method proposed by the present invention.

5. user is asked after ACK message is received, by the transit node transmission solicited message into its coverage, and with The transit node chosen establishes locality connection.

6. simultaneously, agent node is from the contents of content and service provider cache requests, and the packet of request content is entered Transit node is distributed to after row pretreatment and coding encrypting.

Agent node, and will using the content distribution algorithm of secret protection from the contents of content and service provider cache requests The packet delivery of request content is to transit node.The content distribution algorithm combination fountain coding and selective encryption of secret protection Algorithm reaches effective reliable content distribution.The number in dynamic mobile wireless network can not only be ensured by using fountain coding According to the reliability of transmission, additionally it is possible to reach the purpose of low complex degree encrypted content.For video content, using selective encryption side Method will be more more efficient than complete cipher mode and ensures a certain degree of security.

The content distribution algorithm of secret protection in the present invention includes both of which:Partial encryption is carried out after fountain coding (FCBPE) fountain coding (FCASE) and after selective encryption is carried out.Wherein, FCBPE patterns can be used in any type of Hold encryption, and provide with the theoretical level of security ensured;The video content that FCASE patterns are used to take larger memory space adds It is close.

When packet loss is low, agent node selection performs FCBPE patterns and carries out content distribution, specifically includes:Act on behalf of first Node carries out fountain coding to the packet of request content, and fountain coding continuously produces packet conduct as fountain Output, wherein, the packet includes K bag;By estimating bag-losing ratio, agent node correspondingly therefrom selected section packet It is encrypted, is then distributed to transit node again;When transit node is successfully received (1+ ε) K packet, agent node stops Only to transit node packet distribution, wherein, ε is any constant more than zero;When network packet loss rate is PlWhen, Dai Lijie The number of data packets that point needs to encrypt is (Pl+ε)K/(1-Pl).In addition, for real-time data flow, then need original content Data block is split into, fountain coding then is carried out to the data block again.As shown in Fig. 2 figure Chinese version content, image and video Content, real-time stream are data to be distributed, if Segment 1...Segment i are the cadre for being divided into real-time stream Divide, Chunk 1...Chunk n-1Chunk n are the data of fountain coding output, and symmetric cryptography is adding for FCBPE patterns selection Decryption method, Encrypted Chunk are encrypted data ... Chunk n are public data.

When needing that the video content for taking larger memory space is encrypted, agent node selection performs FCASE moulds Formula carries out content distribution, specifically includes:Selective encryption is carried out to video content first, then carries out fountain coding again.Pass through Part and parcel in video content is encrypted selective encryption algorithm, and is used as private portions, and remaining content is as open Part;Input of the content as fountain coding after selective encryption;The packet that agent node exports fountain coder point Transit node is issued, then request user is transmitted to by transit node, until request user receives the content for recovering encryption enough Packet.In the present embodiment, the selective encryption algorithm selects the selective encryption algorithm based on AES, the AES AES encryption is carried out to DC and the AC coefficient of video flowing I frames and motion vector.Wherein, AES is Advanced Encryption Standard abbreviation, i.e. Advanced Encryption Standard.As shown in figure 3, image and video content, real-time stream are to treat point in figure Data are sent out, Chunk 1...Chunk n-1Chunk n are fountain coding output data.

7. the packet of transit node download agent node distribution.

8. the packet is transmitted to request user by transit node.

Technical scheme introduces believable agent node, is distributed to after data are encrypted by agent node Transit node, transit node is avoided to know the address of user's request content, while using the content distribution algorithm energy of secret protection Enough ensure packet transit node is distributed in a manner of low overhead, be wirelessly transferred during be not revealed to third party and have Damage the reliability of data transfer on wireless channel.The present invention makes mobile subscriber to effectively improve Internet data transfer Ensure that the privacy informations such as the personal record browsed, request content are not revealed to third party while rate, at the same time, it is contemplated that The limited dynamic with wireless network of mobile terminal resource, is reduced to data as far as possible while Privacy Preservation Mechanism is introduced The influence of the efficiency of transmission, the safe and reliable transmission of data is ensure that in a manner of low overhead.

Pay attention to, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore, although being carried out by above example to the present invention It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (9)

1. a kind of mobile unloading data transmission method with privacy protection function, it is characterised in that this method is based on by asking The mobile uninstalling system that user, content and service provider, agent node and transit node are formed is realized, is comprised the following steps that:
A. ask user to send one by mobile network to ask to content and service provider;
B. after content and service provider receives the request, the metadata of request content is returned into request user;
C. ask user that metadata is uploaded into agent node after the metadata is received;
D. agent node calculates transmission cost, and checks that can request user have enough reimbursement of expense this time data transfer, if Can not, then NACK message is sent, refusal request user, ACK message is otherwise sent, receives request user;
E. ask user that the transit node into its coverage is sent into solicited message after ACK message is received, and with choosing Transit node establish locality connection;
F. simultaneously, agent node is from the contents of content and service provider cache requests, and the packet of request content is carried out pre- Transit node is distributed to after processing and coding encrypting;
G. the packet received is transmitted to request user by transit node.
2. the mobile unloading data transmission method according to claim 1 with privacy protection function, it is characterised in that institute Stating the metadata in step B includes the URL and size information of request content.
3. the mobile unloading data transmission method according to claim 1 with privacy protection function, it is characterised in that institute State agent node and select third-party server, independently of content and service provider.
4. the mobile unloading data transmission method according to claim 1 with privacy protection function, it is characterised in that institute Agent node is stated to specifically include:Accounting module, secret protection content distribution module and scheduling feature module;
The accounting module is used to record data volume and corresponding expense of the transit node for request user's forwarding;
The secret protection content distribution module is used to pre-process and the content of coding encrypting request, and is distributed to middle trochanter Point;
The scheduling feature module is used to be transmitted transit node scheduling.
5. the mobile unloading data transmission method according to claim 1 with privacy protection function, it is characterised in that institute Step F is stated to specifically include:
Agent node will ask from the contents of content and service provider cache requests, and using the content distribution algorithm of secret protection The packet delivery of content is to transit node;Wherein, the content distribution algorithm of the secret protection includes both of which:In fountain Partial encryption is carried out after coding and fountain coding is carried out after selective encryption.
6. the mobile unloading data transmission method according to claim 5 with privacy protection function, it is characterised in that institute The progress Partial encryption after fountain coding is stated to specifically include:
Agent node carries out fountain coding to the packet of request content first, wherein, the packet includes K bag;Pass through Estimating bag-losing ratio, correspondingly therefrom selected section packet is encrypted agent node, is then distributed to transit node again;It is central When trochanterion is successfully received (1+ ε) K packet, agent node stops to transit node packet distribution, wherein, ε mono- Individual any constant more than zero;When network packet loss rate is PlWhen, the number of data packets that agent node needs to encrypt is (Pl+ε)K/ (1-Pl)。
7. the mobile unloading data transmission method according to claim 6 with privacy protection function, it is characterised in that institute Stating the progress Partial encryption after fountain coding also includes:For real-time data flow, then need original content being split into data Block, fountain coding then is carried out to the data block again.
8. the mobile unloading data transmission method according to claim 5 with privacy protection function, it is characterised in that institute The progress fountain coding after selective encryption is stated to specifically include:
Part and parcel in video content is encrypted by selective encryption algorithm, and is used as private portions, remaining content As open part;Input of the content as fountain coding after selective encryption;Agent node exports fountain coder Packet delivery is transmitted to request user to transit node, then by transit node, adds until request user receives to recover enough The packet of close content.
9. the mobile unloading data transmission method according to claim 8 with privacy protection function, it is characterised in that institute State selective encryption algorithm and select the selective encryption algorithm based on AES, the AES is to video flowing I frames and motion vector DC carries out AES encryption with AC coefficients.
CN201410688219.5A 2014-11-25 2014-11-25 A kind of mobile unloading data transmission method with privacy protection function CN104486294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410688219.5A CN104486294B (en) 2014-11-25 2014-11-25 A kind of mobile unloading data transmission method with privacy protection function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410688219.5A CN104486294B (en) 2014-11-25 2014-11-25 A kind of mobile unloading data transmission method with privacy protection function

Publications (2)

Publication Number Publication Date
CN104486294A CN104486294A (en) 2015-04-01
CN104486294B true CN104486294B (en) 2017-12-12

Family

ID=52760798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410688219.5A CN104486294B (en) 2014-11-25 2014-11-25 A kind of mobile unloading data transmission method with privacy protection function

Country Status (1)

Country Link
CN (1) CN104486294B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2464158A1 (en) * 2009-08-07 2012-06-13 Fujitsu Limited Base station device, data processing device and mobile communication system
CN102685927A (en) * 2011-03-08 2012-09-19 媒介访问系统私人有限公司 Method and system for data offloading in mobile communications
CN103782622A (en) * 2011-04-29 2014-05-07 英特尔公司 Control and data plane solutions for carrier aggregation based WLAN offload
CN103795704A (en) * 2012-10-29 2014-05-14 辉达公司 Technique for offloading compute operations utilizing a low-latency data transmission protocol

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10412649B2 (en) * 2013-03-22 2019-09-10 Lg Electronics Inc. Method and apparatus for performing handover procedure in wireless communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2464158A1 (en) * 2009-08-07 2012-06-13 Fujitsu Limited Base station device, data processing device and mobile communication system
CN102685927A (en) * 2011-03-08 2012-09-19 媒介访问系统私人有限公司 Method and system for data offloading in mobile communications
CN103782622A (en) * 2011-04-29 2014-05-07 英特尔公司 Control and data plane solutions for carrier aggregation based WLAN offload
CN103795704A (en) * 2012-10-29 2014-05-14 辉达公司 Technique for offloading compute operations utilizing a low-latency data transmission protocol

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《支持3G WIFI Offload的网络发现和选择》;薛曜;《中国优秀硕士论文电子期刊网》;20140131(第01期);全文 *

Also Published As

Publication number Publication date
CN104486294A (en) 2015-04-01

Similar Documents

Publication Publication Date Title
Tran et al. Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges
JP6239700B2 (en) Mobile confidential communication method based on quantum key distribution network
ES2728732T3 (en) Quality sensitive rate adaptation techniques for diffusion in DASH-type flow
Abou-Zeid et al. Energy-efficient adaptive video transmission: Exploiting rate predictions in wireless networks
CN104509069B (en) Support the technology of selective mobile content optimization
Jiau et al. Multimedia services in cloud-based vehicular networks
CN103875304B (en) Wireless telecom equipment and the method that content is retrieved by wireless telecom equipment
KR101709371B1 (en) Multipath delivery for adaptive streaming
US20140219099A1 (en) Method and apparatus for wireless distributed computing
US20160182457A1 (en) Providing secure communication and/or sharing of personal data via a broadband gateway
US9037870B1 (en) Method and system for providing a rotating key encrypted file system
CN102195957B (en) Resource sharing method, device and system
US7792517B2 (en) Digital content acquisition and distribution in digitial rights management enabled communications devices and methods
US8831624B2 (en) Back-channeled packeted data
US20190182903A1 (en) Systems for Improved Multi-Channel Network Connectivity Performance and Security
US9565719B2 (en) Electronic device for multiple radio access and method thereof
KR101762184B1 (en) Customizable mobile broadband network system, and method for customizing mobile broadband network
Xu et al. Mobile edge computing enhanced adaptive bitrate video delivery with joint cache and radio resource allocation
US7924792B2 (en) Method, system, gateway and user device for receiving/sending multimedia message
KR101330052B1 (en) Method for providing content caching service in adapted content streaming and local caching device thereof
US9363388B2 (en) Methods, systems, and computer readable media for providing targeted services to telecommunications network subscribers based on information extracted from network signaling and data traffic
CN103188270B (en) Method, device and system for accessing recommended server to IP address
US8503370B2 (en) Site based media storage in a wireless communication network
JP5885310B2 (en) Sharing content between mobile devices
US20110065424A1 (en) System and method to facilitate downloading data at a mobile wireless device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant