[go: up one dir, main page]

EP1854261A1 - Procede pour transmettre un contenu numerique d'un fournisseur de contenu vers les utilisateurs d'un systeme de transmission de contenu en ligne - Google Patents

Procede pour transmettre un contenu numerique d'un fournisseur de contenu vers les utilisateurs d'un systeme de transmission de contenu en ligne

Info

Publication number
EP1854261A1
EP1854261A1 EP05751848A EP05751848A EP1854261A1 EP 1854261 A1 EP1854261 A1 EP 1854261A1 EP 05751848 A EP05751848 A EP 05751848A EP 05751848 A EP05751848 A EP 05751848A EP 1854261 A1 EP1854261 A1 EP 1854261A1
Authority
EP
European Patent Office
Prior art keywords
terminal
file
content
upload
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05751848A
Other languages
German (de)
English (en)
Inventor
Kurt Smit
Wan Kan-Hung
Matthias Runte
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mondia Media Germany GmbH
Original Assignee
Arvato Mobile GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arvato Mobile GmbH filed Critical Arvato Mobile GmbH
Publication of EP1854261A1 publication Critical patent/EP1854261A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1059End-user terminal functionalities specially adapted for real-time communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/80Responding to QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • the invention relates to a method for transferring digital contents of a content provider to the users of an online content transmission system in a computer communication network, in which a file containing a specific, desired by a download user content, at least partially from a terminal of an upload User of the content transmission system is transmitted via the computer communication network to a terminal of the download user. Moreover, the invention relates to a corresponding content transmission system for carrying out such a method and to a terminal suitable for this method for downloading a digital content of a content provider from a computer communication network.
  • downloading in the usual notation
  • downloading platform the operator of such a content transfer system
  • the operators of such download platforms are obliged to invest in new hardware on a regular basis, which ultimately means that relatively high proportionate hardware costs must be covered by the revenues.
  • a user authentication for the digital content by the service provider then takes place.
  • the second user may use the downloaded digital content.
  • a payment is made to the first user who has forwarded the digital content.
  • a third user, who then wants to have this content, can in turn download the content from the second or alternatively from the first user. It is possible that appropriate payments are made to each user in the forwarding chain.
  • This transmission method or this content transmission system has, on the one hand, the advantage that the transmission takes place via a decentralized system structure, a so-called “peer-to-peer (P2P) network", in which the contents are forwarded from one user to another user The contents are thus generally present within the network, so that the burden of downloading a content is distributed over the network.
  • P2P peer-to-peer
  • This peer-to-peer system structure is considerably less expensive than a classic central download platform because it It is not necessary to expand the infrastructure in the form of new servers as the number of users increases, but as the number of users increases, so does the number of potential uploaders (ie the users from whom content can be transmitted to other users). As the number of users increases, the infrastructure automatically increases without additional costs.
  • the cost of legally downloading copyrighted digital content can be significantly reduced, thereby reducing the attractiveness of using illegal exchange platforms relative to such legal platforms.
  • Another advantage is that users who are willing to send digital content to others will receive compensation for it. It is expected that users' willingness to illegally send copyrighted content to others will be reduced if they can receive compensation for using a legitimate peer-to-peer platform. Conversely, the downloaders of such legal content within the peer-to-peer platform can legally send the content back to other users and also receive compensation for it.
  • a disadvantage of the aforementioned method is that when transmitting files in a peer-to-peer network, the transmission rate relative to a download from a server is relatively low.
  • asymmetric networks such as DSL networks have the connections of the end users to the network now, although usually a relatively high download bandwidth, but only a small upload bandwidth for a "upload" of data from the terminal to the network on standard DSL connection, a download rate of 780 bit / s, whereas the upload rate is only 128 bit / s
  • future satellite-based networks it can be assumed that the discrepancy between upload and download rate is even greater, eg 15 Mbit / s download and only 64 bit / s or 128 bit / s upload is due to the fact that in most situations, for example when browsing on the Internet, users need to download significantly more data than they need to upload data to the network.
  • fragments of the file are transferred from terminals of various upload users to the terminal of the download user. That is, in a method according to the invention for downloading a digital content of a content provider from a computer communication network to a terminal of a download user of a content transmission system is ensured according to the invention that the terminal of the download user receives fragments of the file from terminals of different upload users .
  • a “download user” is meant a user who downloads a file with a certain content to his terminal
  • the "upload user” is a user of the system who makes his terminal available for this download, ie uploads file parts to the peer-to-peer network for this transaction. It is clear that these terms refer to a file transfer and in other situations the roles can change, ie a download user becomes an upload user and vice versa.
  • Such an inventive method shortens the download time in asymmetric networks such.
  • B. DSL quite considerably, since several upload terminals with a low upload bandwidth serve a download terminal with a higher download bandwidth.
  • the fragments of the desired file coming from different terminals of the upload users can be received in parallel from the terminal of the download user.
  • parallel is to be understood as meaning the transmission protocol, although the individual transmission packets are transmitted technically serially on the lowest network level, but the individual packets are thereby influenced without the download terminal having an influence on the order of the transmission protocol Packets have sent to the receiving terminal that the download bandwidth is used optimally and the fragments are transmitted as quickly as possible. The desired file must then be reconstructed at the download user only from the fragments obtained from the various terminals However, this is not a problem because even with a classical transmission of a file from a single other terminal connected to the network, the transmission usually takes place in packets and a corresponding reconstruction of the file at the receiver is required.
  • an inventive terminal for downloading a digital content of a content provider of a computer communications network must be available, which in addition to a network interface for receiving fragments of the file from other terminals connected to the computer communication network has a suitable transaction control unit, which is designed such that the terminal receives fragments of the file from terminals of different upload users.
  • Such a terminal may be any terminal which can be connected to the computer communications network, for example a PC, a laptop, a personal digital assistant (PDA), a mobile device with suitable equipment or a device which is specifically designed for Receiving and processing of digital content is provided, such as a set-top box for use with a TV, an MP3 player or the like.
  • a PC personal digital assistant
  • PDA personal digital assistant
  • terminals are programmable devices. Therefore, for example, the transaction control unit and the other components required for carrying out the invention or for carrying out certain embodiments of the invention may be in the form of be implemented by software on the terminal. This has the advantage that existing terminals for a function according to the invention can be retrofitted by suitable software installations.
  • At least a portion of the fragments of the file is preferably transmitted from a specially provided base storage terminal of the content transfer system to the terminal of the download user, if none or too few Terminals of upload users are available on which the appropriate parts of the file are available for transmission.
  • a specially provided base storage terminal of the content transfer system For this purpose, only the transaction control unit of the terminal of the download user, also referred to below as the download terminal, must be configured such that the terminal accordingly receives at least a portion of the fragments of the file from such a base memory terminal.
  • This base storage terminal may be, for example, a server of the content provider and / or the operator of the content transmission system. Of course, several such basic storage terminals may be available within the content transmission system.
  • Such a base memory terminal is usually required at least if none of the users has the file with the appropriate content, ie for the first time downloading the content into the peer-to-peer network.
  • the second user may already have a specific content requesting to receive the file with the corresponding content to a part of the first user and to another part of the central base storage terminal. If a third user then requests the same content, he receives this z. From the terminals of the first and second users and in parallel parts of a basic storage terminal. This procedure is continued until a maximum number of terminals is reached by upload users.
  • the central base storage terminal always takes a back seat and is therefore charged less and less.
  • the organization of when which fragment of the file is downloaded from which upload terminal can be done by the transaction control unit of the download user's terminal.
  • the maximum number of upload terminals may be set so that the total upload bandwidth achieved by the various upload terminals is approximately equal to the download bandwidth available at the download user's terminal. Therefore, this maximum number of upload terminals does not have to be fixed, but can be determined depending on the upload bandwidths available for the individual upload terminals. Similarly, the distribution of how many portions of the file are downloaded from which of the upload terminals can also be selected.
  • the term "upload terminal” should not only be understood as the terminals of upload users, but also as a central basic storage terminal on which the file is available for download.
  • the terminal of the download user sends to possible upload terminals on which at least certain parts of the file are available for upload, request signals for requesting specific fragments of the desired file.
  • the respective requested segments are then transmitted from the relevant upload terminal to the download terminal.
  • the terminal of the download user sends to an upload terminal a request signal block, with which several fragments of the desired file are requested at the same time.
  • Such a procedure is therefore also useful in other networks in which a file is not transferred in parallel from multiple uploaders to a Downloader, but in each of which a Downloader can only transfer the file from an upload terminal.
  • This method can therefore also be seen as a separate invention for solving the above-mentioned task of accelerating the download.
  • a request for a particular content is sent in a preferred embodiment from the terminal of the download user to a central indexing device of the content transmission system.
  • This central indexing device determines a group of candidate upload terminals on which at least parts of the file-generally the entire file-are available for uploading. It will then from the central indexing device to the terminal of the download user address information such.
  • the request signals for requesting specific fragments of the file are sent by the latter to at least part of the candidate upload terminals.
  • the transfer initiation device of the content transfer system therefore has a corresponding indexing device.
  • the central indexing device has for this purpose a suitable memory device which contains the information on which terminals of different users of the content transmission system or on which base memory terminals which contents are provided.
  • the indexing device has a selection unit in order, after receiving a request from a user for a specific content from these terminals, to determine the group of candidate upload terminals in each case according to predetermined criteria.
  • the indexing device receives from a terminal of a user of the content transmission system, when files are available for uploading to other users of the content transmission system, an offer signal containing information about the available files , This means that possible upload users log in to the indexing facility. If a particular user regularly and / or constantly provides files for download by other users on his terminal, it is sufficient if this offer signal contains only the information as to whether something has changed in the offer of the respective user since the last time the offer signal was sent.
  • the selection of the upload terminals, to which a request signal for the transmission of a fragment is sent from the download terminal preferably takes place as a function of the priority values assigned to the individual upload terminals.
  • the candidate upload terminals are preferably already selected by the indexing device as a function of priority values and either prioritized - ie in an appropriate order - sent to the download terminal so that the download terminal sends the request signals to the candidate upload terminals in sends the order as the candidate upload terminals get sent from the indexer.
  • the associated priority values can also be transmitted with the address information and then requested in turn from the download terminal in accordance with the priority values at the potential upload terminals.
  • the priority values may be given to the terminals of the various upload users each upon first registration with the content provider or system operator or even in the case of a later registration, if they register as possible uploaders.
  • the priorities can be selected depending on the quality of the data connection, in particular taking into account the provided upload bandwidth.
  • any other criteria can be used to determine the priorities.
  • the priority of a particular upload terminal can also be changed at any time, for example, to ensure that the potential upload terminals are loaded as evenly as possible and - if a payment for an upload to the upload users - also all potential upload Users have a chance to receive compensation.
  • any other arbitrary weighting function is conceivable, the z. B. certain users, such as regular customers, according to predetermined criteria of the content provider preferred.
  • a file containing a particular digital content is assigned a unique identifier, such as a unique name, an ID number, or the like.
  • a unique identifier such as a unique name, an ID number, or the like.
  • this is an identifier that can simultaneously serve to secure and authenticate the file, that is dependent on the content of the file. This can be done by using a hash value of the respective file or similar. at.
  • the desired file can be uniquely identified, whereby it can be more easily ensured that it is indeed the desired and already authenticated file.
  • the download user can also check whether the received file has been delivered completely, unchanged and unadulterated.
  • each file is decomposed into a number of defined segments and assigned a unique identifier to each of the segments.
  • a request signal of the download terminal to an upload terminal contains the unique identifier of the segment of the file to which a requested fragment belongs.
  • the request for the segments is in the order necessary for subsequent use, thus earliest possible use of the file can be achieved.
  • the breakdown into individual segments has the advantage that it does not have to wait until a download is completely completed in order to carry out a check of the data sent, but it is sufficient if the download terminal has completely received a specific segment. It can then already checked the respective segment using the unique identifier and determined whether the segment has been completely and unadulterated transmitted or if necessary, further measures, such. As a renewed request certain segments or fragments are required.
  • the download terminal sends a request signal to another candidate upload terminal if a particular fragment to be transmitted is incompletely or not received by a first upload terminal, with which a fragment is then requested, which corresponds exactly to the erroneous or missing part of the fragment to be sent by the first upload terminal. That is, it is - unlike previously known methods - not the complete fragment again requested by another upload terminal, but it is sufficient if the rest of the fragment, which has not yet been delivered properly, is requested again. This considerably speeds up the transmission process, in particular in peer-to-peer networks, in which it can happen that an upload user whose terminal is currently being used for uploading switches off the relevant terminal or, for other reasons, disconnects it.
  • a request signal of the terminal of the download user to an upload terminal preferably contains not only the unique identifier of the file and / or the segment of the file to which a requested fragment belongs, but also an offset value which determines the position of the fragment within the File or segment of the file and the length of the fragment.
  • the requesting terminal can specify the fragments exactly, so that it can easily request residual fragments if a first requested fragment has not been completely delivered.
  • the files are each made available encrypted within the content transmission system and transmitted to the users or transmitted further.
  • the user In order to use the file then, for example, to view or listen on the respective terminal, open a file to copy to a data store, in particular to burn a CD, the user needs a matching "bowl" for this file
  • Choice of encryption and keys for example, depending on the fee paid, the different users are granted different rights, such as whether a file on a terminal unlimited playable, how many burning operations allowed are how often transfers to other devices - such as MP3 players - are allowed, etc.
  • a key can also be effective for a limited time. Suitable encryption methods are known to the person skilled in the art.
  • DRM Digital Rights Management can be used for this, as are offered, inter alia, by Microsoft®.
  • a programming of such DRM systems can, for.
  • XRML eXtensible Rights Markup Language
  • the download user is preferably provided with a corresponding key for decrypting the file before the transmission of fragments of the file. If the download terminal already possesses the key before receiving fragments of the file, it is possible to decrypt the received parts of the file even before the complete file download has ended, particularly in the case of a segment-by-segment check of the file, as described above , This has the advantage that the digital content can be used during the download. For example, a video movie may already be viewed by the download user during the download, which usually takes a little longer due to the large amount of data.
  • a user In a preferred variant of the method, a user must first authenticate himself to an authentication unit in order to use the content transmission system within an authentication procedure. After successful authentication, the user is sent an authentication ID. With this authentication identifier, the user can then authenticate himself in the further course of the procedure with respect to other functional units of the content transmission system.
  • This method has the advantage that a complete organizational separation of the outwardly appearing content provider from the actual operator of the content transmission system, hereinafter also referred to as "system operator" is possible, the user, for example, to a content provider associated with and under the Control of the content provider's authentication unit. authenticated and receives the authentication identifier. This authentication identifier can then be used in relation to all functional units of the system operator.
  • the system operator thus does not need to carry out a more precise authentication of the respective user, and in particular it is not necessary for the system operator to obtain the passwords, user names or the like. of the respective user who receives this from its content provider.
  • this method makes it possible for companies which are normally active in other industries, for example as operators of a restaurant chain or as beverage, confectionery, toy or furniture retailers, to also serve as content providers for purposes of advertising and / or customer loyalty without great effort for videos, music, software or the like on the Internet. Ie. they do not have to set up and maintain the necessary infrastructure themselves, but can instead use the services of an operator of a content transmission system according to the invention.
  • such an authentication identifier can be used in combination with conventional methods of cryptography, such as encrypted data transmission, also with respect to other users or their terminals, in order to enable unambiguous identification of the respective communication partner.
  • Such an authentication identifier may be limited in time or to a specific session of the user, so that the user z. For example, each time the system logs on, it receives a new authentication ID. In principle, however, such an authentication identifier can also be assigned only once upon first registration of the user.
  • a further separation takes place by the download user (usually directly to the download terminal) after a selection, ie after buying a digital content offered by the content provider, a mitpfsb concernss Trents- tion and a Quiempfangberecht Trent to be sent.
  • the download user can then send the file claim credential to the respective upload terminals for receiving fragments of the desired file.
  • the key recipient authorization identifier is forwarded to a license issuer for receiving the key. This has the advantage that the license issuing facility can be independent of a content provider that appears to the end user and / or of the system operator.
  • the content provider or the operator of the content transmission system also operate the license issuing organization and are even authorized to grant licenses for the content.
  • a separation of these functions also allows, for example, that the license issuer is operated by the actual owner of the copyright or licensing rights of the content and the content provider and the system operator - apart from the later billing with the rights holder and the secure transmission of the files - not deal with the licenses.
  • this allows both the content provider and the system operator to offer content from a wide range of right holders and, depending on the right holder, different license services or licensing facilities to be used in the process, depending on which right holder owns the copyright or licensing rights for the particular content desired ,
  • each file with a digital content offered by a specific content provider and / or each segment of such a file within the content transmission system is assigned a unique identifier which depends not only on the content of the file or the segment, but also on the respective content provider.
  • the identifier of the file is unique. If the file is changed, the identifier also changes, so that the file can still be authenticated using the identifier.
  • This preferred method has the advantage that the content provider can ensure that only users belonging to the respective content provider send files to one another within the peer-to-peer network. In this way, the content provider can ensure that, if one of its users requests content, that content is also transmitted by other of its users and, if paid accordingly, that fee is paid to its own users.
  • the content transfer system preferably has a transaction action control device which - after a transmission of fragments of the file from upload terminals to the terminal of the download user - provides performance-relevant data from the upload terminals and / or from the download user's terminal. On the basis of these data, a remuneration of the upload users for the provision of the respective upload terminals for the transmission of the data to the terminal of the download user can then be determined.
  • the remuneration can be "performance-dependent", for example, depending on the amount of data transmitted.
  • this data can also be used for a simple control of the transaction, ie to determine whether, for example, the download user also the same amount of data received as sent from the upload terminals.
  • files are transmitted within the content transmission system that are initially transmitted by the content provider and / or by the system operator on a central base storage terminal. be provided. These contents are checked in advance and secured by issuing a corresponding identifier, for example the hash value, and authorized for transmission within the system.
  • a corresponding identifier for example the hash value
  • a file with the relevant digital content can then be checked first by the content provider and / or by the network operator, and it is also associated with a positive review of this file an identifier. Of course, this is not required if this is a file that the user has received within the content delivery system.
  • Such a file then already has a unique identifier within the content transmission system.
  • This has the advantage that a user can not only consume the same himself directly after the purchase of such a checked legal content, but also on a terminal for transmission to other users within the content transfer system and make available - if from his terminal from uploads other users - receives appropriate compensation, with which he can refinance the purchase of the content.
  • the content transmission system has an offer overview unit which is either made available to the content provider by the system operator or operated by the latter.
  • a “content provider shop” can be “visited” by a user in the usual way, for example via the Internet with a suitable browser. The user can then view the available content and possibly metadata such. B. additional information of the content or trailer or other excerpts from the Get content for a test.
  • the user can then select a content and preferably also add it to a virtual "shopping cart” in order then to download all the selected contents at the end of a session after the payment details have been processed.
  • information about the content provided by a specific user on his terminal for uploading to other users of the content transmission system can also be retrieved from an offer information unit located on the terminal of the relevant user from a terminal of another user.
  • an offer information unit located on the terminal of the relevant user from a terminal of another user.
  • a user decides to download one of the contents, it is preferably a download in the manner according to the invention from a plurality of terminals, irrespective of whether the download user in question was caused to download by the shop of another user or by the shop of the content provider other users of the system. If the download user was made to download by visiting the shop of another user, the user can be paid a commission, even if he is not involved in the upload.
  • This approach reinforces user engagement with a particular content provider and encourages users to actively participate within the content delivery system.
  • FIG. 1 shows a schematic illustration of the sequence of transmission of a content to a first user, a second user and a third user according to an embodiment of the invention
  • FIG. 2 shows a schematic representation of a file divided into several segments
  • FIG. 3 is a principle block diagram of a structure of an embodiment of the content transfer system according to the invention.
  • FIG. 4 shows a schematic block diagram of an exemplary embodiment of a terminal which can be used within the method
  • FIG. 5 shows a more detailed schematic representation of the sequence of a download according to a further embodiment of the invention
  • FIG. 6 shows a schematic representation of a possible log-on of a terminal secured by a firewall
  • FIG. 7 shows a schematic illustration of a sequence of a download from a terminal secured by a firewall.
  • FIG. 1 shows in a very simplified form a possible sequence of the method according to the invention for downloading to the terminals T1, T2, T3 of the first three users of a content transmission system who want to download a file with a specific content.
  • a basic memory terminal SP also referred to below as "Seedpeer" SP for a first download by a user, for which purpose the file with the corresponding content is prepared by the system operator SB, ie for example checked and encrypted and by a unique Identifier, e.g. A hash value, saved and deployed on the Seedpeer SP.
  • a unique Identifier e.g. A hash value
  • the file D is also broken down into a certain number of segments PO, P1, P2, P3, P4 and these individual segments PO, P1, P2, P3, P4 are also unique characteristics, eg. Hash values.
  • the segments PO, P1, P2, P3, P4 of a file D are each marked with an index.
  • the first segment PO receives the index 0.
  • Each of these segments PO, P1, P2, P3, P4 has an offset O P1 , O P2> which marks the beginning of the segment within the file D, and a fixed length Ip, IR.
  • the structure of such a decomposed file D is shown schematically in FIG. 2, but only the offsets Opi, Op2 of the second segment P1 and of the third segment P2 are shown in the offsets for better clarity.
  • the file D shown there is in total divided into 5 segments PO, P1, P2, P3, P4, all segments except for the last segment P4 having the same length Ip. Only the last segment P4 has a length IR, which corresponds to the remaining length of the file D.
  • the length of such a segment can in principle be set freely and also depend on the length of the overall file. Thus, in a first embodiment it is provided to select a length lp of 1 MB for segments of music titles and a length lp of 8 MB for segments of video films.
  • the identifier of the file D or of the individual segments PO, P1, P2, P3, P4 is unique insofar as the identifier no longer fits if the content of the segment PO, P1, P2, P3, P4 or the file D will be changed. In this way, it can be checked by means of the identifier whether a file D or a segment PO, P1, P2, P3, P4 has been manipulated or altered in any other way.
  • the identifier is also still dependent on the content provider RS, so that one and the same file or a segment of such a file, which is offered by two different content providers, does not have the same identifier.
  • the file or parts of the file can then be downloaded at any time by the users of the Seedpeer SP stating a unique identifier of a segment PO, P1, P2, P3, P4 of the desired file.
  • each of these segments PO, P1, P2, P3, P4 is split into fragments F on a later data request from a download terminal, regardless of whether the request is sent to a seed spear or a terminal of an upload user.
  • a fragment F is a unit that is transmitted coherently from exactly one upload terminal to exactly one download terminal via the network.
  • the fragments F also have an index, an offset value O F and a length I F.
  • the index does not necessarily reflect the order of the fragments F within the segment PO, P1, P2, P3, P4.
  • the offset value O F represents the offset within the segment, ie the distance of the start point of the fragment F from the starting point of the segment.
  • the first fragment F is usually given the index 0.
  • the offset OF and the length I F of a requested fragment are determined by the downloader immediately before the request freely selectable.
  • the length of a fragment may be on the order of 256 KB, for example. However, the size and number of fragments need not be determined at the beginning of a file transfer. An upload terminal that receives the request always transmits exactly the data requested by the download terminal.
  • the preparation and provision of the contents on the Seedpeer SP is shown in FIG. 1 in step 100.
  • the setting of the files D by the system operator SB on the Seedpeer SP is generally carried out according to the specifications of the content provider RS.
  • a first user logs in via a first terminal T1 to the content provider RS or to a server assigned to the content provider RS, on which the content provider RS operates an internet online shop SR (step 101).
  • a server assigned to the content provider RS on which the content provider RS operates an internet online shop SR
  • he After he has authenticated himself, he then receives an authentification identifier, also referred to below as "ticket", which is valid for the entire session in step 102.
  • an authentification identifier also referred to below as "ticket”
  • a part assigned to the content provider RS is stored on a server SUA of the system operator SB, which serves specifically for authentication purposes, and a possible procedure for this login procedure will be described in more detail later.
  • step 103 the first user can then use his terminal T1, for example with the aid of a conventional browser, to select a content in the Internet shop of the content provider and select it for sale.
  • step 104 the billing by the content provider RS is performed in step 104.
  • step 105 the unique identifiers of the file D and the associated segments PO, P1, P2 , P3, P4, and a file-receiving authentication identifier, hereinafter referred to as "download-ID”, and a key-receiving authentication identifier, hereinafter referred to as "voucher”, sent to the terminal T1 of the first user.
  • the voucher is valid for a limited time, ie the user must pick up a key for the file D within a certain time with the voucher.
  • the first user sends from his terminal T1, stating the voucher, a key request to a license server SL (step 106) and then receives from the license server SL the key to his terminal T1 sent (step 107).
  • a source request is sent from the terminal T1 sending the ticket and the identifier of the desired file to a central indexing device Sl, which here belongs to the system operator SB and is installed with further functional units of the system operator SB on a server.
  • address information is sent back to the terminal T1, indicating on which candidate upload terminals the file with the desired content is available.
  • the indexing device S1 searches the candidate upload terminals on the basis of priorities assigned to the individual terminals according to a predetermined weighting function and then sends the address information in the order in which the terminal T1 at the individual candidate upload terminals after a transmission of Fragments F of the desired file D should request.
  • the example shown in FIG. 1 above is the first download of a particular content. Therefore, this file is so far deposited only on the Seedpeer SP.
  • the terminal T1 of the first user therefore receives only the address of the Seedpeers SP.
  • a request signal is sent to the seed spear SP in step 110, which then in step 111, the desired fragments, in this case gradually the complete file, to the terminal T1 sends.
  • step 112 power data is sent to the system operator SB, on the basis of which the download is checked in step 113.
  • the terminal T1 transmit power data to the system operator SB, to control by comparing the data transmitted by the Seedpeer SP and the data transmitted by the T1 download terminal.
  • this step is not shown in FIG.
  • the file containing the relevant content is present not only on the basic storage terminal SP but also on the terminal T1 of the first user.
  • the terminal T1 of the first user is also available for further transmission of the file to other users. It makes sense that this was done through a special registration, since not every user is willing to make his terminal available for uploads and not always the terminal is connected to the network.
  • One possible method for such a special "uploader registration" will be explained later with reference to FIG.
  • a second user after logging on to a content provider RS in step 121 with his terminal T2 and receiving a ticket in step 122, chooses the same content in step 123 when searching for a content as the first user received it before.
  • billing is again carried out here at the content provider in step 124.
  • a key request is sent from the terminal T2 indicating the voucher to the license server SL, which then returns the key in step 127.
  • a source request to the central indexing device S1 of the system operator SB takes place from the terminal T2 of the second user in step 128, which then in step 129 the address information, on which candidate upload terminals the file with the relevant content available for download, returns to terminal T2.
  • this is, on the one hand, the address of the ter- minals T1 of the first user and the address of the Seedpeers SP.
  • the terminal T2 of the second user sends request signals to the candidate terminals T1 and SP. This is done by specifying the download ID, on the basis of which the terminals T1, SP available for upload check the authorization of the download terminal T2.
  • the upload terminals T1, SP then send in steps 132, 133 the requested fragments of the file to the terminal T2 of the second user.
  • both the terminal T1 of the first user and the seed spear SP in steps 134, 135 respectively transmit performance data to the system operator SB on the basis of which a check of the transaction is carried out (step 136).
  • a check of the transaction it is also determined how much data the first user has transmitted from his terminal T1 to the terminal T2 of the second user and accordingly calculates a compensation for the first user for the provision of his terminal T1 during the download to the second user ,
  • a remuneration message is accordingly sent to the terminal T1 of the first user.
  • This fee can be credited to the first user, so that he can charge the compensation received, for example, at later, own downloads with the then payable amounts.
  • the system operator SB or the content provider RS accounts for the users are led and the user the amount in another way, for example, by a transfer on reaching a minimum sum, is paid.
  • the sending of such a remuneration notification is optional. However, it has the advantage that an upload user can query on his terminal at any time, which amounts he has received so far through his uploader activity. This is additional motivation for users to make their terminals available for uploads.
  • both the first user and the second user subsequently provide their terminals T1, T2 for further uploads,
  • a third user who wants to download the same content, now a total of three terminals, namely the terminal T1 of the first user, the terminal T2 of the second user and the Seedpeer SP available.
  • step 141 The third user must also first register with his terminal T3 in step 141 to the content provider RS and receives a ticket in step 142.
  • step 143 he can then select the content in the online shop SR of the content provider RS. Once he has decided on the said content, in step 144, the settlement.
  • step 145 the identifiers of the file and the segments, a download ID and a voucher are then sent back to the terminal T3 of the third user.
  • step 146 a key request is sent from the terminal T3 sending the voucher to the license server SL, whereupon the latter sends back the key in step 147.
  • the terminal T3 in step 148 indicating the ticket to the system operator SB or the central indexing device Sl a request for possible upload terminals and receives in step 149, the addresses of the terminal T2 of the second user and the terminal T1 of the first user.
  • the third user with his terminal T3 it is sufficient for the third user with his terminal T3 to download the file from two upload terminals T1, T2 of other users.
  • it is usually the case that significantly more upload terminals are used to download a file for example ten or more upload terminals for downloading a file to a download terminal.
  • the address of a seed spear SP can also be sent, for example, for cases in which a download from one of the other indicated candidate upload terminals T1, T2 should not be possible for any reason.
  • steps 150, 151 then sends the terminal T3 of the third user to the terminals T2, T1 of the second and the first user in each case a request signal, in turn, the download ID is indicated for control.
  • steps 152 and 153 the requested fragments are sent from the terminals T2, T1 to the terminal T3 of the download user.
  • the upload terminals T2, T1 then send in step 154, 155 again performance data to the system operator SB, which then carries out the control in step 156 and calculates a remuneration for the users of the upload terminals T2, T1.
  • steps 157, 158 corresponding remuneration messages are sent to the terminals T2, T1 of the respective users.
  • FIG. 3 gives an overview of the architecture of an embodiment of a content transmission system according to the invention.
  • the network N used is the Internet.
  • terminals T1, T2, T3, Tn different users of the system.
  • These terminals T1, T2, T3, Tn can be conventional PCs, laptops or the like, but also other devices suitable for connection to a corresponding network N and which can be used to download and / or process digital content Such as set-top boxes, MP3 players, mobile devices and PDAs with appropriate equipment, etc.
  • the terminals T1, T2, T3, Tn contain a data memory DS1, DS2, DS3, DSn, on which the downloaded files and / or files are stored for upload.
  • client installed on the terminals T1, T2, T3, Tn for use in the method according to the invention a special software, hereinafter referred to as "client" installed, which is shown here as each function block C1, C2, C3, Cn.
  • FIG. Roughly schematic here is again the terminal T with the Data storage D and a network interface Nl shown, via which the connection to the Internet N takes place.
  • a terminal T of course, also all other components that usually contain such terminals, such.
  • a motherboard As in a normal PC, a motherboard, processors, graphics cards, power, user interface, etc. All these components are not shown for clarity. They are known in the art and therefore need not be further explained here.
  • the client C implemented here in the form of software on the terminal consists of several modules.
  • a first module 1 is a transaction control unit 1, which provides for the coordination of the transactions during the download and / or upload of files according to the inventive method.
  • the client C has a content database module 2, in which information about the files available for upload are stored. Before being included in this content database, each file is checked for interchangeability within the content delivery system. For this purpose, the client C first calculates the identifier of the file, for example the hash sum, according to the predetermined method. It is then clarified at the content provider, if this hash value already exists. If so, all metadata, including information about the associated exchange rights, are downloaded to the known content database module 2 of the client C for the known hash value. For the files that were already downloaded by the client C itself within the content transfer system after purchase at the same content provider, this test can be omitted, since all tests have already been carried out here.
  • the client C Before being included in this content database, each file is checked for interchangeability within the content delivery system. For this purpose, the client C first calculates the identifier of the file, for example the hash sum, according to the predetermined method. It is then clarified at the content provider, if this hash value already exists. If so, all metadata,
  • the respective file segment from which fragments are to be transmitted is checked in principle again before uploading fragments to other users by comparison with the associated hash sum of the segment. This will help prevent any damage Files are transmitted. If an error occurs, the file in question is removed from the list of uploaded files in the content database.
  • Another component is a browser 3, with which the user can contact the websites of the Internet shop SR of the content provider RS, so that the user in the Internet shop SR content can choose and purchase.
  • this client C belonging to the browser 3, another installed on the terminal T of the user, external browser can be used. Additional functions that may be required can also be installed in this external browser when client C is installed, if this is permitted by the manufacturer of the external browser. The internal browser of client C is then deactivated.
  • a further component of the client C in the exemplary embodiment illustrated is a offer information unit 4, hereinafter also referred to as "client shop” 4.
  • client shop 4 makes it possible for the user to make content available via the content provider RS on his own terminal T, for example Reviews or the like about the content available for upload on its terminal T.
  • This client shop 4 can be visited directly by other users using their browser 3.
  • a segment reconstruction unit 5 in which the requested fragments are reassembled to the individual segments and in which the segments are subsequently checked to see whether they have been completely and correctly received.
  • the check is carried out in such a way that after downloading a complete segment, the downloaded segment is compared with the segment hash sum, which is known to the download terminal. If an error occurs, the following actions are performed: First, the segment is moved to a defective segment repository. It also stores which upload terminal contributed which data to the segment. Subsequently, the segment is downloaded once more from a trusted central server, for example from a Seedpeer SP. It then compares the segment downloaded from the Seedpeer SP with the segment hash sum. If this segment also does not match the segment hash sum, the error may be on the part of the system operator SB. Then there is a cancellation of the download and an automatic message to a control center of the system operator SB. Otherwise, the correct segment is compared to the corrupt file segment. Based on the comparison, the upload terminal (s) that provided the erroneous data can be determined. The faulty sending upload terminals are reported to the central office of the system operator.
  • the fully reconstructed and validated segments are then communicated to a file reconstructor 6 which performs an overall check by comparing the file to the total hash sum of the file. In this case, no error should occur in itself, since possible errors in the examination of the segments should already have been determined. If an error nevertheless occurs, the entire downloaded file is deleted and an error message is sent to the control center of the system operator SB.
  • parts of the functionality or even the entire functionality may be provided by appropriate hardware in the terminals.
  • the client or at least some of the above components of the client are then installed in the form of hardware in a terminal which e.g. B. was specifically designed for the content transfer system according to the invention.
  • a terminal which e.g. B. was specifically designed for the content transfer system according to the invention.
  • various components are required within the content transmission system, as shown in FIG.
  • One component is a so-called indexing device Sl.
  • This indexing device Sl has a memory DSI, in which it is deposited which terminals T1, T2, T3, Tn, SP1, SP2 are currently available for downloading certain contents.
  • this indexing device S1 has a selection unit SU for selecting certain of these terminals T1, T2, T3, Tn, SP1, SP2 as candidate upload terminals from the available upload terminals when a request for a particular content by a user he follows.
  • TC transaction control device
  • MD metadata database
  • the system also includes a user authentication service SUA 1 which serves to authenticate the user when logging on to the system.
  • SUA 1 serves to authenticate the user when logging on to the system.
  • a license server SL is needed, which is responsible for managing the keys for decrypting the files offered, d. H. which handles the complete Digital Rights Management.
  • All these functional units of the system operator SB are usually installed on various servers connected to the Internet N. Basically, it is also possible to realize all functional units in a server. Similarly, the license server SL can be part of this general server, provided that the system operator SB itself takes over the Digital Rights Management.
  • the content provider RS is usually connected to its own server on the Internet N and operates there its content provider Internet shop SR. Basically, it is also possible that the system operator SB on a server or server area this Tasks acting on behalf of the actual content provider RS assumes, and this is not recognizable for the respective users.
  • two base memory terminals (seed peers) SP1, SP2 are also connected to the Internet N, on which content is made available for download by the users.
  • These seed peers SP1, SP2 can be assigned to the system operator SB or the content provider RS. Basically, it is also possible that these functions of the Seedpeers are integrated into a large powerful server of the system operator SB. However, the seed peers can also be operated by independent third parties.
  • Figure 5 is divided because of their length on the part figures 5a, 5b and 5c.
  • a login signal is sent from the terminal T1 of this upload user to the indexing device S1 of the system operator SB in step 501. This is done by transmitting a unique user ID, which is basically assigned to each user on initial registration with the system and which is unique to a particular user within the entire system.
  • step 502 The successful login is then acknowledged in step 502 by the central indexing device Sl. Subsequently, in step 503, the potential upload terminal T1 sends information about the files available for upload, again stating the unique user ID and stating the unique identifiers of the individual files, for example the hash values.
  • step 504 When registering a second user U, who wants to download a content, he first enters via the user interface at his terminal T2 in step 504 start and login commands. The terminal T2 then sends in step 505 a configuration request to the server or the installed Internet shop SR of the content provider RS, which then sends in step 506 a configuration response with which the client C is configured in the terminal T2 for the following session.
  • the terminal T2 automatically sends a login request with a user name and a password in step 507, which identifies the user U to the content provider RS.
  • This request is to a user authentication service SUA which is owned and controlled by the system operator SB.
  • This user authentication service SUA contains an instance, which in turn is under the control of the content provider RS.
  • a "ticket" is generated, with which the user U or his terminal T2 authenticates himself in the subsequent course of the procedure with respect to the further functional units.
  • This instance of the user authentication service SUA is constructed in such a way that the System operator SB has no access to the username and password of the user U, but that the username and the password remain a common secret of the user U and the content provider RS. The ticket is valid for the entire session.
  • the terminal T2 (optional) in steps 509 to 511 is also registered as a potential upload terminal at the central indexing device Sl.
  • the procedure is identical to the method described above in steps 501 to 503, in which the terminal T1 provides itself as a potential uploader. That is to say, a login is also carried out here at the central indexing service S1 (step 509) and upon receipt of a login confirmation (step 510), send a bid signal to the central indexing service Sl (step 511).
  • the terminal T2 With the aid of the ticket received from the user authentication service SUA, the terminal T2 then authenticates once again to the Internet shop SR (also referred to as the "reseller shop") of the content provider RS in step 512.
  • the ticket is processed by the content provider RS in steps 513, 514 Transmission to the user authentication server SUA and corresponding feedback from there checked.
  • step 515 the user can search for an offer in the reseller shop SR and for this purpose instructs his terminal T2 correspondingly, which transmits corresponding signals to the reseller shop SR in step 516.
  • metadata can be queried in steps 517, 518 from a metadata database MD of the system operator SB.
  • the metadata is additional information about a content, such as: As artists, composers, recording year, performers, but also licensing conditions, prices, etc. These data are stored in one of the database MD memory DSM (see Figure 3). These data are then forwarded in step 519 in the form of an offer to the terminal T2 of the user U and output in step 520 to the user U.
  • Steps 515 through 520 are intended to be a standard browsing within the content provider's Internet shop, i. H. The user can start various search queries as often as he likes, view content and receive the offer and other metadata.
  • step 521 the user U decides on a certain content, whereupon the terminal T2 sends a corresponding signal to the reseller shop SR in step 522.
  • the selected content is then assigned to a shopping cart in step 523.
  • the user U can then continue browsing within the Internet shop of content provider RS and select other content. Accordingly, steps 515 to 523 are repeated as often as desired. It is also possible to delete already selected content from the shopping cart.
  • the user U may decide to purchase the shopping cart in step 524. He enters this accordingly at his terminal T2, which then sends in step 525 a buy signal to the Resellershop SR.
  • the reseller shop SR then causes the creation of a voucher and a download ID and all other data required by the user to download and then use the content in the system in step 526 using the ticket transmitted by the user or his terminal T2.
  • the exact procedure is such that first in step 526 the reseller shop SR sends a purchase request with the ticket of the user U and the information about the shopping cart to a purchase transaction service TS, which is part of the transaction control device TC of the system operator SB.
  • This purchase transaction service TS first sends the ticket to the user authentication service SUA for verification.
  • the purchase transaction service TS Upon receipt of the answer in step 528, the purchase transaction service TS then sends a request to the license server SL in step 529 to create a voucher. After the user has been returned to the purchase transaction service TS in step 530, the purchase transaction service TS transmits a corresponding purchase response which contains the voucher and the download IDs required for downloading and the identifiers of the files or the individual segments of the files to be downloaded and, if necessary. contains more signatures to verify the transaction at the various instances, to the resellershop SR. This then forwards the answer to the terminal T2 of the user U in step 532.
  • the terminal T2 then sends in step 533 automatically specifying the voucher a request to the license server SL to transmit a license key.
  • the license server SL then generates a key corresponding to the license purchased by the user and sends it in step 535 to the terminal T2 of the user U.
  • step 536 the terminal T2 then requests from the central indexing service the list of possible uploaders stating the identifier of the file.
  • the central indexing device S1 then creates this list of candidate upload terminals in step 537. Configurable parameters can be taken into account by selecting the uploaders.
  • Each potential uploader receives an upload priority when logging in. This priority is calculated according to the specifications of the content provider RS.
  • the result of this selection is then transmitted to the terminal T2 in step 538, wherein the priorities of the candidate upload terminals are also transmitted. Based on these priorities, the respective candidate upload terminals are then selected by the terminal T2. That is, the terminal T2 first sends to the candidate upload terminal with the highest priority a request signal to request the download of the first fragment. At the second highest priority terminal, the second fragment is then requested until the maximum total number of connections is reached. Subsequently, the further fragments are queried in turn at the already used upload terminals. If several candidate upload terminals with the same priority exist, the download terminal selects them randomly. In the simplified embodiment shown in FIG. 5, the terminal T2 of the user U only requests fragments from the terminal T1 of an upload user and from a central seed spear SP.
  • a download request is initially made in step 539 to the up-ado terminal T1, the identifier of the desired file and the download ID being transmitted, which the terminal T2 has received on purchase.
  • the upload terminal T1 first verifies by the download ID and also checks if the file is actually available on the relevant terminal T1.
  • a response is then sent to the requesting terminal T2.
  • this terminal sends a concrete fragment request to the upload terminal T1, thereby passing the identifier of a segment PO, P1, P2, P3, P4 of the file D and an offset value OF and the length IF for the respective desired fragment F.
  • the offset value OF specifies exactly the starting point of a fragment F within a segment P1 of the file D.
  • the length IF of the fragment is also specified, so that the offset length O F and the length I F of the fragment are uniquely determined by the unique identifier of the segment P1.
  • the length of the fragment and the offset value OF can independently determine the terminal T2 or the transaction control unit 1 of the client C installed in the terminal T2 (see FIG. 3), depending on which fragment F it currently requires.
  • step 543 the requested fragment F is transmitted from the upload terminal T1 to the download terminal T2 of the user U.
  • the upload terminal T1 sends in step 544 a report to a transaction report receiver TR, which is also part of the transaction control device TC.
  • a transaction report receiver TR which is also part of the transaction control device TC.
  • steps 545-548 a download of fragments from a seed spear SP is presented. Since it is certain that the terminal SP contains the desired files, it can also be indicated at the same time as the download request in step 545 which fragments the terminal T2 wishes to receive. Then, after verification in step 546, the requested fragments may be downloaded to terminal T2 in subsequent step 547. Finally, in step 548, a report is also transmitted to the transaction report receiver TR.
  • Each request of the download terminal T2 to an upload terminal T1, SP may request a plurality of fragments in the form of a request block. This request signal block is then processed successively by the upload terminal T1, SP. This method significantly reduces the overhead of control data during a download.
  • the terminal T2 also several requests in succession at the individual uploaders, d. H. at the upload terminal T1 and at the base memory terminal SP, so as to obtain all the fragments of the file.
  • steps 542 and 543 and steps 545 and 547, respectively are repeated as often as desired.
  • the terminal T2 After the terminal T2 has received all the fragments of the file, it sends a download report to the transaction report receiver TR in step 549. By comparing the data received from the various terminals, it is possible to check whether the transaction has been successfully completed. In addition, the remuneration for the uploader can be calculated, as already explained in the context of Figure 1 above. The reimbursement itself can then take place at a later date.
  • the user U can then log off in step 550 by a corresponding command at his terminal T2 at Resellershop ST. This then sends in step 551 a logoff signal to the indexing device Sl, so that it is known that the terminal T2 is no longer available for uploads to other users, and in step 552 a another logoff signal to the user authentication service SUA, which then invalidates the ticket.
  • a problem with such a peer-to-peer network is that a plurality of end-user terminals are blocked by firewalls and therefore can not easily be built from outside a bidirectional, standing connection, such as a TCP connection. Such a connection must always from the inside, d. H. from the terminal secured by the firewall.
  • a firewall is installed on one of the two terminals between which transmission takes place, the connection between the two terminals is established by means of a third terminal on which no firewall is installed.
  • FIG. 6 shows schematically a possible procedure for logging on a terminal TL (hereinafter also referred to as "leaf" TL) secured by a firewall as a potential upload terminal at the central indexing device S1 when the user U 'passes through his terminal TL If a corresponding command causes a login in step 601, the terminal TL first sends a login signal to the central indexing device S1 in step 602. This then sends back a firewall test signal in step 603.
  • a terminal TL hereinafter also referred to as "leaf" TL
  • the terminal TL first sends a login signal to the central indexing device S1 in step 602. This then sends back a firewall test signal in step 603.
  • a time loop 604 is checked If this is not the case, it is assumed that the terminal TL is secured by a firewall, that is, a "leaf.”
  • the central indexer then returns a login response signal with which the terminal TL ready to upload an address of a responsible for the relevant terminal TL, not by a Fire wall secured further terminals TH (hereinafter also called “hub" TH) is transmitted.
  • a TCP connection is established between the leaf TL and the responsible hub TH.
  • the hub TH then sends in step 607 a status message to the central indexer Sl and an acknowledgment to the leaf TL.
  • the leaf TL sends an offer signal with its user ID and the files available for upload to the central indexing device S1.
  • the further connection can then always take place via the responsible hub TH.
  • FIG. 7 illustrates, as a further example, the case of downloading a fragment to a download terminal TD from such a firewall-secured upload leaf TL.
  • the download terminal TD can then first send a "push request signal" to the hub terminal TH in step 701, which sends a corresponding signal via the previously established connection to the upload leaf TL in step 702.
  • the download terminal TD can then log in Step 703, the connection to the download terminal TD open, so that in step 704, the download terminal TD in the usual way can send a request signal to download a fragment F to the upload leaf TL and then receives the desired fragment in step 705.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un procédé pour transmettre un contenu numérique d'un fournisseur de contenu (SR) vers les utilisateurs d'un système de transmission de contenu dans un réseau de communications informatique (N). Selon ledit procédé, un fichier (D) contenant un contenu spécifique, nécessaire à un utilisateur de téléchargement, est transmis au moins partiellement à un terminal (T1, T2) d'un utilisateur de téléchargement vers l'amont par l'intermédiaire du réseau de communications (N) vers un terminal (T2, T3) de l'utilisateur de téléchargement. Des fragments (F) du fichier (D) sont ensuite transmis par les terminaux (T1, T2) d'utilisateurs de téléchargement différents vers le terminal (T2, T3) de l'utilisateur de téléchargement.
EP05751848A 2005-03-02 2005-06-11 Procede pour transmettre un contenu numerique d'un fournisseur de contenu vers les utilisateurs d'un systeme de transmission de contenu en ligne Withdrawn EP1854261A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102005010131A DE102005010131A1 (de) 2005-03-02 2005-03-02 Verfahren zur Übertragung von digitalen Inhalten eines Inhalteanbieters an die Nutzer eines Online- Inhalteübertragungssystems
PCT/EP2005/006274 WO2006092158A1 (fr) 2005-03-02 2005-06-11 Procede pour transmettre un contenu numerique d'un fournisseur de contenu vers les utilisateurs d'un systeme de transmission de contenu en ligne

Publications (1)

Publication Number Publication Date
EP1854261A1 true EP1854261A1 (fr) 2007-11-14

Family

ID=34970488

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05751848A Withdrawn EP1854261A1 (fr) 2005-03-02 2005-06-11 Procede pour transmettre un contenu numerique d'un fournisseur de contenu vers les utilisateurs d'un systeme de transmission de contenu en ligne

Country Status (6)

Country Link
US (1) US20060200736A1 (fr)
EP (1) EP1854261A1 (fr)
BR (1) BRPI0520040A2 (fr)
DE (1) DE102005010131A1 (fr)
RU (1) RU2007136164A (fr)
WO (1) WO2006092158A1 (fr)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070157266A1 (en) * 2005-12-23 2007-07-05 United Video Properties, Inc. Interactive media guidance system having multiple devices
US7710958B2 (en) * 2006-01-20 2010-05-04 Iona Technologies Limited Method for recoverable message exchange independent of network protocols
WO2007127401A2 (fr) * 2006-04-26 2007-11-08 Bittorrent, Inc. Téléchargement pair à pair et gestion de politique d'essaimage
US7937362B1 (en) * 2006-04-28 2011-05-03 Roxbeam Media Network Corporation System and method for facilitating a credit system in a peer-to-peer content delivery network
DK1858226T3 (da) * 2006-05-19 2011-01-24 Microsoft Corp Indholdsstyring i peer-to-peer indholdsdistribueringsclouds
US9317506B2 (en) * 2006-09-22 2016-04-19 Microsoft Technology Licensing, Llc Accelerated data transfer using common prior data segments
US8131673B2 (en) * 2006-12-05 2012-03-06 International Business Machines Corporation Background file sharing in a segmented peer-to-peer file sharing network
US8775562B2 (en) * 2006-12-05 2014-07-08 International Business Machines Corporation Mapping file fragments to file information and tagging in a segmented file sharing system
US9794310B2 (en) * 2007-01-11 2017-10-17 Samsung Electronics Co., Ltd. Meta data information providing server, client apparatus, method of providing meta data information, and method of providing content
US8402556B2 (en) 2007-01-17 2013-03-19 Intertrust Technologies Corporation Methods, systems, and apparatus for fragmented file sharing
DE102007013014A1 (de) 2007-03-14 2008-09-18 Deutsche Telekom Ag Verfahren zur Online-Distribution von DRM-Nutzinhalten
US8280958B2 (en) * 2009-07-13 2012-10-02 International Business Machines Corporation List passing in a background file sharing network
US8204791B2 (en) * 2009-07-13 2012-06-19 International Business Machines Corporation File fragment pricing in a segmented file sharing network
JP2011097421A (ja) * 2009-10-30 2011-05-12 Panasonic Corp 通信端末装置及びコンテンツデータ受信方法
EP2447843B1 (fr) * 2010-10-06 2013-07-03 Siemens Aktiengesellschaft Procédé de vérification d'un programme d'application d'une commande par programme enregistré protégée contre les erreurs et commande par programme enregistré destinée à l'exécution du procédé
WO2012170508A1 (fr) 2011-06-07 2012-12-13 Interdigital Patent Holdings, Inc. Amélioration d'une opération poste à poste (p2p) par intégration avec des réseaux de diffusion de contenu (cdn)
US8719345B2 (en) * 2012-05-11 2014-05-06 Oracle International Corporation Database replication using collaborative data transfers
US8484347B1 (en) * 2012-06-19 2013-07-09 Kaspersky Lab Zao System and method for malware detection in peer-to-peer computer networks
EP2704053B1 (fr) * 2012-08-27 2016-09-21 Giesecke & Devrient GmbH Procédé et système de mise à jour d'un micrologiciel d'un module de sécurité
US9749663B1 (en) * 2014-11-23 2017-08-29 Silicondust Usa Inc. Distributed upload of television content
DE102018103077A1 (de) * 2018-02-12 2019-08-14 Rauner David Verfahren, Prozessor, nichtflüchtiger Speicher und Recheneinheit

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6219652B1 (en) * 1998-06-01 2001-04-17 Novell, Inc. Network license authentication
US7272645B2 (en) * 2001-05-25 2007-09-18 Sbc Technology Resources, Inc. Method of improving the reliability of peer-to-peer network downloads
KR20010088742A (ko) * 2001-08-28 2001-09-28 문의선 분산처리 및 피어 대 피어 통신을 이용한 네트워크 상의정보전송 병렬화 방법
KR20040013726A (ko) * 2002-08-08 2004-02-14 케이티하이텔 주식회사 온라인 컨텐츠 분배방법 및 장치
GB0303192D0 (en) * 2003-02-12 2003-03-19 Saviso Group Ltd Methods and apparatus for traffic management in peer-to-peer networks
GB0315886D0 (en) * 2003-07-07 2003-08-13 Way Benjamin B P Anti-piracy system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2006092158A1 *

Also Published As

Publication number Publication date
BRPI0520040A2 (pt) 2009-04-14
RU2007136164A (ru) 2009-04-20
DE102005010131A1 (de) 2006-09-07
US20060200736A1 (en) 2006-09-07
WO2006092158A1 (fr) 2006-09-08

Similar Documents

Publication Publication Date Title
EP1854261A1 (fr) Procede pour transmettre un contenu numerique d'un fournisseur de contenu vers les utilisateurs d'un systeme de transmission de contenu en ligne
DE69535166T2 (de) System zur Steuerung der Verteilung und Benutzung von Digitalwerken
DE60214632T2 (de) Multidomäne Berechtigung und Authentifizierung
DE602004011282T2 (de) Versenden einer Herausgeber-Benutzungslizenz off-line in einem digitalen Rechtesystem
DE60212920T2 (de) Verfahren und system zur verwaltung von digitalen abonnementrechten
DE60214836T2 (de) Verfahren und netzwerk zum abliefern von streaming-daten
DE69728182T2 (de) Verfahren und gerät zum entfernten netzwerkzugriffseintrag und netzwerkzugriffsbericht
DE69535248T3 (de) System und Verfahren zur Steuerung der Verteilung und Benutzung von Digitalwerken, das eine Nutzungsrechtsgrammatik verwendet
DE69533847T2 (de) System zur Steuerung der Verteilung und Benutzung von zusammengesetzten Digitalwerken
DE19960978B4 (de) Verfahren zum Steuern des Zugriffs auf in einem Datenarchivsystem gespeicherte elektronische Datendateien
DE60121831T2 (de) System und verfahren zum steuern des zugriffs auf digitalen inhalt einschliesslich streaming-medien
DE60036713T2 (de) System und verfahren für gesicherte netzwerkstransaktionen
WO2004015952A2 (fr) Dispositif de repartition de documents electroniques de maniere protegee contre le piratage
DE112011103830T5 (de) System und Verfahren für den Handel mit nicht genutzten digitalen Rechten
DE102006027030A1 (de) Vorrichtung und Verfahren zum geschützten Verteilen elektronischer Dokumente
DE112016003268T5 (de) Systeme, Verfahren und Medien für Mediensitzungs-Parallelitätsmanagement mit wiederkehrenden Lizenzerneuerungen
EP1971106A2 (fr) Procédé de distribution en ligne de contenus DRM
DE102011077513A1 (de) Verfahren zur sicheren Verarbeitung von Daten
DE112015002469T5 (de) Architektur und Verfahren für eine gemeinsame Nutzung und/oder eine Verteilung eines Inhalts
EP1224807A1 (fr) Dispositif et procede pour la distribution protegee contre la copie de documents electroniques
US20060167807A1 (en) Dispute resolution in an open copyright database
US20050108361A1 (en) Method and system for content delivery
WO2019180152A1 (fr) Procédé automatisé de protection de données électroniques dans le but du traitement des données par une tierce partie avec prise en compte d'une rémunération transparente et ininterruptible
DE102007027019A1 (de) Vorrichtung und Verfahren zur clientseitigen Freigabe elektronischer Dokumente
EP4430468B1 (fr) Gestion flexible de ressources pour de multiples utilisateurs

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070906

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20130103