WO2003005654A1 - Substituting url for attachment in forwarding electronic content - Google Patents

Substituting url for attachment in forwarding electronic content Download PDF

Info

Publication number
WO2003005654A1
WO2003005654A1 PCT/EP2001/008906 EP0108906W WO03005654A1 WO 2003005654 A1 WO2003005654 A1 WO 2003005654A1 EP 0108906 W EP0108906 W EP 0108906W WO 03005654 A1 WO03005654 A1 WO 03005654A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
attachment
file
source
user
Prior art date
Application number
PCT/EP2001/008906
Other languages
French (fr)
Inventor
Peter Kaars
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to PCT/EP2001/008906 priority Critical patent/WO2003005654A1/en
Priority to JP2003511488A priority patent/JP2005525605A/en
Priority to EP01971842A priority patent/EP1415446A1/en
Publication of WO2003005654A1 publication Critical patent/WO2003005654A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/08Annexed information, e.g. attachments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/063Content adaptation, e.g. replacement of unsuitable content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes

Definitions

  • the invention relates to sending or distributing electronic content over a data network, e.g., the Internet.
  • the invention relates in particular to e-mail communication.
  • viral distribution is meant a mechanism wherein the content is propagating and spreading into a community of end-users, much in the same way as a virus.
  • the idea is that there is no explicit distribution channel.
  • the content is passed on from user to user, e.g., content being distributed by youngsters sending e-mails.
  • Napster is another example wherein a server provides a table of contents so that users can pick-up copies from other users' PC's.
  • One form of this mechanism is that users find a piece of content somewhere on the Web and send it by e-mail to a friend.
  • the attachment contains a file of a popular artist or hit movie.
  • the e-mail's attachment is reviewed, e.g., by the mail server or a dedicated email program on the sender's PC, before it is being sent to the addressee.
  • the purpose of the review is to determine whether or not the attachment is a well-known piece of content that is available from many sources, e.g., from a server much closer to the target user (addressee). If so, the attachment is replaced by a much smaller pointer.
  • the server of the target user recognizes the pointer and attaches a local copy of the relevant media file before delivering it to the target user.
  • the attachment is replaced automatically by the pointer altogether, and the recipient is to retrieve the file using this pointer.
  • a further embodiment of the invention uses verifying, either on the sending server or receiving server, whether the source user is authorized to distribute the relevant media file. If not, the file can be replaced by a message to the target user, or the e-mail can bounce back to the source user with a warning message, or the source user can be offered the option to pay for the option to distribute, or the target user can be offered the option to pay.
  • An aspect of the invention relates to a method of controlling communication of content information from a user to a sender as mentioned above, wherein the communication is conditionally being carried out depending on the sender being authorized to communicate the content information, and/or depending on the receiver being authorized to receive the content information.
  • the identification process can be used to verify if the sender and/or receiver are authorized to send and/or receive the content. Restrictions to the distribution of content may apply in view of, e.g., copyright protection or content ratings. As to ratings, some content is considered unsuitable for minors.
  • IM Instant Messaging
  • a user who has installed an IM program is set up for a communications service that enables to create a private chat room with another individual.
  • a chat room is a channel that creates a peer-to- peer communication data path, e.g., for text messaging or (PC) video conferencing.
  • the instant messaging system alerts the user whenever another individual on the user's private chat list is online. The user can then initiate a chat session with that particular individual.
  • Streaming files in an IM (i.e., real time) context is rather undesirable as the streaming file makes a great demand on the communication bandwidth. Rather than streaming the file, it is more convenient to forward or have forwarded the pointer to the file that the receiver can use to download or stream it from another source.
  • Fig.l is a flow diagram of operations in a method of the invention
  • Fig.2 is a block diagram of a system in the invention.
  • Fig.l is a flow diagram with operations in a method of the invention.
  • the user prepares an e-mail and attaches a file to it.
  • the file comprises, e.g., an MP3 clip or another electronic document.
  • the email is sent to the addressee and gets to the email server first.
  • the server analyses the attachment.
  • the file extension determines the type of file (e.g., an extension ".mp3" indicates an MP3 file; an extension ".mpg” indicates an MPEG file; an extension ".avi” indicates an AVI file; etc.).
  • such a file has a header describing the content.
  • the user may copy the file from the Web and rename it for his/her own docketing purposes.
  • the server analyses this header and checks an index, either created on the fly or in advance, if the file is available from another source on the Web.
  • the server checks the file for an embedded watermark or other unique identifier, or uses another process to identify the file's content (e.g., waveform matching, fingerprinting) in order to find a listed copy. If the file is available from another source, the email body gets sent to the addressee in step 110 with a URL or another pointer substituting the file.
  • the URL or other pointer identifies the source on the Web for the same file that the sender had attached.
  • watermarking and fingerprinting also referred to as “hashing"
  • hashing these are well known technologies for authenticating audio or video content.
  • a watermark is a signal or pattern embedded in the audio or video content.
  • a watermark is difficult to remove, if possible at all.
  • a watermark is conserved under common audio and video operations, such as D/A and A/D conversion, filtering or compression.
  • Watermarks are generally detectable only by appropriate software. Watermarks enable to identify the content, its origin, the transmission path, its author, owner, the usage rights, and authorized users of the watermarked content.
  • a fingerprint is computed using a hash algorithm applied to the digital content.
  • the server's index gets updated with the information about the file analyzed, preferably in a background process. For example, the server may temporarily hold the file in a cache if the server was not able to find a source on the Web and it updates the index accordingly. Alternatively, if the index did not have an existing pointer to the appropriate resource on the Web and the server finds one, the latter is added to the server's index.
  • substitution of the pointer for the file may be an automatic process.
  • the sender may indicate to the server that he/she would like to have the server substitute a pointer for the attachment if possible, so as to save bandwidth.
  • a service provider may provide a discount of the service cost charged to this particular sender if the option of substitution is selected.
  • the receiver or addressee may indicate to his/her service provider that a pointer is preferred over the content as attachment, if possible, so as to reduce bandwidth and storage space.
  • An aspect of the invention could also be embodied by software residing at the end-user's PC.
  • the software cooperates with the local email program.
  • the software Upon detecting an attachment to an email, the software makes an attempt to determine if the content information of the attachment is publicly available on the Web, and if so, to locate a URL or set of URLs.
  • the software instructs via a browser a search engine to determine a location of the content information and return a list of URLs.
  • the attachment is detached from the email and one or more URLs are substituted before the email leaves the user's PC.
  • Fig. 2 is a block diagram of a system 200 in the invention illustrating this aspect.
  • System 200 comprises a PC 202 of an e-mail subscriber.
  • PC 202 has an e-mail application 204 that enables the user to send an e-mail via a data network 206 and an e-mail server 208 to an addressee 210.
  • PC 202 further comprises substitution software 212 and a browser 214.
  • Substitution software 212 analyzes e-mails created by the user of PC 202 to determine if electronic documents are attached to the e-mail to be sent. If an attachment is found and identified, software 212 instructs browser 214 to contact a search engine 216 to find out if the same electronic document is available from a source on data network 206. Assume that search engine 216 has available an index that lists a source 218 as having an exact copy of the electronic document that the user has attached to the e-mail body.
  • Browser 214 gets returned from search engine 216 a pointer (e.g., a URL) of source 218, and notifies software 212.
  • Software 212 then strips attachment from the e-mail, or otherwise cuts the bonds between the e-mail and the attachment, and substitutes the pointer. Then the e-mail is ready to be sent to addressee 210.
  • addressee opens the e-mail and retrieves the copy of the document via the pointer embedded.
  • a pointer e.g., a URL
  • U.S. ser. no. 09/642,713 (attorney docket US 000213) filed 8/21/00 for Leila Kaghazian for SELECTIVE SENDING OF PORTIONS OF ELECTRONIC CONTENT.
  • This document relates to enabling a user of a handheld communication device to select in a foreground process portions of an electronic document. In a background process a new document is prepared that comprises the selected portions. The user selects the address for forwarding the new document, and the new document gets sent in a background process.
  • U.S. serial no. 09/374,694 (attorney docket PHA 23,737) filed 8/16/99 for Chanda Dharap for SEMANTIC CACHING.
  • This document relates to caching resources based on the semantic type of the resource.
  • the cache management strategy is customized for each semantic type, using different caching policies for different semantic types.
  • Semantic types that can be expected to contain dynamic information such as news and weather, employ an active caching policy wherein the resource in the cache memory is chosen for replacement based on the duration of time that the resource has been in cache memory.
  • semantic types that can be expected to contain static resources such as encyclopedic information
  • employ a more conservative caching strategy such as LRU (Last Recently Used) and LFU (Least Frequently Used) that is substantially independent of the time duration that the resource remains in cache memory.
  • semantic types such as communicated e-mail messages, newsgroup messages, and so on, may employ a caching policy that is a combination of multiple strategies, wherein the resource progresses from an active cache with a dynamic caching policy to a more static caches with increasing less dynamic caching policies.
  • the relationship between semantic content type and caching policy to be associated with the type can be determined in advance, or may be determined directly by the user, or could be based, at least partly, on user-history and profiling of user- interaction with the resources.
  • U.S. serial no. 09/844,570 (attorney docket US 018052) filed 4/26/01 for Eugene Shteyn for DISTRIBUTED STORAGE ON A P2P NETWORK ARCHITECTURE.
  • This document relates to a network architecture for, e.g., a cable operator to enable a broadband service, such as a video-on demand service, in a peer-to-peer network environment.
  • the network uses high-speed reliable data network connections between service provider hubs or proxies, e.g., cable operators local stations.
  • the end-users form a peer-to-peer network community around each hub.
  • the peer-to-peer network provides distributed storage for content downloaded from the hub that is only a few hops away.
  • the content is stored locally using commumty resources and is made available to the community via a Virtual Private Web service.
  • This service enables content look-up, content distribution, connection set-up, copyright protection, and other facilities.
  • Current peer-to-peer (P2P) solutions provide low or undefined (video) quality of content, cannot guarantee a timely content delivery, and do not have proper copyright protection in place for the content.
  • An aspect of the invention provides a scalable service, e.g., for VOD, that overcomes these drawbacks.
  • the invention also enables a business model where the VOD service can be provided inexpensively and with high quality. Low cost of the service may further deter content piracy, which is usually associated with peer-to-peer networking.

Abstract

A service on a data network verifies if an attachment to a sender's e-mail has a copy of an electronic document available from a source on the data network If the document is available from this source, the service strips the attachment from the e-mail body and replaces it with a URL to save bandwidth and storage space.

Description

Substituting URL for attachment in forwarding electronic content
The invention relates to sending or distributing electronic content over a data network, e.g., the Internet. The invention relates in particular to e-mail communication.
Trends indicate that so-called viral distribution is going to play an important role in the delivery of content over the Internet. With "viral distribution" is meant a mechanism wherein the content is propagating and spreading into a community of end-users, much in the same way as a virus. The idea is that there is no explicit distribution channel. The content is passed on from user to user, e.g., content being distributed by youngsters sending e-mails. Napster is another example wherein a server provides a table of contents so that users can pick-up copies from other users' PC's. One form of this mechanism is that users find a piece of content somewhere on the Web and send it by e-mail to a friend. In the case of music files or, especially, video files attached to e-mails the size of the message and hence the bandwidth usage can be significant. Typically, the attachment contains a file of a popular artist or hit movie.
The inventor proposes to reduce bandwidth usage in this form of viral distribution. To this end, the e-mail's attachment is reviewed, e.g., by the mail server or a dedicated email program on the sender's PC, before it is being sent to the addressee. The purpose of the review is to determine whether or not the attachment is a well-known piece of content that is available from many sources, e.g., from a server much closer to the target user (addressee). If so, the attachment is replaced by a much smaller pointer. The server of the target user recognizes the pointer and attaches a local copy of the relevant media file before delivering it to the target user. Alternatively, the attachment is replaced automatically by the pointer altogether, and the recipient is to retrieve the file using this pointer. A further embodiment of the invention uses verifying, either on the sending server or receiving server, whether the source user is authorized to distribute the relevant media file. If not, the file can be replaced by a message to the target user, or the e-mail can bounce back to the source user with a warning message, or the source user can be offered the option to pay for the option to distribute, or the target user can be offered the option to pay.
An aspect of the invention relates to a method of controlling communication of content information from a user to a sender as mentioned above, wherein the communication is conditionally being carried out depending on the sender being authorized to communicate the content information, and/or depending on the receiver being authorized to receive the content information. As the content information has to be identified anyway to enable a search on the availability of the content from another source, the identification process can be used to verify if the sender and/or receiver are authorized to send and/or receive the content. Restrictions to the distribution of content may apply in view of, e.g., copyright protection or content ratings. As to ratings, some content is considered unsuitable for minors. If the receiver has an email account he/she may have a profile, e.g., created at the time of registering, that indicates some types of content are not to be forwarded to this person. Another aspect of the invention relates to Instant Messaging (IM). A user who has installed an IM program is set up for a communications service that enables to create a private chat room with another individual. A chat room is a channel that creates a peer-to- peer communication data path, e.g., for text messaging or (PC) video conferencing. Typically, the instant messaging system alerts the user whenever another individual on the user's private chat list is online. The user can then initiate a chat session with that particular individual. Streaming files in an IM (i.e., real time) context is rather undesirable as the streaming file makes a great demand on the communication bandwidth. Rather than streaming the file, it is more convenient to forward or have forwarded the pointer to the file that the receiver can use to download or stream it from another source.
The invention is explained below in further detail, by way of example and with reference to the accompanying drawing, wherein
Fig.l is a flow diagram of operations in a method of the invention; and Fig.2 is a block diagram of a system in the invention.
Fig.l is a flow diagram with operations in a method of the invention. In step 102, the user prepares an e-mail and attaches a file to it. The file comprises, e.g., an MP3 clip or another electronic document. In step 104, the email is sent to the addressee and gets to the email server first. In step 106, the server analyses the attachment. For example, the file extension determines the type of file (e.g., an extension ".mp3" indicates an MP3 file; an extension ".mpg" indicates an MPEG file; an extension ".avi" indicates an AVI file; etc.). Typically, such a file has a header describing the content. Note that the user may copy the file from the Web and rename it for his/her own docketing purposes. The server analyses this header and checks an index, either created on the fly or in advance, if the file is available from another source on the Web. Alternatively, the server checks the file for an embedded watermark or other unique identifier, or uses another process to identify the file's content (e.g., waveform matching, fingerprinting) in order to find a listed copy. If the file is available from another source, the email body gets sent to the addressee in step 110 with a URL or another pointer substituting the file. The URL or other pointer identifies the source on the Web for the same file that the sender had attached. If the server cannot locate a source on the Web for the file, the email gets forwarded to the addressee as composed by the sender. As to watermarking and fingerprinting (also referred to as "hashing"), these are well known technologies for authenticating audio or video content. A watermark is a signal or pattern embedded in the audio or video content. A watermark is difficult to remove, if possible at all. A watermark is conserved under common audio and video operations, such as D/A and A/D conversion, filtering or compression. Watermarks are generally detectable only by appropriate software. Watermarks enable to identify the content, its origin, the transmission path, its author, owner, the usage rights, and authorized users of the watermarked content. Whereas watermarking affects the content itself, fingerprinting leaves the content intact but creates an identifier that is unique for that piece of content. Typically, a fingerprint is computed using a hash algorithm applied to the digital content. Preferably, the server's index gets updated with the information about the file analyzed, preferably in a background process. For example, the server may temporarily hold the file in a cache if the server was not able to find a source on the Web and it updates the index accordingly. Alternatively, if the index did not have an existing pointer to the appropriate resource on the Web and the server finds one, the latter is added to the server's index.
Above substitution of the pointer for the file may be an automatic process. Alternatively, the sender may indicate to the server that he/she would like to have the server substitute a pointer for the attachment if possible, so as to save bandwidth. A service provider may provide a discount of the service cost charged to this particular sender if the option of substitution is selected. Also, the receiver or addressee may indicate to his/her service provider that a pointer is preferred over the content as attachment, if possible, so as to reduce bandwidth and storage space.
An aspect of the invention could also be embodied by software residing at the end-user's PC. The software cooperates with the local email program. Upon detecting an attachment to an email, the software makes an attempt to determine if the content information of the attachment is publicly available on the Web, and if so, to locate a URL or set of URLs. For example, the software instructs via a browser a search engine to determine a location of the content information and return a list of URLs. When found, the attachment is detached from the email and one or more URLs are substituted before the email leaves the user's PC. Fig. 2 is a block diagram of a system 200 in the invention illustrating this aspect. System 200 comprises a PC 202 of an e-mail subscriber. PC 202 has an e-mail application 204 that enables the user to send an e-mail via a data network 206 and an e-mail server 208 to an addressee 210. PC 202 further comprises substitution software 212 and a browser 214. Substitution software 212 analyzes e-mails created by the user of PC 202 to determine if electronic documents are attached to the e-mail to be sent. If an attachment is found and identified, software 212 instructs browser 214 to contact a search engine 216 to find out if the same electronic document is available from a source on data network 206. Assume that search engine 216 has available an index that lists a source 218 as having an exact copy of the electronic document that the user has attached to the e-mail body. Browser 214 gets returned from search engine 216 a pointer (e.g., a URL) of source 218, and notifies software 212. Software 212 then strips attachment from the e-mail, or otherwise cuts the bonds between the e-mail and the attachment, and substitutes the pointer. Then the e-mail is ready to be sent to addressee 210. Upon receipt of the e-mail, addressee opens the e-mail and retrieves the copy of the document via the pointer embedded. Incorporated by reference herein:
U.S. ser. no. 09/642,713 (attorney docket US 000213) filed 8/21/00 for Leila Kaghazian for SELECTIVE SENDING OF PORTIONS OF ELECTRONIC CONTENT. This document relates to enabling a user of a handheld communication device to select in a foreground process portions of an electronic document. In a background process a new document is prepared that comprises the selected portions. The user selects the address for forwarding the new document, and the new document gets sent in a background process. U.S. serial no. 09/374,694 (attorney docket PHA 23,737) filed 8/16/99 for Chanda Dharap for SEMANTIC CACHING. This document relates to caching resources based on the semantic type of the resource. The cache management strategy is customized for each semantic type, using different caching policies for different semantic types. Semantic types that can be expected to contain dynamic information, such as news and weather, employ an active caching policy wherein the resource in the cache memory is chosen for replacement based on the duration of time that the resource has been in cache memory. Conversely, semantic types that can be expected to contain static resources, such as encyclopedic information, employ a more conservative caching strategy, such as LRU (Last Recently Used) and LFU (Least Frequently Used) that is substantially independent of the time duration that the resource remains in cache memory. Additionally, some semantic types, such as communicated e-mail messages, newsgroup messages, and so on, may employ a caching policy that is a combination of multiple strategies, wherein the resource progresses from an active cache with a dynamic caching policy to a more static caches with increasing less dynamic caching policies. The relationship between semantic content type and caching policy to be associated with the type can be determined in advance, or may be determined directly by the user, or could be based, at least partly, on user-history and profiling of user- interaction with the resources.
U.S. serial no. 09/844,570 (attorney docket US 018052) filed 4/26/01 for Eugene Shteyn for DISTRIBUTED STORAGE ON A P2P NETWORK ARCHITECTURE. This document relates to a network architecture for, e.g., a cable operator to enable a broadband service, such as a video-on demand service, in a peer-to-peer network environment. The network uses high-speed reliable data network connections between service provider hubs or proxies, e.g., cable operators local stations. The end-users form a peer-to-peer network community around each hub. The peer-to-peer network provides distributed storage for content downloaded from the hub that is only a few hops away. The content is stored locally using commumty resources and is made available to the community via a Virtual Private Web service. This service enables content look-up, content distribution, connection set-up, copyright protection, and other facilities. Current peer-to-peer (P2P) solutions provide low or undefined (video) quality of content, cannot guarantee a timely content delivery, and do not have proper copyright protection in place for the content. An aspect of the invention provides a scalable service, e.g., for VOD, that overcomes these drawbacks. The invention also enables a business model where the VOD service can be provided inexpensively and with high quality. Low cost of the service may further deter content piracy, which is usually associated with peer-to-peer networking.

Claims

CLAIMS:
1. A method of controlling communication of content information from a sender to a receiver via a data network, the method comprising: verifying if the content information is available from a source other than the sender; and - if the content information is available from the other source, substituting for the content information a pointer to the other source.
2. The method of claim 1 , being carried out on request of at least the sender or the receiver.
3. The method of claim 1 , wherein the verifying comprises identifying the content based on a watermark embedded in the content.
4. The method of claim 1 , wherein the verifying comprises identifying the content based on a fingerprint of the content.
5. The method of claim 1, wherein the communication is conditionally being carried out depending on the sender being authorized to communicate the content information.
6. The method of claim 1 , wherein the communication is conditionally being carried out depending on the receiver being authorized to receive the content information.
7. Software for cooperation with an email application, the software verifying if an attachment to a specific email to be sent is available from the Web.
8. Software for cooperation with an Instant Messaging application, the software verifying if a file to be sent by a user via a data network is available from a source on the data network independent of the user.
PCT/EP2001/008906 2001-07-05 2001-07-25 Substituting url for attachment in forwarding electronic content WO2003005654A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/EP2001/008906 WO2003005654A1 (en) 2001-07-25 2001-07-25 Substituting url for attachment in forwarding electronic content
JP2003511488A JP2005525605A (en) 2001-07-25 2001-07-25 Substitution with attachment URL in electronic content transfer
EP01971842A EP1415446A1 (en) 2001-07-05 2001-07-25 Substituting url for attachment in forwarding electronic content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2001/008906 WO2003005654A1 (en) 2001-07-25 2001-07-25 Substituting url for attachment in forwarding electronic content

Publications (1)

Publication Number Publication Date
WO2003005654A1 true WO2003005654A1 (en) 2003-01-16

Family

ID=8164523

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2001/008906 WO2003005654A1 (en) 2001-07-05 2001-07-25 Substituting url for attachment in forwarding electronic content

Country Status (2)

Country Link
JP (1) JP2005525605A (en)
WO (1) WO2003005654A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7107315B1 (en) * 2000-04-27 2006-09-12 International Business Machines Corporation Method for web-based delivery of use-restricted programs to handle mail attachments
WO2006103801A1 (en) * 2005-03-29 2006-10-05 Brother Kogyo Kabushiki Kaisha Information processing device, information processing method, and information processing program
FR2891681A1 (en) * 2005-10-03 2007-04-06 Zslide Soc Par Actions Simplif Voluminous computer data e.g. digital photo, exchanging method for e.g. pocket computer, involves downloading data simultaneously in digital equipment of recipient user from digital equipments of transmitting and other recipient users
GB2436184A (en) * 2006-03-17 2007-09-19 Empower Interactive Group Ltd Monitoring the distribution of messages
WO2008005010A1 (en) * 2006-06-30 2008-01-10 Pando Networks, Inc. System and method for multi-channel email communication
CN100466636C (en) * 2004-11-10 2009-03-04 株式会社Ntt都科摩 Server, server system, and e-mail delivery method
FR2937819A1 (en) * 2008-10-28 2010-04-30 Nathalie Pavia Electronic message editing method for e.g. Internet, involves adding access hypertext link to information, in signature zone of message stored in station connected to network, where file comprises information relative to message signature
US9154552B2 (en) 2007-09-06 2015-10-06 Microsoft Technology Licensing, Llc Method and apparatus for cooperative file distribution with receiver determined quality of services

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998058332A1 (en) * 1997-06-17 1998-12-23 Telefonaktiebolaget Lm Ericsson Method and apparatus for accessing and retrieving messages
WO2001013656A1 (en) * 1999-08-12 2001-02-22 Telefonaktiebolaget Lm Ericsson (Publ) A system and method for sending multimedia attachments to text messages in radiocommunication systems
US6205432B1 (en) * 1998-06-05 2001-03-20 Creative Internet Concepts, Llc Background advertising system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998058332A1 (en) * 1997-06-17 1998-12-23 Telefonaktiebolaget Lm Ericsson Method and apparatus for accessing and retrieving messages
US6205432B1 (en) * 1998-06-05 2001-03-20 Creative Internet Concepts, Llc Background advertising system
WO2001013656A1 (en) * 1999-08-12 2001-02-22 Telefonaktiebolaget Lm Ericsson (Publ) A system and method for sending multimedia attachments to text messages in radiocommunication systems

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7107315B1 (en) * 2000-04-27 2006-09-12 International Business Machines Corporation Method for web-based delivery of use-restricted programs to handle mail attachments
CN100466636C (en) * 2004-11-10 2009-03-04 株式会社Ntt都科摩 Server, server system, and e-mail delivery method
WO2006103801A1 (en) * 2005-03-29 2006-10-05 Brother Kogyo Kabushiki Kaisha Information processing device, information processing method, and information processing program
FR2891681A1 (en) * 2005-10-03 2007-04-06 Zslide Soc Par Actions Simplif Voluminous computer data e.g. digital photo, exchanging method for e.g. pocket computer, involves downloading data simultaneously in digital equipment of recipient user from digital equipments of transmitting and other recipient users
GB2436184A (en) * 2006-03-17 2007-09-19 Empower Interactive Group Ltd Monitoring the distribution of messages
GB2436184B (en) * 2006-03-17 2011-01-26 Empower Interactive Group Ltd Message forwarding system and method
WO2008005010A1 (en) * 2006-06-30 2008-01-10 Pando Networks, Inc. System and method for multi-channel email communication
US9154552B2 (en) 2007-09-06 2015-10-06 Microsoft Technology Licensing, Llc Method and apparatus for cooperative file distribution with receiver determined quality of services
FR2937819A1 (en) * 2008-10-28 2010-04-30 Nathalie Pavia Electronic message editing method for e.g. Internet, involves adding access hypertext link to information, in signature zone of message stored in station connected to network, where file comprises information relative to message signature

Also Published As

Publication number Publication date
JP2005525605A (en) 2005-08-25

Similar Documents

Publication Publication Date Title
US20020059384A1 (en) Substituting URL for attachment in forwarding electronic content
US11477118B2 (en) Preemptive caching of content in a content-centric network
US7219153B1 (en) Methods and apparatus for distributing content
EP2263208B1 (en) Content delivery in a network
US9888089B2 (en) Client side cache management
US8024484B2 (en) Caching signatures
US7496604B2 (en) Reducing duplication of files on a network
US9426244B2 (en) Content delivery in a network
US20170339241A1 (en) Handling long-tail content in a content delivery network (cdn)
US20060064500A1 (en) Caching control for streaming media
US20040199771A1 (en) Method for tracing a security breach in highly distributed content
US20110126018A1 (en) Methods and systems for transaction digital watermarking in content delivery network
WO2006081663A1 (en) Method, apparatus and system for interfering with distribution of protected content
WO2010094322A1 (en) Method and apparatus for distributing data in a peer-to- peer network
WO2002008852A2 (en) System and method for intelligent transmission of digital content embedded in electronic mail messages
WO2012152767A1 (en) A method for content delivery in a content distribution network
WO2003005654A1 (en) Substituting url for attachment in forwarding electronic content
JP2008529396A (en) Digital content distribution
US10924573B2 (en) Handling long-tail content in a content delivery network (CDN)
EP1415446A1 (en) Substituting url for attachment in forwarding electronic content
CN1484905A (en) Substituting URL attachment in forwarding electronic content
EP2025163B1 (en) A scalable unified framework for messaging using multicast and unicast methods
CN113806697B (en) Watermark adding method and system in proxy mode
JP4551375B2 (en) Message delivery system, message transfer apparatus, message transfer method, and message transfer program
KR20080028628A (en) File transmitting and receiving system and method thereof and recording medium thereof

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

WWE Wipo information: entry into national phase

Ref document number: 2001971842

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 018217060

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2003511488

Country of ref document: JP

WWP Wipo information: published in national office

Ref document number: 2001971842

Country of ref document: EP