Search

CN-121986515-A - System and method for prefetching content of interest while preserving user privacy

CN121986515ACN 121986515 ACN121986515 ACN 121986515ACN-121986515-A

Abstract

The hosting network (hosting network, HN) may provide access to content of interest to the User through a digital representation of the User, referred to as a D-User or D-User module. Services may be established by instantiating functionality within the D-User module, hosting platform, or/and the hosting network and configuring the functionality accordingly. A list of content of interest may be maintained in a shared classified content interest portal (shared categorized content interest portal, SCIP). The SCIP can be accessed by a third party or external content provider and after de-privacy and anonymization, content interests from multiple users can be preserved. For paid content, the HN may provide secure payment services to the D-User.

Inventors

  • Nimer Gamini Senares
  • Renzier LEM bor jalinin
  • Mohammed Faraj Mofuta Alzenade

Assignees

  • 华为技术有限公司

Dates

Publication Date
20260505
Application Date
20240613
Priority Date
20231018

Claims (20)

  1. 1. A method for providing a User with access to content of interest in a hosted network by a digital representation of the User, the digital representation being referred to as a D-User module, the method comprising the steps of: The D-User module maintains a list of the content of interest of the User in a shared content interest portal SCIP, wherein each content item in the list is associated with a download location; prefetching content in the list from the content provider by: causing the SCIP to communicate with the content provider and pre-fetch the content at the download location, or Providing the content provider with access to the list of content in the SCIP, the content provider pushing the content to the download location; the D-User module informs a User device of the User that the content is available for access by the User at a network node.
  2. 2. The method of claim 1, wherein the network node corresponds to the download location or to a different node to which the D-User module can move the content closer to the User device.
  3. 3. The method according to claim 1 or 2, wherein the list of content of interest comprises one or more of a location of the content of interest, an IP address of the content of interest, a query condition of the content of interest, a priority assigned to the content of interest, a classification of the content of interest, the download location of the content from a content provider, a unique content ID associated with the corresponding content of interest.
  4. 4. A method according to any one of claims 1 to 3, wherein the SCIP is hosted within the hosting network, the hosting network controlling the SCIP.
  5. 5. A method according to any of claims 1 to 3, wherein the D-User module is isolated from the SCIP and/or the hosted network to protect the privacy of the User.
  6. 6. The method of claim 5, wherein the D-User module is hosted in a hosting platform HOP using a trusted execution environment TEE, the integrity and security of the D-User module being verified by the User through third party remote attestation.
  7. 7. A method according to any one of claims 1 to 3, wherein the SCIP is hosted in a hosting platform having the D-User module controlling the SCIP.
  8. 8. The method of any one of claims 1 to 7, wherein the list stored in SCIP is categorized by index according to standardized content types enabling the content provider to search the index.
  9. 9. The method according to any of claims 1 to 8, wherein the list of content of interest is generated by monitoring of communications of the User by the D-User module and/or the User device providing User interest to the D-User module.
  10. 10. The method according to claim 9, wherein monitoring of the communication of the User is performed by having the D-User module for decrypting and reading data packets sent by the User device to the external entity.
  11. 11. The method according to any one of claims 1 to 10, wherein the content in the list is prioritized based on at least one of importance of the content, time the content needs to be available, current or future context of the user, payment information for accessing a given content.
  12. 12. The method of any one of claims 1 to 11, wherein the D-User module is configured to determine the User context based on at least one of User location, user mobility, user activity, and User demand, wherein the priority of content is updated based on the determined User context.
  13. 13. The method of claim 12, wherein the User context is determined by AI functions performed by or accessible to the D-User module.
  14. 14. The method according to any one of claims 1 to 13, comprising synchronizing, by a data synchronization function, the list of the content with content of interest detected on the user device of the user and content already available on the user device of the user.
  15. 15. The method according to any one of claims 1 to 14, wherein the list of the content stored in the SCIP is dynamically updated by the D-User module if: The user expresses new interests or requests to delete content; the D-User module determining an interest of the User based on the communication of the User; the D-User module predicts an interest of the User based on the User context or historical analysis; a current or predicted context change for the user; the user has consumed the content of interest.
  16. 16. The method of any one of claims 1 to 15, wherein protecting the privacy of the content is based on one or more privacy protection policies provided by the user to the hosted network.
  17. 17. The method of claim 6, wherein the HOP comprises a privacy preserving portal PPP, and wherein communication between the D-User module and the content provider node or between the D-User module and the SCIP is performed through the PPP.
  18. 18. The method of claim 17, wherein the PPP is used to de-privacy the communication between the D-User module and the content provider node or between the D-User module and the SCIP.
  19. 19. The method of claim 18, wherein the de-privacy of the communication is performed by one or more of removing information in a communication message exposing a given content of interest, altering an ID of an owner of the content of interest, encrypting the communication message using an encryption algorithm to remove the association with the user.
  20. 20. The method according to any of claims 17 to 19, wherein the PPP is used to anonymize the communication between the D-User module and the content provider node.

Description

System and method for prefetching content of interest while preserving user privacy 1. Cross-reference to related applications The present application claims priority from U.S. patent application Ser. No. 63/591,243 filed on 10/18 of 2023. The content of this priority application is incorporated herein by reference. 2. Technical field The present disclosure relates to the field of data communications, and more particularly, to a system, method, and memory for prefetching content of interest to a user from a content provider while ensuring privacy and confidentiality of the data. 3. Background art The public land mobile network (public land mobile network, PLMN) is intended to provide connectivity services for users or other types of entities and their User Equipments (UEs). The concept of a user centric network (user centric network, UCN) improves the user network experience by dynamically adapting the network structure to the individual user contexts. As users or other types of entities require or claim more ownership and control over their services and their privacy, future networks may become increasingly "user-centric", that is, they are expected to provide more user authorization. The UCN design may allow entities to have more control over the services provided by the network or over the network that provides these services to these entities. Future networks must also be able to support new network infrastructure capabilities, suitable for cloud computing applications being deployed on a large scale. Future networks should be able to support the use of large scale artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) models, data anonymization, blockchain technology, etc., which have made significant progress in the past few years. Furthermore, future networks, including enhanced 5G and 6G networks, should also be designed to support new applications and services, including AI and data sensing services, which are not only widely used for industrial applications, but also by individuals. These applications make collaboration between different entities more global and open, and future networks should be designed to provide or improve data confidentiality and reliability, standardization, and rapid application deployment. As the real world is increasingly controlled by means of the digital domain and more precise control of the real world system is required, digital twinning is created to provide a digital representation of the real world entity. These digital twins may represent any type of entity, including objects such as engines, automobiles, robots, infrastructure such as cities and factories, but also users themselves. Replicating users in the virtual world presents additional challenges compared to objects or infrastructure because confidentiality and integrity of user data is critical. All of these factors are driving the study of future network architectures, including, for example, 6G networks. Therefore, improvements in communication networks are imperative. This background is provided for the purpose of revealing information that the applicant believes may be relevant to the present disclosure. It is not intended to be an admission that any of the preceding information is not to be construed as constituting prior art against the present disclosure. 4. Summary of the invention The present disclosure provides a method, system, platform, and computer readable memory that enables users to access pre-fetched and available content of interest securely and anonymously, if desired, through their user devices. The content of interest to a user may refer to different types of information, media, or services that the user is interested in accessing or consuming through their telecommunication service. This may include various forms of digital content such as articles, videos, music, games, applications, or any other digital service provided by a content provider. In the present application, a digital entity (also referred to as a DE, D-XX, DE module, or D-XX module) corresponds to a representation of any entity, including, for example, an asset, a process, a system, a digital world, an organization, or a user. The digital entities may be virtual representations or copies of real world objects, people, or processes that can be used to simulate their behavior in order to better understand and predict their operation in real life. The digital entity may be linked to the actual data sources collected from the sensors, as well as other sources of information from its environment. The digital entity may be updated in real time to reflect the original, real world version. The digital entities may be interconnected and may communicate with each other affecting each other so that the entire system may be replicated. A digital entity that replicates a physical entity or collection of physical entities may be referred to as a digital representation (D-Rep or D-Rep module). A digital entity that replicates a more co