Identifying and managing redundant digital content transfers

ABSTRACT

A computer system receives digital content for communication to a user. Digital fingerprints are calculated from the digital content. The fingerprints are compared to identify redundant digital content. Digital identifications associated with the digital fingerprints are communicated to a user device to determine whether the digital content exists in local storage.

BACKGROUND

The present invention relates generally to the field of computing deviceresource conservation, and more particularly to identifying and managingredundant digital content transfers.

Digital content transfers frequently occur over a network. For example,users may share videos or music on a social media site, through amessaging service, e-mail, via a peer-to-peer application, etc.

SUMMARY

Disclosed herein are embodiments of a method for avoiding redundantcommunication of digital content. A computer system receives a firstdigital content for communication to a user. A first digital fingerprintis calculated from the first digital content. A determination is madethat the first digital fingerprint matches a stored digital fingerprintassociated with the user. A digital identification associated with thestored digital fingerprint is identified. The digital identification iscommunicated to a user device associated with the user to cause the userdevice to determine whether digital content associated with the digitalidentification exists in the user device's local storage.

Further disclosed herein are embodiments of a second method for avoidingredundant communication of digital content. A computer system receives afirst digital content from a server. The first digital content is storedin local storage. The computer system receives, from a server, a firstdigital identification associated with a digital fingerprint of thefirst digital content. The first digital identification is stored, withdata referencing the first digital content. The computer system receivesa second digital identification from a server. In response to receivingthe second digital identification, the computer system determineswhether the second digital identification matches the first digitalidentification. In response to determining the second digitalidentification matches the first digital identification, the computersystem identifies digital content associated with the first digitalidentification using the data referencing the first digital content. Thecomputer system provides a notification to a user that the first digitalcontent is available in local storage.

Further disclosed herein are embodiments of a system for avoidingredundant communication of digital content. A computer system comprisinga memory with program instructions stored thereon and a processor incommunication with the memory, wherein the computer system is configuredto receive a first digital content for communication to a user. A firstdigital fingerprint is calculated from the first digital content. Adetermination is made that the first digital fingerprint matches astored digital fingerprint associated with the user. A digitalidentification associated with the stored digital fingerprint isidentified. The digital identification is communicated to a user deviceassociated with the user to cause the user device to determine whetherdigital content associated with the digital identification exists in theuser device's local storage.

The above summary is not intended to describe each illustratedembodiment or every implementation of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings included in the present disclosure are incorporated into,and form part of, the specification. They illustrate embodiments of thepresent disclosure and, along with the description, serve to explain theprinciples of the disclosure. The drawings are only illustrative oftypical embodiments and do not limit the disclosure.

FIG. 1 illustrates a flow diagram of an example method, in a serverenvironment, for avoiding the redundant communication of digitalcontent.

FIG. 2 illustrates a flow diagram of an example method, in a clientenvironment, for avoiding the redundant communication of digitalcontent.

FIG. 3 illustrates a diagram of a network environment, in accordancewith embodiments of the present disclosure.

FIG. 4 illustrates a high-level block diagram of an example computersystem that may be used in implementing embodiments of the presentdisclosure.

While the embodiments described herein are amenable to variousmodifications and alternative forms, specifics thereof have been shownby way of example in the drawings and will be described in detail. Itshould be understood, however, that the particular embodiments describedare not to be taken in a limiting sense. On the contrary, the intentionis to cover all modifications, equivalents, and alternatives fallingwithin the spirit and scope of the invention.

DETAILED DESCRIPTION

Aspects of the present disclosure relate to computing device resourceconservation, and more particularly, to identifying and managingredundant digital content transfers. While the present disclosure is notnecessarily limited to such applications, various aspects of thedisclosure may be appreciated through a discussion of various examplesusing this context.

Given the ubiquitous nature of networks where data usage is chargeable,conservation of client device resources and smart management ofbandwidth is needed to keep costs low. Social media sites and messagingapplications, for example, pose large obstacles in this area, becauseusers are constantly sharing the same digital content with each other,with varying formats, resolutions, filenames, etc. When digital contentis communicated to a client device, bandwidth, processor time and power,memory for storage, and other resources are consumed. Identifying andavoiding redundant downloads of digital content will preserve theseresources and realize cost savings.

Hash value comparison is a technique that may be used to identify andcompare digital content. This technique is limited because it can onlydetermine absolute equality or non-equality of content files or parts ofsaid files. Small differences in content, such as a difference inresolution, format, etc. may cause a hash value comparison to fail todetect similar or identical pieces of digital content.

Digital watermarking can also be used to identify similar or identicalcontent. This technique focuses on inserting a signature or otheridentifying features into the content. While watermarks can be difficultto remove, the technique cannot identify similar or identical content incases where the watermark has been successfully removed, damaged beyondutility, or in cases where the content was reproduced prior to theinsertion of the watermark.

Unlike the aforementioned techniques, digital fingerprinting extractsand compresses characteristic components of digital content and createsa “fingerprint” that allows the content to be reliably compared andidentified, regardless of variations in size, format, resolution,filename, time of reproduction, etc.

When digital content is “shared” over a network, there is an opportunityto conserve resources and avoid redundant communications by comparingthe content's fingerprint to the fingerprints of previously-communicatedcontent and having the client device access the redundant contentalready located in that device's local storage. For example, when avideo is shared through a messaging application, a social media site,e-mail, etc. there is a chance a similar or identical video waspreviously shared with the user and already exists on the client device.Digital fingerprinting can be utilized to recognize this situation andavoid a redundant download of the video onto the client device, thusconserving bandwidth, storage, etc.

The present invention will now be described in detail with reference tothe Figures. FIG. 1 is a flow diagram of an example method for avoidingthe redundant communication of digital content in a server-side dataprocessing environment, generally designated 100, in accordance withembodiments of the present disclosure. From start 102, a piece ofdigital content is received at 105 for communication to a user. Forexample, a video file titled Video1.avi may be shared on a social mediasite with User1, causing Video1.avi to be received by a server forcommunication to User1.

A digital fingerprint is calculated from the digital content at 110. Forexample, software may be used to decode the file data and apply featureextraction algorithms. The fingerprint may be a string of valuesrepresenting a variety of the content's properties (e.g. frame snippets,audio changes, brightness level, object movements, metadata entries,etc.) that are highly compressed compared to the original file (i.e.lossy compression), resulting in the creation of, for example,Fingerprint 4.

The fingerprint is compared against stored fingerprints at 115. Thestored fingerprints may refer to a single fingerprint or a plurality offingerprints. The fingerprints may be stored in a table or database,locally or remotely, relative to the server-side data processingenvironment. The stored fingerprints may be stored to provide a recordof digital content previously communicated to a client device. Thestored fingerprints may be referenced by user or group of users. Forexample, Fingerprint 4 may be compared against a table, such as Table 1For User1, below:

TABLE 1 For User1 Fingerprint Digital Identification Fingerprint 1 ID1Fingerprint 2 ID2 Fingerprint 3 ID3

If no matching fingerprint is found, the fingerprint is stored at 120.Fingerprints may be stored in a table or database. For example, thefingerprint may be stored in Table 1 For User1 or a database containingother digital fingerprints generated from digital content previouslycommunicated to User1.

A unique digital identification is generated to associate with thedigital fingerprint at 125. The unique digital identification may begenerated by a variety of methods, such as random number generation,sequential numbering, or a reduced-bit representation of the digitalfingerprint. For example, when the unique digital identification isgenerated and associated, Table 1 For User1 may be updated to resemble:

TABLE 1 For User1 Fingerprint Designation Digital IdentificationFingerprint 1 ID1 Fingerprint 2 ID2 Fingerprint 3 ID3 Fingerprint 4 ID4

The digital identification and the digital content are communicated tothe client device at 130. The digital content may be video, audio,photography, interactive media, etc. A user may share the content viamessaging application, social media site, file hosting service,electronic mail, peer-to-peer application, etc. For example, Video1.aviand its associated unique digital identification, ID4, may be sharedwith, and communicated to, User1 via an instant messaging service.

If a matching fingerprint is found at 115, the unique digitalidentification assigned to the stored fingerprint is identified at 135.The digital identification may be located in a table or database,configured to associate the stored fingerprints with their respectiveidentifications. For example, using the table above, if matchingFingerprint 4 is found, the associated digital identification ID4 isidentified.

The digital identification is communicated to the client device at 140.Receiving the digital identification may cause the user device toascertain whether the associated digital content is in local storage,e.g. a hard drive or memory card. Using the above example, ID4 would becommunicated to User 1. This may cause the user device to determinewhether Video1.avi exists in local storage.

FIG. 2 is a flow diagram of an example method for avoiding the redundantcommunication of digital content in a client-side data processingenvironment, generally designated 200, in accordance with embodiments ofthe present disclosure. From start 202, a digital identification isreceived from a server at 205. The identification may be received inresponse to the sharing of digital content, as described above. Forexample, the digital identification ID4 from the updated Table For User1above may be received from a server in response to a server-sidedetermination that User1 had previously received Video1.avi or anotherpiece of digital content with an identical digital fingerprint.

The digital identification is compared against stored digitalidentifications at 210. The stored digital identifications may be storedin a table or database. The identifications may be stored to provide arecord of digital content previously received by a client device. Forexample, ID4 may be compared against Table 2 For User1 below:

TABLE 2 For User1 Digital Identification Digital Content Details ID1Audio1.wav, Location W ID2 Flash1.swf, Location X ID3 Video2.mpeg,Location Y ID4 Video1.avi, Location Z

When a matching digital identification is found, the device retrievesthe associated digital content's details from the local table ordatabase at 215. The digital content details may include filename,location in storage, etc. For example, the match of ID4 causes thedevice to retrieve the associated digital content's details anddetermine whether Video1.avi exists at Location Z.

The device determines whether the digital content exists in localstorage at 225. The device may use the details retrieved to check alocation on a local hard drive, memory card, solid-state drive, etc. Forexample, if digital identification ID2's digital content details wereretrieved, the device may determine whether Flashl.swf exists in localstorage at Location X.

If the digital content exists in local storage, the device notifies theuser at 230. The notification may be a window, message, sound, etc. Forexample, in response to a determination that Audio1.wav exists atLocation W, the device may display a window, informing the user that thesame or similar content is already in local storage.

The device may inquire whether the user wants to download the contentagain at 235. A user may wish to download a file with a higherresolution or alternate format. For example, the device may display awindow informing the user of the differences in the two pieces ofcontent (higher resolution, format differences, etc.) and give the userthe option to cause the device to download the more recent copy of thedigital content by clicking a button, inputting a voice command, etc.

If the user wants to download the more recent copy of the digitalcontent at 235, the device downloads the digital content from the serverat 240. The user may input the proper command to initiate the download.For example, if the user clicks the appropriate button to download themore recent copy of Video1.avi, the device may retrieve the content fromthe server and store it in Location A.

The device updates the digital content's details at 245. The device mayaccess the table or database containing the digital content details andoverwrite the data to reflect the more current information. For example,the device may update Table 2 For User1 to reflect the new locationinformation, accordingly:

TABLE 2 For User1 Digital Identification Digital Content Details ID1Audio1.wav, Location W ID2 Flash1.swf, Location X ID3 Video2.mpeg,Location Y ID4 Video1.avi, Location A

The user device notifies the user that the digital content is availablein local storage at 250. The notification may be a pop-up window, a textmessage, a sound, a vibration, etc. For example, the user device maydisplay a pop-up window notifying the user that Video1.avi is now inlocal storage and ready for viewing.

If, at 235, the user declines to download the more recent copy of thedigital content, the device accesses the digital content already inlocal storage. The user may decline to download the more recent contentby clicking the appropriate button on a pop-up window, inputting a voicecommand, replying to a text message, etc. For example, the user mayclick a “No” button on a pop-up window to decline downloading the morerecent copy of Video1.avi, causing the device to access the local copyof Video1.avi.

If, at 225, the device determines the digital content does not exist inlocal storage, the device downloads the digital content from the serverat 240. The device may automatically request a download of the contentand store it locally. For example, if the user has previously deletedVideo1.avi, the device may automatically download Video1.avi from theserver and store it in Location A of a local hard drive.

The device updates the stored digital identification details at 245. Thedevice may update a table or database containing the details. Forexample, the digital content details in Table 2 For User1 may be updatedto reflect accurate entries.

If, at 210, the device determines the digital identification does notmatch a stored digital identification, the device downloads the digitalcontent at 255. The device may assume that no match means the digitalcontent has never been received and proceed with a download. Forexample, if the digital identification ID4 does not match any storeddigital identification, the device will download Video1.avi from theserver.

The user device stores the digital content and digital identification,concatenate with data referencing the digital content at 260. Thedigital content may be stored on a hard drive, solid state, drive,memory card, etc. The digital identification and reference data may bestored in a table or database. For example, the user device may storeVideo1.avi on a memory card at Location Z, and update Table 2 For User1for accuracy.

The user device notifies the user that the digital content is availablein local storage at 250. The notification may be a pop-up window, textmessage, sound, vibration, etc. For example, the user device may displaya text message notifying the user that Video1.avi is now in localstorage and ready for viewing.

FIG. 3 is a diagram illustrating an example system 300 for communicationof digital content between a server 302 and client devices 310, 315,320, and 325 over a network 305. In some embodiments, each client devicemay be under the control of a different user, or multiple client devicesmay be under the control of a single user. A client device may be acomputing system, e.g. a desktop computer, a laptop computer, a tablet,a smartphone, a portable terminal, or one or more programs, devices, orcombination thereof capable of processing digital content and configuredto connect to a network and communicate with any number of servers orclient devices.

Network 305 may be any type or combination of networks. For example, thenetwork may include any combination of personal area network (PAN),local area network (LAN), metropolitan area network (MAN), wide areanetwork (WAN), wireless local area network (WLAN), storage area network(SAN), enterprise private network (EPN), or virtual private network(VPN). In some embodiments, the network 305 may refer to an IP network,a conventional coaxial-based network, etc. For example, a server for aninstant messaging application may communicate with various clientdevices (e.g. tablets, laptops, smartphones, portable terminals, etc.)over the Internet.

In some embodiments, the server 302 may refer to a computing system,e.g. one or more programs, devices, or combination thereof capable ofprocessing digital content and configured to connect to a network andcommunicate with any number of client devices or servers. In someembodiments, the server 302 may be implemented in a cloud computingenvironment.

In some embodiments, the flow diagram of FIG. 1 may be performed by theserver 302. The flow diagram of FIG. 2 may be performed by any number ofclient devices 310, 315, 320, and 325. The server and client(s) maycommunicate digital content (e.g. videos, music, interactive mediafiles, etc.) and digital identifications, as well as requests fordigital content and digital identifications over the network 305.

Referring now to FIG. 4, shown is a high-level block diagram of anexample computer system (i.e., computer) 401 that may be configured toperform method 100, described in FIG. 1, or method 200, described inFIG. 2. The example computer system 401 may be used in implementing oneor more of the methods or modules, and any related functions oroperations, described herein (e.g., using one or more processor circuitsor computer processors of the computer), in accordance with embodimentsof the present disclosure. In some embodiments, the major components ofthe computer system 401 may comprise one or more CPUs 402, a memorysubsystem 404, a terminal interface 412, a storage interface 414, an I/O(Input/Output) device interface 416, and a network interface 418, all ofwhich may be communicatively coupled, directly or indirectly, forinter-component communication via a memory bus 403, an I/O bus 408, andan I/O bus interface unit 410.

The computer system 401 may contain one or more general-purposeprogrammable central processing units (CPUs) 402A, 402B, 402C, and 402D,herein generically referred to as the CPU 402. In some embodiments, thecomputer system 401 may contain multiple processors typical of arelatively large system; however, in other embodiments the computersystem 401 may alternatively be a single CPU system. Each CPU 402 mayexecute instructions stored in the memory subsystem 404 and may compriseone or more levels of on-board cache.

In some embodiments, the memory subsystem 404 may comprise arandom-access semiconductor memory, storage device, or storage medium(either volatile or non-volatile) for storing data and programs. In someembodiments, the memory subsystem 404 may represent the entire virtualmemory of the computer system 401, and may also include the virtualmemory of other computer systems coupled to the computer system 401 orconnected via a network. The memory subsystem 404 may be conceptually asingle monolithic entity, but, in some embodiments, the memory subsystem404 may be a more complex arrangement, such as a hierarchy of caches andother memory devices. For example, memory may exist in multiple levelsof caches, and these caches may be further divided by function, so thatone cache holds instructions while another holds non-instruction data,which is used by the processor or processors. Memory may be furtherdistributed and associated with different CPUs or sets of CPUs, as isknown in any of various so-called non-uniform memory access (NUMA)computer architectures. In some embodiments, the main memory or memorysubsystem 404 may contain elements for control and flow of memory usedby the CPU 402. This may include a memory controller 405.

Although the memory bus 403 is shown in FIG. 4 as a single bus structureproviding a direct communication path among the CPUs 402, the memorysubsystem 404, and the I/O bus interface 410, the memory bus 403 may, insome embodiments, comprise multiple different buses or communicationpaths, which may be arranged in any of various forms, such aspoint-to-point links in hierarchical, star or web configurations,multiple hierarchical buses, parallel and redundant paths, or any otherappropriate type of configuration. Furthermore, while the I/O businterface 410 and the I/O bus 408 are shown as single respective units,the computer system 401 may, in some embodiments, contain multiple I/Obus interface units 410, multiple I/O buses 408, or both. Further, whilemultiple I/O interface units are shown, which separate the I/O bus 408from various communications paths running to the various I/O devices, inother embodiments some or all of the I/O devices may be connecteddirectly to one or more system I/O buses.

In some embodiments, the computer system 401 may be a multi-usermainframe computer system, a single-user system, or a server computer orsimilar device that has little or no direct user interface, but receivesrequests from other computer systems (clients). Further, in someembodiments, the computer system 401 may be implemented as a desktopcomputer, portable computer, laptop or notebook computer, tabletcomputer, pocket computer, telephone, smart phone, mobile device, or anyother appropriate type of electronic device.

It is noted that FIG. 4 is intended to depict the representative majorcomponents of an exemplary computer system 401. In some embodiments,however, individual components may have greater or lesser complexitythan as represented in FIG. 4, components other than or in addition tothose shown in FIG. 4 may be present, and the number, type, andconfiguration of such components may vary.

The programs described herein are identified based upon the applicationfor which they are implemented in a specific embodiment of theinvention. However, it should be appreciated that any particular programnomenclature herein is used merely for convenience, and thus theinvention should not be limited to use solely in any specificapplication identified and/or implied by such nomenclature.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

As will be appreciated by one skilled in the art, aspects of the presentinvention may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present invention may take the formof an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, aspects of the present invention may take the form of acomputer program product embodied in one or more computer-readablemedium(s) having computer readable program code/instructions embodiedthereon.

Any combination of computer-readable media may be utilized.Computer-readable media may be a computer-readable signal medium or acomputer-readable storage medium. A computer-readable storage medium maybe, for example, but not limited to, an electronic, magnetic, optical,electromagnetic, infrared, or semiconductor system, apparatus, ordevice, or any suitable combination of the foregoing. More specificexamples (a non-exhaustive list) of a computer-readable storage mediumwould include the following: an electrical connection having one or morewires, a portable computer diskette, a hard disk, a random access memory(RAM), a read-only memory (ROM), an erasable programmable read-onlymemory (EPROM or Flash memory), an optical fiber, a portable compactdisc read-only memory (CD-ROM), an optical storage device, a magneticstorage device, or any suitable combination of the foregoing. In thecontext of this document, a computer-readable storage medium may be anytangible medium that can contain, or store a program for use by or inconnection with an instruction execution system, apparatus, or device.

A computer-readable signal medium may include a propagated data signalwith computer-readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer-readable signal medium may be any computer-readable medium thatis not a computer-readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a computer-readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing.

Computer program code for carrying out operations for aspects of thepresent invention may be written in any combination of one or moreprogramming languages, including an object oriented programming languagesuch as Java, Smalltalk, C++ or the like and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on a user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).

Aspects of the present invention are described above with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable medium that can direct a computer, other programmabledata processing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer-readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce acomputer-implemented process such that the instructions which execute onthe computer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

What is claimed is:
 1. A computer-implemented method for avoiding redundant communication of digital content, the computer-implemented method comprising: receiving, from a server, a first digital content for communication to a user; storing the first digital content in a local storage of a user device; receiving, from the server, a first digital identification, the first digital identification associated with a digital fingerprint of the first digital content, wherein the digital fingerprint is calculated from the digital content by extracting and compressing, using lossy compression, frame snippets, audio changes, brightness level, object movements, and metadata entries; storing the first digital identification, concatenate with data referencing the first digital content; receiving, from the server, a second digital identification, the digital identification being stored in a table containing a plurality of digital identifications associated with a plurality of respective digital fingerprints, the digital identification having been generated using a random number generation algorithm, wherein the digital identification comprising a reduced-bit signature of the digital fingerprint, wherein receiving the second digital identification occurs in response to sharing of the first digital content via a messaging application; determining the second digital identification matches the first digital identification based on the received second digital identification; identifying, in the local storage, the digital content associated with the first digital identification using the data referencing the first digital content based on determining the second digital identification matches the first digital identification; providing a notification to the user that the first digital content is available in the local storage, wherein the notification is displayed on the user device as a text message notifying the user that the first digital content is in the local storage and ready for viewing; receiving, from the server, a third digital identification; determining non-existence of a match for the third digital identification based on the received third digital identification; downloading, from the server, a third digital content associated with the third digital identification; and storing the third digital identification and data referencing the digital content.
 2. The computer-implemented method of claim 1, further comprising: receiving, from the server, the third digital identification; in response to receiving the third digital identification, determining the third digital identification matches the first digital identification; determining non-existence, in the local storage, of the first digital content associated with the first digital identification; and downloading, from the server, the digital content associated with the first digital identification.
 3. The computer-implemented method of claim 1, wherein receiving the second digital identification occurs in response to sharing of the first digital content via a social media site.
 4. The computer-implemented method of claim 1, wherein receiving the second digital identification occurs in response to sharing of the first digital content via a file hosting service.
 5. The computer-implemented method of claim 1, wherein receiving the second digital identification occurs in response to sharing of the first digital content via electronic mail.
 6. A system for avoiding redundant communication of digital content, the system comprising: a hardware memory with program instructions stored thereon; and a hardware processor in communication with the hardware memory, wherein the program instructions cause the hardware processor to: receive, from a server, a first digital content for communication to a user; store the first digital content in a local storage of a user device; receive, from the server, a first digital identification, the first digital identification associated with a digital fingerprint of the first digital content, wherein the digital fingerprint is calculated from the digital content by extracting and compressing, using lossy compression, frame snippets, audio changes, brightness level, object movements, and metadata entries; store the first digital identification, concatenate with data referencing the first digital content; receive, from the server, a second digital identification, the digital identification being stored in a table containing a plurality of digital identifications associated with a plurality of respective digital fingerprints, the digital identification having been generated using a random number generation algorithm, wherein the digital identification comprising a reduced-bit signature of the digital fingerprint, wherein receiving the second digital identification occurs in response to sharing of the first digital content via a messaging application; determine the second digital identification matches the first digital identification based on the received second digital identification; identify, in the local storage, the digital content associated with the first digital identification using the data referencing the first digital content based on determining the second digital identification matches the first digital identification; provide a notification to the user that the first digital content is available in the local storage, wherein the notification is displayed on the user device as a text message notifying the user that the first digital content is in the local storage and ready for viewing; receive, from the server, a third digital identification; determine non-existence of a match for the third digital identification based on the received third digital identification; download, from the server, a third digital content associated with the third digital identification; and store the third digital identification and data referencing the digital content.
 7. The system of claim 6, wherein the program instructions further cause the hardware processor to: receive, from the server, the third digital identification; in response to receiving the third digital identification, determine the third digital identification matches the first digital identification; determine non-existence, in the local storage, of the first digital content associated with the first digital identification; and download, from the server, the digital content associated with the first digital identification.
 8. The system of claim 6, wherein receiving the second digital identification occurs in response to sharing of the first digital content via a social media site.
 9. The system of claim 6, wherein receiving the second digital identification occurs in response to sharing of the first digital content via a file hosting service.
 10. A computer program product for avoiding redundant communication of digital content, the computer program product comprising a hardware memory having program instructions embodied therewith, the program instructions executable by a hardware processor to cause the hardware processor to: receive, from a server, a first digital content for communication to a user; store the first digital content in a local storage of a user device; receive, from the server, a first digital identification, the first digital identification associated with a digital fingerprint of the first digital content, wherein the digital fingerprint is calculated from the digital content by extracting and compressing, using lossy compression, frame snippets, audio changes, brightness level, object movements, and metadata entries; store the first digital identification, concatenate with data referencing the first digital content; receive, from the server, a second digital identification, the digital identification being stored in a table containing a plurality of digital identifications associated with a plurality of respective digital fingerprints, the digital identification having been generated using a random number generation algorithm, wherein the digital identification comprising a reduced-bit signature of the digital fingerprint, wherein receiving the second digital identification occurs in response to sharing of the first digital content via a messaging application; determine the second digital identification matches the first digital identification based on the received second digital identification; identify, in the local storage, the digital content associated with the first digital identification using the data referencing the first digital content based on determining the second digital identification matches the first digital identification; provide a notification to the user that the first digital content is available in the local storage, wherein the notification is displayed on the user device as a text message notifying the user that the first digital content is in the local storage and ready for viewing; receive, from the server, a third digital identification; determine non-existence of a match for the third digital identification based on the received third digital identification; download, from the server, a third digital content associated with the third digital identification; and store the third digital identification and data referencing the digital content.
 11. The computer program product of claim 10, wherein the program instructions further cause the hardware processor to: receive, from the server, the third digital identification; in response to receiving the third digital identification, determine the third digital identification matches the first digital identification; determine non-existence, in the local storage, of the first digital content associated with the first digital identification; and download, from the server, the digital content associated with the first digital identification. 