Electronic transmissions with intermittent network connections
First Claim
1. A system for conditioning transmission of a query response with an unsecured communication protocol, the system comprising:
- a remote content management server that;
identifies a plurality of query files, the plurality of query files comprising a first query file and a second query file; and
encrypts the plurality of query files, the encryption of the plurality of query files being decrypted by a same key corresponding to the plurality of query files;
a relay device that;
receives and stores the plurality of query files from the remote content management server in a local memory associated with the relay device and a first user device, wherein the plurality of query files are being stored in a locked configuration; and
transmits the plurality of query files via the unsecured communication protocol, the plurality of query files not being decrypted by the relay device, the first query file being transmitted to the first user device, and the second query file being transmitted to a second user device; and
the first user device that;
receives the same key and the first query file corresponding to the plurality of query files;
decrypts the first query file using the same key;
generates the query response to the first query file;
determines a connection variable by assessing one or more network connections available to the first user device;
determines whether a transmission condition is satisfied based on the connection variable, the determination including comparing the connection variable to a threshold, a result of the determination indicating that the transmission condition is satisfied when the connection variable exceeds the threshold;
when the connection variable exceeds the threshold, transmits the query response via the unsecured communication protocol without storing the query response at a memory associated with the first user device; and
when the connection variable fails to exceed the threshold, encrypts the query response and storing the encrypted query response at the memory associated with the first user device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments relate to systems and methods for electronically conditioning transmission of communications based on results of a connection assessment. An electronic file is executed at an electronic device, which causes a first query and a second query to be presented. A first query response and a second query response are identified. The first query response is stored in a locked configuration that inhibits the ability to modify the first query response to the first query. The second query response is stored but is not stored in the locked configuration. Query response data is generated that includes an identifier of the second query, an identifier of the second query response and an identifier of the electronic device. A connection variable is determined by assessing one or more network connections available to the electronic device. When a transmission condition is satisfied, the query response data is transmitted to another device.
38 Citations
12 Claims
-
1. A system for conditioning transmission of a query response with an unsecured communication protocol, the system comprising:
-
a remote content management server that; identifies a plurality of query files, the plurality of query files comprising a first query file and a second query file; and encrypts the plurality of query files, the encryption of the plurality of query files being decrypted by a same key corresponding to the plurality of query files; a relay device that; receives and stores the plurality of query files from the remote content management server in a local memory associated with the relay device and a first user device, wherein the plurality of query files are being stored in a locked configuration; and transmits the plurality of query files via the unsecured communication protocol, the plurality of query files not being decrypted by the relay device, the first query file being transmitted to the first user device, and the second query file being transmitted to a second user device; and the first user device that; receives the same key and the first query file corresponding to the plurality of query files; decrypts the first query file using the same key; generates the query response to the first query file; determines a connection variable by assessing one or more network connections available to the first user device; determines whether a transmission condition is satisfied based on the connection variable, the determination including comparing the connection variable to a threshold, a result of the determination indicating that the transmission condition is satisfied when the connection variable exceeds the threshold; when the connection variable exceeds the threshold, transmits the query response via the unsecured communication protocol without storing the query response at a memory associated with the first user device; and when the connection variable fails to exceed the threshold, encrypts the query response and storing the encrypted query response at the memory associated with the first user device. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-implemented method for conditioning transmission of a query response with an unsecured communication protocol, the method comprising:
-
identifying, by a remote content management server of a content distribution network, a plurality of query files, the plurality of query files comprising a first query file and a second query file; encrypting the plurality of query files, the encryption of the plurality of query files being decrypted by a same key corresponding to the plurality of query files; receiving and storing, by a relay device of the content distribution network, the plurality of query files from the remote content management server in a local memory associated with the relay device and a first user device, wherein the plurality of query files are being stored in a locked configuration; transmitting, by the relay device, the plurality of query files via the unsecured communication protocol, the plurality of query files not being decrypted by the relay device, the first query file being transmitted to the first user device, and the second query file being transmitted to a second user device; receiving, by the first user device of the content distribution network, the same key and the first query file corresponding to the plurality of query files; decrypting the first query file using the same key; generating the query response to the first query file; determining a connection variable by assessing one or more network connections available to the first user device; determining whether a transmission condition is satisfied based on the connection variable, the determination including comparing the connection variable to a threshold, a result of the determination indicating that the transmission condition is satisfied when the connection variable exceeds the threshold; when the connection variable exceeds the threshold, transmitting, by the first user device, the query response via the unsecured communication protocol without storing the query response at a memory associated with the first user device; and when the connection variable fails to exceed the threshold, encrypting, by the first user device, the query response and storing the encrypted query response at the memory associated with the first user device. - View Dependent Claims (6, 7, 8)
-
-
9. A computer-program product tangibly embodied in a non-transitory, machine-readable storage medium for conditioning transmission of a query response with an unsecured communication protocol, including instructions configured to cause one or more data processors to perform actions including:
-
identifying a plurality of query files, the plurality of query files comprising a first query file and a second query file; and encrypting the plurality of query files, the encryption of the plurality of query files being decrypted by a same key corresponding to the plurality of query files; receiving and storing the plurality of query files, wherein the plurality of query files are being stored in a locked configuration; transmitting the plurality of query files via the unsecured communication protocol, the plurality of query files not being decrypted, the first query file being transmitted to a first user device, and the second query file being transmitted to a second user device; receiving the same key and the first query file corresponding to the plurality of query files; decrypting the first query file using the same key; generating the query response to the first query file; determining a connection variable by assessing one or more network connections available to the first user device; determining whether a transmission condition is satisfied based on the connection variable, the determination including comparing the connection variable to a threshold, a result of the determination indicating that the transmission condition is satisfied when the connection variable exceeds the threshold; when the connection variable exceeds the threshold, transmitting the query response via the unsecured communication protocol without storing the query response at a memory associated with the first user device; and when the connection variable fails to exceed the threshold, encrypting the query response and storing the encrypted query response at the memory associated with the first user device. - View Dependent Claims (10, 11, 12)
-
Specification