Methods, systems, and media for secure connection management and automatic compression over metered data connections
First Claim
1. A method for facilitating compression over a metered data connection, the method comprising:
- detecting, using a hardware processor of a user device, a first new wireless network connection;
determining, using the hardware processor of the user device, that the first new wireless network connection is a metered data connection;
sending, via a proxy server, one or more requests for content to at least one remote content server using the metered data connection in response to determining that the first new wireless connection is a metered data connection;
receiving, via the proxy server, content from the content server using the metered data connection, wherein the content is compressed by the proxy server;
determining, using the hardware processor of the user device, that the first new wireless network connection is a secure connection;
upon determining that the first new wireless network connection is a secure connection, indicating to a user that the first new wireless network connection is secure;
detecting, using the hardware processor of the user device, a second new wireless network connection;
determining, using the hardware processor of the user device, that the second new wireless network connection is a non-secure wireless connection;
determining, using the hardware processor of the user device, that the second new wireless network connection is not a metered data connection;
causing the proxy server to inhibit compression of content sent to the user device in response to determining that the second new wireless network connection is not a metered data connection;
causing, using the hardware processor of the user device, information sent by the user device over the second new wireless network connection to be encrypted in response to determining that the second new wireless network connection is not secure;
establishing, the hardware processor of the user device, a virtual private network connection between the user device and a virtual private network server using encrypted information sent over the second new wireless network connection in response to determining that the second new wireless network connection is not secure;
upon establishing the virtual private network connection, indicating, using the hardware processor of the user device, to the user that the second new wireless network connection is secure based on the virtual private network connection being established; and
receiving, using the hardware processor of the user device, content from the at least one remote content server over the second new wireless network connection as encrypted information from the virtual private network server.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and media for facilitating compression over a metered data connection are provided. In some embodiments, the methods comprise: detecting a new wireless network connection; determining that the new connection is metered; sending, via a proxy server, requests for content to a content server using the metered data connection; receiving, via the proxy server, content from the content server compressed by the proxy server using the metered data connection; detecting a second new wireless network connection; determining that the second new wireless network connection is not a metered data connection; causing the proxy server to inhibit compression of content sent to the user device in response to determining that the second new wireless network connection is not a metered data connection.
-
Citations
18 Claims
-
1. A method for facilitating compression over a metered data connection, the method comprising:
-
detecting, using a hardware processor of a user device, a first new wireless network connection; determining, using the hardware processor of the user device, that the first new wireless network connection is a metered data connection; sending, via a proxy server, one or more requests for content to at least one remote content server using the metered data connection in response to determining that the first new wireless connection is a metered data connection; receiving, via the proxy server, content from the content server using the metered data connection, wherein the content is compressed by the proxy server; determining, using the hardware processor of the user device, that the first new wireless network connection is a secure connection; upon determining that the first new wireless network connection is a secure connection, indicating to a user that the first new wireless network connection is secure; detecting, using the hardware processor of the user device, a second new wireless network connection; determining, using the hardware processor of the user device, that the second new wireless network connection is a non-secure wireless connection; determining, using the hardware processor of the user device, that the second new wireless network connection is not a metered data connection; causing the proxy server to inhibit compression of content sent to the user device in response to determining that the second new wireless network connection is not a metered data connection; causing, using the hardware processor of the user device, information sent by the user device over the second new wireless network connection to be encrypted in response to determining that the second new wireless network connection is not secure; establishing, the hardware processor of the user device, a virtual private network connection between the user device and a virtual private network server using encrypted information sent over the second new wireless network connection in response to determining that the second new wireless network connection is not secure; upon establishing the virtual private network connection, indicating, using the hardware processor of the user device, to the user that the second new wireless network connection is secure based on the virtual private network connection being established; and receiving, using the hardware processor of the user device, content from the at least one remote content server over the second new wireless network connection as encrypted information from the virtual private network server. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for facilitating compression over a metered data connection, the system comprising:
a hardware processor of a user device programmed to; detect a first new wireless network connection; determine that the first new wireless network connection is a metered data connection; send, via a proxy server, one or more requests for content to at least one remote content server using the metered data connection in response to determining that the first new wireless connection is a metered data connection; receive, via the proxy server, content from the content server using the metered data connection, wherein the content is compressed by the proxy server; determine, using the hardware processor of the user device, that the first new wireless network connection is a secure connection; upon determining that the first new wireless network connection is a secure connection, indicate to a user that the first new wireless network connection is secure; detect a second new wireless network connection; determine that the second new wireless network connection is a non-secure wireless connection; determine that the second new wireless network connection is not a metered data connection; cause the proxy server to inhibit compression of content sent to the user device in response to determining that the second new wireless network connection is not a metered data connection; cause information sent by the user device over the second new wireless network connection to be encrypted in response to determining that the second new wireless network connection is not secure; establish a virtual private network connection between the user device and a virtual private network server using encrypted information sent over the second new wireless network connection in response to determining that the second new wireless network connection is not secure; upon establishing the virtual private network connection, indicate to the user that the second new wireless network connection is secure based on the virtual private network connection being established; and receive content from the at least one remote content server over the second new wireless network connection as encrypted information from the virtual private network server. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A non-transitory computer-readable medium containing computer executable instructions that, when executed by a processor of a user device, cause the processor to perform a method for facilitating compression over a metered data connection, the method comprising:
-
detecting a first new wireless network connection; determining that the first new wireless network connection is a metered data connection; sending, via a proxy server, one or more requests for content to at least one remote content server using the metered data connection in response to determining that the first new wireless connection is a metered data connection; receiving, via the proxy server, content from the content server using the metered data connection, wherein the content is compressed by the proxy server; determining that the first new wireless network connection is a secure connection; upon determining that the first new wireless network connection is a secure connection, indicating to a user that the first new wireless network connection is secure; detecting a second new wireless network connection; determining that the second new wireless network connection is a non-secure wireless connection; determining that the second new wireless network connection is not a metered data connection; causing the proxy server to inhibit compression of content sent to the user device in response to determining that the second new wireless network connection is not a metered data connection; causing information sent by the user device over the second new wireless network connection to be encrypted in response to determining that the second new wireless network connection is not secure; establishing a virtual private network connection between the user device and a virtual private network server using encrypted information sent over the second new wireless network connection in response to determining that the second new wireless network connection is not secure; upon establishing the virtual private network connection, indicating to the user that the second new wireless network connection is secure based on the virtual private network connection being established; and receiving content from the at least one remote content server over the second new wireless network connection as encrypted information from the virtual private network server. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification