Electronic transmissions with intermittent network connections

ABSTRACT

Embodiments relate to systems and methods for electronically conditioning transmission of communications based on results of a connection assessment. An electronic file is executed at an electronic device, which causes a first query and a second query to be presented. A first query response and a second query response are identified. The first query response is stored in a locked configuration that inhibits the ability to modify the first query response to the first query. The second query response is stored but is not stored in the locked configuration. Query response data is generated that includes an identifier of the second query, an identifier of the second query response and an identifier of the electronic device. A connection variable is determined by assessing one or more network connections available to the electronic device. When a transmission condition is satisfied, the query response data is transmitted to another device.

CROSS-REFERENCE OF RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/842,653, filed on Dec. 14, 2017, which is a continuation of U.S.patent application Ser. No. 14/753,858, filed on Jun. 29, 2015, which isa continuation-in-part of U.S. patent application Ser. No. 14/222,317,filed on Mar. 21, 2014, which are herein incorporated by reference intheir entirety for all purposes.

FIELD

This disclosure relates in general to methods and systems for executingfiles and electronically conditioning transmission of communicationsbased on results of a connection assessment.

BACKGROUND

Communication exchanges between devices are becoming increasinglyfrequent and important. In some instances, a first communication isreceived at a device, and one or more second communications aregenerated that include data responsive to content in the firstcommunication. However, circumstances may exist where a reliability atwhich the second communication(s) can be successfully transmitted isquestionable or poor. Thus, techniques that identify transmissionconditions and transmission characteristics would advantageous.

SUMMARY

In some embodiments, a system for electronically conditioningtransmission of communications based on results of a connectionassessment is provided. A file retriever receives, at an electronicdevice, one or more electronic files. An access engine executes at leastone of the one or more electronic files, wherein the execution causeseach of a first query and a second query to be presented at theelectronic device. A query response engine identifies a first queryresponse corresponding to the first query and stores the first queryresponse in a locked configuration. The locked configuration inhibitsthe ability to modify the first query response to the first query. Thequery engine also identifies a second query response corresponding tothe second query and stores the second query response. The second queryresponse is not stored in a locked configuration and is stored in aconfiguration that enables the stored second query response to bemodified. The query engine further generates query response data thatincludes an identifier of each of one or more queries, an identifier ofeach of one or more query responses, and an identifier of the electronicdevice, the one or more queries including the second query, and the oneor more query responses includes the second query response. A connectionassessor determines a connection variable by assessing one or morenetwork connections available to the electronic device and determineswhether a transmission condition is satisfied based on the connectionvariable. The determination includes comparing the connection variableto a threshold. A result of the determination indicates that thetransmission condition is satisfied when the connection variable exceedsthe threshold. A query response transmitter transmits, when it isdetermined that the transmission condition is satisfied, the queryresponse data from the electronic device to another device.

In some embodiments, a computer-implemented method for electronicallyconditioning transmission of communications based on results of aconnection assessment is provided. At an electronic device, one or moreelectronic files are executed, which causes each of a first query and asecond query to be presented at the electronic device. A first queryresponse corresponding to the first query is identified. The first queryresponse is stored in a locked configuration that inhibits the abilityto modify the first query response to the first query. A second queryresponse corresponding to the second query is identified and stored atthe electronic device. The second query response is not stored in alocked configuration and is stored in a configuration that enables thestored second query response to be modified. Query response data isgenerated that includes an identifier of each of one or more queries, anidentifier of each of one or more query responses, and an identifier ofthe electronic device. The one or more queries include the second query,and the one or more query responses include the second query response. Aconnection variable is determined by assessing one or more networkconnections available to the electronic device. It is determined whethera transmission condition is satisfied based on the connection variable.The determination includes comparing the connection variable to athreshold. A result of the determination indicates that the transmissioncondition is satisfied when the connection variable exceeds thethreshold. When it is determined that the transmission condition issatisfied, the query response data is transmitted from the electronicdevice to another device. A set of electronic files is received thatinclude the one or more electronic files. The one or more electronicfiles includes a first executable file compatible with a first browser.The set of electronic files includes a second executable file compatiblewith a second browser. It is identified that code for the first browseris being executed on the electronic device. The first executable filefor execution is selected based on the identification that code for thefirst browser is being executed and the second executable file is notexecuted at the electronic device.

In some embodiments, a computer-program product tangibly embodied in anon-transitory machine-readable storage medium, including instructionsconfigured to cause one or more data processors to perform one or moreactions from one or more processes disclosed herein.

In some embodiments, a computer program product is provided that istangibly embodied in a non-transitory machine-readable storage medium.The computer program product includes instructions configured to causeone or more data processors to perform actions including part or all ofa method disclosed herein.

Further areas of applicability of the present disclosure will becomeapparent from the detailed description provided hereinafter. It shouldbe understood that the detailed description and specific examples, whileindicating various embodiments, are intended for purposes ofillustration only and are not intended to necessarily limit the scope ofthe disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is described in conjunction with the appendedfigures:

FIG. 1 is a block diagram showing illustrating an example of a contentdistribution network.

FIG. 2 is a block diagram illustrating a computer server and computingenvironment within a content distribution network.

FIG. 3 is a block diagram illustrating an embodiment of one or more datastore servers within a content distribution network.

FIG. 4 is a block diagram illustrating an embodiment of one or morecontent management servers within a content distribution network.

FIG. 5 is a block diagram illustrating the physical and logicalcomponents of a special-purpose computer device within a contentdistribution network.

FIG. 6 depicts a block diagram of an embodiment of an query managementsystem;

FIG. 7 illustrates a flowchart of an embodiment of a process forretrieving an power file at an electronic device;

FIG. 8 illustrates a flowchart of an embodiment of a process foridentifying and transmitting query responses;

FIG. 9 illustrates a flowchart of an embodiment of a process forconditionally transmitting query responses;

FIG. 10 illustrates a flowchart of an embodiment of a process forcaching executable files;

FIG. 11 illustrates a flowchart of an embodiment of a process forcaching query responses;

FIG. 12 illustrates a flowchart of an embodiment of a process forelectronically executing an executable file; and

FIG. 13 illustrates a flow diagram of an embodiment of a process forupdating query response data based on conflict-resolution indications.

In the appended figures, similar components and/or features can have thesame reference label. Further, various components of the same type canbe distinguished by following the reference label by a dash and a secondlabel that distinguishes among the similar components. If only the firstreference label is used in the specification, the description isapplicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

DETAILED DESCRIPTION

The ensuing description provides illustrative embodiment(s) only and isnot intended to limit the scope, applicability or configuration of thedisclosure. Rather, the ensuing description of the illustrativeembodiment(s) will provide those skilled in the art with an enablingdescription for implementing a preferred exemplary embodiment. It isunderstood that various changes can be made in the function andarrangement of elements without departing from the spirit and scope asset forth in the appended claims.

With reference now to FIG. 1, a block diagram is shown illustratingvarious components of a content distribution network (CDN) 100 whichimplements and supports certain embodiments and features describedherein. Content distribution network 100 may include one or more contentmanagement servers 102. As discussed below in more detail, contentmanagement servers 102 may be any desired type of server including, forexample, a rack server, a tower server, a miniature server, a bladeserver, a mini rack server, a mobile server, an ultra-dense server, asuper server, or the like, and may include various hardware components,for example, a motherboard, a processing units, memory systems, harddrives, network interfaces, power supplies, etc. Content managementserver 102 may include one or more server farms, clusters, or any otherappropriate arrangement and/or combination or computer servers. Contentmanagement server 102 may act according to stored instructions locatedin a memory subsystem of the server 102, and may run an operatingsystem, including any commercially available server operating systemand/or any other operating systems discussed herein.

The content distribution network 100 may include one or more data storeservers 104, such as database servers and file-based storage systems.Data stores 104 may comprise stored data relevant to the functions ofthe content distribution network 100. Illustrative examples of datastores 104 that may be maintained in certain embodiments of the contentdistribution network 100 are described below in reference to FIG. 3. Insome embodiments, multiple data stores may reside on a single server104, either using the same storage components of server 104 or usingdifferent physical storage components to assure data security andintegrity between data stores. In other embodiments, each data store mayhave a separate dedicated data store server 104.

Content distribution network 100 also may include one or more userdevices 106 (e.g., electronic user devices) and/or supervisor devices110 (e.g., electronic supervisor devices). User devices 106 andsupervisor devices 110 may display content received via the contentdistribution network 100, and may support various types of userinteractions with the content. User devices 106 and supervisor devices110 may include mobile devices such as smartphones, tablet computers,personal digital assistants, and wearable computing devices. Such mobiledevices may run a variety of mobile operating systems, and may beenabled for Internet, e-mail, short message service (SMS), Bluetooth®,mobile radio-frequency identification (M-RFID), and/or othercommunication protocols. Other user devices 106 and supervisor devices110 may be general purpose personal computers or special-purposecomputing devices including, by way of example, personal computers,laptop computers, workstation computers, projection devices, andinteractive room display systems. Additionally, user devices 106 andsupervisor devices 110 may be any other electronic devices, such as athin-client computers, an Internet-enabled gaming systems, business orhome appliances, and/or a personal messaging devices, capable ofcommunicating over network(s) 120.

In different contexts of content distribution networks 100, user devices106 and supervisor devices 110 may correspond to different types ofspecialized devices, for example, student devices and teacher devices inan educational network, employee devices and presentation devices in acompany network, different gaming devices in a gaming network, etc. Insome embodiments, user devices 106 and supervisor devices 110 mayoperate in the same physical location 107, such as a classroom orconference room. In such cases, the devices may contain components thatsupport direct communications with other nearby devices, such as awireless transceivers and wireless communications interfaces, Ethernetsockets or other Local Area Network (LAN) interfaces, etc. In otherimplementations, the user devices 106 and supervisor devices 110 neednot be used at the same location 107, but may be used in remotegeographic locations in which each user device 106 and supervisor device110 may use security features and/or specialized hardware (e.g.,hardware-accelerated SSL and HTTPS, WS-Security, firewalls, etc.) tocommunicate with the content management server 102 and/or other remotelylocated user devices 106. Additionally, different user devices 106 andsupervisor devices 110 may be assigned different designated roles, suchas presenter devices, teacher devices, administrator devices, or thelike, and in such cases the different devices may be provided withadditional hardware and/or software components to provide content andsupport user capabilities not available to the other devices.

The content distribution network 100 also may include a privacy server108 that maintains private user information at the privacy server 108while using applications or services hosted on other servers. Forexample, the privacy server 108 may be used to maintain private data ofa user within one jurisdiction even though the user is accessing anapplication hosted on a server (e.g., the content management server 102)located outside the jurisdiction. In such cases, the privacy server 108may intercept communications between a user device 106 or supervisordevice 110 and other devices that include private user information. Theprivacy server 108 may create a token or identifier that does notdisclose the private information and may use the token or identifierwhen communicating with the other servers and systems, instead of usingthe user's private information.

As illustrated in FIG. 1, the content management server 102 may be incommunication with one or more additional servers, such as a contentserver 112, a user data server 112, and/or an administrator server 116.Each of these servers may include some or all of the same physical andlogical components as the content management server(s) 102, and in somecases, the hardware and software components of these servers 112-116 maybe incorporated into the content management server(s) 102, rather thanbeing implemented as separate computer servers.

Content server 112 may include hardware and software components togenerate, store, and maintain the content resources for distribution touser devices 106 and other devices in the network 100. For example, incontent distribution networks 100 used for professional training andeducational purposes, content server 112 may include data stores oftraining materials, presentations, interactive programs and simulations,course models, course outlines, and various training interfaces thatcorrespond to different materials and/or different types of user devices106. In content distribution networks 100 used for media distribution,interactive gaming, and the like, a content server 112 may include mediacontent files such as music, movies, television programming, games, andadvertisements.

User data server 114 may include hardware and software components thatstore and process data for multiple users relating to each user'sactivities and usage of the content distribution network 100. Forexample, the content management server 102 may record and track eachuser's system usage, including their user device 106, content resourcesaccessed, and interactions with other user devices 106. This data may bestored and processed by the user data server 114, to support usertracking and analysis features. For instance, in the professionaltraining and educational contexts, the user data server 114 may storeand analyze each user's training materials viewed, presentationsattended, courses completed, interactions, evaluation results, and thelike. The user data server 114 may also include a repository foruser-generated material, such as evaluations and tests completed byusers, and documents and assignments prepared by users. In the contextof media distribution and interactive gaming, the user data server 114may store and process resource access data for multiple users (e.g.,content titles accessed, access times, data usage amounts, gaminghistories, user devices and device types, etc.).

Administrator server 116 may include hardware and software components toinitiate various administrative functions at the content managementserver 102 and other components within the content distribution network100. For example, the administrator server 116 may monitor device statusand performance for the various servers, data stores, and/or userdevices 106 in the content distribution network 100. When necessary, theadministrator server 116 may add or remove devices from the network 100,and perform device maintenance such as providing software updates to thedevices in the network 100. Various administrative tools on theadministrator server 116 may allow authorized users to set user accesspermissions to various content resources, monitor resource usage byusers and devices 106, and perform analyses and generate reports onspecific network users and/or devices (e.g., resource usage trackingreports, training evaluations, etc.).

The content distribution network 100 may include one or morecommunication networks 120. Although only a single network 120 isidentified in FIG. 1, the content distribution network 100 may includeany number of different communication networks between any of thecomputer servers and devices shown in FIG. 1 and/or other devicesdescribed herein. Communication networks 120 may enable communicationbetween the various computing devices, servers, and other components ofthe content distribution network 100. As discussed below, variousimplementations of content distribution networks 100 may employdifferent types of networks 120, for example, computer networks,telecommunications networks, wireless networks, and/or any combinationof these and/or other networks.

It will be appreciated that content distribution network 100 can includeone or more other devices and/or servers not depicted in FIG. 1. Forexample, content distribution network 100 (e.g., which can include orcan be a central server) can include a relay device (e.g., which caninclude or can be a proctor device) that can be connected to one or moreuser devices 106 and to a remote content management server 102. Therelay device may be, in some instances, located in a same room and/or asame building as the one or more user devices. Depending on theembodiment, the relay device may be connected to content managementserver 102 and the one or more user devices 106 over a same or differenttypes of networks. For example, the relay device may be connected tocontent management server 102 via a wireless connection (e.g., WiFi) andto the one or more user devices 106 via a short-range (e.g., Bluetooth)connection, wired network and/or local network.

The relay device may retrieve one or more files (e.g., a power fileand/or one or more executable files) from content management server 102.In some instances, the one or more files are encrypted, and the relaydevice may, or may not, decrypt the file(s). The relay device may beconfigured to encrypt (e.g., encrypt a file not encrypted when received;encrypt a decrypted file; or doubly encrypt a file). The encryption maybe configured such that an encrypted file transmitted to each ofmultiple user devices can be decrypted with a same key, or theencryption can include a layer specific to a user device. For example, akey (or part thereof) may correspond to a particular user, account oruser device. A key may include multiple components, with one componentbeing user-specific; one component being specific to a file or fileclass (e.g., a particular exam); one component being specific to a date;and/or one component being specific to a location.

The relay device may subsequently (e.g., at or after a defined timeand/or upon receiving an instruction from content management server 102or request from a user device) transmit the one or more files to a userdevice. The one or more files can include one or more executable files.When the one or more files are received at the user device, the userdevice may decrypt the file(s) (e.g., individually or a collection ofthe files) using a stored key or a derived key. For example, the one ormore files can be transmitted with or in association with a file thatidentifies a protocol for generating a key (e.g., using an identifier ofa time, location, user, user device and/or account).

When executed, an executable file can facilitate or cause one or morequeries (e.g., one or more questions) to be presented at an executingdevice. The execution can further cause or facilitate a response to eachof the one or more queries to be identified. For example, a input can beprovided at an interface, which can be associated with response.

The response can be stored in a locked or unlocked configuration. Alocked configuration can be one that inhibits or prevents the responsefrom being changed via subsequent input. For example, once inputidentifies a particular response for a given query, storing theparticular response in a locked configuration can prevent identifying adifferent response for that query. In some instances, one or moreresponses (e.g., identified while executing a given executable fileand/or provided in response to a query in a given exam) are stored in alocked configuration and one or more other responses (e.g., identifiedwhile executing the same given executable file and/or provided inresponse to another query in the same given exam) are stored in anunlocked configuration.

In one instance, a response is stored in a locked configuration when aparticular input has been received at the executing user device (e.g.,submitting or locking a response). In one instance, a response is storedin a locked configuration (which can include changing the configurationto a locked configuration) after a defined time period has passed or adefined number of other responses have been provided since identifyingthe response. In one instance, a response is stored in a lockedconfiguration when one or more subsequent queries have been identifiedbased on the response. In one instance, a response is stored in a lockedconfiguration when response data identifying the response has beentransmitted or successfully transmitted (e.g., to a relay device orcontent management server 102). In one instance, a structure fileidentifies which responses are to be stored in a locked configuration,whether all responses are to be stored in a locked (or unlocked)configuration and/or any conditions (e.g., time passage, queryadaptation, local input, etc.) for storing a response in a lockedconfiguration.

Response data can include one or more responses (e.g., identified inassociation with a corresponding one or more questions). Response datamay further include an identifier of a user, electronic device, useraccount, and/or one more times (e.g., a time at which response data isgenerated or a time at which each of one or more responses wereprovided). Response data may be transmitted (e.g., to a relay device orcontent management server 102). The response data may be transmitted,for example, upon a defined number of responses being identified and/orstored; at one or more defined times; at defined time intervals; uponreceiving a local instruction (e.g., a submission instruction orresponse-confirmation indication) initiating the transmission; and/orupon receiving a request for response data (e.g., from a relay device).

The transmission may further and/or alternatively depend on networkfactors. For example, transmission of response data may require that athreshold number (e.g., at least one or at least a defined non-onenumber) of networks are available; that a threshold number of networkshaving a network strength greater than or equal to a strength threshold(e.g., a non-zero strength threshold) are available; that a thresholdnumber of networks of a particular type (e.g., short-range network, WiFinetwork, or a Bluetooth network) are available; that a particular orthreshold number of networks have an upload speed that is at least adefined upload speed threshold; that a particular or threshold number ofnetworks have a download speed that is at least a defined download speedthreshold; and/or that a particular or threshold number of networks havea latency less than or equal to a defined latency threshold.

When response data is transmitted to the relay device, the relay devicemay subsequently transmit the response data (e.g., and an appended orprocessed version thereof) to content management server 102.

With reference to FIG. 2, an illustrative distributed computingenvironment 200 is shown including a computer server 202, four clientcomputing devices 206, and other components that may implement certainembodiments and features described herein. In some embodiments, theserver 202 may correspond to the content management server 102 discussedabove in FIG. 1, and the client computing devices 206 may correspond tothe user devices 106. However, the computing environment 200 illustratedin FIG. 2 may correspond to any other combination of devices and serversconfigured to implement a client-server model or other distributedcomputing architecture. In one instance, computer server 202 maycorrespond to a relay device. In one instance, computer server 202 maycorrespond to a distributed system, such as one that resides in part ata relay device and in part at a remote content management server 102(e.g., in a cloud).

Client devices 206 may be configured to receive and execute clientapplications over one or more networks 220. Such client applications maybe web browser based applications and/or standalone softwareapplications, such as mobile device applications. Server 202 may becommunicatively coupled with the client devices 206 via one or morecommunication networks 220. Client devices 206 may receive clientapplications from server 202 or from other application providers (e.g.,public or private application stores). Server 202 may be configured torun one or more server software applications or services, for example,web-based or cloud-based services, to support content distribution andinteraction with client devices 206. Users operating client devices 206may in turn utilize one or more client applications (e.g., virtualclient applications) to interact with server 202 to utilize the servicesprovided by these components.

Various different subsystems and/or components 204 may be implemented onserver 202. Users operating the client devices 206 may initiate one ormore client applications to use services provided by these subsystemsand components. The subsystems and components within the server 202 andclient devices 206 may be implemented in hardware, firmware, software,or combinations thereof. Various different system configurations arepossible in different distributed computing systems 200 and contentdistribution networks 100. The embodiment shown in FIG. 2 is thus oneexample of a distributed computing system and is not intended to belimiting.

Although exemplary computing environment 200 is shown with four clientcomputing devices 206, any number of client computing devices may besupported. Other devices, such as specialized sensor devices, etc., mayinteract with client devices 206 and/or server 202.

As shown in FIG. 2, various security and integration components 208 maybe used to send and manage communications between the server 202 anduser devices 206 over one or more communication networks 220. Thesecurity and integration components 208 may include separate servers,such as web servers and/or authentication servers, and/or specializednetworking components, such as firewalls, routers, gateways, loadbalancers, and the like. In some cases, the security and integrationcomponents 208 may correspond to a set of dedicated hardware and/orsoftware operating at the same physical location and under the controlof same entities as server 202. For example, components 208 may includeone or more dedicated web servers and network hardware in a datacenteror a cloud infrastructure. In other examples, the security andintegration components 208 may correspond to separate hardware andsoftware components which may be operated at a separate physicallocation and/or by a separate entity.

Security and integration components 208 may implement various securityfeatures for data transmission and storage, such as authenticating usersand restricting access to unknown or unauthorized users. In variousimplementations, security and integration components 208 may provide,for example, a file-based integration scheme or a service-basedintegration scheme for transmitting data between the various devices inthe content distribution network 100. Security and integrationcomponents 208 also may use secure data transmission protocols and/orencryption for data transfers, for example, File Transfer Protocol(FTP), Secure File Transfer Protocol (SFTP), and/or Pretty Good Privacy(PGP) encryption.

In some embodiments, one or more web services may be implemented withinthe security and integration components 208 and/or elsewhere within thecontent distribution network 100. Such web services, includingcross-domain and/or cross-platform web services, may be developed forenterprise use in accordance with various web service standards, such asthe Web Service Interoperability (WS-I) guidelines. For example, someweb services may use the Secure Sockets Layer (SSL) or Transport LayerSecurity (TLS) protocol to provide secure connections between the server202 and user devices 206. SSL or TLS may use HTTP or HTTPS to provideauthentication and confidentiality. In other examples, web services maybe implemented using the WS-Security standard, which provides for secureSOAP messages using XML encryption. In other examples, the security andintegration components 208 may include specialized hardware forproviding secure web services. For example, security and integrationcomponents 208 may include secure network appliances having built-infeatures such as hardware-accelerated SSL and HTTPS, WS-Security, andfirewalls. Such specialized hardware may be installed and configured infront of any web servers, so that any external devices may communicatedirectly with the specialized hardware.

Communication network(s) 220 may be any type of network familiar tothose skilled in the art that can support data communications using anyof a variety of commercially-available protocols, including withoutlimitation, TCP/IP (transmission control protocol/Internet protocol),SNA (systems network architecture), IPX (Internet packet exchange),Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols,Hyper Text Transfer Protocol (HTTP) and Secure Hyper Text TransferProtocol (HTTPS), and the like. Merely by way of example, network(s) 220may be local area networks (LAN), such as one based on Ethernet,Token-Ring and/or the like. Network(s) 220 also may be wide-areanetworks, such as the Internet. Networks 220 may includetelecommunication networks such as a public switched telephone networks(PSTNs), or virtual networks such as an intranet or an extranet.Infrared and wireless networks (e.g., using the Institute of Electricaland Electronics (IEEE) 802.11 protocol suite or other wirelessprotocols) also may be included in networks 220.

Computing environment 200 also may include one or more data stores 210and/or back-end servers 212. In certain examples, the data stores 210may correspond to data store server(s) 104 discussed above in FIG. 1,and back-end servers 212 may correspond to the various back-end servers112-116. Data stores 210 and servers 212 may reside in the samedatacenter or may operate at a remote location from server 202. In somecases, one or more data stores 210 may reside on a non-transitorystorage medium within the server 202. Other data stores 210 and back-endservers 212 may be remote from server 202 and configured to communicatewith server 202 via one or more networks 220. In certain embodiments,data stores 210 and back-end servers 212 may reside in a storage-areanetwork (SAN).

With reference to FIG. 3, an illustrative set of data stores and/or datastore servers is shown, corresponding to the data store servers 104 ofthe content distribution network 100 discussed above in FIG. 1. One ormore individual data stores 301-309 may reside in storage on a singlecomputer server 104 (or a single server farm or cluster) under thecontrol of a single entity, or may reside on separate servers operatedby different entities and/or at remote locations. In some embodiments,data stores 301-309 may be accessed by the content management server 102and/or other devices and servers within the network 100 (e.g., userdevices 106, supervisor devices 110, administrator servers 116, etc.).Access to one or more of the data stores 301-309 may be limited ordenied based on the processes, user credentials, and/or devicesattempting to interact with the data store.

In one instance, some or all of data stores 301-309 reside in storage ona remote server 104 and a corresponding data store for each of at leastone of data stores 301-309 or another data store reside in a relaydevice. Thus, the relay device may receive data from the remote serverand store the data locally (e.g., to facilitate subsequent transmissionto a user device). Similarly, a corresponding data store for at leastone of data stores 301-309 or another data store may reside at a userdevice 106. For example, a content management server 102 may provideselect data from evaluation data store 308 to a relay device (which canstore the data in a corresponding data store), which can transmit someor all of the data to a user device.

The paragraphs below describe examples of specific data stores that maybe implemented within some embodiments of a content distribution network100. It should be understood that the below descriptions of data stores301-309, including their functionality and types of data stored therein,are illustrative and non-limiting. Data stores server architecture,design, and the execution of specific data stores 301-309 may depend onthe context, size, and functional requirements of a content distributionnetwork 100. For example, in content distribution systems 100 used forprofessional training and educational purposes, separate databases orfile-based storage systems may be implemented in data store server(s)104 to store trainee and/or student data, trainer and/or professor data,training module data and content descriptions, training results,evaluation data, and the like. In contrast, in content distributionsystems 100 used for media distribution from content providers tosubscribers, separate data stores may be implemented in data storesserver(s) 104 to store listings of available content titles anddescriptions, content title usage statistics, subscriber profiles,account data, payment data, network usage statistics, etc.

A user profile data store 301 may include information relating to theend users within the content distribution network 100. This informationmay include user characteristics such as the user names, accesscredentials (e.g., logins and passwords), user preferences, andinformation relating to any previous user interactions within thecontent distribution network 100 (e.g., requested content, postedcontent, content modules completed, training scores or evaluations,other associated users, etc.).

An accounts data store 302 may generate and store account data fordifferent users in various roles within the content distribution network100. For example, accounts may be created in an accounts data store 302for individual end users, supervisors, administrator users, and entitiessuch as companies or educational institutions. Account data may includeaccount types, current account status, account characteristics, and anyparameters, limits, restrictions associated with the accounts.

A content library data store 303 may include information describing theindividual content items (or content resources) available via thecontent distribution network 100. In some embodiments, the library datastore 303 may include metadata, properties, and other characteristicsassociated with the content resources stored in the content server 112.Such data may identify one or more aspects or content attributes of theassociated content resources, for example, subject matter, access level,or skill level of the content resources, license attributes of thecontent resources (e.g., any limitations and/or restrictions on thelicensable use and/or distribution of the content resource), priceattributes of the content resources (e.g., a price and/or pricestructure for determining a payment amount for use or distribution ofthe content resource), rating attributes for the content resources(e.g., data indicating the evaluation or effectiveness of the contentresource), and the like. In some embodiments, the library data store 303may be configured to allow updating of content metadata or properties,and to allow the addition and/or removal of information relating to thecontent resources.

A pricing data store 304 may include pricing information and/or pricingstructures for determining payment amounts for providing access to thecontent distribution network 100 and/or the individual content resourceswithin the network 100. In some cases, pricing may be determined basedon a user's access to the content distribution network 100, for example,a time-based subscription fee, or pricing based on network usage and. Inother cases, pricing may be tied to specific content resources. Certaincontent resources may have associated pricing information, whereas otherpricing determinations may be based on the resources accessed, theprofiles and/or accounts of the user, and the desired level of access(e.g., duration of access, network speed, etc.). Additionally, thepricing data store 304 may include information relating to compilationpricing for groups of content resources, such as group prices and/orprice structures for groupings of resources.

A license data store 305 may include information relating to licensesand/or licensing of the content resources within the contentdistribution network 100. For example, the license data store 305 mayidentify licenses and licensing terms for individual content resourcesand/or compilations of content resources in the content server 112, therights holders for the content resources, and/or common or large-scaleright holder information such as contact information for rights holdersof content not included in the content server 112.

A content access data store 306 may include access rights and securityinformation for the content distribution network 100 and specificcontent resources. For example, the content access data store 306 mayinclude login information (e.g., user identifiers, logins, passwords,etc.) that can be verified during user login attempts to the network100. The content access data store 306 also may be used to storeassigned user roles and/or user levels of access. For example, a user'saccess level may correspond to the sets of content resources and/or theclient or server applications that the user is permitted to access.Certain users may be permitted or denied access to certain applicationsand resources based on their subscription level, training program,course/grade level, etc. Certain users may have supervisory access overone or more end users, allowing the supervisor to access all or portionsof the end user's content, activities, evaluations, etc. Additionally,certain users may have administrative access over some users and/or someapplications in the content management network 100, allowing such usersto add and remove user accounts, modify user access permissions, performmaintenance updates on software and servers, etc.

A source data store 307 may include information relating to the sourceof the content resources available via the content distribution network.For example, a source data store 307 may identify the authors andoriginating devices of content resources, previous pieces of data and/orgroups of data originating from the same authors or originating devices,and the like.

An evaluation data store 308 may include information used to direct theevaluation of users and content resources in the content managementnetwork 100. In some embodiments, the evaluation data store 308 maycontain, for example, the analysis criteria and the analysis guidelinesfor evaluating users (e.g., trainees/students, gaming users, mediacontent consumers, etc.) and/or for evaluating the content resources inthe network 100. The evaluation data store 308 also may includeinformation relating to evaluation processing tasks, for example, theidentification of users and user devices 106 that have received certaincontent resources or accessed certain applications, the status ofevaluations or evaluation histories for content resources, users, orapplications, and the like. Evaluation criteria may be stored in theevaluation data store 308 including data and/or instructions in the formof one or several electronic rubrics or scoring guides for use in theevaluation of the content, users, or applications. The evaluation datastore 308 also may include past evaluations and/or evaluation analysesfor users, content, and applications, including relative rankings,characterizations, explanations, and the like.

In addition to the illustrative data stores described above, data storeserver(s) 104 (e.g., database servers, file-based storage servers, etc.)may include one or more external data aggregators 309. External dataaggregators 309 may include third-party data sources accessible to thecontent management network 100, but not maintained by the contentmanagement network 100. External data aggregators 309 may include anyelectronic information source relating to the users, content resources,or applications of the content distribution network 100. For example,external data aggregators 309 may be third-party data stores containingdemographic data, education related data, consumer sales data, healthrelated data, and the like. Illustrative external data aggregators 309may include, for example, social networking web servers, public recordsdata stores, learning management systems, educational institutionservers, business servers, consumer sales data stores, medical recorddata stores, etc. Data retrieved from various external data aggregators309 may be used to verify and update user account information, suggestuser content, and perform user and content evaluations.

With reference now to FIG. 4, a block diagram is shown illustrating anembodiment of one or more content management servers 102 within acontent distribution network 100. As discussed above, content managementserver(s) 102 may include various server hardware and softwarecomponents that manage the content resources within the contentdistribution network 100 and provide interactive and adaptive content tousers on various user devices 106. For example, content managementserver(s) 102 may provide instructions to and receive information fromthe other devices within the content distribution network 100, in orderto manage and transmit content resources, user data, and server orclient applications executing within the network 100.

A content management server 102 may include a content customizationsystem 402. The content customization system 402 may be implementedusing dedicated hardware within the content distribution network 100(e.g., a content customization server 402), or using designated hardwareand software resources within a shared content management server 102.

It will be appreciated that, though FIG. 4 shows content managementserver 102 as including content customization system 402, usermanagement system 404, evaluation system 406 and content delivery system408, one or more of the systems (or corresponding or similar systems)may also or alternatively reside on a different device. For example, auser device (e.g., executing an executable file) and/or relay device mayinclude an evaluation system, and/or a relay device may include a usermanagement system 404 and/or content delivery system 408.

In some embodiments, the content customization system 402 may adjust theselection and adaptive capabilities of content resources to match theneeds and desires of the users receiving the content. For example, thecontent customization system 402 may query various data stores andservers 104 to retrieve user information, such as user preferences andcharacteristics (e.g., from a user profile data store 301), user accessrestrictions to content recourses (e.g., from a content access datastore 306), previous user results and content evaluations (e.g., from anevaluation data store 308), and the like. Based on the retrievedinformation from data stores 104 and other data sources, the contentcustomization system 402 may modify content resources for individualusers.

A content management server 102 also may include a user managementsystem 404. The user management system 404 may be implemented usingdedicated hardware within the content distribution network 100 (e.g., auser management server 404), or using designated hardware and softwareresources within a shared content management server 102. In someembodiments, the user management system 404 may monitor the progress ofusers through various types of content resources and groups, such asmedia compilations, courses or curriculums in training or educationalcontexts, interactive gaming environments, and the like. For example,the user management system 404 may query one or more databases and/ordata store servers 104 to retrieve user data such as associated contentcompilations or programs, content completion status, user goals,results, and the like.

A content management server 102 also may include an evaluation system406. The evaluation system 406 may be implemented using dedicatedhardware within the content distribution network 100 (e.g., anevaluation server 406), or using designated hardware and softwareresources within a shared content management server 102. The evaluationsystem 406 may be configured to receive and analyze information fromuser devices 106. For example, various ratings of content resourcessubmitted by users may be compiled and analyzed, and then stored in adata store (e.g., a content library data store 303 and/or evaluationdata store 308) associated with the content. In some embodiments, theevaluation server 406 may analyze the information to determine theeffectiveness or appropriateness of content resources with, for example,a subject matter, an age group, a skill level, or the like. In someembodiments, the evaluation system 406 may provide updates to thecontent customization system 402 or the user management system 404, withthe attributes of one or more content resources or groups of resourceswithin the network 100. The evaluation system 406 also may receive andanalyze user evaluation data from user devices 106, supervisor devices110, and administrator servers 116, etc. For instance, evaluation system406 may receive, aggregate, and analyze user evaluation data fordifferent types of users (e.g., end users, supervisors, administrators,etc.) in different contexts (e.g., media consumer ratings, trainee orstudent comprehension levels, teacher effectiveness levels, gamer skilllevels, etc.).

A content management server 102 also may include a content deliverysystem 408. The content delivery system 408 may be implemented usingdedicated hardware within the content distribution network 100 (e.g., acontent delivery server 408), or using designated hardware and softwareresources within a shared content management server 102. The contentdelivery system 408 may receive content resources from the contentcustomization system 402 and/or from the user management system 404, andprovide the resources to user devices 106. The content delivery system408 may determine the appropriate presentation format for the contentresources based on the user characteristics and preferences, and/or thedevice capabilities of user devices 106. If needed, the content deliverysystem 408 may convert the content resources to the appropriatepresentation format and/or compress the content before transmission. Insome embodiments, the content delivery system 408 may also determine theappropriate transmission media and communication protocols fortransmission of the content resources.

In some embodiments, the content delivery system 408 may includespecialized security and integration hardware 410, along withcorresponding software components to implement the appropriate securityfeatures content transmission and storage, to provide the supportednetwork and client access models, and to support the performance andscalability requirements of the network 100. The security andintegration layer 410 may include some or all of the security andintegration components 208 discussed above in FIG. 2, and may controlthe transmission of content resources and other data, as well as thereceipt of requests and content interactions, to and from the userdevices 106, supervisor devices 110, administrative servers 116, andother devices in the network 100.

With reference now to FIG. 5, a block diagram of an illustrativecomputer system is shown. The system 500 may correspond to any of thecomputing devices or servers of the content distribution network 100described above, or any other computing devices described herein. Inthis example, computer system 500 includes processing units 504 thatcommunicate with a number of peripheral subsystems via a bus subsystem502. These peripheral subsystems include, for example, a storagesubsystem 510, an I/O subsystem 526, and a communications subsystem 532.

Bus subsystem 502 provides a mechanism for letting the variouscomponents and subsystems of computer system 500 communicate with eachother as intended. Although bus subsystem 502 is shown schematically asa single bus, alternative embodiments of the bus subsystem may utilizemultiple buses. Bus subsystem 502 may be any of several types of busstructures including a memory bus or memory controller, a peripheralbus, and a local bus using any of a variety of bus architectures. Sucharchitectures may include, for example, an Industry StandardArchitecture (ISA) bus, Micro Channel Architecture (MCA) bus, EnhancedISA (EISA) bus, Video Electronics Standards Association (VESA) localbus, and Peripheral Component Interconnect (PCI) bus, which can beimplemented as a Mezzanine bus manufactured to the IEEE P1386.1standard.

Processing unit 504, which may be implemented as one or more integratedcircuits (e.g., a conventional microprocessor or microcontroller),controls the operation of computer system 500. One or more processors,including single core and/or multicore processors, may be included inprocessing unit 504. As shown in the figure, processing unit 504 may beimplemented as one or more independent processing units 506 and/or 508with single or multicore processors and processor caches included ineach processing unit. In other embodiments, processing unit 504 may alsobe implemented as a quad-core processing unit or larger multicoredesigns (e.g., hexa-core processors, octo-core processors, ten-coreprocessors, or greater.

Processing unit 504 may execute a variety of software processes embodiedin program code, and may maintain multiple concurrently executingprograms or processes. At any given time, some or all of the programcode to be executed can be resident in processor(s) 504 and/or instorage subsystem 510. In some embodiments, computer system 500 mayinclude one or more specialized processors, such as digital signalprocessors (DSPs), outboard processors, graphics processors,application-specific processors, and/or the like.

I/O subsystem 526 may include device controllers 528 for one or moreuser interface input devices and/or user interface output devices 530.User interface input and output devices 530 may be integral with thecomputer system 500 (e.g., integrated audio/video systems, and/ortouchscreen displays), or may be separate peripheral devices which areattachable/detachable from the computer system 500.

Input devices 530 may include a keyboard, pointing devices such as amouse or trackball, a touchpad or touch screen incorporated into adisplay, a scroll wheel, a click wheel, a dial, a button, a switch, akeypad, audio input devices with voice command recognition systems,microphones, and other types of input devices. Input devices 530 mayalso include three dimensional (3D) mice, joysticks or pointing sticks,gamepads and graphic tablets, and audio/visual devices such as speakers,digital cameras, digital camcorders, portable media players, webcams,image scanners, fingerprint scanners, barcode reader 3D scanners, 3Dprinters, laser rangefinders, and eye gaze tracking devices. Additionalinput devices 530 may include, for example, motion sensing and/orgesture recognition devices that enable users to control and interactwith an input device through a natural user interface using gestures andspoken commands, eye gesture recognition devices that detect eyeactivity from users and transform the eye gestures as input into aninput device, voice recognition sensing devices that enable users tointeract with voice recognition systems through voice commands, medicalimaging input devices, MIDI keyboards, digital musical instruments, andthe like.

Output devices 530 may include one or more display subsystems, indicatorlights, or non-visual displays such as audio output devices, etc.Display subsystems may include, for example, cathode ray tube (CRT)displays, flat-panel devices, such as those using a liquid crystaldisplay (LCD) or plasma display, projection devices, touch screens, andthe like. In general, use of the term “output device” is intended toinclude all possible types of devices and mechanisms for outputtinginformation from computer system 500 to a user or other computer. Forexample, output devices 530 may include, without limitation, a varietyof display devices that visually convey text, graphics and audio/videoinformation such as monitors, printers, speakers, headphones, automotivenavigation systems, plotters, voice output devices, and modems.

Computer system 500 may comprise one or more storage subsystems 510,comprising hardware and software components used for storing data andprogram instructions, such as system memory 518 and computer-readablestorage media 516. The system memory 518 and/or computer-readablestorage media 516 may store program instructions that are loadable andexecutable on processing units 504, as well as data generated during theexecution of these programs.

Depending on the configuration and type of computer system 500, systemmemory 318 may be stored in volatile memory (such as random accessmemory (RAM) 512) and/or in non-volatile storage drives 514 (such asread-only memory (ROM), flash memory, etc.) The RAM 512 may contain dataand/or program modules that are immediately accessible to and/orpresently being operated and executed by processing units 504. In someimplementations, system memory 518 may include multiple different typesof memory, such as static random access memory (SRAM) or dynamic randomaccess memory (DRAM). In some implementations, a basic input/outputsystem (BIOS), containing the basic routines that help to transferinformation between elements within computer system 500, such as duringstart-up, may typically be stored in the non-volatile storage drives514. By way of example, and not limitation, system memory 518 mayinclude application programs 520, such as client applications, Webbrowsers, mid-tier applications, server applications, etc., program data522, and an operating system 524.

Storage subsystem 510 also may provide one or more tangiblecomputer-readable storage media 516 for storing the basic programmingand data constructs that provide the functionality of some embodiments.Software (programs, code modules, instructions) that when executed by aprocessor provide the functionality described herein may be stored instorage subsystem 510. These software modules or instructions may beexecuted by processing units 504. Storage subsystem 510 may also providea repository for storing data used in accordance with the presentinvention.

Storage subsystem 300 may also include a computer-readable storage mediareader that can further be connected to computer-readable storage media516. Together and, optionally, in combination with system memory 518,computer-readable storage media 516 may comprehensively representremote, local, fixed, and/or removable storage devices plus storagemedia for temporarily and/or more permanently containing, storing,transmitting, and retrieving computer-readable information.

Computer-readable storage media 516 containing program code, or portionsof program code, may include any appropriate media known or used in theart, including storage media and communication media, such as but notlimited to, volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information. This can include tangible computer-readable storagemedia such as RAM, ROM, electronically erasable programmable ROM(EEPROM), flash memory or other memory technology, CD-ROM, digitalversatile disk (DVD), or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or other tangible computer readable media. This can also includenontangible computer-readable media, such as data signals, datatransmissions, or any other medium which can be used to transmit thedesired information and which can be accessed by computer system 500.

By way of example, computer-readable storage media 516 may include ahard disk drive that reads from or writes to non-removable, nonvolatilemagnetic media, a magnetic disk drive that reads from or writes to aremovable, nonvolatile magnetic disk, and an optical disk drive thatreads from or writes to a removable, nonvolatile optical disk such as aCD ROM, DVD, and Blu-Ray® disk, or other optical media.Computer-readable storage media 516 may include, but is not limited to,Zip® drives, flash memory cards, universal serial bus (USB) flashdrives, secure digital (SD) cards, DVD disks, digital video tape, andthe like. Computer-readable storage media 516 may also include,solid-state drives (SSD) based on non-volatile memory such asflash-memory based SSDs, enterprise flash drives, solid state ROM, andthe like, SSDs based on volatile memory such as solid state RAM, dynamicRAM, static RAM, DRAM-based SSDs, magnetoresistive RAM (MRAM) SSDs, andhybrid SSDs that use a combination of DRAM and flash memory based SSDs.The disk drives and their associated computer-readable media may providenon-volatile storage of computer-readable instructions, data structures,program modules, and other data for computer system 500.

Communications subsystem 532 may provide a communication interface fromcomputer system 500 and external computing devices via one or morecommunication networks, including local area networks (LANs), wide areanetworks (WANs) (e.g., the Internet), and various wirelesstelecommunications networks. As illustrated in FIG. 5, thecommunications subsystem 532 may include, for example, one or morenetwork interface controllers (NICs) 534, such as Ethernet cards,Asynchronous Transfer Mode NICs, Token Ring NICs, and the like, as wellas one or more wireless communications interfaces 536, such as wirelessnetwork interface controllers (WNICs), wireless network adapters, andthe like. Additionally and/or alternatively, the communicationssubsystem 532 may include one or more modems (telephone, satellite,cable, ISDN), synchronous or asynchronous digital subscriber line (DSL)units, FireWire® interfaces, USB® interfaces, and the like.Communications subsystem 536 also may include radio frequency (RF)transceiver components for accessing wireless voice and/or data networks(e.g., using cellular telephone technology, advanced data networktechnology, such as 3G, 4G or EDGE (enhanced data rates for globalevolution), WiFi (IEEE 802.11 family standards, or other mobilecommunication technologies, or any combination thereof), globalpositioning system (GPS) receiver components, and/or other components.

The various physical components of the communications subsystem 532 maybe detachable components coupled to the computer system 500 via acomputer network, a FireWire® bus, or the like, and/or may be physicallyintegrated onto a motherboard of the computer system 500. Communicationssubsystem 532 also may be implemented in whole or in part by software.

In some embodiments, communications subsystem 532 may also receive inputcommunication in the form of structured and/or unstructured data feeds,event streams, event updates, and the like, on behalf of one or moreusers who may use or access computer system 500. For example,communications subsystem 532 may be configured to receive data feeds inreal-time from users of social networks and/or other communicationservices, web feeds such as Rich Site Summary (RSS) feeds, and/orreal-time updates from one or more third party information sources(e.g., data aggregators 309). Additionally, communications subsystem 532may be configured to receive data in the form of continuous datastreams, which may include event streams of real-time events and/orevent updates (e.g., sensor data applications, financial tickers,network performance measuring tools, clickstream analysis tools,automobile traffic monitoring, etc.). Communications subsystem 532 mayoutput such structured and/or unstructured data feeds, event streams,event updates, and the like to one or more data stores 104 that may bein communication with one or more streaming data source computerscoupled to computer system 500.

Due to the ever-changing nature of computers and networks, thedescription of computer system 500 depicted in the figure is intendedonly as a specific example. Many other configurations having more orfewer components than the system depicted in the figure are possible.For example, customized hardware might also be used and/or particularelements might be implemented in hardware, firmware, software, or acombination. Further, connection to other computing devices, such asnetwork input/output devices, may be employed. Based on the disclosureand teachings provided herein, a person of ordinary skill in the artwill appreciate other ways and/or methods to implement the variousembodiments.

Referring next to FIG. 6, a block diagram of an embodiment of querymanagement system 150 is shown. Query management system 150 can be, inpart or in its entirety, in the cloud. In some instances, at least partof query management system 150 is present on a device, such as a userdevice 106 or a relay device. Query management system 150 can include adistributed system (e.g., part residing in content management server 102and part on user device 106, part residing in the cloud and part on userdevice 106, part residing in content management server 102 and part on arelay device and part on user device 106, etc.). Further, it will beappreciated that each of one or more components of query managementsystem 150 may reside on multiple devices. For example, each of a relaydevice and user device 106 may include an account engine 605 to verifyan identity of a proctor and user, respectively, and each device mayfurther include an interface engine 615 to receive inputs and presentoutputs. The operation of a given component may depend upon the type ofdevice.

Query management system 150 includes an account engine 605, whichgenerates and maintains accounts for proctors and/or users and verifiesidentities of proctors (e.g., interacting with a relay device) and/orusers. Account engine 605 can collect, e.g., personal (e.g., name, emailaddress, residence address, telephone number and occupation), academic(e.g., grade level, current grade, school, one or more teachers,interests, course history, and course enrollment), and/or login (e.g.,username and password) information. Account information can be stored inaccount data store 610. Further, account engine 605 can characterize asystem-accessing party as a particular user or proctor (e.g., based on alogin name or device identifier) and can verify an identity of the partyby, e.g., ensuring that information entered by the party (e.g., logininformation) matches that in a stored account.

Account engine 605 can interact with an interface engine 615 duringaccount generation and/or account verification to receive accountinformation, to identify an account and/or to receive information toallow for account access.

A file retriever 620 can retrieve one or more executable files from acontent management server 102 or relay device. In one instance, a powerfile that includes a set of executable files can be retrieved. Theexecutable file(s) can be pushed from a sending device (contentmanagement server 102 or relay device) or pulled by a retrieving device(relay device or user device 106). The executable file(s) can beretrieved at a set time or when a condition is satisfied. For example,the executable file(s) can be retrieved when it is less than a thresholdtime before a start time and an a registered proctor or user is loggedinto a retrieving relay device or user device. As another example, theexecutable file(s) can be retrieved when input is provided thatcorresponds to a request to retrieve the executable file(s).

After the executable file(s) are retrieved, file retriever 620 candecrypt and/or decompress the executable file(s). Such actions can beperformed immediately or at a later time, such as prior to transmittingthe files to another device or to executing a file. One or moreexecutable files (or a power file including the executable files) can bestored in an executable-file data store 625. The executable files can bestored in association with a course identifier, a start time, and/orinformation indicating which devices or parties are allowed to accessthe files.

In some instances, a file retriever 620 on a relay device initiallyretrieves one or more executable files (e.g., compressed into a powerfile) from a central server (e.g., content management server 102). Thisinitial retrieval can be performed in advance of a start time. Theexecutable files can then be cached in executable-file data store 625 onthe relay device, a file retriever 620 on a user device can subsequentlyretrieve one or more executable files from the relay device. Thesubsequent retrieval can be performed at a start time or shortly before.This two-part retrieval technique can reduce a system load on a centralserver and can further reduce dependence on network connectivity. Forexample, user devices may be connected via a wired connection to a relaydevice, such that the second retrieval would not depend on a strength ofa wireless connection.

Access engine 630 can evaluate one or more conditions to determinewhether an executable file can be retrieved, decrypted, decompressed,executed or otherwise accessed. Evaluation of the conditions can includeevaluating a current time, an identified party (e.g., one logged into adevice), an input (e.g., whether a party has interred inputcorresponding to a request to retrieve executable files or to begin canexam), etc. For example, access engine 630 can allow exam-file retrievalupon receiving input from a user corresponding to a request to retrievethe executable file and upon verifying that a current time is within aprescribed time window from a start time (e.g., a time at which anexecutable file is to be executed; a series of queries is to bepresented and/or an examination is to begin or be presented). It will beappreciated that a condition applicable to executable file retrieval,decryption, decompression, or execution can differ from a conditionapplicable to another of these actions.

An access engine 630 on a user device can identify one or moreexecutable files to execute or read. This selection can be based on ananalysis of software installed on a user device, hardware or resourceson the user device or one or more applications open on the user device.For example, access engine 630 can identify a browser that is open onthe user device or one that is identified as being a preferred browserfor that device. Access engine 630 can then identify one or moreexecutable files compatible with that browser.

Upon detecting satisfaction and exam-initiation condition, access engine630 can execute one or more executable files. The execution can causethe user device to be partly locked, such that the user's access to oneor more applications is limited or blocked. The extent of such lockingcan be common across exams or can be determined based on an executablefile variable (e.g., such that an instructor can identify applicationsthat the user can access during the exam). The locking may extend to thesame browser that the user is using to access the exam. Thus, forexample, executable file questions may be presented in a tab in abrowser, but the user may be prevented from opening a new tab oraccessing Internet content using the browser. The prevention may occurby changing responses to traditional inputs (e.g., such that a control-Tcommand has no effect, produces an error or pauses or ends in exam).

Execution of one or more executable files can cause one or moreexecutable file queries (or questions) to be presented on a user devicevia interface engine 615. In some instances, executable file questionscan be presented on a screen of a user device using a browser that hadbeen open prior to the executable file initiation. In some instances,the presentation can further include a set of potential responses oranswers. In some instances, the presentation can include a text boxwhere a user can enter a short answer or an essay response. In oneinstance, executable file questions are presented one at the time. Thus,for example, a second executable file question may be presented onlyonce a response to a first executable file question has been received ora user has indicated that the first executable file question is to beskipped. In one instance, a set of executable file questions (e.g., allexecutable file questions) are simultaneously presented. When apresentation of the set of executable file questions extends beyond aviewable portion of a page (e.g., in a browser), a user may viewindividual executable file questions by scrolling through the page.

Interface engine 615 can receive inputs from a user during an executablefile period. The inputs can include text, a selection (e.g., betweenmultiple answer options) or other inputs indicative of a response to anexecutable file question. In some instances, an input can furtherindicate whether a response is to be treated as final (e.g., a selectionof a “submit” button). Such indication can be associated with a singleresponse or a set of responses (e.g. multiple responses or all responsesfor an exam). In some instances, a response is determined to be finalregardless of such explicit indication.

A query response engine 635 can map response inputs to responses forparticular questions. For example, query response engine 635 candetermine that a particular response corresponds to a selection ofanswer choice D. As another example, query response engine 635 candetermine that a particular response corresponds to a correct answerchoice. As another example, query response engine 635 can associate atext response with question number 9. Query response engine 635 cangenerate a response file that includes response data for each responseor for a set of responses (e.g., all responses for an executable file orsubset thereof). The response file can include one or more of: anidentifier of a corresponding user or user device, the time at which theresponse was received, an answer corresponding to the response, theresponse itself, an indication as to whether the response was correct,an application used to view a corresponding question or to provide theresponse and other information. The response file can be generated uponreceiving one or more responses, prior to transmitting one or moreresponses, at an end time, prior to storing one or more responses (e.g.,in long-term memory). The response file can be encrypted or otherwisesecurely stored.

Query response engine 635 can store each response (e.g., by storing aresponse file) in query-response data store 640 and/or can transmit eachresponse (e.g., by transmitting a response file) via query responsetransmitter 645 to a relay device or central server. The response may bestored in a locked or an unlocked configuration. Storing a response inlocked configuration may include, for example, storing the response asread-only data (e.g., to a ROM chip), whereas storing a response in anunlocked configuration may include storing the response as read-writedata (e.g., to a RAM chip). A locked configuration may further oralternatively be associated with a query-presentation configuration thatrestricts or prevents a corresponding query from being subsequentlypresented. A response may be stored in a locked configuration, forexample, when a submission input (e.g., corresponding to a particularquestion, question set or exam) is received, a threshold number or atleast a threshold number of responses have been identified (e.g., intotal or since a previous response locking), a threshold time or atleast a threshold time has passed (e.g., since a start time or aprevious response locking), a query selection or customization has beenperformed based on the response and/or the response has beentransmitted. The locking configuration can facilitate adaptive querygeneration.

Responses can be transmitted individually or in sets. In some instances,whether responses are locally stored or how responses are stored (e.g.,whether in short-term memory or long-term memory or whether theresponses are stored in a locked configuration) depends on whether theresponses are being or has been transmitted or whether transmission wassuccessful. For example, responses may be stored in long-term memoryonly when responses of not been successfully transmitted to a relaydevice or central server.

In some instances, a response is stored in an unlocked configuration andis also transmitted (e.g., to a relay device). If the response is latermodified, the modified response may then be subsequently transmitted.

In one instance, a transmission of one or more responses is attemptedupon receipt of the responses or an indication that the responses oftime. In one instance, the transmission is conditioned upon othercircumstances. A condition can depend upon a connection availability orstrength or other factors (e.g., a previous transmissionsuccess/failure, a processing load on a user device, etc.).

A connection assessor 650 can identify a value of a connection variable(e.g., an availability of a connection or strength of a connection) anduse this value to determine whether transmission should be attempted.The evaluation can include, for example, determining whether a userdevice is connected via a wired connection to another device, evaluatingwhether a wireless connection is available, evaluating a strength of awireless connection, evaluating the success/failure of a testtransmission or previous transmission (e.g., based on whether a successreceipt confirmation was received from a receiving device), etc. In oneinstance, the value of the connection variable as compared to athreshold set forth in the transmission condition, such that thetransmission is to be attempted when the value exceeds a threshold(e.g., a zero threshold, non-zero threshold or a threshold that isgreater than one).

Thus, for example, a handling of a first request may differ from ahandling of a second request. To illustrate, a first request can beautomatically transmitted to a relay device upon determining that asatisfactory wireless connection is available, while a second requestcan be stored instead of being transmitted upon determining that nosatisfactory wireless connection is available.

The conditioned transmission can lead to circumstances where responsesare locally stored beyond the time at which they were finalized, beyondan end time (e.g., a time at which responses are no longer to beaccepted, queries are no longer to be presented, a defined time or anend of a defined time period), etc. This may occur due to a previousfailure to satisfy transmission condition or a previous transmissionfailure. Condition assessor 650 can then continue to monitor aconnection variable and evaluate the transmission condition to determinewhen a transmission of the stored responses can be attempted. Thissubsequent evaluation can occur at a prescribed time interval from apast evaluation, at a prescribed time, upon receiving a request from arelay device or central server, etc. Once the condition is satisfied,query response transmitter 645 can attempt to transmit the responses(e.g., by transmitting a response file) to a relay device or centralserver. In some instances, query response transmitter 645 repeatedlyattempts transmission (e.g., at fixed intervals) until all responseshave been successfully transmitted.

It will be appreciated that, in some instances, a number of responsesactually transmitted are considered for transmission (e.g., based on theassessment performed by connection assessor 650) changes. Such as changecan occur due to a change in speed at which a user provides responses, aprevious transmission that was unsuccessful, a previous response or setof responses that was not transmitted (e.g., due to an unsatisfactoryconnection), etc.

It will also be appreciated that a component of query management system150 can be present on each of multiple types of devices (e.g., a relaydevice and a user device). The function of the component may be similar,the same or different depending on the device type.

FIG. 7 illustrates a flowchart of an embodiment of a process 700 forretrieving an power file at a user device. Part or all of process 700can be implemented in a user device. Process 700 begins at block 705where account engine 605 authenticates a user. The authentication caninclude, for example, matching one or more of the login name, a username, a user device identifier, a user identifier, to data in a useraccount. The authentication can further verifying that additionalinformation (e.g., a password or token) corresponds to data in theaccount or associated with the account.

File retriever 620 identifies an executable file (e.g., which may bepart of a power file) or identifies a power file for the user at block710. For example, file retriever 620 can first identify one or morecourses associated with a user's account or device location. A scheduleassociated with each of the one or more courses can be retrieved, and acurrent time can be mapped to each schedule. Thus, file retriever 620can determine whether an exam (associated with a power file) isscheduled to occur for any of the one or more courses at a current time,a current day, within a defined time period, etc. In some instances, auser submits input response to a selection or other identification of acourse, exam or file.

File retriever 620 detects an initialization time at block 715. For eachexecutable file, an initialization time or initialization time periodcan indicate a time at which or a time period during which executablefile materials can be retrieved at a user device from a remote source.The initialization time or initialization time period may be defined fora given course for a given executable file (e.g., such that a proctor orinstructor can at least partly define the initialization time or timeperiod) or may be fixed across courses and/or exams. At block 715, fileretriever 620 can detect whether a current time is subsequent to theinitialization time or falls within the initialization time period.

File retriever 620 securely retrieves an power file from a relay device(or central server) at block 720. For example, file retriever 620 cansend a request to the relay device for the power file. The request caninclude an identifier of one or more of: the user device, the user, thecourse, the executable file (e.g., as determined using a schedule oraccount data), the power file and so on. A response to the request canthen be received.

In one instance, the power file includes a file that identifies one ormore characteristics of other files to be included in the power file.For example, the file can identify a total number of files that are tobe present in the power file, a version of each of one or more files inthe power file, a size of each of one or more files in the power file(or a sum thereof), etc. A user device can then confirm that theappropriate files are received. For example, in one instance, the fileidentifies a version of each of one or more files to be present in thepower file and/or a checksum thereof. The user device can then identifythe versions of the received files, generate a checksum (e.g., accordingto an order prescribed in the file) and compare the generated checksumto that in the file. If it is determined that the files in the powerfile do not correspond to those that are to be included in the powerfile, an action may be taken, such as requesting the power file again orpresenting a warning notification. A similar complete-transmissionverification may be performed in association with a transmission of apower file from a central server to a relay device.

The power file can include a set of (e.g., compressed) executable files.One or more files in the set of files can include executable files. Insome instances, at least some files in the set of files differ in termsof their compatibility. For example, one or more first files may becompatible with a first browser or piece of software and one or moresecond files may be compatible with a second browser or piece ofsoftware. The power file and/or executable files in the power file canbe encrypted or otherwise secured (e.g., password secured).

The user device can identify a relay device (or central server) fromwhich to retrieve or request the power file from based on, e.g.,identifying a nearby relay device, identifying a relay device present ona wired connection, identifying a relay device in a same classroom,identifying a device associated with an identifier matching oneassociated with a course or executable file, etc.

File retriever 620 decompresses the power file at block 725. Thedecompression can include unzipping the power file. The decompressioncan serve to convert a single power file into a set of separateexecutable files. In some instances, decompressing the power fileincludes decrypting the power file. In some instances, file retriever620 further or alternatively decrypts or partially decrypts the powerfile and/or one or more executable files, or such decryption (ifrequired) may be performed in advance or at a start time. Decrypting thefile can include identifying, retrieving or generating a key. Forexample, a power file can include an instruction identifying a techniquefor generating a key. The technique may include a program code thatretrieves or collects data of a particular type (e.g., user identifier,device identifier, location detected by a sensor, etc.) and using (e.g.,transforming) the data into a key. The key can include a public key, aprivate key, and/or a symmetric key. In some instances, at least part ofthe key is initially generated at a central server and/or remote device(e.g., using a random number generator or pseudorandom number generatorto generate a (pseudo)random number which can be combined with dataidentifiable at a user device and/or other data (e.g., a current data).At least part of the key (e.g., the (pseudo)random component thereof)can be transmitted from the central server or relay device to the userdevice.

At block 730, file retriever 620 securely stores the executable files inexecutable-file data store 625. In some instances, file retriever 620may encrypt or otherwise secure the executable files prior to storingthem (e.g., in instances where executable files in the power file arenot secure). In some instances, executable-file data store 625 as awhole a secure. The secure storage can serve to prevent a user or userdevice from accessing the executable files prior to a start time. Insome instances, an initialization time insubstantial and the same as astart time. In such cases, block 730 can be omitted from process 700.

It will be appreciated that, in some instances, executable files are notcompressed at a relay device. Thus, in some instances, block 725 may beomitted from process 700.

FIG. 8 illustrates a flowchart of an embodiment of a process 800 foridentifying and transmitting query responses. Part or all of process 800can be implemented in a user device. Process 800 begins at block 805where access engine 630 detects a start time. For each exam, a starttime or start time period can indicate a time at which or a time periodduring which executable file materials can presented on a user device.The start time or start time period may be defined for a given coursefor a given executable file (e.g., such that a proctor or instructor canat least partly define the initialization time or time period) or may befixed across courses and/or exams. In some instances, a start time ortime period is determined based on a course time associated with acourse. For example, for a 12 am course, a start time may be 12 am (onan executable file date). At block 805, access engine 630 can detectwhether a current time is subsequent to the start time or falls withinthe start time period.

In some instances, block 805 can further include detecting whether theuser has provided an explicit request or implicit request (e.g., bylogging into executable file software) to begin execution of anexecutable file. In some instances, block 805 further includes detectingwhether one or more other execution-start conditions are satisfied, suchas determining whether the user has completed a pre-executable fileinformation form (e.g., identifying the user), determining whetherexecutable file materials are locally available, determining whether theuser completed one or more pre-requisites.

Interface engine 615 presents executable file materials at block 810.The material can include a query. For example, access engine 630 canexecute one or more executable files such that the executable filematerials are presented. The executable file materials can include oneor more queries (e.g., questions) and response (e.g., answer)opportunities (e.g., answer options, text boxes, labeling abilities,etc.). Presenting executable file materials can include presenting text,graphics, videos, audio streams, etc. Executable file materials can besimultaneously (e.g., in a single screen or page), sequentially orconditionally presented (e.g., such that a subset of executable filequestions are presented at a time). Which particular question(s) areshown at a given time can depend on a question sequence, a user input(selecting a question or group of questions) and/or whether a previousresponse provided by the user was correct.

Interface engine 615 identifies a query response at block 815. Forexample, a user may enter text, select a button option or other inputoption (e.g., an option on a drop-down menu, a slider value, a listoption, etc.), click on a location on a screen (e.g., corresponding to alocation in a graphic), etc. In some instances, the user response alsoincludes input indicating that a response is complete, input indicatingthat a response is finalized, a request to progress to a next question,etc.

Query response engine 635 can map the input received into response data.For example, a selection of an option can be mapped to a selection of aparticular response. As another example, clicking on a screen locationcan be mapped to identifying a particular location within an image. Asanother example, entered text can be identified as a response. Theresponse data can further associate the response with an identifier ofone or more of: a question, a user, a user device, a response time, acourse, an exam, and so on.

At block 820, query response engine 635 securely stores the responsedata in query-response data store 640. Depending on the embodimentand/or circumstances, the response data may be locked such that the useris prevented from changing the stored response. Such locking can occurunconditionally, when an executable file or course variable indicatesthat such locking is to occur, when a user indicates that a response isfinal or is submitted, and so on. Thus, in some instances, a subset ofresponses for a given executable file and given user may be locked whileothers for the same executable file and user may not.

Process 800 can return to block 815 such that additional responses canbe received and stored. In some instances, process 800 returns to block810 such that new executable file material (e.g., question(s)) can bepresented.

Access engine 630 detects an end time at block 825. An end time canindicate a time at which responses are to no longer be provided ormodified (e.g., are locked), executable file materials are to no longerbe presented on a user device and/or response data is to be transmittedfrom a user device to another device. The end time may be defined for agiven course for a given executable file (e.g., such that a proctor orinstructor can at least partly define the initialization time or timeperiod) or may be fixed across courses and/or exams. In some instances,the end time depends on a start time (e.g., the end time being a fixedduration after a start time). In some instances, the end time isdetermined at least partly based on user input. For example, a user mayidentify that an executable file is complete, that responses are to besubmitted, etc.

Query response engine 635 locks at least one (or all) of the user'sstored responses at block 830. The locking can be performed such thatthe user can no longer modify the responses or add responses. In someinstances, the locking includes locking responses not already locked.Locking the response(s) can include storing the response(s) in aparticular memory partition and/or memory type (e.g., ROM).

Query response transmitter 645 securely transmits the stored responsedata at block 835. The responses can be transmitted to a relay device orcentral server. In some instances, response data identifying allresponses for an executable file is transmitted in a single transmission(e.g., after an end time). In some instances, multiple transmissions aresent, with each including response data identifying various subsets ofresponses for an exam. For example, a transmission may occur or may beattempted (or a transmission condition may be evaluated) after eachresponse is received, after each response is finalized, after each of aset of responses is received or finalized, etc.

In one instance, the response data is encrypted prior to thetransmission. The response data can be encrypted using a key used todecrypt a power file or executable file and/or one generated using atechnique disclosed herein. Decrypting response data (e.g., or a filethat includes the response data) using a key that is determined using(for example) an identifier of a user, user device, location, time, etc.Use of such a key can allow an evaluation to be performed to ensure, forexample, that information accompanying the response data (e.g., inmetadata) matches that of the key. For example, a relay device receivingmetadata for response data can use a user name or device identifierincluded in the response data to generate a key. If the key cannot beused to decrypt the response data, it can suggest that a representeduser did not provide a response in the response data.

In some instances, whether a transmission is successful or whether it isattempted influences whether and/or how response data is saved. Forexample, when it is determined that a transmission will occur, will beattempted or was successful, a user device may forego saving theresponse data or may delete the stored response data.

In some instances, response data can be transmitted to a destinationdevice one or more times before the end time is detected at block 825.The destination device may be different than or the same as a device towhich the response data is transmitted at block 835 (e.g., than a relaydevice). The destination device may include a storage server or devicethat may be located in a same room or building as the transmitting userdevice. Such intermediate transmission may serve to build back-up data,which may be used (for example) to reconstruct response data in responseto a malfunction of or problem with a user device, relay device ornetwork.

In one instance, a transmission disclosed herein includes an FTPtransmission, an SSH transmission and/or a tunneled transmission. Insome instances, various types of transmissions may use differenttransmission techniques. For example, two or more of a transmission of apower file from a relay device to a user device, a transmission ofresponse data to a storage server prior to an end time and atransmission of response data to a relay device at or after an end timemay use a different transmission technique.

FIG. 9 illustrates a flowchart of an embodiment of a process 900 forconditionally transmitting query responses. Part or all of process 900can be implemented in a user device. Process 900 begins at block 905where access engine 630 detects an end time. Block 905 of process 900can parallel block 825 of process 800.

Connection assessor 650 assesses a connection at block 910. Theassessment can include determining whether a connection (e.g., awireless connection, a wired connection or either) to a network isavailable, whether a connection to a preferred network or to a networkof a preferred type is available, determining a characteristic (e.g.,upload or download speed, latency or network strength) of a network,determining whether the user device can communicate with a particularother device (e.g., a relay device or central server), determining howmany networks are available, etc.

A connection variable can be determined based on the assessment. Forexample, a connection variable can reflect a characteristic of a network(or a extremum of a characteristic across all available networks, suchas a maximum strength, shortest latency or maximum upload speed), anumber of networks available, a number of networks of a particular typeor with a particular quality available, whether a preferred network isavailable, whether a wired connection is available, whether a local areanetwork is available, whether a short-range network is available, and soon.

Connection assessor 650 determines whether a connection condition issatisfied at block 915. The condition can require, for example, that aconnection (e.g., a wireless connection, a wired connection or either)to a network be available, that a connection to a preferred network isavailable, that a connection to a network of a preferred type isavailable, that the user device can communicate with a particular otherdevice, that a characteristic exceed a zero, non-zero or great-than-onethreshold (a strength being above a threshold or a latency being below athreshold), etc. In one instance, the condition requires that a requestfor the responses be received from another device (e.g., a relay device)within a past particular time period.

When it is determined that the condition is satisfied, process 900continues to block 920 where query response transmitter 645 securelytransmits response data (e.g., to a relay device). Block 920 of process900 can parallel block 835 of process 800. When it is not determinedthat the condition is satisfied, process 900 can return to block 910,such that a connection can be repeatedly assessed and a conditionrepeatedly evaluated until all response data has been transmitted.

In some instances, the return to block 910 is nearly immediate. In otherinstances, a delay is introduced. The delay may be, at least about,about, or less than about 1 second, 15 seconds, 70 seconds, 1 minute, 10minutes, 70 minutes, 1 hour, 6 hours, 10 hours, 1 day or 6 days. Thisdelay can serve to reduce repeated evaluations of same networkconditions.

In some instances, a quantity of untransmitted responses may buildduring iterations of the loop in process 900. It will be appreciatedthat response data may thus be aggregated for storing and/or fortransmission. Thus, for example, rather than storing or transmittingmultiple units (e.g., files or communications), each includingnon-response information (e.g., an identifier of a user, a user device,a course and/or an exam), a single unit can include one copy of thenon-response information and aggregated response information.

In some instances, process 900 further includes securely storing orcaching the response data. The response data can be stored or cachedregardless of whether it is determined that the condition is satisfiedor not or can be stored only upon determining that the condition is notsatisfied. The response data can be stored for a fixed time interval(e.g., one that is at least about 1 minute, 9 minutes, 10 minutes, 70minutes, 1 hour, or 10 hours), until it is transmitted, until a receiptconfirmation is received in response to transmission of the responsedata, until an available memory space drops below a threshold, until amemory space devoted to the response data and other response datacrosses a threshold, and so on.

While process 900 presents an embodiment where a transmission isconditioned based on a connection, it will be appreciated that othertypes of conditions can additionally or alternatively be used. Forexample, other conditions may relate to a time since a last transmission(e.g., requiring at least a threshold interval between transmissions), asuccess of a last transmission (e.g., requiring improved connectionassessments following a previous transmission failure), whether anexecutable file period has ended (e.g., reducing or eliminatingtransmission conditions upon end of the executable file period),resources available on a user device (e.g., requiring that a resourcelevel be above or below a threshold to attempt transmission), whether arequest for responses has been received from a relay device, etc.

In some instances, following a return to block 915, a same type ofvariable is assessed at block 910 as was previously assessed and/or asame condition is evaluated at block 915 as was previously evaluated. Insome instances, a different type of variable is assessed upon a repeatof block 910 and/or a different condition is evaluated at block 915. Forexample, a threshold for a connection strength in a condition may bereduced following an end time. As another example, a condition mayinitially require a threshold resource availability on a user device(e.g., so as not to interrupt the exam) while the threshold may bereduced or the resource condition eliminated once the user completes theexam. As another exam, following repeated transmission failures, acondition may require receipt of a request for response data beforeattempting transmission again.

While transmission of response data can be reserved for instances wherean explicit condition is satisfied, it will be appreciated thattransmission of response data can also or alternatively be functionallyconditioned. For example, if no network is available to a user device orif a network connection is weak, transmission of the response data maynot be possible. A functional condition can include instances wheretransmission attempts fail, where transmissions are not possible, wheretransmissions performed according to a transmission protocol (e.g., asset forth in an executable file and/or based on data from the userdevice) are not possible, and so on.

FIG. 10 illustrates a flowchart of an embodiment of a process 1000 forcaching executable files. Part or all of process 1000 can be implementedin a relay device. Process 1000 begins at block 1005 where fileretriever 620 identifies a structure. For example, a relay device canidentify a classroom that the relay device is located in and canidentify a structure (e.g., course) associated with that room (e.g., onehaving an executable file or time associated with that room generally oron a given day). As another example, a relay device may locally storestructure information about one or more structures. As yet anotherexample, a relay device may identify a structure based on information ina communication received from another device (e.g., from a centralserver).

File retriever 620 securely retrieves an power file for the structurefrom a central server at block 1010. The retrieval can be performed on aday of an exam, a set time before a start time (e.g., a day or weekbefore), at an initialization time, etc. In one instance, retrieving thepower file includes sending a request for the power file to the centralserver. The request can include, for example, an identifier of the relaydevice, an identifier of a course, an identifier of an executable fileand so on. In one instance, the power file is pushed from the centralserver without requiring a request.

Along with the power file, the central server may provide informationindicating when (e.g., an absolute or relative time or an absolute orrelative time period) the power file is to be provided to user devicesand/or which user devices are to allowed to retrieve the power file.

File retriever 620 caches the power file in an executable-file datastore resident on the relay device at block 1015. In some instances,file retriever 620 processes the power file to, e.g., decrypt, encrypt,secure or at least partly de-secure the power file.

Access engine 630 identifies one or more user devices for the structure(e.g., course) at block 1020. This identification can be performed usinginformation provided (along with the power file or separately) by thecentral server, by a device detection technique (e.g., detecting deviceson a particular network, detecting devices in a room or detecting nearbydevices), or by analyzing information received from other devices (e.g.,determining whether an executable file code matches one for the powerfile, determining whether a user or device identifier matches oneassociated with the power file, etc.).

Access engine 630 detects one or more initialization times at block1025. Block 1025 can parallel block 715 of process 700. In someinstances, receiving a request for a power file or receiving the powerfile from the central server can indicate that a current time qualifiesas being an initialization time.

A relay-device transmitter causes the power file to be transmitted toone or more user devices at block 1030. In some instances, the powerfile is pushed to one, some or all of the identified one or more userdevices. In some instances, the power file is not transmitted to a userdevice in the identified one or more user devices until a request forthe power file is first received. In instances where the power file issent to multiple user devices, the power file may be sent to the devicessimultaneously or at different times.

A period between receipt of the power file and transmission of the powerfile (or processed version thereof), a period between receipt of thepower file and a start time, a period between request for the power fileand transmission of the power file (or processed version thereof), aperiod between request for the power file and a start time, and/or aperiod of caching of the power file may be at least about 1 minute, 9minutes, 70 minutes, 1 hour, 10 hours, 12 hours, 1 day, 6 days or 1week. By caching the power file in advance, a system load at a commonexecutable file time can be reduced. In some instances, a schedule isdeveloped across relay devices or exams such that a one of theabove-listed time periods is varied across exams, relay devices, etc.Additionally or alternatively, the time period may depend at least inpart on when a proctor input was received. In either case, a coordinatedpre-executable file load may also be reduced.

FIG. 11 illustrates a flowchart of an embodiment of a process 1100 forcaching query responses. Part or all of process 1100 can be implementedin a relay device. Process 1100 begins at block 1105 where a responsereceiver on a relay device receives a communication from a user device.The communication can include query response data, which can include aresponse and, in some instances, an identifier of one or more of: a userdevice, a user, a course, an executable file, a power file, an exam, aquestion, a response time and so on.

Query response engine 635 encrypts or otherwise secures the responsedata at block 1110. In some instances, the received response data isalready secure and/or encrypted, and no additional securing orencryption is performed. The response data can be encrypted using a keyidentified using a technique disclosed herein. For example, a key caninclude or can be generated using an identifier or a user or device.Query response engine 635 securely stores the response data at block1115.

Access engine 630 detects an executable file target transmission time atblock 1120. The target transmission time can be identified based on datain an exam-related file, based on a communication received from acentral server, based on input from a proctor (e.g., indicating thatresponses are to be submitted to the central server), based on a rule,etc. In one instance, a central server sends a request for responses tothe relay device, and a time of receipt of the request can serve as thetarget transmission time. In some instances, the target transmissiontime is functionally determined (e.g., determined as being a time whenresponses are received from all user devices in a room, all user devicesthat received an executable file, etc.).

Query response transmitter 645 securely transmits response data to acentral server at block 1125. In some instances, all response dataassociated with an executable file is transmitted in a singletransmission or communication and/or substantially concurrently. In someinstances, multiple transmissions with response data are sent. Forexample, response data for one user device or a set of user devices canbe transmitted as soon as it is received.

The transmission at block 1125 can be conditioned. The condition maydepend on, e.g., a load on a central server, whether a response-datarequest has been received from a central server, a quantity of responsedata received, an end time, a network strength, a network availability,a resource load or availability on a relay device, etc.

FIG. 12 illustrates a flowchart of an embodiment of a process 1200 forexecuting an executable file. Part or all of process 1200 can beimplemented in a user device. Process 1200 begins at block 1205 wherefile retriever 620 identifies an open browser (e.g., as being Explorer®,Chrome®, Firefox® or Safari®). In instances where multiple browsers areopen, file retriever 620 can identify a browser most recently opened, abrowser which most recently was interacted with, a browser front-most ona screen, and so on.

File retriever 620 identifies one or more executable files from an powerfile that are compatible with the open browser at block 1210. Theidentification can be compared by detecting metadata indicatingcompatibilities of files, by analyzing content of files, by evaluating arule, by analyzing a function or file name, by analyzing an if function,and so on. In some instances, block 1210 includes identifying one ormore parts of executable files that are compatible with the openbrowser.

Access engine 630 detects a start time at block 1215. Block 1215 ofprocess 1200 can correspond to block 805 of process 800.

At block 1220, access engine 630 executes at least one of the one ormore executable files (or parts of the file) such that one or morequeries are presented in the open browser. Thus, for example, if a useropens an Explorer® browser, executable file queries or questions can bepresented in the Explorer® browser, and executable file responses can bereceived via the Explorer® browser. It will be appreciated that one ormore other executable files (or parts of executable files) may not havebrowser compatibility restrictions and can be executed at block 1220regardless of the browser identified at block 1205.

Via execution of the at least one executable files or of other files,access engine 630 restricts access to non-browser programs at block1225. The extent of the restriction can be determined based on an exam,a course, a user device, and so on. For example, an instructor mayindicate that users are allowed to access the Internet and MicrosoftWord® during a test but no other applications. The central server canthen generate or modify one or more executable files to enforce thisrestriction. An attempt to access a restricted application may result ina lack of traditional response, an error, or a negative executable fileoccurrence (e.g., ending a file execution).

Interface engine 615 receives user input via the browser at block 1230.For example, a user may enter text, select a button option or otherinput option (e.g., an option on a drop-down menu, a slider value, alist option, etc.), click on a location on a screen (e.g., correspondingto a location in a graphic), etc. In some instances, the user responsealso includes input indicating that a response is complete, inputindicating that a response is finalized, a request to progress to a nextquery, etc.

Query response engine 635 determines a query response based on the inputat block 1235. The determination may include mapping the input toresponse data. For example, a selection of an option can be mapped to aselection of a particular response. As another example, clicking on ascreen location can be mapped to identifying a particular locationwithin an image. As another example, entered text can be identified as aresponse. The response data can further associate the response with anidentifier of one or more of: a question, a user, a user device, aresponse time, a course, an exam, and so on.

FIG. 13 illustrates a flowchart of an embodiment of a process 1300 forupdating query response data based on conflict-resolution indications.Part of process 1200 can be implemented in a user device, such as userdevice 106. Part of process 1200 can be performed in a query managementsystem, which can include (for example) a content management server 102,relay device, or other server or system (e.g., located remotely or in asame building or room as the user device).

Process 1300 begins at block 1305 where the user device executes one ormore executable files, which can facilitate a local presentation of eachof one or more questions or queries. At block 1310, a query response foreach of the one or more queries is determined (e.g., based on providedinput). At block 1315 a, response data that includes the queryresponse(s) and potentially additional information (e.g., an identifierof an account, user, user device, and/or corresponding queries) istransmitted to the query management system. The response data isreceived at the query management system at block 1315 b and stored inassociation with an identifier of an account, user, user device and/ortime (e.g., of receipt of the response data or a time identified in theresponse data). Each of one or more of blocks 1305-1320 can correspondto similar actions disclosed herein.

At block 1325, previous response data associated with a same useridentifier or account identifier is retrieved (e.g., from a localstorage or by sending a data request to a remote storage server). Theprevious response data can include identifiers of responses provided fora same executable file, exam, power file and/or date as that associatedwith the response data. In some instances, the previous response dataand the response data were transmitted from different user devices.Depending on the embodiment, block 1325 is conditionally performed. Forexample, block 1325 may be performed when the response data or acorresponding communication includes a request for the previous responsedata.

In some instances, each of the response data and the previous responsedata include a (same or different) response to a same query. In somealternative or same instances, each of the response data and theprevious response data include a response to a different query.

At block 1330 a, at least part of the previous response data istransmitted to the user device, which is received at the user device atblock 1330 b. In one instance, each response in the previous responsedata is transmitted. In one instance, each query for which a response isincluded in each of the response data and the previous response data areidentified, and the previous-response-data responses for each of thosequeries are included in the transmission. In one instance, each queryfor which different responses included in each of the response data andthe previous response data are identified, and theprevious-response-data responses for each of those queries are includedin the transmission.

In some instances, transmission of the at least part of the previousresponse data is conditioned. For example, block 1330 a may be performedonly when the previous response data and the response data include atleast one conflicting response and/or if the previous response dataincludes a response not provided in the response data. The transmissionmay also include other information, such as identifiers of queries forwhich no response conflict was detected.

At block 1335, the at least part of the previous response data ispresented (e.g., at a single time or at multiple times). Thepresentation can include, for example, presenting an identifier of aquery or a query itself along with a response as identified in theprevious response data. The presentation may further include anidentifier of a response as identified in the response data. When theresponses from the previous response data and the response dataconflict, the presentation can include a conflict-resolution option. Forexample, the conflict-resolution option can allow a user to select oneof the two options.

At block 1340, updated response data is identified based on aconflict-resolution indication. The conflict-resolution indication canbe provided via interaction with the conflict-resolution option. Forexample, the conflict-resolution indication can identify a selectedresponse for a particular query. The updated response data can include aselection between conflicting responses (or a response selection ingeneral) for each of one or more queries, an identification of each ofthe one or more queries and/or an identifier of a user, user device,account and/or time.

At block 1345 a, the update response data is transmitted from the userdevice to the query management system, and the query management systemreceives the updated response data at block 1345 b. The updated responsedata is stored at block 1350. Storing the updated response data caninclude, for example, deleting an unselected response, changing a status(e.g., to final or selected) of a response, committing a response to aparticular memory or memory partition or storing a new data segment.

Process 1300 thus provides a technique for detecting and to respondingto conflicting data. Such data may be provided from different devicesand may be a result of experience of a device or network problem duringinitial execution of a file. Process 1300 allows an executable file toinitiate and run without needing to first retrieve response data, andyet normal response transmission can trigger a technique for detectingand responding to data conflicts.

Embodiments herein provide a variety of technical advantages. Forexample, the inclusion of relay devices in networks can allow trafficinvolving a central server to be distributed in time so as to reducepeak loads. Proximity between relay devices and user devices enable thedevices to communicate over short-range or wired connections to furtherreduce network demands during high-use time periods. Encryptiontechniques using device-specific keys can serve to verify that a sourceof a response is as is identified in metadata or input. Use of powerfiles and browser-detection techniques can allow consistent content tobe provided across browser types and to allow users to use familiarcontrols. Conditioned transmission of response data can reduce networkdemand to avoid repeated network use in ineffective connection attempts.Use of differential locking and unlocking configurations when storingresponses can allow for adaptation in content and queries while stillpermitting acceptable levels of modification that would not disrupt theadaptation processes.

U.S. patent application Ser. Nos. 14/222,317, 14/222,350, 14/753,858,15/842,653, and 15/874,244, are herein incorporated by reference intheir entirety for all purposes.

A number of variations and modifications of the disclosed embodimentscan also be used. Specific details are given in the above description toprovide a thorough understanding of the embodiments. However, it isunderstood that the embodiments may be practiced without these specificdetails. For example, well-known circuits, processes, algorithms,structures, and techniques may be shown without unnecessary detail inorder to avoid obscuring the embodiments.

Implementation of the techniques, blocks, steps and means describedabove may be done in various ways. For example, these techniques,blocks, steps and means may be implemented in hardware, software, or acombination thereof. For a hardware implementation, the processing unitsmay be implemented within one or more application specific integratedcircuits (ASICs), digital signal processors (DSPs), digital signalprocessing devices (DSPDs), programmable logic devices (PLDs), fieldprogrammable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described above, and/or a combination thereof.

Also, it is noted that the embodiments may be described as a processwhich is depicted as a flowchart, a flow diagram, a swim diagram, a dataflow diagram, a structure diagram, or a block diagram. Although adepiction may describe the operations as a sequential process, many ofthe operations can be performed in parallel or concurrently. Inaddition, the order of the operations may be re-arranged. A process isterminated when its operations are completed, but could have additionalsteps not included in the figure. A process may correspond to a method,a function, a procedure, a subroutine, a subprogram, etc. When a processcorresponds to a function, its termination corresponds to a return ofthe function to the calling function or the main function.

Furthermore, embodiments may be implemented by hardware, software,scripting languages, firmware, middleware, microcode, hardwaredescription languages, and/or any combination thereof. When implementedin software, firmware, middleware, scripting language, and/or microcode,the program code or code segments to perform the necessary tasks may bestored in a machine readable medium such as a storage medium. A codesegment or machine-executable instruction may represent a procedure, afunction, a subprogram, a program, a routine, a subroutine, a module, asoftware package, a script, a class, or any combination of instructions,data structures, and/or program statements. A code segment may becoupled to another code segment or a hardware circuit by passing and/orreceiving information, data, arguments, parameters, and/or memorycontents. Information, arguments, parameters, data, etc. may be passed,forwarded, or transmitted via any suitable means including memorysharing, message passing, token passing, network transmission, etc.

For a firmware and/or software implementation, the methodologies may beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. Any machine-readable mediumtangibly embodying instructions may be used in implementing themethodologies described herein. For example, software codes may bestored in a memory. Memory may be implemented within the processor orexternal to the processor. As used herein the term “memory” refers toany type of long term, short term, volatile, nonvolatile, or otherstorage medium and is not to be limited to any particular type of memoryor number of memories, or type of media upon which memory is stored.

Moreover, as disclosed herein, the term “storage medium” may representone or more memories for storing data, including read only memory (ROM),random access memory (RAM), magnetic RAM, core memory, magnetic diskstorage mediums, optical storage mediums, flash memory devices and/orother machine readable mediums for storing information. The term“machine-readable medium” includes, but is not limited to portable orfixed storage devices, optical storage devices, and/or various otherstorage mediums capable of storing that contain or carry instruction(s)and/or data.

While the principles of the disclosure have been described above inconnection with specific apparatuses and methods, it is to be clearlyunderstood that this description is made only by way of example and notas limitation on the scope of the disclosure.

What is claimed is:
 1. A system for conditioning transmission of a queryresponse with an unsecured communication protocol, the systemcomprising: a remote content management server that: identifies aplurality of query files, the plurality of query files comprising afirst query file and a second query file; and encrypts the plurality ofquery files, the encryption of the plurality of query files beingdecrypted by a same key corresponding to the plurality of query files; arelay device that: receives and stores the plurality of query files fromthe remote content management server in a local memory associated withthe relay device and a first user device, wherein the plurality of queryfiles are being stored in a locked configuration; and transmits theplurality of query files via the unsecured communication protocol, theplurality of query files not being decrypted by the relay device, thefirst query file being transmitted to the first user device, and thesecond query file being transmitted to a second user device; and thefirst user device that: receives the same key and the first query filecorresponding to the plurality of query files; decrypts the first queryfile using the same key; generates the query response to the first queryfile; determines a connection variable by assessing one or more networkconnections available to the first user device; determines whether atransmission condition is satisfied based on the connection variable,the determination including comparing the connection variable to athreshold, a result of the determination indicating that thetransmission condition is satisfied when the connection variable exceedsthe threshold; when the connection variable exceeds the threshold,transmits the query response via the unsecured communication protocolwithout storing the query response at a memory associated with the firstuser device; and when the connection variable fails to exceed thethreshold, encrypts the query response and storing the encrypted queryresponse at the memory associated with the first user device.
 2. Thesystem for conditioning transmission of a query response with anunsecured communication protocol of claim 1, wherein the first userdevice encrypts the query response to the first query file prior totransmitting the query response via the unsecured communicationprotocol.
 3. The system for conditioning transmission of a queryresponse with an unsecured communication protocol of claim 1, whereinthe query response is transmitted to the relay device from the firstuser device, which transmits the query response to the remote contentmanagement server.
 4. The system for conditioning transmission of aquery response with an unsecured communication protocol of claim 1,wherein a warning notification is presented at the first user devicewhen the connection variable fails to exceed the threshold.
 5. Acomputer-implemented method for conditioning transmission of a queryresponse with an unsecured communication protocol, the methodcomprising: identifying, by a remote content management server of acontent distribution network, a plurality of query files, the pluralityof query files comprising a first query file and a second query file;encrypting the plurality of query files, the encryption of the pluralityof query files being decrypted by a same key corresponding to theplurality of query files; receiving and storing, by a relay device ofthe content distribution network, the plurality of query files from theremote content management server in a local memory associated with therelay device and a first user device, wherein the plurality of queryfiles are being stored in a locked configuration; transmitting, by therelay device, the plurality of query files via the unsecuredcommunication protocol, the plurality of query files not being decryptedby the relay device, the first query file being transmitted to the firstuser device, and the second query file being transmitted to a seconduser device; receiving, by the first user device of the contentdistribution network, the same key and the first query filecorresponding to the plurality of query files; decrypting the firstquery file using the same key; generating the query response to thefirst query file; determining a connection variable by assessing one ormore network connections available to the first user device; determiningwhether a transmission condition is satisfied based on the connectionvariable, the determination including comparing the connection variableto a threshold, a result of the determination indicating that thetransmission condition is satisfied when the connection variable exceedsthe threshold; when the connection variable exceeds the threshold,transmitting, by the first user device, the query response via theunsecured communication protocol without storing the query response at amemory associated with the first user device; and when the connectionvariable fails to exceed the threshold, encrypting, by the first userdevice, the query response and storing the encrypted query response atthe memory associated with the first user device.
 6. The method forconditioning transmission of a query response with the unsecuredcommunication protocol of claim 5, wherein the first user deviceencrypts the query response to the first query file prior totransmitting the query response via the unsecured communicationprotocol.
 7. The method for conditioning transmission of a queryresponse with the unsecured communication protocol of claim 5, whereinthe query response is transmitted to the relay device from the firstuser device, which transmits the query response to the remote contentmanagement server.
 8. The method for conditioning transmission of aquery response with the unsecured communication protocol of claim 5,wherein a warning notification is presented at the first user devicewhen the connection variable fails to exceed the threshold.
 9. Acomputer-program product tangibly embodied in a non-transitory,machine-readable storage medium for conditioning transmission of a queryresponse with an unsecured communication protocol, includinginstructions configured to cause one or more data processors to performactions including: identifying a plurality of query files, the pluralityof query files comprising a first query file and a second query file;and encrypting the plurality of query files, the encryption of theplurality of query files being decrypted by a same key corresponding tothe plurality of query files; receiving and storing the plurality ofquery files, wherein the plurality of query files are being stored in alocked configuration; transmitting the plurality of query files via theunsecured communication protocol, the plurality of query files not beingdecrypted, the first query file being transmitted to a first userdevice, and the second query file being transmitted to a second userdevice; receiving the same key and the first query file corresponding tothe plurality of query files; decrypting the first query file using thesame key; generating the query response to the first query file;determining a connection variable by assessing one or more networkconnections available to the first user device; determining whether atransmission condition is satisfied based on the connection variable,the determination including comparing the connection variable to athreshold, a result of the determination indicating that thetransmission condition is satisfied when the connection variable exceedsthe threshold; when the connection variable exceeds the threshold,transmitting the query response via the unsecured communication protocolwithout storing the query response at a memory associated with the firstuser device; and when the connection variable fails to exceed thethreshold, encrypting the query response and storing the encrypted queryresponse at the memory associated with the first user device.
 10. Thecomputer-program product tangibly embodied in a non-transitorymachine-readable storage medium of claim 9, wherein the first userdevice encrypts the query response to the first query file prior totransmitting the query response via the unsecured communicationprotocol.
 11. The computer-program product tangibly embodied in anon-transitory machine-readable storage medium of claim 9, wherein thequery response is transmitted to a relay device from the first userdevice, which transmits the query response to a remote contentmanagement server.
 12. The computer-program product tangibly embodied ina non-transitory machine-readable storage medium of claim 9, wherein awarning notification is presented at the first user device when theconnection variable fails to exceed the threshold.