发明名称 Method for using a multi-function computer for testing
摘要 A system and method facilitate the use of a multi-function computer for an examination. An application implementing the method receives a hash input from a user and, upon successful completion of the examination, displays a hash output. The hash output may be displayed as a visual hash. During the examination, the application or system monitors the multi-function computer to determine whether the user has activated, viewed, or launched any prohibited functions or applications on the multi-function computer. If the user views a prohibited function or application, the examination application does not display the hash output. The system and application implement various security measures to prevent spoofing or duplication of the hash output or tampering with the application.
申请公布号 US9582648(B2) 申请公布日期 2017.02.28
申请号 US201414332043 申请日期 2014.07.15
申请人 Wolfram Alpha LLC 发明人 Wolfram Stephen;Beynon Taliesin Sebastian;Lockhart Robert Kerr
分类号 G06F21/00;G06F7/544;G09C5/00;G06F21/62;G06F21/60;H04L9/32;H04W12/08 主分类号 G06F21/00
代理机构 代理人
主权项 1. A system for coordinating the secure use of computer devices during an academic examination, the system comprising: a plurality of computer devices, each computer device comprising (i) a memory device storing (a) at least one approved application, (b) at least one un-approved application, and (c) a testing routine, and (ii) a processor coupled to the memory device and programmed to execute each of the at least one approved application, the at least one un-approved application, and the testing routine, wherein execution of the testing routine: causes the processor to allow a respective user to access and use the at least one approved application and restricts or prevents access by the user of the at least one un-approved application,determines whether the respective user of the respective computer device accessed any un-approved applications using the computer device while the computer device was executing the testing routine, andreceives identification information corresponding to the respective computer device and uses the identification information as an input to a hash function to generate a user hash output; and a proctor computer comprising a memory device storing (i) a routine for receiving identification information corresponding to one of the plurality of computer devices, and (ii) a verification routine for providing one or more indications of whether one or more users of one or more of the plurality of computer devices accessed any of the at least one un-approved application while the one or more computer devices were executing the testing routine, wherein execution of the verification routine includes: using identification information corresponding to one of the computer devices as an input to the hash function to generate a proctor hash output for the one computer device, such that the user hash output and the proctor hash output are the same if the user of the one computer device has not accessed any of the un-approved applications, andcausing a visual indication of the hash output to be displayed on a display device.
地址 Champaign IL US