Method for using a multi-function computer for testing
First Claim
1. A method executed on a first computer device running an operating system and including a processor, a memory device communicatively coupled to the processor, and a display, the method comprising:
- executing a testing routine on the processor, the testing routine configured to securely allow the use of one or more of a plurality of applications or functions of the first computer device during an academic examination;
receiving a hash input;
entering a test mode;
receiving an input indicating completion;
evaluating whether unauthorized use of the first computer device occurred while the first computer device was in the test mode;
computing a hash output;
displaying the hash output or a visual representation of the hash output when it is determined that no unauthorized use of an application or function on the first computer device occurred while the first computer device was in the test mode; and
displaying an indication of unauthorized use when it is determined that unauthorized use of an application or function on the first computer device occurred while the first computer device was in the test mode.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method facilitate the use of a multi-function computer for an examination. An application implementing the method receives a hash input from a user and, upon successful completion of the examination, displays a hash output. The hash output may be displayed as a visual hash. During the examination, the application or system monitors the multi-function computer to determine whether the user has activated, viewed, or launched any prohibited functions or applications on the multi-function computer. If the user views a prohibited function or application, the examination application does not display the hash output. The system and application implement various security measures to prevent spoofing or duplication of the hash output or tampering with the application.
22 Citations
39 Claims
-
1. A method executed on a first computer device running an operating system and including a processor, a memory device communicatively coupled to the processor, and a display, the method comprising:
-
executing a testing routine on the processor, the testing routine configured to securely allow the use of one or more of a plurality of applications or functions of the first computer device during an academic examination; receiving a hash input; entering a test mode; receiving an input indicating completion; evaluating whether unauthorized use of the first computer device occurred while the first computer device was in the test mode; computing a hash output; displaying the hash output or a visual representation of the hash output when it is determined that no unauthorized use of an application or function on the first computer device occurred while the first computer device was in the test mode; and displaying an indication of unauthorized use when it is determined that unauthorized use of an application or function on the first computer device occurred while the first computer device was in the test mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable storage medium having stored thereon a set of instructions, executable by a processor, the instructions comprising:
-
instructions for receiving a hash input; instructions for entering a test mode, the test mode configured to securely allow the use of one or more of a plurality of applications or functions of the first computer device during an academic examination; instructions for receiving an input indicating completion; instructions for evaluating whether unauthorized use of the first computer device occurred while the first computer device was in the test mode; instructions for generating a hash output; instructions for displaying the hash output or a visual representation of the hash output when it is determined that no unauthorized use of an application or function on the first computer device occurred while the first computer device was in the test mode; and instructions for displaying an indication of unauthorized application execution when it is determined that unauthorized use of an application or function on the first computer device occurred while the first computer device was in the test mode. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
Specification