Maintaining a secure computing device in a test taking environment
First Claim
1. A non-transitory computer readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for securing a computing device during a testing event, the method comprising:
- receiving a testing protocol for the testing event, the testing protocol including limitations to be applied to the computing device during the testing event, the testing protocol received from a test server by the computing device over a communication network, wherein a testing routine delivers test data in accord with the testing protocol, the test data including test answers to test questions answered by a test-taker during the testing event;
granting access to the computing device before initiating execution of the testing routine, wherein granting access to the computing device allows the computing device to be searched for illicit files related to the testing routine;
applying the limitations by modifying a system registry of the computing device in accordance with the testing protocol, the system registry modified before executing the testing routine;
initiating execution of the testing routine corresponding to the testing event, the execution initiated after the system registry has been modified;
observing a keystroke log for attempts to switch to another account with a different system registry;
transmitting to a proctoring center in real-time a feed of on-screen activity displayed on the screen of the computing device, the transmission automatically triggered when the computing device detects an attempt to change the system registry of the computing device that is not in accordance with the testing protocol during the testing routine;
transmitting to the proctoring center in real-time the feed of the on-screen activity displayed on the screen of the computing device, the transmission automatically triggered when the computing device detects an attempt to switch to another account with a different system registry;
sending the test answers to the test server over the communication network when the testing routine is complete; and
locking the test answers when the testing routine is complete.
3 Assignments
0 Petitions
Accused Products
Abstract
The presently disclosed invention provides for the security of a computing device in the context of a test taking environment. By securing a computing device, an individual (or group of individuals) may more effectively proctor a large examination without worrying about a test taker illicitly accessing information on their computer or via a remote source of data. Securing a computing device includes locking out or preventing access to any application not deemed necessary or appropriate by the test administrator.
-
Citations
19 Claims
-
1. A non-transitory computer readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for securing a computing device during a testing event, the method comprising:
-
receiving a testing protocol for the testing event, the testing protocol including limitations to be applied to the computing device during the testing event, the testing protocol received from a test server by the computing device over a communication network, wherein a testing routine delivers test data in accord with the testing protocol, the test data including test answers to test questions answered by a test-taker during the testing event; granting access to the computing device before initiating execution of the testing routine, wherein granting access to the computing device allows the computing device to be searched for illicit files related to the testing routine; applying the limitations by modifying a system registry of the computing device in accordance with the testing protocol, the system registry modified before executing the testing routine; initiating execution of the testing routine corresponding to the testing event, the execution initiated after the system registry has been modified; observing a keystroke log for attempts to switch to another account with a different system registry; transmitting to a proctoring center in real-time a feed of on-screen activity displayed on the screen of the computing device, the transmission automatically triggered when the computing device detects an attempt to change the system registry of the computing device that is not in accordance with the testing protocol during the testing routine; transmitting to the proctoring center in real-time the feed of the on-screen activity displayed on the screen of the computing device, the transmission automatically triggered when the computing device detects an attempt to switch to another account with a different system registry; sending the test answers to the test server over the communication network when the testing routine is complete; and locking the test answers when the testing routine is complete. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification