Maintaining a secure computing device in a test taking environment
First Claim
1. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for securing a computing device during a testing event, the method comprising:
- receiving a testing protocol for the testing event, the testing protocol including limitations to be applied to the computing device during the testing event, the testing protocol received from a test server by the computing device over a communication network;
applying the limitations by modifying a system registry of the computing device in accordance with the testing protocol;
initiating execution of a testing routine corresponding to the testing event;
detecting an attempt to switch from a first account having a first system registry to a second account having a different second system registry; and
transmitting to a proctoring center in real-time a feed of on-screen activity displayed on the screen of the computing device, the transmission automatically triggered when the computing device detects an attempt to change the system registry of the computing device that is not in accordance with the testing protocol during the testing routine, wherein an attempt to change the system registry includes an attempt to switch from a first account having a first system registry to a second account having a different second system registry.
0 Assignments
0 Petitions
Accused Products
Abstract
The presently disclosed invention provides for the security of a computing device in the context of a test taking environment. By securing a computing device, an individual (or group of individuals) may more effectively proctor a large examination without worrying about a test taker illicitly accessing information on their computer or via a remote source of data. Securing a computing device includes locking out or preventing access to any application not deemed necessary or appropriate by the test administrator.
100 Citations
14 Claims
-
1. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for securing a computing device during a testing event, the method comprising:
-
receiving a testing protocol for the testing event, the testing protocol including limitations to be applied to the computing device during the testing event, the testing protocol received from a test server by the computing device over a communication network; applying the limitations by modifying a system registry of the computing device in accordance with the testing protocol; initiating execution of a testing routine corresponding to the testing event; detecting an attempt to switch from a first account having a first system registry to a second account having a different second system registry; and transmitting to a proctoring center in real-time a feed of on-screen activity displayed on the screen of the computing device, the transmission automatically triggered when the computing device detects an attempt to change the system registry of the computing device that is not in accordance with the testing protocol during the testing routine, wherein an attempt to change the system registry includes an attempt to switch from a first account having a first system registry to a second account having a different second system registry. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for securing a computing device during a testing event, the method comprising:
-
receiving a testing protocol for the testing event, the testing protocol including limitations to be applied to the computing device during the testing event, the testing protocol received from a test server by the computing device over a communication network; applying the limitations by modifying a system registry of the computing device in accordance with the testing protocol; initiating execution of a testing routine corresponding to the testing event; detecting an attempt to switch from a first account having a first system registry to a second account having a different second system registry; and transmitting to a proctoring center in real-time a feed of on-screen activity displayed on the screen of the computing device, the transmission automatically triggered when the computing device detects an attempt to change the system registry of the computing device that is not in accordance with the testing protocol during the testing routine, wherein an attempt to change the system registry includes an attempt to switch from a first account having a first system registry to a second account having a different second system registry. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system for securing a computing device during a testing event, the system comprising:
-
a server that provides a testing protocol for a testing event; and a computing device that receives from the server the testing protocol for the testing event and executes instructions stored in memory, wherein the computing device is communicatively coupled to the server by a network, the testing protocol includes limitations to be applied to the computing device during the testing event, and execution of the instructions by a processor of the computing device; applies the limitations by modifying a system registry of the computing device in accordance with the testing protocol, initiates execution of a testing routine corresponding to the testing event, detecting an attempt to switch from a first account having a first system registry to a second account having a different second system registry, and transmits to a proctoring center in real-time a feed of on-screen activity displayed on the screen of the computing device, the transmission automatically triggered when the computing device detects an attempt to change the system registry of the computing device that is not in accordance with the testing protocol during the testing routine, wherein an attempt to change the system registry includes an attempt to switch from a first account having a first system registry to a second account having a different second system registry. - View Dependent Claims (12, 13, 14)
-
Specification