×

Method for using a multi-function computer for testing

  • US 9,582,648 B2
  • Filed: 07/15/2014
  • Issued: 02/28/2017
  • Est. Priority Date: 09/17/2010
  • Status: Active Grant
First Claim
Patent Images

1. A system for coordinating the secure use of computer devices during an academic examination, the system comprising:

  • a plurality of computer devices, each computer device comprising (i) a memory device storing (a) at least one approved application, (b) at least one un-approved application, and (c) a testing routine, and (ii) a processor coupled to the memory device and programmed to execute each of the at least one approved application, the at least one un-approved application, and the testing routine,wherein execution of the testing routine;

    causes the processor to allow a respective user to access and use the at least one approved application and restricts or prevents access by the user of the at least one un-approved application,determines whether the respective user of the respective computer device accessed any un-approved applications using the computer device while the computer device was executing the testing routine, andreceives identification information corresponding to the respective computer device and uses the identification information as an input to a hash function to generate a user hash output; and

    a proctor computer comprising a memory device storing(i) a routine for receiving identification information corresponding to one of the plurality of computer devices, and(ii) a verification routine for providing one or more indications of whether one or more users of one or more of the plurality of computer devices accessed any of the at least one un-approved application while the one or more computer devices were executing the testing routine, wherein execution of the verification routine includes;

    using identification information corresponding to one of the computer devices as an input to the hash function to generate a proctor hash output for the one computer device, such that the user hash output and the proctor hash output are the same if the user of the one computer device has not accessed any of the un-approved applications, andcausing a visual indication of the hash output to be displayed on a display device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×