Detection of unauthorized information exchange between users
First Claim
1. A method, comprising:
- initiating, by one or more computer processors coupled to at least one memory, a first camera at a first user device;
determining, by one or more computer processors and using the first camera, first behavioral data comprising a first duration of time that a first user'"'"'s eyes deviated from the first user device;
receiving first monitoring data associated with a first set of responses received by the first device from the first user in response to a set of questions, wherein the first monitoring data comprises at least;
the first behavioral data; and
a first viewing time period corresponding to a first length of time that a first question was viewed by the first user;
receiving second monitoring data associated with a second set of responses received by a second device from a second user in response to the set of questions, wherein the second monitoring data comprises at least;
second behavioral data comprising a second duration of time that the second user'"'"'s eyes deviated from the second user device; and
a second viewing time period corresponding to a second length of time that the first question was viewed by the second user;
determining, by one or more computer processors, based on an analysis of the first monitoring data and the second monitoring data, a similarity metric indicative of a degree of correspondence between the first monitoring data and the second monitoring data; and
generating, by one or more computer processors, a cheating metric based on the similarity metric, wherein the cheating metric indicates a probability that a portion of the first set or the second set of responses was obtained from an unauthorized source.
1 Assignment
0 Petitions
Accused Products
Abstract
Detection and prevention of unauthorized exchange of information between users of user devices is disclosed. Monitoring data associated with respective information received by the user devices from respective users may be received. Position information indicating proximity or relative positions of the devices may also be received. The monitoring data and/or the position information may be analyzed to determining whether unauthorized information exchange between users may be occurring. One or more metrics indicating a likelihood that unauthorized information exchange is occurring may be generated based on the analysis of the monitoring data and/or the position information. A generated metric may be compared to an associated threshold and preventive measures for deterring unauthorized information exchange may be identified based on a result of the comparison.
-
Citations
20 Claims
-
1. A method, comprising:
-
initiating, by one or more computer processors coupled to at least one memory, a first camera at a first user device; determining, by one or more computer processors and using the first camera, first behavioral data comprising a first duration of time that a first user'"'"'s eyes deviated from the first user device; receiving first monitoring data associated with a first set of responses received by the first device from the first user in response to a set of questions, wherein the first monitoring data comprises at least; the first behavioral data; and a first viewing time period corresponding to a first length of time that a first question was viewed by the first user; receiving second monitoring data associated with a second set of responses received by a second device from a second user in response to the set of questions, wherein the second monitoring data comprises at least; second behavioral data comprising a second duration of time that the second user'"'"'s eyes deviated from the second user device; and a second viewing time period corresponding to a second length of time that the first question was viewed by the second user; determining, by one or more computer processors, based on an analysis of the first monitoring data and the second monitoring data, a similarity metric indicative of a degree of correspondence between the first monitoring data and the second monitoring data; and generating, by one or more computer processors, a cheating metric based on the similarity metric, wherein the cheating metric indicates a probability that a portion of the first set or the second set of responses was obtained from an unauthorized source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a first user device with a first camera; a second user device with a second camera; and one or more computers in communication with the first user device and the second user device, the one or more computers comprising; at least one processor; and at least one memory storing computer-executable instructions, wherein at least one processor of the one or more processors is configured to execute the computer-executable instructions to; determine first behavioral information using the first camera, the first behavioral information comprising a first duration of time that a first user'"'"'s eyes deviated from the first user device; determine second behavioral information using the second camera, the second behavioral information comprising a second duration of time that a second user'"'"'s eyes deviated from the second user device; receive first monitoring data associated with first response information received by the first device from the first user, wherein the first monitoring data comprises the first behavioral information and a first viewing time period corresponding to a first length of time that a first question was viewed by the first user; receive second monitoring data associated with second response information received by the second device from the second user, wherein the second monitoring data comprises the second behavioral information and a second viewing time period corresponding to a second length of time that the first question was viewed by the second user; analyze the first monitoring data and the second monitoring data to identify one or more correlations; and generate, based at least in part on the one or more correlations, a cheating metric indicating a probability that a portion of the first or the second response information was obtained from an unauthorized source. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification