×

Systems and methods for security verification in electronic learning systems and other systems

  • US 9,396,327 B2
  • Filed: 05/16/2011
  • Issued: 07/19/2016
  • Est. Priority Date: 05/16/2011
  • Status: Active Grant
First Claim
Patent Images

1. A security verification system for an electronic learning environment, the system comprising:

  • at least one client computer having a client processor, the client processor adapted to send at least one command for execution; and

    at least one server having a server processor in data communication with the at least one client computer, the server processor being adapted to;

    provide an account for allowing access to the electronic learning environment, the account being associated with a plurality of permission sets, wherein at least a subset of permission sets are associated with corresponding ones of a plurality of roles in relation to the electronic learning environment, the plurality of permission sets including;

    (i) a first permission set available for activation, the first permission set comprising permissions to execute a first plurality of commands associated with a first user role for a first electronic learning course available on the electronic learning environment, the first plurality of commands being executable when the first permission set is activated, and the first permission set having a first security verification process associated therewith to activate the first permission set; and

    (ii) a second permission set available for activation, the second permission set being different from the first permission set, the second permission set comprising permissions to execute a second plurality of commands associated with a second user role for a second electronic learning course available on the electronic learning environment, the second plurality of commands being executable when the second permission set is activated, and the second permission set having a second security verification process associated therewith to activate the second permission set;

    wherein once one of the first or the second permission sets is activated, the activated permission set remains activated for a defined period and the server processor is further adapted to deactivate the activated permission set upon expiry of the defined period.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×