Systems and methods for security verification in electronic learning systems and other systems
First Claim
Patent Images
1. A security verification system for an electronic learning environment, the system comprising:
- at least one client computer having a client processor, the client processor adapted to send at least one command for execution; and
at least one server having a server processor in data communication with the at least one client computer, the server processor being adapted to;
provide an account for allowing access to the electronic learning environment, the account being associated with a plurality of permission sets, wherein at least a subset of permission sets are associated with corresponding ones of a plurality of roles in relation to the electronic learning environment, the plurality of permission sets including;
(i) a first permission set available for activation, the first permission set comprising permissions to execute a first plurality of commands associated with a first user role for a first electronic learning course available on the electronic learning environment, the first plurality of commands being executable when the first permission set is activated, and the first permission set having a first security verification process associated therewith to activate the first permission set; and
(ii) a second permission set available for activation, the second permission set being different from the first permission set, the second permission set comprising permissions to execute a second plurality of commands associated with a second user role for a second electronic learning course available on the electronic learning environment, the second plurality of commands being executable when the second permission set is activated, and the second permission set having a second security verification process associated therewith to activate the second permission set;
wherein once one of the first or the second permission sets is activated, the activated permission set remains activated for a defined period and the server processor is further adapted to deactivate the activated permission set upon expiry of the defined period.
3 Assignments
0 Petitions
Accused Products
Abstract
The embodiments described herein relate to security verification systems and methods. In some aspects, there is provided a security verification server comprising a server processor. The server processor is adapted to provide at least one account identifier, receive at least one command for execution, determine whether to activate one or more available additional permission sets to execute the received command, and if it is determined that one or more additional permission sets should be activated to execute the received command, activate those permission sets by executing the security verification processes associated therewith.
96 Citations
28 Claims
-
1. A security verification system for an electronic learning environment, the system comprising:
-
at least one client computer having a client processor, the client processor adapted to send at least one command for execution; and at least one server having a server processor in data communication with the at least one client computer, the server processor being adapted to; provide an account for allowing access to the electronic learning environment, the account being associated with a plurality of permission sets, wherein at least a subset of permission sets are associated with corresponding ones of a plurality of roles in relation to the electronic learning environment, the plurality of permission sets including; (i) a first permission set available for activation, the first permission set comprising permissions to execute a first plurality of commands associated with a first user role for a first electronic learning course available on the electronic learning environment, the first plurality of commands being executable when the first permission set is activated, and the first permission set having a first security verification process associated therewith to activate the first permission set; and (ii) a second permission set available for activation, the second permission set being different from the first permission set, the second permission set comprising permissions to execute a second plurality of commands associated with a second user role for a second electronic learning course available on the electronic learning environment, the second plurality of commands being executable when the second permission set is activated, and the second permission set having a second security verification process associated therewith to activate the second permission set; wherein once one of the first or the second permission sets is activated, the activated permission set remains activated for a defined period and the server processor is further adapted to deactivate the activated permission set upon expiry of the defined period. - View Dependent Claims (2, 3)
-
-
4. A security verification server comprising a server processor and a memory storing instructions which, when executed by the server processor, cause the server processor to:
-
provide an account for allowing access to an electronic learning environment, the account being associated with plurality of permission sets, wherein at least a subset of permission sets are associated with corresponding ones of a plurality of roles in relation to the electronic learning environment, the plurality of permission sets including; (i) a first permission set available for activation, the first permission set comprising permissions to execute a first plurality of commands associated with a first user role for a first electronic learning course available on the electronic learning environment, the first plurality of commands being executable when the first permission set is activated, and the first permission set having a first security verification process associated therewith to activate the first permission set; and (ii) a second permission set available for activation, the second permission set being different from the first permission set, the second permission set comprising permissions to execute a second plurality of commands associated with a second user role for a second electronic learning course available on the electronic learning environment, the second plurality of commands being executable when the second permission set is activated, and the second permission set having a second security verification process associated therewith to activate the second permission set; wherein once one of the first or the second permission sets is activated, the activated permission set remains activated for a defined period and the server processor is further adapted to deactivate the activated permission set upon expiry of the defined period. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 27)
-
-
15. A security verification method for an electronic learning environment, the method to be performed by a server comprising a server processor, the method comprising:
-
the server providing an account for allowing access to an electronic learning environment, the account being associated with plurality of permission sets, wherein at least a subset of permission sets are associated with corresponding ones of a plurality of roles in relation to the electronic learning environment, the plurality of permission sets including; (i) a first permission set available for activation, the first permission set comprising permissions to execute a first plurality of commands associated with a first user role for a first electronic learning course available on the electronic learning environment, the first plurality of commands being executable when the first permission set is activated, and the first permission set having a first security verification process associated therewith to activate the first permission set; and (ii) a second permission set available for activation, the second permission set being different from the first permission set, the second permission set comprising permissions to execute a second plurality of commands associated with a second user role for a second electronic learning course available on the electronic learning environment, the second plurality of commands being executable when the second permission set is activated, and the second permission set having a second security verification process associated therewith to activate the second permission set; wherein when one of the first or second permission sets is activated, the activated permission set remains activated for a defined period and the activated permission set is deactivated upon expiry of the defined period. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 28)
-
-
26. A computer readable medium comprising instructions which, when executed by a processor of a server, causes the processor to perform a method of security verification, the method comprising:
-
providing an account for allowing access to the electronic learning environment, the account being associated with plurality of permission sets, wherein at least a subset of permission sets are associated with corresponding ones of a plurality of roles in relation to the electronic learning environment, the plurality of permission sets including; (i) a first permission set available for activation, the first permission set comprising permissions to execute a first plurality of commands associated with a first user role for a first electronic learning course available on the electronic learning environment, the first plurality of commands being executable when the first permission set is activated, and the first permission set having a first security verification process associated therewith to activate the first permission set; and (ii) a second permission set available for activation, the second permission set being different from the first permission set, the second permission set comprising permissions to execute a second plurality of commands associated with a second user role for a second electronic learning course available on the electronic learning environment, the second plurality of commands being executable when the second permission set is activated, and the second permission set having a second security verification process associated therewith to activate the second permission set; wherein when one of the first or second permission sets is activated, the activated permission set remains activated for a defined period and the activated permission set is deactivated upon expiry of the defined period.
-
Specification