Patents by Inventor John Kleeman
John Kleeman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10170013Abstract: Computerized assessments rely upon databases containing constantly changing assessment information including an identifier, questions, choices, and scoring criteria. A particular instance of an assessment, including captured questions and corresponding scoring criteria is stored. The captured questions are administered to assessment takers. The answers are linked to scoring criteria using the identifier, so that assessment results may be generated. The assessment instance includes a first data entity including a selection of questions and an instance identifier; and a second data entity including the instance identifier and scoring criteria. An API captures the assessment instance responsive to a request by an external program, then communicates the first data entity to the external program. The external program then communicates back assessment answers with the identifier. The API associates the responses with the second data entity using the identifier and creates scoring results.Type: GrantFiled: January 11, 2008Date of Patent: January 1, 2019Assignee: Questionmark Computing LimitedInventors: Paul Roberts, John Kleeman, Eric Shepherd
-
Patent number: 9763613Abstract: A method, computer program product, and computer system for identifying at least one attribute of a user. An attention level of the user is determined with the identified at least one attribute. The attention level of the user is analyzed. An action of the user is classified as an attention deficiency event using the analyzed attention level of the user.Type: GrantFiled: June 23, 2016Date of Patent: September 19, 2017Assignee: Questionmark Computing LimitedInventors: Eric Shepherd, John Kleeman
-
Publication number: 20160296152Abstract: A method, computer program product, and computer system for identifying at least one attribute of a user. An attention level of the user is determined with the identified at least one attribute. The attention level of the user is analyzed. An action of the user is classified as an attention deficiency event using the analyzed attention level of the user.Type: ApplicationFiled: June 23, 2016Publication date: October 13, 2016Inventors: Eric Shepherd, John Kleeman
-
Patent number: 9439593Abstract: A method, computer program product, and computer system for identifying at least one attribute of a user. An attention level of the user is determined with the identified at least one attribute. The attention level of the user is analyzed. An action of the user is classified as an attention deficiency event using the analyzed attention level of the user.Type: GrantFiled: December 27, 2013Date of Patent: September 13, 2016Assignee: Questionmark Computing LimitedInventors: Eric Shepherd, John Kleeman
-
Patent number: 9055048Abstract: A method for interacting with a user, comprising communicating with at least one cooperative server through a normal browser; automatically receiving encrypted data having an associated received type code indicative of a requirement for a secure browser having restricted functionality with respect to a functionality of the normal browser; selectively and automatically invoking the secure browser for handling of the received encrypted data based on the received type code associated with the received encrypted data; receiving the encrypted data with the invoked secure browser for handling thereof, wherein the received encrypted data is not available for use by the user in the normal browser and the invoked secure browser imposes restrictions on availability outside of the secure browser of decrypted data derived from the encrypted data; and communicating an input from the user, through the secure browser, to the at least one cooperative server.Type: GrantFiled: February 4, 2009Date of Patent: June 9, 2015Assignee: Questionmark Computing LimitedInventors: Eric Robert Shepherd, Paul Roberts, John Kleeman
-
Patent number: 8816861Abstract: A method, computer program product, and computer system for detecting cheating in an assessment. Brainwaves of a user are identified. An attention level of the user is determined with the identified brainwaves. The attention level of the user is analyzed. An action of the user is classified as a cheating event using the analyzed attention level of the user.Type: GrantFiled: November 2, 2012Date of Patent: August 26, 2014Assignee: Questionmark Computing LimitedInventors: Eric Shepherd, John Kleeman
-
Publication number: 20140114148Abstract: A method, computer program product, and computer system for identifying at least one attribute of a user. An attention level of the user is determined with the identified at least one attribute. The attention level of the user is analyzed. An action of the user is classified as an attention deficiency event using the analyzed attention level of the user.Type: ApplicationFiled: December 27, 2013Publication date: April 24, 2014Applicant: Questionmark Computing LimitedInventors: Eric Shepherd, John Kleeman
-
Patent number: 8509949Abstract: The inventive concept of the metrology system (the system) actively determines the 6 Degree of Freedom (6-DOF) pose of a motion device such as, but not limited to, an industrial robot employing an end of arm tool (EOAT). A concept of the system includes using laser pointing devices without any inherent ranging capability in conjunction with the EOAT-mounted targets to actively determine the pose of the EOAT at distinct work positions of at least one motion device.Type: GrantFiled: March 23, 2009Date of Patent: August 13, 2013Assignee: Variation Reduction Solutions, Inc.Inventors: Brett Alan Bordyn, Myles Daniel Markey, Michael John Kleeman
-
Publication number: 20130113628Abstract: A method, computer program product, and computer system for detecting cheating in an assessment. Brainwaves of a user are identified. An attention level of the user is determined with the identified brainwaves. The attention level of the user is analyzed. An action of the user is classified as a cheating event using the analyzed attention level of the user.Type: ApplicationFiled: November 2, 2012Publication date: May 9, 2013Inventors: Eric Shepherd, John Kleeman
-
Publication number: 20090138804Abstract: A method for interacting with a user, comprising communicating with at least one cooperative server through a normal browser; automatically receiving encrypted data having an associated received type code indicative of a requirement for a secure browser having restricted functionality with respect to a functionality of the normal browser; selectively and automatically invoking the secure browser for handling of the received encrypted data based on the received type code associated with the received encrypted data; receiving the encrypted data with the invoked secure browser for handling thereof, wherein the received encrypted data is not available for use by the user in the normal browser and the invoked secure browser imposes restrictions on availability outside of the secure browser of decrypted data derived from the encrypted data; and communicating an input from the user, through the secure browser, to the at least one cooperative server.Type: ApplicationFiled: February 4, 2009Publication date: May 28, 2009Applicant: QUESTION MARK COMPUTING LIMITEDInventors: Eric Robert Shepherd, Paul Roberts, John Kleeman
-
Publication number: 20040230825Abstract: A secure user interface method, for interacting with a user through a browser, comprising the steps of controlling the browser to request a document from a cooperative server, the browser providing data export support functionality; receiving data with the browser in response to the request; determining, based on a type encoding of the received data, whether a secure browser is to be employed, the secure browser having a set of functionality restricted with respect to a normal browser, to enhance security of a received document against data export; authenticating the secure browser, to assure that the secure browser having the restricted set of functionality is available for presentation of secure content; receiving the secure content for presentation in the secure browser; and communicating an input from the user, through the secure browser, to a cooperative server.Type: ApplicationFiled: March 2, 2004Publication date: November 18, 2004Inventors: Eric Robert Shepherd, Paul Roberts, John Kleeman