Abstract: A method, computer program product, and computer system for identifying at least one attribute of a user. An attention level of the user is determined with the identified at least one attribute. The attention level of the user is analyzed. An action of the user is classified as an attention deficiency event using the analyzed attention level of the user.
Abstract: A method, computer program product, and computer system for identifying at least one attribute of a user. An attention level of the user is determined with the identified at least one attribute. The attention level of the user is analyzed. An action of the user is classified as an attention deficiency event using the analyzed attention level of the user.
Abstract: A method, computer program product, and computer system for detecting cheating in an assessment. Brainwaves of a user are identified. An attention level of the user is determined with the identified brainwaves. The attention level of the user is analyzed. An action of the user is classified as a cheating event using the analyzed attention level of the user.
Abstract: A method, computer program product, and computer system for identifying at least one attribute of a user. An attention level of the user is determined with the identified at least one attribute. The attention level of the user is analyzed. An action of the user is classified as an attention deficiency event using the analyzed attention level of the user.
Abstract: A method for interacting with a user, comprising communicating with at least one cooperative server through a normal browser; automatically receiving encrypted data having an associated received type code indicative of a requirement for a secure browser having restricted functionality with respect to a functionality of the normal browser; selectively and automatically invoking the secure browser for handling of the received encrypted data based on the received type code associated with the received encrypted data; receiving the encrypted data with the invoked secure browser for handling thereof, wherein the received encrypted data is not available for use by the user in the normal browser and the invoked secure browser imposes restrictions on availability outside of the secure browser of decrypted data derived from the encrypted data; and communicating an input from the user, through the secure browser, to the at least one cooperative server.
Type:
Grant
Filed:
February 4, 2009
Date of Patent:
June 9, 2015
Assignee:
Questionmark Computing Limited
Inventors:
Eric Robert Shepherd, Paul Roberts, John Kleeman
Abstract: Computerized assessments rely upon databases containing constantly changing assessment information including an identifier, questions, choices, and scoring criteria. A particular instance of an assessment, including captured questions and corresponding scoring criteria is stored. The captured questions are administered to assessment takers. The answers are linked to scoring criteria using the identifier, so that assessment results may be generated. The assessment instance includes a first data entity including a selection of questions and an instance identifier; and a second data entity including the instance identifier and scoring criteria. An API captures the assessment instance responsive to a request by an external program, then communicates the first data entity to the external program. The external program then communicates back assessment answers with the identifier. The API associates the responses with the second data entity using the identifier and creates scoring results.
Type:
Grant
Filed:
January 11, 2008
Date of Patent:
January 1, 2019
Assignee:
Questionmark Computing Limited
Inventors:
Paul Roberts, John Kleeman, Eric Shepherd