Deidentified access of data

ABSTRACT

Generally, embodiments of the invention are directed to methods, computer readable medium, servers, and systems for deidentified access of data. The deidentified access is permitted with the use of an identifier that uniquely indicates an outcome, the coding of the identifier obscures unaided human interpretation of the outcome, and the identifier uniquely identifies data for remediating performance associated with future outcomes.

BACKGROUND

Fraudulently accessing data is possible through various means. Forexample, data may be transmitted to a recipient and intercepted. Whenthe source or content of the data is sensitive, it would be beneficialto secure or encode the data to hide the source or content of the data.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram showing illustrating an example of a contentdistribution network.

FIG. 2 is a block diagram illustrating a computer server and computingenvironment within a content distribution network.

FIG. 3 is a block diagram illustrating an embodiment of one or more datastore servers within a content distribution network.

FIG. 4 is a block diagram illustrating an embodiment of one or morecontent management servers within a content distribution network.

FIG. 5 is a block diagram illustrating the physical and logicalcomponents of a special-purpose computer device within a contentdistribution network.

FIG. 6 illustrates an example architecture of an evaluation system thatcommunicates with one or more data stores, according to at least oneexample;

FIG. 7 illustrates an example architecture of a content customizationsystem with one or more data stores, according to at least one example;

FIG. 8 illustrates an illustrative flow for implementing deidentifiedaccess of data described herein, according to at least one example;

FIG. 9 illustrates an illustrative flow for implementing deidentifiedaccess of data described herein, according to at least one example;

FIGS. 10A-10B and 11A-10B illustrate examples of data that are stored inthe test content data store, according to at least one example;

FIG. 12 illustrates an example encryption process of an identifier,according to at least one example;

FIG. 13 illustrates an example graphical user interface for displaying atest, according to at least one example;

FIG. 14 illustrates an example graphical user interface for displaying areview, according to at least one example;

FIG. 15 illustrates an example graphical user interface for accessingdata, according to at least one example;

FIG. 16 illustrates an example graphical user interface for displayingdata, according to at least one example;

FIG. 17 illustrates an illustrative flow for implementing deidentifiedaccess of data described herein, according to at least one example;

FIG. 18 illustrates an illustrative flow for implementing deidentifiedaccess of data described herein, according to at least one example;

FIG. 19 illustrates an illustrative flow for implementing deidentifiedaccess of data described herein, according to at least one example; and

FIG. 20 illustrates an illustrative flow for implementing deidentifiedaccess of data described herein, according to at least one example.

In the appended figures, similar components and/or features may have thesame reference label. Further, various components of the same type maybe distinguished by following the reference label by a dash and a secondlabel that distinguishes among the similar components. If only the firstreference label is used in the specification, the description isapplicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

DETAILED DESCRIPTION

The ensuing description provides illustrative embodiment(s) only and isnot intended to limit the scope, applicability or configuration of thedisclosure. Rather, the ensuing description of the illustrativeembodiment(s) will provide those skilled in the art with an enablingdescription for implementing a preferred exemplary embodiment. It isunderstood that various changes can be made in the function andarrangement of elements without departing from the spirit and scope asset forth in the appended claims.

The present disclosure provides a content distribution network foraccessing deidentified content. This content distribution networkincludes, for example, an evaluation system. The evaluation system maybe configured to transmit, to a user device, a first test strand and asecond test strand and receive, from the user device, one or moreresponses to the first test strand and the second test strand. Thecontent distribution network may also include a data engine thatexecutes a key. The execution can cause a comparison of the key with theone or more responses to the first test strand and the second teststrand and a determination of a first outcome for the first test strand,based in part on the comparison of the key with the one or moreresponses. The execution can also cause a determination of a secondoutcome for the second test strand, based in part on the comparison ofthe key with the one or more responses. The content distribution networkmay also include an identifier engine that generates an identifier. Theidentifier may uniquely indicate the first outcome and the secondoutcome. Coding of the identifier may obscure unaided humaninterpretation of the first outcome and the second outcome, and theidentifier may identify data for remediating performance on the firsttest strand or the second test strand. The content distribution networkmay also include a network interface controller (NIC) that transmits theidentifier to the user device.

In some embodiments, the present disclosure provides a method foraccessing deidentified content. This method includes, for example,transmitting, to a user device using a content distribution network, afirst test strand and a second test strand and receiving, from the userdevice, one or more responses to the first test strand and the secondtest strand. The method also includes executing a key with the one ormore responses to the first test strand and the second test strand. Theexecution may comprise a determination of a first outcome for the firsttest strand, based in part on the comparison of the key with the one ormore responses, and a determination of a second outcome for the secondtest strand, based in part on the comparison of the key with the one ormore responses. The method also includes generating an identifier. Theidentifier may uniquely indicate the first outcome and the secondoutcome. Coding of the identifier may obscure unaided humaninterpretation of the first outcome and the second outcome, and theidentifier may identify data for remediating performance on the firsttest strand or the second test strand. The method also includestransmitting the identifier to the user device.

In some embodiments, the present disclosure provides an evaluationsystem that comprises a network interface controller (NIC), a datastore, a processor, and a memory comprising computer executableinstructions which when executed by the processor cause the processor toperform the method receiving, by the evaluation system using the networkinterface controller (NIC) of the evaluation system from a user device,an identifier. The evaluation system and the user device communicatewithin a content distribution network. The identifier is associated witha first test strand and a second test strand, the identifier isgenerated by concatenating: a first identifier portion that identifiesthe first test strand with a first score identifier portion thatidentifies a first outcome with a second identifier portion thatidentifies the second test strand with a second score identifier portionthat identifies a second outcome; and wherein the identifier: uniquelyindicates the first outcome and the second outcome, coding of theidentifier obscures unaided human interpretation of the first outcomeand the second outcome, and the identifier identifies data forremediating performance on the first test strand or the second teststrand. The identifier may be parsed to identify remediate data. Forexample, parsing the identifier may determine the first identifierportion and the first score identifier portion. The method may compriseidentifying first remediate data in association with the firstidentifier portion and the first score identifier portion, where thefirst remediate data corresponds with the first outcome of the firsttest strand. The method may comprise parsing the identifier to determinethe second identifier portion and the second score identifier portion.The method may comprise identifying second remediate data with thesecond identifier portion and the second score identifier portion, wherethe second remediate data corresponds with the second outcome of thesecond test strand. The method may also comprise transmitting, by thenetwork interface controller (NIC), the first remediate data or thesecond remediate data to the user device to display the first remediatedata or the second remediate data at the user device, where the userdevice is enabled to display the first remediate data or the secondremediate data.

With reference now to FIG. 1, a block diagram is shown illustratingvarious components of a content distribution network (CDN) 100 whichimplements and supports certain embodiments and features describedherein. Content distribution network 100 may include one or more contentmanagement servers 102. As discussed below in more detail, contentmanagement servers 102 may be any desired type of server including, forexample, a rack server, a tower server, a miniature server, a bladeserver, a mini rack server, a mobile server, an ultra-dense server, asuper server, or the like, and may include various hardware components,for example, a mother board, a processing units, memory systems, harddrives, network interfaces, power supplies, etc. Content managementserver 102 may include one or more server farms, clusters, or any otherappropriate arrangement and/or combination or computer servers. Contentmanagement server 102 may act according to stored instructions locatedin a memory subsystem of the server 102, and may run an operatingsystem, including any commercially available server operating systemand/or any other operating systems discussed herein.

The content distribution network 100 may include one or more data storeservers 104, such as database servers and file-based storage systems.Data stores 104 may comprise stored data relevant to the functions ofthe content distribution network 100. Illustrative examples of datastores 104 that may be maintained in certain embodiments of the contentdistribution network 100 are described below in reference to FIG. 3. Insome embodiments, multiple data stores may reside on a single server104, either using the same storage components of server 104 or usingdifferent physical storage components to assure data security andintegrity between data stores. In other embodiments, each data store mayhave a separate dedicated data store server 104.

Content distribution network 100 also may include one or more userdevices 106 and/or supervisor devices 110. User devices 106 andsupervisor devices 110 may display content received via the contentdistribution network 100, and may support various types of userinteractions with the content. User devices 106 and supervisor devices110 may include mobile devices such as smartphone, tablet computers,personal digital assistants, and wearable computing devices. Such mobiledevices may run a variety of mobile operating systems, and may beenabled for Internet, e-mail, short message service (SMS), Blue tooth®,mobile radio-frequency identification (M-RFID), and/or othercommunication protocols. Other user devices 106 and supervisor devices110 may be general purpose personal computers or special-purposecomputing devices including, by way of example, personal computers,laptop computers, work station computers, projection devices, andinteractive room display systems. Additionally, user devices 106 andsupervisor devices 110 may be any other electronic devices, such as athin-client computers, an Internet-enabled gaming systems, business orhome appliances, and/or a personal messaging devices, capable ofcommunicating over network(s) 120.

In different contexts of content distribution networks 100, user devices106 and supervisor devices 110 may correspond to different types ofspecialized devices, for example, student devices and teacher devices inan educational network, employee devices and presentation devices in acompany network, different gaming devices in a gaming network, etc. Insome embodiments, user devices 106 and supervisor devices 110 mayoperate in the same physical location 107, such as a classroom orconference room. In such cases, the devices may contain components thatsupport direct communications with other nearby devices, such as awireless transceivers and wireless communications interfaces, Ethernetsockets or other Local Area Network (LAN) interfaces, etc. In otherimplementations, the user devices 106 and supervisor devices 110 neednot be used at the same location 107, but may be used in remotegeographic locations in which each user device 106 and supervisor device110 may use security features and/or specialized hardware (e.g.,hardware-accelerated SSL and HTTPS, WS-Security, firewalls, etc.) tocommunicate with the content management server 102 and/or other remotelylocated user devices 106. Additionally, different user devices 106 andsupervisor devices 110 may be assigned different designated roles, suchas presenter devices, teacher devices, administrator devices, or thelike, and in such cases the different devices may be provided withadditional hardware and/or software components to provide content andsupport user capabilities not available to the other devices.

The content distribution network 100 also may include a privacy server108 that maintains private user information at the privacy server 108while using applications or services hosted on other servers. Forexample, the privacy server 108 may be used to maintain private data ofa user within one jurisdiction even though the user is accessing anapplication hosted on a server (e.g., the content management server 102)located outside the jurisdiction. In such cases, the privacy server 108may intercept communications between a user device 106 or supervisordevice 110 and other devices that include private user information. Theprivacy server 108 may create a token or identifier that does notdisclose the private information and may use the token or identifierwhen communicating with the other servers and systems, instead of usingthe user's private information.

As illustrated in FIG. 1, the content management server 102 may be incommunication with one or more additional servers, such as a contentserver 112, a user data server 112, and/or an administrator server 116.Each of these servers may include some or all of the same physical andlogical components as the content management server(s) 102, and in somecases, the hardware and software components of these servers 112-116 maybe incorporated into the content management server(s) 102, rather thanbeing implemented as separate computer servers.

Content server 112 may include hardware and software components togenerate, store, and maintain the content resources for distribution touser devices 106 and other devices in the network 100. For example, incontent distribution networks 100 used for professional training andeducational purposes, content server 112 may include data stores oftraining materials, presentations, interactive programs and simulations,course models, course outlines, and various training interfaces thatcorrespond to different materials and/or different types of user devices106. In content distribution networks 100 used for media distribution,interactive gaming, and the like, a content server 112 may include mediacontent files such as music, movies, television programming, or games.

User data server 114 may include hardware and software components thatstore and process data for multiple users relating to each user'sactivities and usage of the content distribution network 100. Forexample, the content management server 102 may record and track eachuser's system usage, including their user device 106, content resourcesaccessed, and interactions with other user devices 106. This data may bestored and processed by the user data server 114, to support usertracking and analysis features. For instance, in the professionaltraining and educational contexts, the user data server 114 may storeand analyze each user's training materials viewed, presentationsattended, courses completed, interactions, evaluation results, and thelike. The user data server 114 may also include a repository foruser-generated material, such as evaluations and tests completed byusers, and documents and assignments prepared by users. In the contextof media distribution and interactive gaming, the user data server 114may store and process resource access data for multiple users (e.g.,content titles accessed, access times, data usage amounts, gaminghistories, user devices and device types, etc.).

Administrator server 116 may include hardware and software components toinitiate various administrative functions at the content managementserver 102 and other components within the content distribution network100. For example, the administrator server 116 may monitor device statusand performance for the various servers, data stores, and/or userdevices 106 in the content distribution network 100. When necessary, theadministrator server 116 may add or remove devices from the network 100,and perform device maintenance such as providing software updates to thedevices in the network 100. Various administrative tools on theadministrator server 116 may allow authorized users to set user accesspermissions to various content resources, monitor resource usage byusers and devices 106, and perform analyses and generate reports onspecific network users and/or devices (e.g., resource usage trackingreports, training evaluations, etc.).

The content distribution network 100 may include one or morecommunication networks 120. Although only a single network 120 isidentified in FIG. 1, the content distribution network 100 may includeany number of different communication networks between any of thecomputer servers and devices shown in FIG. 1 and/or other devicesdescribed herein. Communication networks 120 may enable communicationbetween the various computing devices, servers, and other components ofthe content distribution network 100. As discussed below, variousimplementations of content distribution networks 100 may employdifferent types of networks 120, for example, computer networks,telecommunications networks, wireless networks, and/or any combinationof these and/or other networks.

With reference to FIG. 2, an illustrative distributed computingenvironment 200 is shown including a computer server 202, four clientcomputing devices 206, and other components that may implement certainembodiments and features described herein. In some embodiments, theserver 202 may correspond to the content management server 102 discussedabove in FIG. 1, and the client computing devices 206 may correspond tothe user devices 106. However, the computing environment 200 illustratedin FIG. 2 may correspond to any other combination of devices and serversconfigured to implement a client-server model or other distributedcomputing architecture.

Client devices 206 may be configured to receive and execute clientapplications over one or more networks 220. Such client applications maybe web browser based applications and/or standalone softwareapplications, such as mobile device applications. Server 202 may becommunicatively coupled with the client devices 206 via one or morecommunication networks 220. Client devices 206 may receive clientapplications from server 202 or from other application providers (e.g.,public or private application stores). Server 202 may be configured torun one or more server software applications or services, for example,web-based or cloud-based services, to support content distribution andinteraction with client devices 206. Users operating client devices 206may in turn utilize one or more client applications (e.g., virtualclient applications) to interact with server 202 to utilize the servicesprovided by these components.

Various different subsystems and/or components 204 may be implemented onserver 202. Users operating the client devices 206 may initiate one ormore client applications to use services provided by these subsystemsand components. The subsystems and components within the server 202 andclient devices 206 may be implemented in hardware, firmware, software,or combinations thereof. Various different system configurations arepossible in different distributed computing systems 200 and contentdistribution networks 100. The embodiment shown in FIG. 2 is thus oneexample of a distributed computing system and is not intended to belimiting.

Although exemplary computing environment 200 is shown with four clientcomputing devices 206, any number of client computing devices may besupported. Other devices, such as specialized sensor devices, etc., mayinteract with client devices 206 and/or server 202.

As shown in FIG. 2, various security and integration components 208 maybe used to send and manage communications between the server 202 anduser devices 206 over one or more communication networks 220. Thesecurity and integration components 208 may include separate servers,such as web servers and/or authentication servers, and/or specializednetworking components, such as firewalls, routers, gateways, loadbalancers, and the like. In some cases, the security and integrationcomponents 208 may correspond to a set of dedicated hardware and/orsoftware operating at the same physical location and under the controlof same entities as server 202. For example, components 208 may includeone or more dedicated web servers and network hardware in a datacenteror a cloud infrastructure. In other examples, the security andintegration components 208 may correspond to separate hardware andsoftware components which may be operated at a separate physicallocation and/or by a separate entity.

Security and integration components 208 may implement various securityfeatures for data transmission and storage, such as authenticating usersand restricting access to unknown or unauthorized users. In variousimplementations, security and integration components 208 may provide,for example, a file-based integration scheme or a service-basedintegration scheme for transmitting data between the various devices inthe content distribution network 100. Security and integrationcomponents 208 also may use secure data transmission protocols and/orencryption for data transfers, for example, File Transfer Protocol(FTP), Secure File Transfer Protocol (SFTP), and/or Pretty Good Privacy(PGP) encryption.

In some embodiments, one or more web services may be implemented withinthe security and integration components 208 and/or elsewhere within thecontent distribution network 100. Such web services, includingcross-domain and/or cross-platform web services, may be developed forenterprise use in accordance with various web service standards, such asthe Web Service Interoperability (WS-I) guidelines. For example, someweb services may use the Secure Sockets Layer (SSL) or Transport LayerSecurity (TLS) protocol to provide secure connections between the server202 and user devices 206. SSL or TLS may use HTTP or HTTPS to provideauthentication and confidentiality. In other examples, web services maybe implemented using the WS-Security standard, which provides for secureSOAP messages using XML encryption. In other examples, the security andintegration components 208 may include specialized hardware forproviding secure web services. For example, security and integrationcomponents 208 may include secure network appliances having built-infeatures such as hardware-accelerated SSL and HTTPS, WS-Security, andfirewalls. Such specialized hardware may be installed and configured infront of any web servers, so that any external devices may communicatedirectly with the specialized hardware.

Communication network(s) 220 may be any type of network familiar tothose skilled in the art that can support data communications using anyof a variety of commercially-available protocols, including withoutlimitation, TCP/IP (transmission control protocol/Internet protocol),SNA (systems network architecture), IPX (Internet packet exchange),Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols,Hyper Text Transfer Protocol (HTTP) and

Secure Hyper Text Transfer Protocol (HTTPS), and the like. Merely by wayof example, network(s) 220 may be local area networks (LAN), such as onebased on Ethernet, Token-Ring and/or the like. Network(s) 220 also maybe wide-area networks, such as the Internet. Networks 220 may includetelecommunication networks such as a public switched telephone networks(PSTNs), or virtual networks such as an intranet or an extranet.Infrared and wireless networks (e.g., using the Institute of Electricaland Electronics (IEEE) 802.11 protocol suite or other wirelessprotocols) also may be included in networks 220.

Computing environment 200 also may include one or more data stores 210and/or back-end servers 212. In certain examples, the data stores 210may correspond to data store server(s) 104 discussed above in FIG. 1,and back-end servers 212 may correspond to the various back-end servers112-116. Data stores 210 and servers 212 may reside in the samedatacenter or may operate at a remote location from server 202. In somecases, one or more data stores 210 may reside on a non-transitorystorage medium within the server 202. Other data stores 210 and back-endservers 212 may be remote from server 202 and configured to communicatewith server 202 via one or more networks 220. In certain embodiments,data stores 210 and back-end servers 212 may reside in a storage-areanetwork (SAN).

With reference to FIG. 3, an illustrative set of data stores and/or datastore servers is shown, corresponding to the data store servers 104 ofthe content distribution network 100 discussed above in FIG. 1. One ormore individual data stores 301-309 may reside in storage on a singlecomputer server 104 (or a single server farm or cluster) under thecontrol of a single entity, or may reside on separate servers operatedby different entities and/or at remote locations. In some embodiments,data stores 301-309 may be accessed by the content management server 102and/or other devices and servers within the network 100 (e.g., userdevices 106, supervisor devices 110, administrator servers 116, etc.).Access to one or more of the data stores 301-309 may be limited ordenied based on the processes, user credentials, and/or devicesattempting to interact with the data store.

The paragraphs below describe examples of specific data stores that maybe implemented within some embodiments of a content distribution network100. It should be understood that the below descriptions of data stores301-309, including their functionality and types of data stored therein,are illustrative and non-limiting. Data stores server architecture,design, and the execution of specific data stores 301-309 may depend onthe context, size, and functional requirements of a content distributionnetwork 100. For example, in content distribution systems 100 used forprofessional training and educational purposes, separate databases orfile-based storage systems may be implemented in data store server(s)104 to store trainee and/or student data, trainer and/or professor data,training module data and content descriptions, training results,evaluation data, and the like. In contrast, in content distributionsystems 100 used for media distribution from content providers tosubscribers, separate data stores may be implemented in data storesserver(s) 104 to store listings of available content titles anddescriptions, content title usage statistics, subscriber profiles,network usage statistics, etc.

A user profile data store 301 may include information relating to theend users within the content distribution network 100. This informationmay include user characteristics such as the user names, accesscredentials (e.g., logins and passwords), user preferences, andinformation relating to any previous user interactions within thecontent distribution network 100 (e.g., requested content, postedcontent, content modules completed, training scores or evaluations,other associated users, etc.).

An accounts data store 302 may generate and store account data fordifferent users in various roles within the content distribution network100. For example, accounts may be created in an accounts data store 302for individual end users, supervisors, administrator users, and entitiessuch as companies or educational institutions. Account data may includeaccount types, current account status, account characteristics, and anyparameters, limits, restrictions associated with the accounts.

A content library data store 303 may include information describing theindividual content items (or content resources) available via thecontent distribution network 100. In some embodiments, the library datastore 303 may include metadata, properties, and other characteristicsassociated with the content resources stored in the content server 112.Such data may identify one or more aspects or content attributes of theassociated content resources, for example, subject matter, access level,or skill level of the content resources, license attributes of thecontent resources (e.g., any limitations and/or restrictions on thelicensable use and/or distribution of the content resource), ratingattributes for the content resources (e.g., data indicating theevaluation or effectiveness of the content resource), and the like. Insome embodiments, the library data store 303 may be configured to allowupdating of content metadata or properties, and to allow the additionand/or removal of information relating to the content resources.

A license data store 305 may include information relating to licensesand/or licensing of the content resources within the contentdistribution network 100. For example, the license data store 305 mayidentify licenses and licensing terms for individual content resourcesand/or compilations of content resources in the content server 112, therights holders for the content resources, and/or common or large-scaleright holder information such as contact information for rights holdersof content not included in the content server 112.

A content access data store 306 may include access rights and securityinformation for the content distribution network 100 and specificcontent resources. For example, the content access data store 306 mayinclude login information (e.g., user identifiers, logins, passwords,etc.) that can be verified during user login attempts to the network100. The content access data store 306 also may be used to storeassigned user roles and/or user levels of access. For example, a user'saccess level may correspond to the sets of content resources and/or theclient or server applications that the user is permitted to access.Certain users may be permitted or denied access to certain applicationsand resources based on their subscription level, training program,course/grade level, etc. Certain users may have supervisory access overone or more end users, allowing the supervisor to access all or portionsof the end user's content, activities, evaluations, etc. Additionally,certain users may have administrative access over some users and/or someapplications in the content management network 100, allowing such usersto add and remove user accounts, modify user access permissions, performmaintenance updates on software and servers, etc.

A source data store 307 may include information relating to the sourceof the content resources available via the content distribution network.For example, a source data store 307 may identify the authors andoriginating devices of content resources, previous pieces of data and/orgroups of data originating from the same authors or originating devices,and the like.

An evaluation data store 308 may include information used to direct theevaluation of users and content resources in the content managementnetwork 100. In some embodiments, the evaluation data store 308 maycontain, for example, the analysis criteria and the analysis guidelinesfor evaluating users (e.g., trainees/students, gaming users, mediacontent users, etc.) and/or for evaluating the content resources in thenetwork 100. The evaluation data store 308 also may include informationrelating to evaluation processing tasks, for example, the identificationof users and user devices 106 that have received certain contentresources or accessed certain applications, the status of evaluations orevaluation histories for content resources, users, or applications, andthe like. Evaluation criteria may be stored in the evaluation data store308 including data and/or instructions in the form of one or severalelectronic rubrics or scoring guides for use in the evaluation of thecontent, users, or applications. The evaluation data store 308 also mayinclude past evaluations and/or evaluation analyses for users, content,and applications, including relative rankings, characterizations,explanations, and the like.

In addition to the illustrative data stores described above, data storeserver(s) 104 (e.g., database servers, file-based storage servers, etc.)may include one or more external data aggregators 309. External dataaggregators 309 may include third-party data sources accessible to thecontent management network 100, but not maintained by the contentmanagement network 100. External data aggregators 309 may include anyelectronic information source relating to the users, content resources,or applications of the content distribution network 100. For example,external data aggregators 309 may be third-party data stores containingdemographic data, education related data, user data, health relateddata, and the like. Illustrative external data aggregators 309 mayinclude, for example, networking web servers, public records datastores, learning management systems, educational institution servers,business servers, medical record data stores, etc. Data retrieved fromvarious external data aggregators 309 may be used to verify and updateuser account information, suggest user content, and perform user andcontent evaluations.

With reference now to FIG. 4, a block diagram is shown illustrating anembodiment of one or more content management servers 102 within acontent distribution network 100. As discussed above, content managementserver(s) 102 may include various server hardware and softwarecomponents that manage the content resources within the contentdistribution network 100 and provide interactive and adaptive content tousers on various user devices 106. For example, content managementserver(s) 102 may provide instructions to and receive information fromthe other devices within the content distribution network 100, in orderto manage and transmit content resources, user data, and server orclient applications executing within the network 100.

A content management server 102 may include a content customizationsystem 402. The content customization system 402 may be implementedusing dedicated hardware within the content distribution network 100(e.g., a content customization server 402), or using designated hardwareand software resources within a shared content management server 102. Insome embodiments, the content customization system 402 may adjust theselection and adaptive capabilities of content resources to match theneeds and desires of the users receiving the content. For example, thecontent customization system 402 may query various data stores andservers 104 to retrieve user information, such as user preferences andcharacteristics (e.g., from a user profile data store 301), user accessrestrictions to content recourses (e.g., from a content access datastore 306), previous user results and content evaluations (e.g., from anevaluation data store 308), and the like. Based on the retrievedinformation from data stores 104 and other data sources, the contentcustomization system 402 may modify content resources for individualusers.

A content management server 102 also may include a user managementsystem 404. The user management system 404 may be implemented usingdedicated hardware within the content distribution network 100 (e.g., auser management server 404), or using designated hardware and softwareresources within a shared content management server 102. In someembodiments, the user management system 404 may monitor the progress ofusers through various types of content resources and groups, such asmedia compilations, courses or curriculums in training or educationalcontexts, interactive gaming environments, and the like. For example,the user management system 404 may query one or more databases and/ordata store servers 104 to retrieve user data such as associated contentcompilations or programs, content completion status, user goals,results, and the like.

A content management server 102 also may include an evaluation system406. The evaluation system 406 may be implemented using dedicatedhardware within the content distribution network 100 (e.g., anevaluation server 406), or using designated hardware and softwareresources within a shared content management server 102. The evaluationsystem 406 may be configured to receive and analyze information fromuser devices 106. For example, various ratings of content resourcessubmitted by users may be compiled and analyzed, and then stored in adata store (e.g., a content library data store 303 and/or evaluationdata store 308) associated with the content. In some embodiments, theevaluation server 406 may analyze the information to determine theeffectiveness or appropriateness of content resources with, for example,a subject matter, an age group, a skill level, or the like. In someembodiments, the evaluation system 406 may provide updates to thecontent customization system 402 or the user management system 404, withthe attributes of one or more content resources or groups of resourceswithin the network 100. The evaluation system 406 also may receive andanalyze user evaluation data from user devices 106, supervisor devices110, and administrator servers 116, etc. For instance, evaluation system406 may receive, aggregate, and analyze user evaluation data fordifferent types of users (e.g., end users, supervisors, administrators,etc.) in different contexts (e.g., ratings, trainee or studentcomprehension levels, teacher effectiveness levels, gamer skill levels,etc.).

A content management server 102 also may include a content deliverysystem 408. The content delivery system 408 may be implemented usingdedicated hardware within the content distribution network 100 (e.g., acontent delivery server 408), or using designated hardware and softwareresources within a shared content management server 102. The contentdelivery system 408 may receive content resources from the contentcustomization system 402 and/or from the user management system 404, andprovide the resources to user devices 106. The content delivery system408 may determine the appropriate presentation format for the contentresources based on the user characteristics and preferences, and/or thedevice capabilities of user devices 106. If needed, the content deliverysystem 408 may convert the content resources to the appropriatepresentation format and/or compress the content before transmission. Insome embodiments, the content delivery system 408 may also determine theappropriate transmission media and communication protocols fortransmission of the content resources.

In some embodiments, the content delivery system 408 may includespecialized security and integration hardware 410, along withcorresponding software components to implement the appropriate securityfeatures content transmission and storage, to provide the supportednetwork and client access models, and to support the performance andscalability requirements of the network 100. The security andintegration layer 410 may include some or all of the security andintegration components 208 discussed above in FIG. 2, and may controlthe transmission of content resources and other data, as well as thereceipt of requests and content interactions, to and from the userdevices 106, supervisor devices 110, administrative servers 116, andother devices in the network 100.

With reference now to FIG. 5, a block diagram of an illustrativecomputer system is shown. The system 500 may correspond to any of thecomputing devices or servers of the content distribution network 100described above, or any other computing devices described herein. Inthis example, computer system 500 includes processing units 504 thatcommunicate with a number of peripheral subsystems via a bus subsystem502. These peripheral subsystems include, for example, a storagesubsystem 510, an I/O subsystem 526, and a communications subsystem 532.

Bus subsystem 502 provides a mechanism for letting the variouscomponents and subsystems of computer system 500 communicate with eachother as intended. Although bus subsystem 502 is shown schematically asa single bus, alternative embodiments of the bus subsystem may utilizemultiple buses. Bus subsystem 502 may be any of several types of busstructures including a memory bus or memory controller, a peripheralbus, and a local bus using any of a variety of bus architectures. Sucharchitectures may include, for example, an Industry StandardArchitecture (ISA) bus, Micro Channel Architecture (MCA) bus, EnhancedISA (EISA) bus, Video Electronics Standards Association (VESA) localbus, and Peripheral Component Interconnect (PCI) bus, which can beimplemented as a Mezzanine bus manufactured to the IEEE P1386.1standard.

Processing unit 504, which may be implemented as one or more integratedcircuits (e.g., a conventional microprocessor or microcontroller),controls the operation of computer system 500. One or more processors,including single core and/or multicore processors, may be included inprocessing unit 504. As shown in the figure, processing unit 504 may beimplemented as one or more independent processing units 506 and/or 508with single or multicore processors and processor caches included ineach processing unit. In other embodiments, processing unit 504 may alsobe implemented as a quad-core processing unit or larger multicoredesigns (e.g., hexa-core processors, octo-core processors, ten-coreprocessors, or greater.

Processing unit 504 may execute a variety of software processes embodiedin program code, and may maintain multiple concurrently executingprograms or processes. At any given time, some or all of the programcode to be executed can be resident in processor(s) 504 and/or instorage subsystem 510. In some embodiments, computer system 500 mayinclude one or more specialized processors, such as digital signalprocessors (DSPs), outboard processors, graphics processors,application-specific processors, and/or the like.

I/O subsystem 526 may include device controllers 528 for one or moreuser interface input devices and/or user interface output devices 530.User interface input and output devices 530 may be integral with thecomputer system 500 (e.g., integrated audio/video systems, and/ortouchscreen displays), or may be separate peripheral devices which areattachable/detachable from the computer system 500.

Input devices 530 may include a keyboard, pointing devices such as amouse or trackball, a touchpad or touch screen incorporated into adisplay, a scroll wheel, a click wheel, a dial, a button, a switch, akeypad, audio input devices with voice command recognition systems,microphones, and other types of input devices. Input devices 530 mayalso include three dimensional (3D) mice, joysticks or pointing sticks,game pads and graphic tablets, and audio/visual devices such asspeakers, digital cameras, digital camcorders, portable media players,web cams, image scanners, fingerprint scanners, bar code reader 3Dscanners, 3D printers, laser range finders, and eye gaze trackingdevices. Additional input devices 530 may include, for example, motionsensing and/or gesture recognition devices that enable users to controland interact with an input device through a natural user interface usinggestures and spoken commands, eye gesture recognition devices thatdetect eye activity from users and transform the eye gestures as inputinto an input device, voice recognition sensing devices that enableusers to interact with voice recognition systems through voice commands,medical imaging input devices, MIDI keyboards, digital musicalinstruments, and the like.

Output devices 530 may include one or more display subsystems, indicatorlights, or non-visual displays such as audio output devices, etc.Display subsystems may include, for example, cathode ray tube (CRT)displays, flat-panel devices, such as those using a liquid crystaldisplay (LCD) or plasma display, projection devices, touch screens, andthe like. In general, use of the term “output device” is intended toinclude all possible types of devices and mechanisms for outputtinginformation from computer system 500 to a user or other computer. Forexample, output devices 530 may include, without limitation, a varietyof display devices that visually convey text, graphics and audio/videoinformation such as monitors, printers, speakers, headphones, automotivenavigation systems, plotters, voice output devices, and modems.

Computer system 500 may comprise one or more storage subsystems 510,comprising hardware and software components used for storing data andprogram instructions, such as system memory 518 and computer-readablestorage media 516. The system memory 518 and/or computer-readablestorage media 516 may store program instructions that are loadable andexecutable on processing units 504, as well as data generated during theexecution of these programs.

Depending on the configuration and type of computer system 500, systemmemory 318 may be stored in volatile memory (such as random accessmemory (RAM) 512) and/or in non-volatile storage drives 514 (such asread-only memory (ROM), flash memory, etc.) The RAM 512 may contain dataand/or program modules that are immediately accessible to and/orpresently being operated and executed by processing units 504. In someimplementations, system memory 518 may include multiple different typesof memory, such as static random access memory (SRAM) or dynamic randomaccess memory (DRAM). In some implementations, a basic input/outputsystem (BIOS), containing the basic routines that help to transferinformation between elements within computer system 500, such as duringstart-up, may typically be stored in the non-volatile storage drives514. By way of example, and not limitation, system memory 518 mayinclude application programs 520, such as client applications, Webbrowsers, mid-tier applications, server applications, etc., program data522, and an operating system 524.

Storage subsystem 510 also may provide one or more tangiblecomputer-readable storage media 516 for storing the basic programmingand data constructs that provide the functionality of some embodiments.Software (programs, code modules, instructions) that when executed by aprocessor provide the functionality described herein may be stored instorage subsystem 510. These software modules or instructions may beexecuted by processing units 504. Storage subsystem 510 may also providea repository for storing data used in accordance with the presentinvention.

Storage subsystem 300 may also include a computer-readable storage mediareader that can further be connected to computer-readable storage media516. Together and, optionally, in combination with system memory 518,computer-readable storage media 516 may comprehensively representremote, local, fixed, and/or removable storage devices plus storagemedia for temporarily and/or more permanently containing, storing,transmitting, and retrieving computer-readable information.

Computer-readable storage media 516 containing program code, or portionsof program code, may include any appropriate media known or used in theart, including storage media and communication media, such as but notlimited to, volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information. This can include tangible computer-readable storagemedia such as RAM, ROM, electronically erasable programmable ROM(EEPROM), flash memory or other memory technology, CD-ROM, digitalversatile disk (DVD), or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or other tangible computer readable media. This can also includenontangible computer-readable media, such as data signals, datatransmissions, or any other medium which can be used to transmit thedesired information and which can be accessed by computer system 500.

By way of example, computer-readable storage media 516 may include ahard disk drive that reads from or writes to non-removable, nonvolatilemagnetic media, a magnetic disk drive that reads from or writes to aremovable, nonvolatile magnetic disk, and an optical disk drive thatreads from or writes to a removable, nonvolatile optical disk such as aCD ROM, DVD, and Blu-Ray® disk, or other optical media.Computer-readable storage media 516 may include, but is not limited to,Zip® drives, flash memory cards, universal serial bus (USB) flashdrives, secure digital (SD) cards, DVD disks, digital video tape, andthe like. Computer-readable storage media 516 may also include,solid-state drives (SSD) based on non-volatile memory such asflash-memory based SSDs, enterprise flash drives, solid state ROM, andthe like, SSDs based on volatile memory such as solid state RAM, dynamicRAM, static RAM, DRAM-based SSDs, magnetoresistive RAM (MRAM) SSDs, andhybrid SSDs that use a combination of DRAM and flash memory based SSDs.The disk drives and their associated computer-readable media may providenon-volatile storage of computer-readable instructions, data structures,program modules, and other data for computer system 500.

Communications subsystem 532 may provide a communication interface fromcomputer system 500 and external computing devices via one or morecommunication networks, including local area networks (LANs), wide areanetworks (WANs) (e.g., the Internet), and various wirelesstelecommunications networks. As illustrated in FIG. 5, thecommunications subsystem 532 may include, for example, one or morenetwork interface controllers (NICs) 534, such as Ethernet cards,Asynchronous Transfer Mode NICs, Token Ring NICs, and the like, as wellas one or more wireless communications interfaces 536, such as wirelessnetwork interface controllers (WNICs), wireless network adapters, andthe like. Additionally and/or alternatively, the communicationssubsystem 532 may include one or more modems (telephone, satellite,cable, ISDN), synchronous or asynchronous digital subscriber line (DSL)units, FireWire® interfaces, USB® interfaces, and the like.Communications subsystem 536 also may include radio frequency (RF)transceiver components for accessing wireless voice and/or data networks(e.g., using cellular telephone technology, advanced data networktechnology, such as 3G, 4G or EDGE (enhanced data rates for globalevolution), WiFi (IEEE 802.11 family standards, or other mobilecommunication technologies, or any combination thereof), globalpositioning system (GPS) receiver components, and/or other components.

The various physical components of the communications subsystem 532 maybe detachable components coupled to the computer system 500 via acomputer network, a FireWire® bus, or the like, and/or may be physicallyintegrated onto a mother board of the computer system 500.Communications subsystem 532 also may be implemented in whole or in partby software.

In some embodiments, communications subsystem 532 may also receive inputcommunication in the form of structured and/or unstructured data feeds,event streams, event updates, and the like, on behalf of one or moreusers who may use or access computer system 500. For example,communications subsystem 532 may be configured to receive data feeds inreal-time from users of networks and/or other communication services,web feeds such as Rich Site Summary (RSS) feeds, and/or real-timeupdates from one or more third party information sources (e.g., dataaggregators 309). Additionally, communications subsystem 532 may beconfigured to receive data in the form of continuous data streams, whichmay include event streams of real-time events and/or event updates(e.g., sensor data applications, tickers, network performance measuringtools, click stream analysis tools, automobile traffic monitoring,etc.). Communications subsystem 532 may output such structured and/orunstructured data feeds, event streams, event updates, and the like toone or more data stores 104 that may be in communication with one ormore streaming data source computers coupled to computer system 500.

Due to the ever-changing nature of computers and networks, thedescription of computer system 500 depicted in the figure is intendedonly as a specific example. Many other configurations having more orfewer components than the system depicted in the figure are possible.For example, customized hardware might also be used and/or particularelements might be implemented in hardware, firmware, software, or acombination. Further, connection to other computing devices, such asnetwork input/output devices, may be employed. Based on the disclosureand teachings provided herein, a person of ordinary skill in the artwill appreciate other ways and/or methods to implement the variousembodiments.

This application incorporates by reference the entirety of U.S. patentapplication Ser. No. 14/788,228, filed Jun. 30, 2015. This applicationalso incorporates by reference the entirety of U.S. patent applicationSer. Nos. 14/724,620, 14/614,279, 14/524,948, 14/154,050, 14/144,437,14/137,890, 14/089,432, 13/655,507, 61/895,556, and 14/754,337.

With reference now to FIG. 6, a block diagram of an illustrativecomputer system is shown. The system may correspond with the evaluationsystem 406 of the content distribution network 100 within a sharedcontent management server 102 described above, or any other computingdevices described herein. In this example, evaluation system 406includes processing units that include, for example, a data engine 610,an identifier engine 620, an authenticator 630, and a workflow processor640 communicate with one or more data stores, including a content datastore 670, identifier data store 680, and authentication data store 690.

The evaluation system 406 includes one or more network interfacecontrollers (NIC) (illustrated as NIC 605A, hereinafter “NIC 605”) whichcan allow devices, networks, and other systems to access the othercomponents of the system 100. The NIC 605 includes features configuredto send and receive information, including, for example, an antenna, amodem, a transmitter, receiver, or any other feature that can send andreceive information. The NIC 605 can communicate via telephone, cable,fiber-optic, and other wired communication network. In some embodiments,the NIC 605 communicates via cellular networks, WLAN (wireless localarea networking) networks, or any other wireless network.

The NIC 605 can also be configured to send and receive data. In someembodiments, the NIC 605 transmits a test to a user device, transmits aplurality of test strands to a user device, receives test answers thatcorrespond to the strands of the test, or receives correct answers in akey. For example, the user device 106 provides test answers thatcorrespond to the strands of the test, which are received via the NIC605.

The evaluation system 406 also includes a data engine 610. The dataengine 610 can be configured to identify data associated with a test.The data may include one or more test questions, answers to testquestions, remediate code, instructional content, or other data that canhelp diagnose the performance of a user. The user may include a studentor any other individual or user device that interacts with the test. Thetest may include a plurality of strands, including a first strand andsecond strand. The strands of the test may include one or more subjects,including algebra, arithmetic, reading comprehension, sentence skills,or other subjects. In some embodiments, the strands of the test areprovided in other formats, including difficulty levels (e.g., one strandis low difficulty, one strand is high difficulty), test types (e.g.,logic, reading, games), nested sets of questions (e.g., one prompt forseven questions), and timeframes (e.g., one strand corresponds to onehour or day, a second strand corresponds to a different hour or day). Insome examples, the strands of the test can represent particular strandsor portions of the test. For example, when the test includes algebraproblems, the strands or portions of the test include word problems,computation with decimals, main ideas, or other strands or portions.

The data engine 610 can also be configured to receive and/or identify akey. The key may include a set of correct answers for a particular test,including a first strand of correct answers and a second strand ofcorrect answers. For example, the data engine 610 receives a pluralityof test answers to a plurality of test strands in a test and theplurality of test answers correspond with the user interacting with thetest. The plurality of test answers can include a first set of testanswers and a second set of test answers, such that the first set oftest answers corresponds to the first strand of the test, and the secondset of test answers corresponds to the second strand of the test.

The data engine 610 can also be configured to identify a plurality ofcorrect answers in the key, including a first strand of correct answersand a second strand of correct answers. The correct answers in the keymay correspond with various strands of the test. For example, the firststrand of correct answers corresponds with the first strand of the testand the second strand of correct answers corresponds with the secondstrand of the test. In another example, the correct answers may include“C” for question 1, “D” for question 2, and “No” for question 3.

The data engine 610 can also be configured to compare the test answersfrom the user with strands of correct answers. For example, the testanswers from the student may include “A” for question 1, “C” forquestion 2, and “Yes” for question 3. The correct answers from the keymay include “C” for question 1, “D” for question 2, and “No” forquestion 3. In this instance, the data engine 610 determines that thestudent scored “0,” received 0% correct or 100% incorrect, or any othermethod of grading the test answers in comparison with the correctanswers.

The data engine 610 can also be configured to determine an outcome for aparticular strand of the test. For example, the determination includes afirst outcome on the first strand of the test based in part on thecomparison of the first set of test answers. The first outcome canidentify one or more correct responses provided in the first strand ofthe test (e.g., 50% correct, answers 4 and 5 are correct). In anotherexample, the determination includes a second outcome on the secondstrand of the test based in part on the comparison of the second set oftest answers.

The evaluation system 406 also includes an identifier engine 620. Theidentifier engine 620 can be configured to generate an identifierassociated with the user of the test. The identifier can include one ormore alphanumeric characters, including alphabetic characters, digits,and/or symbols that are associated with data, remediation levels, one ormore outcomes associated with strands of the test, one or more usersassociated with the identifier, strands of the test, check portion(e.g., digit), access credentials, or other information. For example,when an identifier is “1AGCJ-5ABEFH-6,” the identifier identifies twostrands of the test (e.g., 1 for arithmetic and 5 for general math, 1forword problems and 5 for computation with decimals, 1 for one stand of atest and 5 for a different strand of a test), a plurality of remediationlevels (e.g., “A” for a low score in the fractions strand of arithmetic,“G” for a medium score in the division strand of arithmetic, “C” for alow score in the percentages strand of arithmetic), and a check portion(e.g., by translating the identifier to a numeric value to help confirmthat the identifier was provided correctly to a remediation server orwebpage).

In some embodiments, the identifier uniquely indicates the first outcomeof the first strand of the test and the second outcome of the secondstrand of the test. The outcome identifies one or more correct responsesprovided in a particular strand of the test. For example, the outcomeincludes a “low” score in the fractions strand of the test, a “medium”score in the division strand of arithmetic strand of the test, and a“low” score in the percentages strand of test.

In another example, the outcome includes 50% correct or answers 4 and 5are correct.

The identifier can uniquely indicate the outcome by including identifierportion(s) with the identifier. For example, an identifier of “1AGCJ”incorporates five identifier portions, including “1,” “A,” “G,” “C,” and“J,” where each character, digit, or symbol is an identifier portion. Inanother example, an identifier of “1A-2J” incorporates two identifierportions, including “A” and “J,” where “A” indicates a low score on thefractions strand of the arithmetic strand (e.g., “1”) and “J” indicatesa low score on the main concepts strand of the reading comprehensionstrand (e.g., “2”). In another example, an identifier of “1A-2J”incorporates two identifier portions, including “A” and “J,” where “A”indicates a low score on the fractions strand, portion, or strand ofalgebra (e.g., “1”) and “J” indicates a low score on the main conceptsstrand, portion, or strand of reading comprehension (e.g., “2”).

In some embodiments, the coding of the identifier obscures unaided humaninterpretation of the first outcome and the second outcome. Obscuringunaided human interpretation may code the identifier so that it isimpossible for a human to decode or interpret the identifier or dataassociated with the identifier without a computer. Human interpretationmay include a user's ability to read the identifier and deduce whichdata will be provided to the user, based in part on a remediation leveland/or remediation content associated with the identifier. In someinstances, human interpretation may be aided by the use of a computer,server, or user device used to translate the identifier. For example, acomputer can calculate a complex mathematics problem, whereas the humaninterpretation of the same mathematics problem would take more time orbe unsolvable for the human. The human can use a computer to help solvethe mathematics problem. In another example, a computer can easily see apattern in a coded identifier (e.g., “OLLEH” is “HELLO” backwards),whereas the human interpretation of the pattern may take more time or beunsolvable. In some embodiments, unaided human interpretation will notinclude these computers, servers, or user devices.

In some embodiments, the identifier uniquely identifies remediate datafor remediating performance on the test. For example, the identifierincludes “2B” which indicates the user performed poorly on the sentencestructure portion of the reading comprehension strand of the test. Basedin part on the “poor” performance identified by the identifier, the datafor remediating performance on the test can include lectures,instructional videos, tutorials, question/answer portions, step-by-stepinstructions, supplemental learning material, references to books orinstructions in content, or other information to help remediateperformance on the test. In some examples, the user will review and/orpractice performing problems from a particular strand using the data.The user can improve performance on future tests by interacting with thedata provided for the one or more strands.

The identifier engine 620 can also be configured to transmit theidentifier. In some embodiments, the identifier is transmitted to a userdevice to enable the user device to access data associated with thetest. The identifier engine 620 can interact with the NIC 605 totransmit the identifier to the user device 106.

The identifier engine 620 can also be configured to encrypt and/ordecrypt the identifier. The identifier may be encrypted before theidentifier is transmitted. For example, the identifier engine 620 maygenerate an identifier and alter the identifier to form an encryptedidentifier. Details and features of one type of encryption process areprovided in association with FIG. 12.

The evaluation system 406 also includes an authenticator 630. Theauthenticator 630 can be configured to identify a user and/or a userdevice. For example, the authenticator 630 identifies the userassociated with the user device as John Smith in a Colorado high schoolin Grade 12. The user can attend the test through a distance learningenvironment. The authenticator 630 may also identify the type of userdevice operated by the user (e.g., mobile device, tablet, desktopcomputer) and/or alter data based in part on the identification of theuser and/or user device. For example, when the user is identified as anEnglish-speaker, the data is provided in English. In another example,when the user is identified as operating a mobile device, the data isprovided for a smaller screen than when the user device is identified asa desktop computer.

The authenticator 630 can also be configured to interact with theauthentication data store 690. For example, the authenticator 630identifies the name, user name, student identifier, user deviceidentifier, user device type, or other information associated with auser. The authenticator 630 can interact with the authentication datastore 690 to store the information. The authenticator 630 may alsoretrieve the data for future uses and/or to process analytics.

The evaluation system 406 also includes an workflow processor 640. Theanalytics engine can be configured to display the results of a test. Forexample, the results of the test provide the user with a summary of thetest answers, correct answers, information about the test (e.g., date,title of the test, time allotted to take the test, test provider), orany subsequent steps that the user can consider to improve performance(e.g., by reviewing the data).

The workflow processor 640 can also be configured to generate data thatidentifies the performance of the user. The data can include varioustypes of information. For example, the data includes at least onepsychographic illustration depicting the performance of the user. Inanother example, the data includes at least one human-readabledescription associated with the performance of the user. The workflowprocessor 640 can also be configured to transmit and/or display thedata. For example, the data is displayed via a network page, presentedusing audio/visual information, or other formats for providing data.Details and features of data is provided in association with FIG. 14.

The evaluation system 406 also interacts with one or more data stores,including a content data store 670, identifier data store 680, andauthentication data store 690. The data stores are associated with adistributed or local data system accessible by the evaluation system406.

The content data store 670 may be configured to store informationrelated to tests, including test questions. For example, a test questionthat includes an algebraic test strand in a test can include:“______+22=30.” In another example, a test question that includes analgebraic test strand in a test can include: “A person has 10 apples inhis fruit basket, but needs 32 apples. How many apples should the personget from the store?” Details and features of a sample test is providedin association with FIG. 7.

The content data store 670 may also be configured to store points orweighted values that correlate with the test questions or the strand ofthe test. For example, when the first question incorporates severalalgebraic concepts in one question and the second question incorporatesonly one elementary concept in one question, the first question may beharder than the second question. The content data store 670 canassociate 2 points for the first question and 1 point for the secondquestion.

In one embodiment, for example, the content data store 670 receives aplurality of test strands from an administrator or test publisher thatinclude one or more test questions in each strand. The questions,strands, origin of the information, upload date, or other informationmay be stored in the content data store 670 to help create and/oranalyze the test.

The identifier data store 680 is configured to store information relatedto the identifier. For example, the identifier data store 680 stores theidentifier (e.g., for future use, as a back-up to providing theidentifier to the user device). In some examples, the identifier datastore 680 also identifies a user and/or user device associated with anidentifier.

The identifier data store 680 may also be configured to store dataassociated with remediating performance identified by the identifier.For example, when the identifier includes an identifier portion “2B,”which indicates the user performed poorly on a strand of the test, thedata may be stored in the identifier data store 680 to correlate withthat identifier and/or identifier portion. In another example, theidentifier data store may include references to the data stored inanother location (e.g., text file, webpage, instructional content datastore).

The authentication data store 690 stores information related to a useror user device. For example, the authentication data store 690 stores acredential, authentication identifier, device identifier, useridentifier, identifier associated with the user of a test, user name, orother information that allows the user of the device to access, manage,receive, generate, or otherwise interact with the test and/or data. Theauthentication data store 690 may also store a user's test answers,access code, or other information provided by the user to access thetest and/or data.

With reference now to FIG. 7, a block diagram of an illustrativecomputer system is shown. The system may correspond with the contentcustomization system 402 of the content distribution network 100 withina shared content management server 102 described above, or any othercomputing devices described herein. In this example, contentcustomization system 402 includes processing units that include, forexample, an instructional data engine 710, identifier engine 720,validation processor 730, access authorization processor 740, andcommunicate with one or more data stores, including an data store 770and access authorization data store 780.

As depicted in FIG. 7, the content customization system 402 includes anetwork interface controller (NIC) 605 (herein shown as NIC 605B). TheNIC 605 allows the devices, networks, and other systems to access theother components of the system 100. The NIC 605 includes featuresconfigured to send and receive information, including, for example, anantenna, a modem, a transmitter, receiver, or any other feature that cansend and receive information. The NIC 605 can communicate via telephone,cable, fiber-optic, and other wired communication network. In someembodiments, the NIC 605 communicates via cellular networks, WLAN(wireless local area networking) networks, or any other wirelessnetwork.

The NIC 605 can also be configured to send and receive data. In someembodiments, the NIC 605 receives an identifier associated with a userof a test, receives data, transmits one or more strands of data, orreceives a key (e.g., to identify remediation levels in an identifier,to identify a secret for decrypting an encrypted identifier). Forexample, the NIC 605 transmits the data to a user device 106 thatcorresponds to the strands of the test.

The content customization system 402 also includes a data engine 710.The data engine 710 can be configured to determine data correspondingwith a test. As shown, the test can diagnose the performance of a user.The test can include a first strand of the test and a second strand ofthe test, and the plurality of data can include a first strand of dataand a second strand of data. The data can include one or more questionsdirected to improving the performance of the user (e.g., on a test).

The data engine 710 can also be configured to determine data inassociation with the level of remediation. For example, a first strandof data is determined in association with a first level of remediation,so that the first strand of data helps to remediate performance on thefirst strand of the test. In another example, a second strand of data isdetermined in association with the second level of remediation, so thatthe second strand of data is identified for remediating performance onthe second strand of the test.

The data engine 710 can also be configured to display the data. In someembodiments, the data may be transmitted to a user device to enable theuser remediate performance on a test. The data engine 710 interacts withthe NIC 605 to transmit the data to a user device 106.

The data engine 710 can also be configured to interact with the datastore 770. For example, when the data engine 710 identifies one or morestrands of data, the data engine 710 interacts with the data store 770to store the information. The data engine 710 may retrieve the data forfuture uses and/or to process analytics.

The content customization system 402 also includes an identifier engine720. The identifier engine 720 can be configured to receive anidentifier associated with the user of the test. As shown, theidentifier may be associated with a user of a test. The identifier canalso uniquely indicate one or more outcomes of the test. The coding ofthe identifier can also obscure unaided human interpretation of the oneor more outcomes. The identifier may also uniquely identify theplurality of data for remediating performance on the test.

For example, the identifier engine 720 is configured to identify “A” asa low score in the fractions strand of arithmetic and “G” as a mediumscore in the division strand of arithmetic. In another example, theidentifier engine 720 is configured to identify “TA” as a low score inthe fractions strand of arithmetic and “GR” as a medium score in thedivision strand of arithmetic. The identifier engine 720 can beconfigured to identify a single character, digit, or symbol as anidentifier portion, or identify one or more characters, digits, orsymbols as an identifier portion.

The identifier engine 720 can also be configured to identify identifierportions by a particular length. For example, the identifier engine 720can identify each identifier portion as 1 or 2 characters, digits, orsymbols in length. In another example, each identifier portion is 1digit or 1 character. In yet another example, the identifier engine 720can be configured to identify variable-length identifier portions (e.g.,a first identifier is “A” because it matches a list of known identifierportions, the second identifier is “BB” because “B” is not a knownidentifier portion and “BB” is a known identifier portion).

The identifier engine 720 can also be configured to identify a pluralityof remediation levels in association with the identifier. For example,the plurality of remediation levels identify the remediation needed forthe user based in part on the performance on the test. The remediationlevels can include a first level of remediation and a second level ofremediation, such that the first level of remediation corresponds withthe first strand of the test, and the second level of remediationcorresponds with the second strand of the test.

The identifier engine 720 can also be configured to encrypt and/ordecrypt the identifier. For example, the identifier is decrypted beforethe remediation levels are identified in association with theidentifier. In another example, the identifier is decrypted once theidentifier is received from the user device. Details and features of theencryption process is provided in association with FIG. 12.

The identifier engine 720 can also be configured to interact with theidentifier data store 680. For example, the identifier engine 720 canreceive the identifier from the user device and/or the identifier datastore 680. The identifier engine 720 may store and/or retrieve theidentifier from the identifier data store 680.

The content customization system 402 also includes a validationprocessor 730. The validation processor 730 can be configured toidentify a check portion with the identifier. The check portion canconfirm that the identifier is provided correctly. For example, when theuser provides the identifier with the appropriate check portion to theserver, the server can identify that the identifier was providedcorrectly (e.g., typed, spoken, copied, pasted) by the user. In anotherexample, the network page can include a scripting language to check theidentifier locally at the user device without transmitting theidentifier to the content customization system 402. In some examples,when the check portion is determined not to be valid, the validationprocessor 730 may transmit a notification to the user device regardingthe identifier (e.g., “the identifier is incorrect,” “please try toprovide the identifier again,” etc.).

In an illustrative example, the identifier is “1AGCJ-5ABEFH.” The servercan calculate the check portion by first assigning numeric values to anycharacters in the identifier (e.g., “A” is “1,” “B” is “2,” . . . “Z” is26″). Using this initial character translation, the identifier becomes“117310512568.” The server can then implement one or more arithmeticoperations to form the check portion. For example, the server can add oraggregate all digits to form a single-digit check portion number (e.g.,1+1+7+3 + . . . +8=40; 4+0=4). The single-digit check portion numberwould be 4. In another example, the server can add the digits placed inevery other position or in each odd position (e.g., 1+7+1+5+2+6=22),multiply the sum by 3 (e.g., 22×3=66), and combine the results of eacharithmetic operation to form a final check portion number (e.g.,22+66=88; 8+8=16; 1+6=7). The single-digit check portion number would be7. In either of these examples, the single-digit check portion numbercan be compared with the check portion number received with theidentifier. When the single-digit check portion number matches the checkportion included with the identifier, the identifier may be determinedto be a valid check portion.

In yet another example, a more complex, multi-step process may beperformed to form the check portion. First, add the digits placed in oddpositions (e.g., 1+7+1+5+2+6=22). Second, multiply the sum by 3 (e.g.,22×3=66). Third, add the digits placed in even positions (e.g.,1+3+0+1+5+8=18). Fourth, add the results from the second and thirdsteps, including multiplying the odd digits by 3 and adding the evendigits (e.g., 66+18=84). Fifth, divide the result by 10 and keep theremainder (e.g., remainder of 84/10=4). Sixth, subtract by 10−4=6). Thesingle-digit check portion number would be 6. The single-digit checkportion number can be compared with the check portion number receivedwith the identifier. When the single-digit check portion number matchesthe check portion included with the identifier, the identifier may bedetermined to be a valid check portion.

The content customization system 402 also includes an accessauthorization processor 740. The access authorization processor 740 canbe configured to receive an access code associated with the user of thetest. The access code can indicate that a user and/or user device isallowed access to the data. The access authorization processor 740 canauthenticate the access code before displaying the data and/or confirmthat the particular user and/or user device has access to the data(e.g., after the access code is transmitted to the user device).

The access authorization processor 740 can also be configured togenerate the access code. The access code can include one or morealphanumeric characters, including alphabetic characters, digits, and/orsymbols. For example, an access code can be “01234-10-10-10-5.” In someembodiments, the access authorization processor 740 interacts with theaccess authorization data store 780 to store the access code in theaccess authorization data store 780 in association with a user. Detailsand features of a graphical user interface that receives an access codeis provided in association with FIG. 15.

The access authorization processor 740 can also be configured tointeract with the access authorization data store 780. For example, whenthe access authorization processor 740 receives an access code, theaccess authorization processor 740 interacts with the accessauthorization data store 780 to store the access code (e.g., inassociation with a user and/or user device). In another example, theaccess code may be checked against other access codes that are alreadystored in the access authorization data store 780 to confirm that theaccess codes has only been used once. The access authorization processor740 may retrieve the data for future uses and/or to process analytics.

The content customization system 402 also interacts with one or moredata stores, including a data store 770 and access authorization datastore 780. The data stores are associated with a distributed or localdata system accessible by the content customization system 402.

The data store 770 stores information related to data. In someembodiments, for example, the data store 770 includes data or referencesto data for remediating performance on the test, including lectures,instructional videos, tutorials, question/answer portions, step-by-stepinstructions, supplemental learning material, references to books orinstructions in content, or other information to help remediateperformance on the test. Details and features of data is provided inassociation with FIG. 16.

The access authorization data store 780 stores information related toone or more access codes. For example, an access code can be“01234-10-10-10-5.” The access code can be stored in the accessauthorization data store 780, along with information associated with theaccess code, including a corresponding user or account number. One ormore access codes may be associated with a user.

With reference now to FIG. 8, the content management server 102 (e.g.,the content customization system 402 and the evaluation system 406,etc.) may transmit data to the user device 106. In some embodiments, thecontent management server 102 (e.g., using the evaluation system 406,data engine 610, identifier engine 620, authenticator 630, workflowprocessor 640, or any data stores, including a content data store 670,identifier data store 680, and authentication data store 690, etc.) isresponsible for diagnosing the performance of the user with a test andgenerating an identifier to access data to remediate future performance.

At block 810, transmit a test strand to a user device. The test maycomprise a first test strand and a second test strand. The test strandscan correspond with different sections of the test, including algebra,arithmetic, reading comprehension, sentence skills, or other subjects.The test strands can be provided in other formats, including difficultylevels (e.g., one strand is low difficulty, one strand is highdifficulty), test types (e.g., logic, reading, games), nested sets ofquestions (e.g., one prompt for seven questions), and timeframes (e.g.,one strand corresponds to one hour or day, a second strand correspondsto a different hour or day).

At block 820, receive responses from the user device. The responses maycorrespond with the first test strand and the second test strand.

In some embodiments, the content management server 102 may correlate theresults at the strand with a score. For example, the results for a firststrand may be ten correct. The content management server 102 (e.g.,using the evaluation system 406) may compare the ten correct with ananswer key corresponding to the first strand. The answer key maydetermine that zero to five correct results is a low score, six to tencorrect results is a medium score, and eleven to fifteen correct resultsis a high score. Since the results for a first strand may be tencorrect, the results may correspond with a high score. The process ofdetermining the results and/or corresponding score may be a recursiveprocess for each strand.

At block 830, compare a key with the responses. The evaluation system406 (e.g., using the data engine 610, etc.) may compare the key with theresponses from the user device. For example, the first question may becompared with a corresponding portion of the key that relates to thefirst question. The response to the first question may be correct orincorrect when compared with the key. In some embodiments, thecomparisons of many portions or test strands may be aggregated so that akey is compared with the response(s) overall from the user device.

At block 840, determine an outcome for the comparison. The evaluationsystem 406 (e.g., using the data engine 610, etc.) may complete thecomparison of the key with the response(s) and determine an outcome forthe comparison. The outcome may correspond with the first test strandand the second test strand. For example, the content management server102 may correlate one or more portions of the test with one or moreportions of an identifier before the content management server 102receives the results at the strand level. Examples of one or moreoutcomes is illustrated in FIGS. 10A-10B and 11A-11B.

At block 850, generate an identifier based in part on the outcome. Theevaluation system 406 (e.g., using the identifier engine 620, etc.) maygenerate the identifier by combining the outcome from the comparison. Insome embodiments, the identifier may be generated by concatenatingportions of an identifier that correspond with the first test strand andthe second test strand. In some embodiments, the identifier is generatedby concatenating a first portion that corresponds with the first outcomeand a second portion that corresponds with the second outcome.

In some embodiments, content management server 102 may encrypt theidentifier using encryption processes discussed throughout thedisclosure. For example, the content management server 102 may usesecure data transmission protocols and/or encryption for data transfers,for example, File Transfer Protocol (FTP), Secure File Transfer Protocol(SFTP), and/or Pretty Good Privacy (PGP) encryption. An exampleencryption process is also illustrated with FIG. 12.

In some embodiments, content management server 102 may determine a checkportion associated with the identifier. The check portion may begenerated by translating the identifier to a numeric value and adding oraggregating the numeric values to a single value (e.g., the checkportion). The check portion may help confirm that the identifier wasprovided correctly to a remediation server or webpage.

At block 860, transmit identifier to user device. The evaluation system406 (e.g., using the identifier engine 620, the NIC 605, etc.) transmitsthe identifier to a user device. The user device may be enabled toaccess data associated with the first test strand and the second teststrand and/or remediate data for remediating performance with the firsttest strand or the second test strand and/or future performanceassociated with different test strands. In some embodiments, theevaluation system 406 may be configured to transmit the remediate dataas well.

With reference now to FIG. 9, the content management server 102 (e.g.,the content customization system 402 and the evaluation system 406,etc.) may transmit data to the user device 106. In some embodiments, thecontent management server 102 is responsible for receiving and decodingthe identifier and providing access to data associated with theidentifier to remediate future performance. The content managementserver 102 in FIG. 8 may be the same implementation of the contentmanagement server 102 in FIG. 9, or may be implemented as more than oneserver in a content distribution network (CDN) 100.

At block 910, receive the identifier. For example, the contentcustomization system 402 (e.g., using the NIC 605, etc.) may receive theidentifier from a user device. The content customization system 402 mayreceive the identifier through a graphical user interface (GUI) asillustrated with FIG. 15.

At block 920, parse or decode the identifier. For example, the contentcustomization system 402 (e.g., using the identifier engine 720, etc.)can be configured to receive an identifier and uniquely indicate one ormore outcomes of the test by parsing one or more portions of theidentifier. In some examples, the parsing may correspond with anidentifier that is formed by concatenating portions to form theidentifier, and then separating those portions to form portions of theidentifier.

At block 930, determine remediate data that corresponds with a portionof the identifier (e.g., for remediating performance on the test). Forexample, the content customization system 402 (e.g., using theidentifier engine 720, etc.) can be configured to receive an identifierand uniquely indicate one or more outcomes and/or remediation levelsthat corresponds with the one or more test strands.

In some embodiments, the identifier engine 720 can also be configured toencrypt and/or decrypt the identifier. For example, when the evaluationsystem 406 encrypts the identifier and transmits the encryptedidentifier to the content customization system 402, the contentcustomization system 402 can decrypt the identifier. The contentcustomization system 402 can use secure data transmission protocolsand/or encryption for data transfers, for example, File TransferProtocol (FTP), Secure File Transfer Protocol (SFTP), and/or Pretty GoodPrivacy (PGP) encryption. An example encryption process is alsoillustrated with FIG. 12.

In some embodiments, a check portion may be included with theidentifier. The content customization system 402 (e.g., using thevalidation processor 730, etc.) can authenticate check portion with theidentifier (e.g., to confirm whether one or more portions of theidentifier were lost during transmission, etc.).

At block 940, remediate data corresponding with the identifier may betransmitted to the user device. For example, the content customizationsystem 402 may interact with the data store 770 to retrieve and provideremediate data that corresponds with the outcome (e.g., the outcome is“low” for test strand 1, so the remediate data provided to the userdevice can remediate performance when the outcome is associated with“low” for that particular test strand, etc.).

In some embodiments, the identifier and/or test strands may be stored ina data store. The data store may be located in a cloud, hostedenvironment, or locally in association with the content managementserver 102.

With reference now to FIGS. 10A-10B, illustrations of data that arestored in the test content data store are shown. As shown in FIG. 10A,the illustration shows a plurality of test strands in a test that areassociated with an identifier or an identifier portion. For example, atest includes a plurality of test strands including instruction memory,registers, arithmetic logic unit (ALU), and data memory corresponding toportions along a pipelined computer data path. In other examples, theplurality of test strands may include arithmetic, reading comprehension,sentence skills, and algebra. One or more strands of the test may beassociated with an identifier and/or identifier portion. For example,the instruction memory strand of the test is associated with a “1”identifier portion, the registers strand of the test is associated witha “2” identifier portion, the arithmetic logic unit (ALU)strand isassociated with a “3” identifier portion, and the data memory strand isassociated with a “4” identifier portion.

In some embodiments, the identifier portions are concatenated togenerate an identifier. For example, when the test includes instructionmemory and registers, “1” and “2” may be concatenated to create anidentifier of “12.” The identifier may correlate to a data to remediateperformance in instruction memory and registers.

As shown in FIG. 10B, the illustration shows a plurality of test strandsin a test that are associated with an identifier or identifier portion.For example, the test includes a plurality of test strands includinginstruction memory, registers, arithmetic logic unit (ALU), and datamemory.

One or more test strands in the test are also associated with aplurality of remediation levels, including “low,” “medium,” and “high.”For example, when the user performs poorly on an instruction memorystrand, the strand associated with that user's performance is“instruction memory—low.” In another example, when the user performsaverage on an instruction memory strand, the strand associated with thatuser's performance is “instruction memory—medium.” In another example,when the user performs well on an instruction memory strand, the strandassociated with that user's performance is “instruction memory—high.”Each of these strands may correspond with an absolute number of correctanswers (e.g., 1-3 correct is “low,” 4-6 correct is “medium,” 7-10correct is “high”) or weighted average of correct answers, based in parton the difficulty of the particular test question and/or strand of thetest.

In some embodiments, the one or more strands of the test and theremediation level are associated with identifiers and/or identifierportions. For example, when the user performs poorly on an instructionmemory strand, this strand of the test is associated with an “A”identifier portion. When the user performs average on the instructionmemory strand, this strand of the test is associated with a “B”identifier portion. When the user performs well on the instructionmemory strand, this strand of the test is associated with a “C”identifier portion, and so on as illustrated.

In some embodiments, the identifier portions are concatenated togenerate an identifier. For example, when the test includes arithmetic,the user performed poorly on the arithmetic word problem strand (e.g.,“A”) and also performed poorly on the arithmetic computation withdecimals strand (e.g., “D”), “A” and “D” may be concatenated to createan identifier of “AD.” Other identifier portions are added as well,including an identifier portion associated with the generic test strand,arithmetic (e.g., “1”), to create an identifier of “1AD.” The identifiermay correlate to data to remediate performance (e.g., in arithmetic).

In some embodiments, the identifier portions from a plurality of teststrands are concatenated to generate an identifier. For example, whenthe test includes arithmetic (e.g., “1”) and reading comprehension(e.g., “2”), and the user performed poorly on the arithmetic wordproblem strand (e.g., “A”), but performed well on reading comprehensionsentence relationships (e.g., “C”), each of the identifier portions maybe concatenated to create an identifier of “1A2C,” “2C-1A,” or “1A-2C.”The identifier may correlate to data to remediate performance (e.g., inarithmetic and reading comprehension).

With reference now to FIGS. 11A-11B, illustrations of data that arestored in the test content data store are shown. As shown in FIG. 11A,the illustration shows a plurality of test strands in a test that areassociated with an identifier or an identifier portion. For example, atest includes a plurality of test strands including instruction memory,registers, arithmetic logic unit (ALU), and data memory. One or morestrands of the test may be associated with an identifier and/oridentifier portions, including arithmetic logic unit (ALU)—AND gate with“TA,” arithmetic logic unit (ALU)—OR gate with “GR,” arithmetic logicunit (ALU)—inverter with “EE,” and arithmetic logic unit(ALU)—multiplexor with “9P.”

In some embodiments, the identifier portions are concatenated togenerate an identifier. For example, when the test includes arithmeticlogic unit (ALU)—AND gate and arithmetic logic unit (ALU)—OR gate, “TA”and “GR” may be concatenated to create an identifier of “TAGR” or“TA-GR.” The identifier may correlate to data to remediate performancein ALU—AND gate as well as the OR gate test strands.

As shown in FIG. 11B, the illustration shows a plurality of test strandsin a test that are associated with an identifier or identifier portion.For example, the test includes a plurality of test strands includinginstruction memory, registers, arithmetic logic unit (ALU), and datamemory.

One or more test strands in the test are also associated with aplurality of remediation levels, including “10% correct,” “20% correct,”through “100% correct.” For example, when the user answers only10-percent of the questions correctly on an ALU—AND gate strand, thestrand associated with that user's performance is “ALU—AND gate—10%correct.” In another example, when the user answers only 50-percent ofthe questions correctly on an ALU—AND gate strand, the strand associatedwith that user's performance is “ALU—AND gate—50% correct.” In anotherexample, when the user answers 90-percent of the questions correctly onan ALU—AND gate strand, the strand associated with that user'sperformance is “ALU—AND gate—90% correct.”

In some embodiments, the one or more strands of the test and theremediation level are associated with identifiers and/or identifierportions. For example, when the user answers only 10-percent of thequestions correctly on an ALU—AND gate strand, this strand of the testis associated with an “42” identifier portion. When the user answersonly 50-percent of the questions correctly on the ALU—AND gate strand,this strand of the test is associated with a “QB” identifier portion.When the user answers 90-percent of the questions correctly on theALU—AND gate strand, this strand of the test is associated with a “BC”identifier portion, and so on as illustrated.

In some embodiments, the identifier portions are concatenated togenerate an identifier. For example, when the test includes ALU—AND gate(e.g., “TA”) and the user answers only 10-percent of the questionscorrectly on the ALU—AND gate strand (e.g., “42”), “TA” and “42” may beconcatenated to create an identifier of “TA42.” The identifier maycorrelate to data to remediate performance in one or more strands of thetest.

With reference now to FIG. 12, an illustration of an example encryptionprocess of an identifier is shown. In some embodiments, the identifieris encrypted (e.g., by the server) before the identifier is transmittedand decrypted after the identifier is received (e.g., by the server).Encryption may encode the identifier so that third parties cannot readthe identifier, even if the third party possesses the answer key thatidentifies the identifier portions for a particular remediation levelwithin the identifier (e.g., “QB” means that the user answers 50-percentof the questions correctly on the ALU—AND gate strand). For example, theencryption process includes any encryption algorithm to encrypt theidentifier, including a one-time pad encryption (as shown), symmetrickey encryption, or public key encryption.

At block 1210, the identifier is generated as “HELLO.” The identifiercan be associated with the user of the test and uniquely indicate theoutcome of one or more strands of the test (e.g., based in part on acomparison of the user's test answers with the correct answers). Forexample, the “H” represents ALU—AND gate, “E” represents performing wellon the ALU—OR gate strand problems, “LL” represents performing poorly onthe instruction memory strand, and “O” represents performing well onALU—AND gate percentage calculations. As shown in some examples, themodule that parses the identifier is configured to identify (e.g.,parse) one character, digit, or symbol at a time (e.g., H, E, O), morethan one character, digit, or symbol at a time (e.g., LL), or acombination of one or more than one character, digit, or symbol at atime.

At block 1220, the identifier is translated to a numerical equivalent.For example, one method of translating the identifier to a numericalequivalent corresponds with associating each character to the positionthat the number occupies in a 0-25 letter alphabet (e.g., “A” is 0, “B”is 1, “C” is 2). In this example, the identifier is translated to“7-4-11-11-14,” which corresponds with “H” as the 7^(th) letter, “E” asthe 4^(th) letter, “L” as the 11^(th) letter, and “O” as the 14^(th)letter.

At block 1230, the encryption key is identified. For example, when usinga one-time pad encryption, the encryption key identifies a correspondingvalue from a secret random key (e.g., the 10^(th) sheet on a pad on June1 ^(st), the next available key in a pad of potential encryption keys).The encryption key can identify that the first digit should be combinedwith the number “23,” the second digit should be combined with “12,” thethird digit should be combined with “2,” the fourth digit should becombined with “10,” and the fifth digit should be combined with “11.”The encryption key may be unique for each encryption (e.g., only usedonce) and kept secret. In this example, the key is combined with eachcharacter, digit, or symbol of the identifier, so “7” or “H” should becombined with “23,” “4” or “E” should be combined with “12,” “11” or “L”should be combined with “2,” “11” or “L” should be combined with “10,”and “14” or “O” should be combined with “11.”

In some embodiments, the testing server 110 and the contentcustomization system 402 each possess the encryption key for encryptingand decrypting the identifier. For example, the testing server 110 andthe content customization system 402 each identify the appropriateunused page from the pad. The corresponding page at each location canidentify the same key (e.g., the first digit should be combined with thenumber “23,” the second digit should be combined with “12”), so thatwhen the testing server 110 combines the key with the identifier toencrypt the identifier, the content customization system 402 can combinethe key with the identifier to decrypt the identifier.

At block 1240, the encryption key and identifier are combined. Forexample, “7” is combined with “23” to form “30,” “4 ” is combined with“12” to form “16,” “11 ” is combined with “2” to form “13,” “11 ” iscombined with “10” to form “21,” and “14” is combined with “11” to form“25.” The combination creates a combined identifier of “30-16-13-21-25.”

At block 1250, the modular remainder is identified from the combined keyand identifier, so that when the combined key and identifier is a valuelarger than 26, the remainder after subtraction of 26 is taken as thenew digit. For example, since “30” is greater than “26,” the modularvalue for the first digit is calculated and replaced with “4.” Sinceeach of the other digits is less than “26,” the other digits remainunchanged after the combination, creating an encrypted identifier“4-16-13-21-25,” which corresponds with “E” as the 4^(th) letter, “Q” asthe 16^(th) letter, “N” as the 13^(th) letter, “V” as the 21^(st)letter, and “Z” as the 25^(th) letter.

At block 1260, the digits are translated back to letter values andtransmitted. In some examples, the letter values may be the same lengthof characters, digits, or symbols in the original identifier. Forexample, the encrypted identifier is “EQNVZ,” which corresponds with thedecrypted identifier “HELLO.”

With reference now to FIG. 13, an illustration of a graphical userinterface for displaying a test is shown. The test is provided on agraphical user interface (GUI) 1310. As shown, the GUI 1310 can includeone or more strands of a test 1320 (herein shown as 1320-A and 1320-B),one or more test questions 1330, and one or more GUI input elements 1340to accept test answers, including text boxes. In some examples, the testincludes only one strand of a test 1320 (e.g., only algebra or onlyreading comprehension).

The GUI 1310 includes one or more strands of a test 1320. As shown, thestrands of the test are “ALU-AND gate” and “Instruction Memory.” Thestrands may include subjects (e.g., along a pipeline data path),difficulty levels (e.g., low difficulty, high difficulty), test types(e.g., gates, multiplexors, instruction memory), nested sets ofquestions (e.g., one prompt for seven questions), timeframes (e.g., day1 questions, day 2 questions), or other portions of a test.

The GUI 1310 also includes one or more test questions 1330. The testquestions can vary by the type of test and/or strands presented in thetest. As shown, the test question that includes : “______+22=30.” Inanother example, a test question that includes: “A person has 10 applesin his fruit basket, but needs 32 apples. How many apples should theperson get from the store?”

The GUI 1310 also includes one or more GUI input elements 1340. Asshown, the GUI input elements 1340 can include test boxes. AlternativeGUI input elements can include radio buttons, drop-down menus, orexpanded text boxes (e.g., to enter essay-type responses). The user mayuse the GUI input elements 1340 to provide responses (e.g., type,select) in order to generate a test answer to a particular testquestion. For example, in response to question 1, the user can type “8”and in response to question 2, the user can type “22.”

With reference now to FIG. 14, an illustration of a graphical userinterface for displaying a diagnostic review is shown. The diagnosticreview is provided on a graphical user interface (GUI) 1410. As shown,the GUI 1410 includes an identifier 1420 and data, including apsychographic illustration 1430 and a human-readable description 1440associated with the performance of the user.

The GUI 1410 includes an identifier 1420. In some embodiments, theidentifier is received from a user device after the user completes thetest. For example, as shown, the user's test answers are received for aplurality of test strands in a test. The test answers are compared withthe correct answers in a key and an outcome is determined for eachstrand for the test, based in part on the comparison. The identifier canuniquely indicate the outcome of one or more strands of the test.

The GUI 1410 also includes data. The data can identify the performanceof the user on the test. For example, when the identifier indicates thatthe user's performance on the main ideas portion of the readingcomprehension strand was low, the data can identify the poor performanceappropriately.

The data can include a psychographic illustration 1430, including bars,lines, charts, graphics, or other formats for presenting information toa user. For example, data for a strand may display a colored-bar chart,where a color (e.g., green) identifies a relatively “high” outcome and adifferent color (e.g., red) identifies a relatively “low” outcome. Inanother example, the placement of the bar is affected by the difficultylevel of the test questions. For instances, the illustrated data can beidentical for a student that answered six easy questions correctly outof ten total questions, and the student that answered three difficultquestions correctly out of ten total questions. The psychographicillustration 1430 can highlight which test strands need improvement ormeet a minimum standard of competency based in part on the analysis.

The data can include a human-readable description 1440 associated withthe performance of the user. A human-readable description may include arepresentation of data or information that can be naturally read byhumans. For example, the human-readable description 1440 includes thetest strand (e.g., ALU—AND gate, multiplexor), a description of the teststrand (e.g., “These questions test your ability to identify therelationships amongst sentences, grasping key details that support themain idea.”), the outcome and/or suggestions to improve performance(e.g., “you need to improve significantly in this area”), or otherinformation.

With reference now to FIG. 15, an illustration of a graphical userinterface for accessing data is shown. A graphical user interface (GUI)1510 for accessing data is provided. As shown, the GUI 1510 includes anidentifier 1520 and an access code 1530.

The GUI 1510 includes an identifier 1520. For example, the identifier isreceived from a user device after the user completes the test. After auser device receives an identifier, the user device provides theidentifier to the GUI 1510 to access the data. The identifier canuniquely identify data for remediating performance on the test.

The GUI 1510 also includes an access code 1530. For example, the usermay provide the access code via a user device to the GUI 1510. Theaccess code can indicate that a user and/or user device is allowedaccess to the data. The GUI and/or server can authenticate the accesscode before displaying the data and/or confirm that the particular userand/or user device has access to the data.

With reference now to FIG. 16, an illustration of a graphical userinterface for displaying data is shown. A graphical user interface (GUI)1610 for displaying data is provided. As shown, the GUI 1610 includes anidentifier 1620 and data 1630.

The server may access data (e.g., stored in an data store 770) and/ordetermine which data to utilize. The data may include one or morestrands of data, including a first strand of data and a second strand ofdata. The strands of data can correlate with the strands of the test,including a first strand of the test and a second strand of the test.

The GUI 1610 receives the identifier and data is identified for theparticular identifier. For example, the identifier can help identify aplurality of remediation levels to help identify the remediation neededfor the user based in part on the performance on the test. The pluralityof remediation levels can include a first level of remediation and asecond level of remediation, so that the first level of remediationcorresponds with the first strand of the test and the second level ofremediation corresponds with the second strand of the test.

Once the data is determined in association with the particularremediation needed for the identifier, the GUI 1610 displays the data1630. For example, data 1630 includes an algebra problem andstep-by-step instructions on how to approach solving the algebraproblem. Other methods of providing data may also be supported,including lectures, instructional videos, tutorials, question/answerportions, supplemental learning material, references to books orinstructions in content, or other information to help remediateperformance on the test.

With reference now to FIG. 17, a flowchart illustrating one embodimentof implementing deidentified access of data is shown. The process 1700is performed by one or several of the components of the system 100. Theprocess 1700 begins at block 1710 when test answers are received. Forexample, the user device provides a plurality of strands of a test thatinclude one or more test questions. The user operates the user device toprovide test answers in response to the one or more test questions. Theuser device transmits the test answers to a server.

At block 1720, the process identifies correct answers in a key. Forexample, a server identifies the correct answers in a key (e.g.,identifying the appropriate test, identifying the appropriate version ofthe test) and also receives the test answers. The server may also storethe correct answers and/or answer key in a data store for future use.

At block 1730, the process compares the test answers with the correctanswers. For example, the server can compare the appropriate correctanswers with the corresponding test answers received from the userdevice. In some embodiments, the server can retrieve the correct answersfrom the data store and/or dynamically compare the correct answers tothe received test answers from the user.

At block 1740, the process determines an outcome. For example, theoutcome is based on the comparison. The comparison can identify one ormore correct responses provided in one or more strands of the test,including a first outcome for the comparison between the first set oftest answers and the corresponding correct responses and a secondoutcome for the comparison between the second set of test answers andthe corresponding correct responses.

At block 1750, the process generates an identifier based in part on theoutcome. The identifier may uniquely indicate the outcome of one or morestrands of the test. The identifier may also be coded to obscure unaidedhuman interpretation of the outcome. The identifier may also uniquelyidentify data for remediating performance on the test. Additionaldetails and features of block 1750 are provided in association with FIG.18.

With reference now to FIG. 18, a flowchart illustrating one embodimentof implementing deidentified access of data is shown. The process 1750is performed by one or several of the components of the system 100. Theprocess 1750 begins at block 1810 by identifying a current test strandin a plurality of test strands. For example, the current test strand maybe “algebra” out of a plurality of test strands including arithmetic,reading comprehension, sentence skills, and algebra.

At block 1820, the process determines whether an identifier exists. Forexample, the identifier may be associated with the user of a test andthe process can determine if the user is currently associated with oneor more identifiers. This can include asking the user for theidentifier, querying one or more data stores for an identifier, or othermeans of identifying an identifier for a user.

A decision from block 1820 may be made. If yes, the process proceeds toblock 1830, where the process identifies an existing identifier instorage as the identifier. The identifier may be located in theidentifier data store or other accessible temporary/permanent datastore. If not, the process proceeds to block 1840, when the processallocates storage for a new identifier. For example, the process candynamically allocate portions of storage (e.g. random access memory,virtual memory) and de-allocate the storage when the storage is nolonger needed.

At block 1850, the process identifies the remediation level based on theoutcome for the current test strand. For example, the user may haveperformed poorly on algebra, identifying the need for remediation formost of the topics covered in the test strand. In another example, theprocess can identify the remediation level for particular portions ofthe current test subject, including the “find a variable” strand and the“evaluating algebraic expressions” strand of the algebra test strand.

At block 1860, the process associates the remediation level with anidentifier portion. For example, the poor performance on algebra can beassociated with an “A” identifier portion (e.g., meaning “low” or “poorperformance”) or “1A” identifier portion (e.g., meaning “low” or “poorperformance” on algebra). In another example, the poor performance forparticular portions of the current test subject, including the “find avariable” strand and the “evaluating algebraic expressions” strand ofthe algebra test strand can be associated with other identifierportions, including “1GCE” or “1A-2B.”

At block 1870, the process includes the identifier portion with theidentifier. For example, the identifier portions are concatenated togenerate an identifier. The “A” and “D” may be concatenated to create anidentifier of “AD.” Other identifier portions are added as well,including an identifier portion associated with the generic test strand,algebra (e.g., “1”), to create an identifier of “1AD.” The identifiermay correlate to data to remediate performance (e.g., in algebra).

At block 1880, the process determines whether additional strands of thetest are present. For example, when the user interacts with a test thatincludes an algebra test strand and a reading comprehension test strand,and the process has not analyzed the reading comprehension test strand,the process would determine that additional strands of the test arepresent. As shown, some examples of a test include only one strand of atest (e.g., only algebra or only reading comprehension), so the processcan determine that no additional strands of the test are present.

A decision from block 1880 may be made. If yes, the process returns toblock 1810, where the process identifies a current test strand in aplurality of test strands (e.g., reading comprehension, a subsequenttest strand after algebra). If not, the process proceeds to block 1890.At block 1890, the process encrypts the identifier. The encryption maybe optional. For example, the encryption can encode the identifier sothat third parties cannot read the identifier, even if the third partypossesses the answer key that identifies the identifier portions for aparticular remediation level.

Returning to FIG. 17 at block 1760, the process transmits theidentifier. For example, the identifier is transmitted via a wired orwireless connection to one or more intranets, internets, public orprivate channels, communication tunnels between one or more servers, orother means of communication to a user device. The identifier may beencrypted before the identifier is transmitted. In another example, theidentifier is transmitted to a data store to archive the identifier forfuture use.

With reference now to FIG. 19, a flowchart illustrating one embodimentof implementing deidentified access of data is shown. The process 1900is performed by one or several of the components of the system 100. Theprocess 1900 begins at block 1910 when the identifier is received. Forexample, the identifier is received via a wired or wireless connectionto one or more intranets, internets, public or private channels,communication tunnels between one or more servers, or other means ofcommunication from a user device. The received identifier may beencrypted. In another example, the identifier is received from a datastore.

At block 1920, the process identifies a remediation level. For example,the plurality of remediation levels identify the remediation needed forthe user based in part on the performance on the test. Additionaldetails and features of block 1920 are provided in association with FIG.20.

With reference now to FIG. 20, a flowchart illustrating one embodimentof implementing deidentified access of data is shown. The process 1920is performed by one or several of the components of the system 100. Theprocess 1920 begins at block 2010 by decrypting the identifier. Thedecryption may be optional. For example, the process may determine thatthe received identifier was encrypted and apply a key to decrypt theidentifier (e.g., “XKRE” becomes “1ACG”), as shown in relation to FIG.12.

At block 2020, the process identifies or allocates storage for theidentifier. For example, the identifier may be stored with theidentifier data store 680 or other accessible temporary/permanent datastore. The process may dynamically allocate portions of storage (e.g.random access memory, virtual memory) and de-allocate the storage whenthe storage is no longer needed.

At block 2030, the process determines whether the identifier includes acharacter, digit, or symbol to parse. For example, the identifier “1ACG”includes four characters, digits, or symbols to parse, including “1,”“A,” “C,” and “G.” In another example, the identifier “2IRE-SERW”includes nine characters, digits, or symbols to parse.

A decision from block 2030 may be made. In this example, the processwould start at the first character, digit, or symbol to parse, anddetermine that a character, digit, or symbol is available to parse(e.g., “1”), resulting in proceeding to block 2040. At block 2040, theprocess parses the identifier to identify the current character, digit,or symbol. For example, at the first step, the process would identify“1.” In the second step, the process would identify “A,” and so on.Later, for example, if the process had already parsed “1,” “A,” “C,” and“G,” the process would determine that no additional characters, digits,or symbols are available to parse. In this instance, the process wouldend.

At block 2050, the process includes the current character, digit, orsymbol with the identifier portion. For example, at the first step, theprocess would include “1” with the existing identifier. Since this isthe first step, the existing identifier would be “ ”. The “1” identifierportion would be included with the existing identifier to generate “ ”and “1” or “1.” In the second step, the process would identify theexisting identifier “1.” The process would include “A” with the existingidentifier, to generate “1A” after the second step.

At block 2060, the process compares the identifier portion with apredetermined identifier portion. For example, the process woulddetermine that “1” signifies an algebra test based in part on apredetermined identifier portion. The process could receive thisinformation dynamically or in a previous process (not shown). Once theprocess identifies a current character, digit, or symbol at the firststep (e.g., “1”), the process can compare the identifier with thepredetermined identifier portion to determine if there is a match.

At block 2070, the process determines whether the identifier portionmatches a predetermined identifier portion. In this example, apredetermined identifier portion “1” signifies an algebra test and thereceived identifier portion is “1.” Since these two sources match, theprocess may determine that the received identifier includes a teststrand associated with an algebra test.

A decision from block 2070 may be made. In this example, the identifierportion matches a predetermined identifier portion, so the process wouldproceed to block 2080. If no match (e.g., predetermined identifierportions included “1A,” “5,” and “T,” and the identifier portionincluded “1”), the process returns to block 2020.

At block 2080, the process identifies a remediation level associatedwith the identifier portion. For example, the “1” identifier canidentify that data is needed to remediate performance on the algebrastrand of the test. In other examples, the identifier may identifyparticular portions of a strand of the test (e.g., sentence structure inreading comprehension, fractions in arithmetic) and correlate anappropriate remediation level for that strand.

Returning to FIG. 19 at block 1930, the process determines the data forthe remediation level. For example, a “low” remediation level foralgebra can correspond with step-by-step instructions on how to approachsolving the algebra problem, 20 question/answer portions, andinstructional videos providing at least 30 minutes of instruction onalgebra. In another example, a “medium” remediation level for algebracan correspond with 10 question/answer portions and a 5-minute tutorial.

At block 1940, the process displays the data. For example, the data isprovided through a graphical user interface (GUI) that includes theidentifier and portions of the GUI reserved for displaying the data. Thedisplayed strands of data can correlate with the strands of the testthat were identified by the identifier.

A number of variations and modifications of the disclosed embodimentscan also be used. Specific details are given in the above description toprovide a thorough understanding of the embodiments. However, it isunderstood that the embodiments may be practiced without these specificdetails. For example, well-known circuits, processes, algorithms,structures, and techniques may be shown without unnecessary detail inorder to avoid obscuring the embodiments.

Implementation of the techniques, blocks, steps and means describedabove may be done in various ways. For example, these techniques,blocks, steps and means may be implemented in hardware, software, or acombination thereof. For a hardware implementation, the processing unitsmay be implemented within one or more application specific integratedcircuits (ASICs), digital signal processors (DSPs), digital signalprocessing devices (DSPDs), programmable logic devices (PLDs), fieldprogrammable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described above, and/or a combination thereof.

Also, it is noted that the embodiments may be described as a processwhich is depicted as a flowchart, a flow diagram, a swim diagram, a dataflow diagram, a structure diagram, or a block diagram. Although adepiction may describe the operations as a sequential process, many ofthe operations can be performed in parallel or concurrently. Inaddition, the order of the operations may be re-arranged. A process isterminated when its operations are completed, but could have additionalsteps not included in the figure. A process may correspond to a method,a function, a procedure, a subroutine, a subprogram, etc. When a processcorresponds to a function, its termination corresponds to a return ofthe function to the calling function or the main function.

Furthermore, embodiments may be implemented by hardware, software,scripting languages, firmware, middleware, microcode, hardwaredescription languages, and/or any combination thereof. When implementedin software, firmware, middleware, scripting language, and/or microcode,the program code or code segments to perform the necessary tasks may bestored in a machine readable medium such as a storage medium. A codesegment or machine-executable instruction may represent a procedure, afunction, a subprogram, a program, a routine, a subroutine, a module, asoftware package, a script, a class, or any combination of instructions,data structures, and/or program statements. A code segment may becoupled to another code segment or a hardware circuit by passing and/orreceiving information, data, arguments, parameters, and/or memorycontents. Information, arguments, parameters, data, etc. may be passed,forwarded, or transmitted via any suitable means including memorysharing, message passing, token passing, network transmission, etc.

For a firmware and/or software implementation, the methodologies may beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. Any machine-readable mediumtangibly embodying instructions may be used in implementing themethodologies described herein. For example, software codes may bestored in a memory. Memory may be implemented within the processor orexternal to the processor. As used herein the term “memory” refers toany type of long term, short term, volatile, nonvolatile, or otherstorage medium and is not to be limited to any particular type of memoryor number of memories, or type of media upon which memory is stored.

Moreover, as disclosed herein, the term “storage medium” may representone or more memories for storing data, including read only memory (ROM),random access memory (RAM), magnetic RAM, core memory, magnetic diskstorage mediums, optical storage mediums, flash memory devices and/orother machine readable mediums for storing information. The term“machine-readable medium” includes, but is not limited to portable orfixed storage devices, optical storage devices, and/or various otherstorage mediums capable of storing that contain or carry instruction(s)and/or data.

While the principles of the disclosure have been described above inconnection with specific apparatuses and methods, it is to be clearlyunderstood that this description is made only by way of example and notas limitation on the scope of the disclosure.

What is claimed is:
 1. An evaluation system that comprises a networkinterface controller (NIC), a data store, a processor, and a memorycomprising computer executable instructions which when executed by theprocessor cause the processor to perform the method of: receiving, bythe evaluation system using the network interface controller (NIC) ofthe evaluation system from a user device, an identifier, wherein: theevaluation system and the user device communicate within a contentdistribution network, the identifier is associated with a first teststrand and a second test strand, the identifier is generated byconcatenating: a first identifier portion that identifies the first teststrand with a first score identifier portion that identifies a firstoutcome with a second identifier portion that identifies the second teststrand with a second score identifier portion that identifies a secondoutcome; and wherein the identifier: uniquely indicates the firstoutcome and the second outcome, coding of the identifier obscuresunaided human interpretation of the first outcome and the secondoutcome, and the identifier identifies data for remediating performanceon the first test strand or the second test strand; parsing theidentifier to determine the first identifier portion; parsing theidentifier to determine the first score identifier portion; identifyfirst remediate data in association with the first identifier portionand the first score identifier portion, wherein the first remediate datacorresponds with the first outcome of the first test strand; parsing theidentifier to determine the second identifier portion; parsing theidentifier to determine the second score identifier portion; identifysecond remediate data with the second identifier portion and the secondscore identifier portion, wherein the second remediate data correspondswith the second outcome of the second test strand; and transmitting, bythe network interface controller (NIC), the first remediate data or thesecond remediate data to the user device to display the first remediatedata or the second remediate data at the user device, wherein the userdevice is enabled to display the first remediate data or the secondremediate data.
 2. The evaluation system of claim 1, wherein theidentifier is encrypted when the identifier is received from the userdevice, and wherein the method further comprises: determining anencryption key associated with the received identifier; and decryptingthe identifier using the encryption key.
 3. The evaluation system ofclaim 1, wherein the method further comprises identifying the first teststrand and the second test strand.
 4. The evaluation system of claim 1,wherein the first remediate data or the second remediate data includesat least one psychographic illustration depicting the performance of thefirst test strand or the second test strand.
 5. The evaluation system ofclaim 1, wherein the first remediate data or the second remediate dataincludes at least one human-readable description depicting theperformance of the first test strand or the second test strand.
 6. Theevaluation system of claim 1, wherein the method further comprises:receiving an access code from the user device, wherein the access codeindicates approval to access the data for remediating performance; andauthenticating the access code before displaying the data forremediating performance.
 7. The evaluation system of claim 1, whereinthe method further comprises: parsing the identifier to determine acheck portion; and determine a validity of the check portion by:assigning numeric values to one or more of the first identifier portion,the first score identifier portion, the second identifier portion, andthe second score identifier portion, aggregating the numeric values to asingle digit check portion number, comparing the check portion with thesingle digit check portion number, and when the check portion matchesthe single digit check portion number, determining that the checkportion is a valid check portion.
 8. The evaluation system of claim 7,wherein the method further comprises: when the check portion does notmatch the single digit check portion number, transmitting a notificationto the user device regarding the identifier.
 9. The evaluation system ofclaim 1, wherein the method further comprises: receiving ratings ofcontent resources submitted by user devices, wherein the ratingsdetermine effectiveness of the content resources for a subject matter orage group; and storing the ratings in the data store.
 10. Acomputer-implemented method for accessing deidentified contentcomprising: receiving, by an evaluation system using the networkinterface controller (NIC) of the evaluation system from a user device,an identifier, wherein: the evaluation system and the user devicecommunicate within a content distribution network, the identifier isassociated with a first test strand and a second test strand, theidentifier is generated by concatenating: a first identifier portionthat identifies the first test strand with a first score identifierportion that identifies a first outcome with a second identifier portionthat identifies the second test strand with a second score identifierportion that identifies a second outcome; and wherein the identifier:uniquely indicates the first outcome and the second outcome, coding ofthe identifier obscures unaided human interpretation of the firstoutcome and the second outcome, and the identifier identifies data forremediating performance on the first test strand or the second teststrand; parsing the identifier to determine the first identifierportion; parsing the identifier to determine the first score identifierportion; identify first remediate data in association with the firstidentifier portion and the first score identifier portion, wherein thefirst remediate data corresponds with the first outcome of the firsttest strand; parsing the identifier to determine the second identifierportion; parsing the identifier to determine the second score identifierportion; identify second remediate data with the second identifierportion and the second score identifier portion, wherein the secondremediate data corresponds with the second outcome of the second teststrand; and transmitting, by the network interface controller (NIC), thefirst remediate data or the second remediate data to the user device todisplay the first remediate data or the second remediate data at theuser device, wherein the user device is enabled to display the firstremediate data or the second remediate data.
 11. The evaluation systemof claim 10, wherein the identifier is encrypted when the identifier isreceived from the user device, and wherein the method further comprises:determining an encryption key associated with the received identifier;and decrypting the identifier using the encryption key.
 12. Theevaluation system of claim 10, wherein the method further comprisesidentifying the first test strand and the second test strand.
 13. Theevaluation system of claim 10, wherein the first remediate data or thesecond remediate data includes at least one psychographic illustrationdepicting the performance of the first test strand or the second teststrand.
 14. The evaluation system of claim 10, wherein the firstremediate data or the second remediate data includes at least onehuman-readable description depicting the performance of the first teststrand or the second test strand.
 15. The evaluation system of claim 10,wherein the method further comprises: receiving an access code from theuser device, wherein the access code indicates an approval to access thedata for remediating performance; and authenticating the access codebefore displaying the data for remediating performance.
 16. One or morenon-transitory computer-readable storage media collectively storingcomputer-executable instructions that, when executed by one or morecomputer systems, configure the one or more computer systems tocollectively perform operations comprising: receiving, by an evaluationsystem using the network interface controller (NIC) of the evaluationsystem from a user device, an identifier, wherein: the evaluation systemand the user device communicate within a content distribution network,the identifier is associated with a first test strand and a second teststrand, the identifier is generated by concatenating: a first identifierportion that identifies the first test strand with a first scoreidentifier portion that identifies a first outcome with a secondidentifier portion that identifies the second test strand with a secondscore identifier portion that identifies a second outcome; and whereinthe identifier: uniquely indicates the first outcome and the secondoutcome, coding of the identifier obscures unaided human interpretationof the first outcome and the second outcome, and the identifieridentifies data for remediating performance on the first test strand orthe second test strand; parsing the identifier to determine the firstidentifier portion; parsing the identifier to determine the first scoreidentifier portion; identify first remediate data in association withthe first identifier portion and the first score identifier portion,wherein the first remediate data corresponds with the first outcome ofthe first test strand; parsing the identifier to determine the secondidentifier portion; parsing the identifier to determine the second scoreidentifier portion; identify second remediate data with the secondidentifier portion and the second score identifier portion, wherein thesecond remediate data corresponds with the second outcome of the secondtest strand; and transmitting, by the network interface controller(NIC), the first remediate data or the second remediate data to the userdevice to display the first remediate data or the second remediate dataat the user device, wherein the user device is enabled to display thefirst remediate data or the second remediate data.
 17. The evaluationsystem of claim 16, wherein the identifier is encrypted when theidentifier is received from the user device, and wherein the methodfurther comprises: determining an encryption key associated with thereceived identifier; and decrypting the identifier using the encryptionkey.
 18. The evaluation system of claim 16, wherein the method furthercomprises identifying the first test strand and the second test strand.19. The evaluation system of claim 16, wherein the first remediate dataor the second remediate data includes at least one psychographicillustration depicting the performance of the first test strand or thesecond test strand.
 20. The evaluation system of claim 16, wherein thefirst remediate data or the second remediate data includes at least onehuman-readable description depicting the performance of the first teststrand or the second test strand.