Secure distribution and administration of digital examinations

ABSTRACT

A kit for administering a secure examination includes examinee interfaces and an enclosure with a gateway, power adapters to power the examinee interfaces, and a local examination server, wherein the local examination server includes a first network adapter configured to communicatively couple to a central examination server via a first network connection through the gateway and a second network adapter configured to communicatively couple to the plurality of examinee interface via a second network connection, and wherein the local examination server obtains examination items from the central examination server, transmits the examination items to the examinee interfaces, obtains a responsive input to the examination items from the examinee interfaces, transmits the responsive input to the central examination server, and causes the examinee interfaces to enter an examination mode that restricts access to applications, networks, and devices not required for taking the examination.

REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of and claims priority to U.S.patent application Ser. No. 16/413,929, filed May 16, 2019 and titled“SECURE DISTRIBUTION AND ADMINISTRATION OF DIGITAL EXAMINATIONS,” whichis incorporated herein by reference in its entirety.

TECHNICAL FIELD

The disclosed technology relates generally to digital testing, and moreparticularly various embodiments relate to systems and methods forsecurely distributing and administering digital examinations.

BACKGROUND

Digital testing has become prevalent, particularly for thecontemporaneous administration of standardized timed examinations acrossmultiple testing sites. Digital examinations may be distributed to testtakers from a central source via a data network for administration on aexaminee interface, such as a laptop computer, tablet computer, desktopcomputer, or other network attached device. When the digital examinationis administered on a device that is outside of the direct custody orcontrol of the test administrator (i.e., the test taker's own device),it is desirable to provide a secure testing environment to the testtaker that substantially limits or restricts the test taker's ability toaccess information, data, or resources that are external to the testtaking environment, whether those information, data, or resources arehosted on a network accessible data store or on the test taker's owndevice.

Using traditional digital testing and distribution technology, anexamination administrator is generally required to check devicereadiness and set specific security protocols on an individual devicelevel. The examinee interface is then generally booted into a securekiosk mode that runs outside of the normal operating environment of theoperating system, i.e., the system is required to boot into the kioskmode from the system bios. This process is time consuming, notdependable, nor verifiable to a test publisher or service organization.Even in circumstances where security verification is done automatically,the verification check is generally run only prior to booting into thekiosk mode, leaving open the possibility that a security breach occursafter the examination starts. For example, a test taker could attach anexternal device or otherwise “hack” the system after the examination isinitiated on the examinee interface.

Even if the test taker is not attempting to breach security protocols,existing testing technology where system security verifications are onlyrun prior to initiating the examination leave open the possibility thatthe examinee interface configuration could change during the examinationat no fault of the test taker, e.g., through power or battery drains,viruses, bugs, or unintentional acts. Moreover, existing technologygenerally depends on an uplink to a central examination-server toadminister testing, and is susceptible to interruptions in WANconnectivity.

BRIEF SUMMARY OF EMBODIMENTS

Systems and methods for secure distribution and administration ofdigital examinations are provided. In some embodiments a local testingserver, in addition to a central examination-based server, areimplemented to manage device readiness and security measuresautomatically to implement a seamless, rapid deployment of a secureexamination environment to a number of examinee interfaces.

Embodiments of the disclosure provide a system for administering asecure examination includes a local examination server, multipleexaminee interfaces, and a gateway. For example, the examinee interfacescould be laptop computers, desktop computers, tablet computers, handheldcomputers, or smart phones. The local examination server may include anetwork adapter, a security system, a processor, and a non-transitorymemory with computer executable instructions embedded thereon. Thenetwork adapter may provide a first network connection to a centralexamination server through the gateway and a second network connectionto the plurality of examinee interfaces.

In some examples, the computer executable instructions may cause theprocessor to obtain a plurality of examination item from the centralexamination server, transmit the examination items to the plurality ofexaminee interfaces, obtain, from the examinee interfaces, answerscorresponding to the examination items, and transmit, to the centralexamination server, the answers after all examinations have beencompleted.

In some examples, the security system is configured to perform a firstscan of the plurality of examinee interfaces to record properties ofeach of the plurality of examinee interfaces and verify that theexaminee interface conform to a predetermined configuration. Forexample, the predetermined configuration may include a minimum operatingsystem version and patch level, a minimum bios level, the presence ofup-to-date anti-virus software, a minimum battery level, the presence ofintrusive software, open communication channels, external devices,non-compatible hardware or software, screen capture software, or otherpotential security and/or operational threats. In some embodiments, thesecurity system may perform a second scan of the plurality of examineeinterfaces and the first and second network connections to verify thefirst and second network connections and the plurality of examineeinterfaces continue to conform to the predetermined configuration, i.e.,prior to the entry of a secure examination mode. The security system maythen cause the examinee interfaces to enter an examination mode. Whilein examination mode, the examinee interfaces have limited access toexternal hardware and third part software.

For example, examination mode may limit or disable access toapplications such as the clipboard, web browser, digital assistants,notepad, chat messenger, email, or other applications from which thetest taker could access potential information to assist with the takingof the examination. Examination mode may also limit access to externalhardware such as network adapters, wireless adapters, cameras, speakers,microphones, or other devices from which the test taker couldpotentially access information. For some operating systems, theexamination mode may be a “kiosk” mode. As disclosed herein, manyoperating systems have registry flags or settings that may cause theoperating system to enter an examination or kiosk mode. Embodimentsdisclosed herein implement operating system and/or registry flags toinduce an examination mode, as opposed to requiring the system torestart into kiosk mode.

In some embodiments, the obtained examination item may be displayed tothe plurality of examinee interfaces within secure examination windows.The security system may further cause the examinee interfaces to disableaccess to restricted applications and system functions.

In some examples, the security system may monitor the first and secondnetwork connections and plurality of examinee interfaces while theexaminee interfaces that are in examination mode to verify conformancewith the predetermined configuration during the administration of theexamination. After completion of the examination, the local examinationserver may cause the examinee interfaces to exit examination mode aftercompletion of the examination.

In some embodiments, the first network connection is a wide-area network(WAN) network connection. Alternatively, the first network connectionmay be a wireless or cellular connection, a BLUETOOTH connection, a WiFiconnection, or other network connection. The first network connectionmay be implemented through a gateway or router device. In some examples,the second network connection is a WiFi connection or a local areanetwork (LAN) connection. The second network connection mayalternatively be a BLUETOOTH connection or other local networkconnection. The first and second network connections may be implementedthrough the same or different network adapters. In some examples, thefirst and second network connections are concurrently active during theexamination. The concurrent connectivity may be synchronous orasynchronous. In some embodiments, examination data is stored on thelocal examination server such that examination items may be distributedto examinee interfaces via the second network connection even when thefirst network connection is not active.

In some embodiments, a digital examination distribution kit is providedthat includes multiple examinee interfaces stored and shipped in anenclosure, wherein the enclosure may include the local examinationserver and network adapters. The enclosure may also include charginginterfaces for the examinee interfaces. The examinee interfaces may beremoved from the enclosure to activate them and initiate networkconnections to them. In other embodiments, the examinee interfaces maybe provided by the test takers. In some embodiments, some examineeinterfaces may be provided by the test takers, whereas other examineeinterfaces may be from the digital examination distribution kit.

In some examples of the disclosed technology, the first and second scansare security and readiness checks ensuring the properties of theplurality of examinee interfaces are suitable for examination, thenetwork connection for each examinee interface is secure, and that noexaminee interface is running restricted applications.

The present disclosure also provides methods for securely distributingdigital examinations using the disclosed system and/or kit. The methodmay include establishing a first network connection between the localexamination server and a central examination server via the gateway,establishing a second network connection between the local examinationserver and the plurality of examinee interfaces, obtaining examinationitems from the central examination server, transmitting the examinationitems to the plurality of examinee interfaces, and obtaining, answersresponsive to the examination items from the plurality of examineeinterfaces. The method may also include transmitting the answers to thecentral examination server.

In some examples, the method includes causing a security system toperform initial scans of the plurality of examinee interfaces to recordproperties of each of the plurality of examinee interfaces and verifyconformance with a predetermined configuration.

The method may include causing the examinee interfaces to enter anexamination mode after performing the initial scans. The method mayinclude causing the examination items to be displayed on the examineeinterfaces within secure examination windows when the examineeinterfaces are in examination mode. The examination mode may disableaccess to any other restricted applications during examination.

In some embodiments, the method includes monitoring the examineeinterfaces and the first and second network connections during theexamination to verify conformance with the predetermined configuration.The method may include causing the examinee interfaces to exitexamination mode when the examination is complete.

Other features and aspects of the disclosed technology will becomeapparent from the following detailed description, taken in conjunctionwith the accompanying drawings, which illustrate, by way of example, thefeatures in accordance with embodiments of the disclosed technology. Thesummary is not intended to limit the scope of any inventions describedherein, which are defined solely by the claims attached hereto.

BRIEF DESCRIPTION OF THE DRAWINGS

The technology disclosed herein, in accordance with one or more variousembodiments, is described in detail with reference to the followingfigures. The drawings are provided for purposes of illustration only andmerely depict typical or example embodiments of the disclosedtechnology. These drawings are provided to facilitate the reader'sunderstanding of the disclosed technology and shall not be consideredlimiting of the breadth, scope, or applicability thereof. It should benoted that for clarity and ease of illustration these drawings are notnecessarily made to scale.

FIG. 1A illustrates an example system for secure distribution andadministration of digital examinations, consistent with embodimentsdisclosed herein.

FIG. 1B illustrates an example examination kit, consistent with theembodiments disclosed herein.

FIG. 1C illustrates an example examination kit interacting in an examplesystem for secure distribution and administration of digitalexaminations, consistent with embodiments disclosed herein.

FIG. 2 is a flow chart illustrating an example method describing thecomplete process for secure distribution and administration of digitalexaminations, consistent with embodiments disclosed herein.

FIG. 3 is a flow chart illustrating an example method describing theprocess of securely delivering, displaying and receiving a question andanswer in an example system for secure distribution and administrationof digital examinations, consistent with embodiments disclosed herein.

FIG. 4 is a components diagram illustrating an example configuration ofthe Test Center Management Systems in an example system for securedistribution and administration of digital examinations, consistent withembodiments disclosed herein.

FIG. 5A is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with a Chrome Operating System (OS) Public Session,consistent with embodiments disclosed herein.

FIG. 5B is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with Chrome (OS) Single App Kiosk Mode, consistentwith embodiments disclosed herein.

FIG. 5C is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with iOS Security, consistent with embodimentsdisclosed herein.

FIG. 5D is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with Android security, consistent with embodimentsdisclosed herein.

FIG. 5E is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with Windows 10 MSI, consistent with embodimentsdisclosed herein.

FIG. 6 is a components diagram illustrating an example configuration ofan external test interacting within the context of an example system forsecure distribution and administration of digital examinations,consistent with embodiments disclosed herein.

FIG. 7 illustrates a diagram of a computer system, consistent withembodiments disclosed herein.

The figures are not intended to be exhaustive or to limit the inventionto the precise form disclosed. It should be understood that thedisclosed technology can be practiced with modification and alteration,and that the disclosed technology be limited only by the claims and theequivalents thereof.

DETAILED DESCRIPTION OF THE EMBODIMENTS

Embodiments of the technology disclosed herein are directed toward asystem and method for secure distribution and administration of digitalexaminations

FIG. 1A illustrates an example system for secure distribution andadministration of digital examinations, in accordance with one or moreimplementations of the disclosure. In some embodiments, an examplesystem for secure distribution and administration of digitalexaminations may comprise of a central examination server 100, a localexamination server 102, a network adapter 104, one or more examineeinterfaces 106, and one or more test takers 108. The central examinationserver 100 may communicate with the local examination server 102 througha wireless communication protocol. In some embodiments a wirelesscommunication protocol may be WLAN, 3G, 4G, 5G, or LTE.

In some embodiments, the local examination server 102 may comprise anetwork Adapter 104 that allows for wireless communication between thelocal examination server 102 and the central examination server 100. Insome embodiments, the Network Adapter 104 may be configured to separatethe network communication between the one or more examinee interfaces106 and the central examination server 100, while still allowingcommunication with the local examination server 102.

In some embodiments, the one or more examinee interfaces 106 may be oneor more personal computing devices of the Examinee Interface Users 108.In some embodiments, a personal device may be desktop, laptop andnotebook computers; hand-held computing devices (PDA's, smart phones,cell phones, palmtops, etc.); mainframes, supercomputers, workstationsor servers; or any other type of special-purpose or general-purposecomputing devices as may be desirable or appropriate for a givenapplication or environment, as described herein. In some embodiments theone or more examinee interfaces 106 may be a part of an examination kitdesigned with the purpose to interact with the system for the securedistribution and administration of one or more digital examinations, asdisclosed herein.

FIG. 1B illustrates an example examination kit in accordance with one ormore implementations of the disclosure. In implementations, theexamination kit may comprise of an examination local server as describedin FIG. 1A, a digital examination distribution kit 150, and one or moreexaminee interfaces 106. The examination kit may be configured toadminister a secure examination by providing a built-in localexamination server 102 and one or more associated network gateways. Insome embodiments, the local examination server 102 may be pre-configuredto connect with the provided examinee interfaces 106 included in thekit. For example, kit 150 may include an enclosure for storing andshipping examinee interfaces 106. In some examples, the enclosure mayinclude charging interfaces to charge the examinee interfaces 106 whenthey are disposed in the kit enclosure.

In some embodiments, the examinee interfaces 106 may automaticallyretrieve examination data from the local examination server 102 uponinitialization of the examinee interface and/or upon removal of theexaminee interface from the kit enclosure. In some embodiments, theexaminee interfaces 106 may be pre-configured for security. For example,one or more of the examiner interfaces may be pre-programmed to be in aKiosk mode, wherein an examiner interface in kiosk mode may be deniedaccess to the one or more network services. Network services may includethe global internet network, central examination server, and mobileconnectivity.

FIG. 1C illustrates an example examination kit interacting in an examplesystem for secure distribution and administration of digitalexaminations, in accordance with one or more implementations of thedisclosure. In some embodiments, the local examination server 102 may beconnected to the examinee interfaces through wireless communicationprotocol such as TCP/IP, Bluetooth BLE or a cellular network such as 3G,4G, 5G, or LTE 160.

In some embodiments the central examination server may be connected tothe examinee interfaces through wireless communication protocol such asTCP/IP, Bluetooth BLE or a cellular network such as 3G, 4G, 5G, or LTE170.

Additionally, some embodiments may configure the central examinationserver to be connected with the local examination server 102 throughwireless communication protocol such as TCP/IP, Bluetooth BLE or acellular network such as 3G, 4G, 5G, or LTE 180.

FIG. 2 is a flow chart illustrating an example method describing theprocess for the secure distribution and administration of digitalexaminations, in accordance with one or more implementations of thedisclosure.

As illustrated in FIG. 2, an initial examinee interface and networksecurity readiness scan may be performed at step 200. In someembodiments, an initial examinee interface and network securityreadiness scan may include verifying whether the examinee interface iscompatible with the rules in the system for secure distribution andadministration of digital examinations. For example, certain systems forsecure distribution and administration of digital examinations may onlyallow interaction with a specific subset of operating systems. In someembodiments the examinee interface will and network security readinessscan may be performed.

In some embodiments, an additional examinee interface and networksecurity readiness scan may be performed at step 202 prior to enteringthe examination mode and/or prior to the distribution of the digitalexamination to the examinee interfaces. In some embodiments, theadditional examinee interface and network security readiness scan mayinclude verifying that nothing on the examinee interface has beenmodified since the initial scan.

The disclosed process may include causing the examinee interfaces toenter an examination mode at step 204. In some embodiments theexamination mode may be a kiosk mode, or similar mode for the respectiveoperating system of the examinee interface. In some embodiments anexaminee interface in kiosk mode may have restricted or disabled accessto applications, services, and network services that are not requiredfor taking the digital examination.

The disclosed process may also include monitoring the examineeinterfaces and performing network security checks during the examinationat step 206. In some embodiments, monitoring of the examinee interfaceduring examination may include scanning an examinee interface on aspecific time interval. In some embodiments, monitoring of the examineeinterface during examination may include scanning an examinee interfaceon an event driven basis. For example, a scan could occur on a perquestion basis or by a Proctor noticing specific behavior by an examineeinterface user or examinee interface.

The process may include causing the examinee interfaces to exitexamination mode, i.e., return to normal operating conditions when theexamination is complete or terminated. In some embodiments, causing theexaminee interface to return to normal operating conditions may includeenabling access to the one or more applications, services, or networkservices that had been restricted or disabled during the examinationmode.

FIG. 3 is a flow chart illustrating an example method describing theprocess of securely delivering, displaying, and receiving a question andanswer for the secure distribution and administration of digitalexaminations, in accordance with one or more implementations of thedisclosure.

As illustrated in FIG. 3, the local examination server may obtainexamination items from the central examination server at step 300.Examination items may include questions and/or content contained in thedigital examination. In some embodiments, the central examination servermay transmit the examination items through wireless protocol such asTCP/IP, Bluetooth BLE or a cellular network such as 3G, 4G, 5G, or LTE.

The method may include transmitting the examination items to theexaminee interfaces at step 302. In some embodiments the localexamination server may transmit the examination items through a wirelessprotocol such as TCP/IP, Bluetooth BLE, or a cellular network such as3G, 4G, 5G, or LTE. The examinee interface may obtain responsive input,i.e., responses or answers to the examination items, from a test takerthrough a secure interface window at step 304 and transmit the responsesor answers to the local examination server at step 306. In someembodiments, the examinee interface may transmit the responses oranswers through a wireless protocol such as TCP/IP, Bluetooth BLE or acellular network such as 3G, 4G, 5G, or LTE.

The local examination server may transmit the responses or answers tothe central examination server, together with demographic inputrespective to each test taker, at step 308. In some embodiments, theanswers or responses may be transmitted through a wireless protocol suchas TCP/IP, Bluetooth BLE or a cellular network such as 3G, 4G, 5G, orLTE.

FIG. 4 is a components diagram illustrating an example configuration ofthe test center registration and device verification system forauthorizing a device in a system for secure distribution andadministration of digital examinations, consistent with embodimentsdisclosed herein. In some embodiments, the test center management (TCM)dashboard 402 may be the top hierarchical logical circuit of the testcenter Registration and device verification system 400. In someembodiments, the test center management dashboard 402 may communicatethe list of digital products eligible 410 to initially verify whether anew device can be integrated into the secure distribution andadministration of digital examinations. In some embodiments, the testcenter management dashboard 402 may communicate with the device statusof digital products logical circuit 420. In some embodiments, devicestatus of digital products logical circuit 420 may be used to monitordevices on in a system for secure distribution and administration ofdigital examinations after the device has been initially verified, andthroughout the examination process.

In some embodiments, the test center management dashboard 402 verifiesif a specific digital product trying to checking if it is in the list ofdigital products eligible 410. In some embodiments, if a device is onthe list of digital products eligible they are presented with an opt-inlogical circuit 414 and an opt-out logical circuit 416. The opt-inlogical circuit may include terms and conditions surrounding the use ofthe digital examinee interface. In some embodiments the Opt-in logicalcircuit may include terms and conditions surround the use of the entiresystem for secure distribution and administration of digitalexaminations.

In some embodiments, if a device is not on the list of digital productseligible a verified digital product types logical circuit 412,determines if the device trying to register is compliant with the rulesestablished in the system for secure distribution and administration ofdigital examinations. In some embodiments, a digital product that getsapproved by the verified digital product types logical circuit 412 maybe added to the list of digital products eligible 410. A digital productthat is not added to the list may be disapproved and, thus, is not addedto the list of digital products eligible 410.

In some embodiments, the device status of digital products logicalcircuit 420 may invoke the pass/fail digital product logical circuit422, which may determine status based on updates to the digital productsit is enabled to interact with. In some embodiments, the device statusof digital products logical circuit 420 may invoke the serial numberlogical circuit 424, which may cause a status change depending on theactivity of that specific devices serial number. For example, if aspecific device associated with a serial number was consistentlymalfunctioning or over performing, the device status could be modified.In some embodiments, the device status of digital products logicalcircuit 420 may invoke the on-demand/scheduled update device checklogical circuit 426.

In some embodiments, the on-demand/scheduled update device check logicalcircuit 426 may not be invoked during an examination phase. In someembodiments, embodiments, the on-demand/scheduled update device checklogical circuit 426 may be invoked on a specific time interval. In someembodiments, embodiments, the on-demand/scheduled update device checklogical circuit 426 may be invoked, on an event driven basis. Forexample, the on-demand/scheduled update device check logical circuit 426may be invoked on a per question basis or by a Proctor noticing specificbehavior by an examinee interface user or examinee interface. In someembodiments, embodiments, the on-demand/scheduled update device checklogical circuit 426 may be invoked by the examinee interface itself. Forexample, the device check logical circuit 426 may be invoked from anexaminee interface with a low battery. In some embodiments, theon-demand/scheduled update device check logical circuit 426 may beinvoke the notify test center control logical circuit 428.

FIG. 5A is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with a Chrome Operating System (OS) public session,consistent with embodiments disclosed herein. In one embodiment, thepublic session security logical circuit 501 may initially secure ChromeOS Public Session 500. Chrome OS public session logical circuit 500 maycommunicate with the unity application 502. The device verificationlogical circuit 503 verifies that the device is compliant with thesecure distribution and administration of digital examinations systemrules and allows invocation of the unity application 502. The unityapplication 502 may communicate with the login/authentication logicalcircuit, which authenticates individual users in the secure distributionand administration of digital examinations system. In some embodiments,the Login/Authentication logical circuit 504 may invoke the display testmenu 505. In some embodiments the just-in-time check 506 secures andinvokes the display test menu 505, by verifying that the device is stillcompliant with the rules of the secure distribution and administrationof digital examinations system. In some embodiments, the display testmenu 505 communicates with the delivery engine logical circuit 507,which may use the delivery engine Security logical circuit 508, toverify that delivery of information happens in a manner that iscompliant with the rules of the secure distribution and administrationof digital examinations system.

FIG. 5B is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with Chrome (OS) single app kiosk mode, consistentwith embodiments disclosed herein. public session security 501, alongwith an install via private Chrome web store logical circuit 511initially secure Chrome (OS) single app kiosk mode 500. Chrome (OS)single app kiosk mode 510 communicates with the unity application 502.The device verification logical circuit 503 verifies that the device iscompliant with the secure distribution and administration of digitalexaminations system rules and allows invocation of the unity application502. The unity application 502 may communicate with thelogin/authentication logical circuit, which authenticates individualusers in the secure distribution and administration of digitalexaminations system. In some embodiments, the Login/Authenticationlogical circuit 504 may invoke the display test menu 505. In someembodiments the just-in-time check 506 secures and invokes the displaytest menu 505, by verifying that the device is still compliant with therules of the secure distribution and administration of digitalexaminations system. In some embodiments, the display test menu 505communicates with the delivery engine logical circuit 507, which may usethe delivery engine security logical circuit 508, to verify thatdelivery of information happens in a manner that is compliant with therules of the secure distribution and administration of digitalexaminations system.

FIG. 5C is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with iOS Security, consistent with embodimentsdisclosed herein. Security through AAC logical circuit 521, along withan install via app store 521 initially secure iOS Security 520. iOSSecurity 500 communicates with the unity application 502. The deviceverification logical circuit 503 verifies that the device is compliantwith the secure distribution and administration of digital examinationssystem rules and allows invocation of the unity application 502. Theunity application 502 may communicate with the login/authenticationlogical circuit, which authenticates individual users in the securedistribution and administration of digital examinations system. In someembodiments, the login/authentication logical circuit 504 may invoke thedisplay test menu 505. In some embodiments the just-in-time check 506secures and invokes the display test menu 505, by verifying that thedevice is still compliant with the rules of the secure distribution andadministration of digital examinations system. In some embodiments, thedisplay test menu 505 communicates with the delivery engine logicalcircuit 507, which may use the delivery engine security logical circuit508, to verify that delivery of information happens in a manner that iscompliant with the rules of the secure distribution and administrationof digital examinations system.

FIG. 5D is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with Android security, consistent with embodimentsdisclosed herein. Install via Private Play Store logical circuit 531initially secure Android security 530. Android security 530 communicateswith the unity application 502. The device verification logical circuit503 verifies that the device is compliant with the secure distributionand administration of digital examinations system rules and allowsinvocation of the unity application 502. The unity application 502 maycommunicate with the login/authentication logical circuit, whichauthenticates individual users in the secure distribution andadministration of digital examinations system. In some embodiments, thelogin/authentication logical circuit 504 may invoke the display testmenu 505. In some embodiments the just-in-time check 506 secures andinvokes the display test menu 505, by verifying that the device is stillcompliant with the rules of the secure distribution and administrationof digital examinations system. In some embodiments, the display testmenu 505 communicates with the delivery engine logical circuit 507,which may use the delivery engine security logical circuit 508, toverify that delivery of information happens in a manner that iscompliant with the rules of the secure distribution and administrationof digital examinations system.

FIG. 5E is a components diagram illustrating an example configuration ofthe secure distribution and administration of digital examinationssystem interacting with Windows 10 MSI, consistent with embodimentsdisclosed herein. In some embodiments, Windows 10 security logicalcircuit 541, may initially verify Windows 10 MSI 540. Windows 10 MSI 540may communicate with the unity application 502. The device verificationlogical circuit 503 may verify that the device is compliant with thesecure distribution and administration of digital examinations systemrules. Successful verification of the device verification logicalcircuit 503 may allow invocation of the unity application 502. The unityapplication 502 may communicate with the login/authentication logicalcircuit 504, which authenticates individual users in the securedistribution and administration of digital examinations system. In someembodiments, the login/authentication logical circuit 504 may invoke thedisplay test menu 505. In some embodiments the just-in-time check 506secures and invokes the display test menu 505, by verifying that thedevice is still compliant with the rules of the secure distribution andadministration of digital examinations system. In some embodiments, thedisplay test menu 505 communicates with the delivery engine logicalcircuit 507, which may use the delivery engine security logical circuit508, to verify that delivery of information happens in a manner that iscompliant with the rules of the secure distribution and administrationof digital examinations system.

FIG. 6 is a components diagram illustrating an example configuration ofan external test logical circuit 600 interacting within the context ofthe secure distribution and administration of digital examinationssystem, consistent with embodiments disclosed herein. For example, anexternal test may be a test from a third-party organization. The testinginterface may be designed to conform with the third-party's branding. Insome embodiments, external test 600 may communicate with the externaltest center management app 610. External test center management app 610may include user interface configuration logical circuit 612. The userinterface configuration logical circuit may have an associated productconfiguration logical circuit. The product configuration logical circuit616 may include a localization logical circuit 616 and a languagelogical circuit 618.

In some embodiments, the external test logical circuit 600 maycommunicate with the external unity app 620 to administer secureexamination. External unity app 620 may integrate with a user interfaceconfiguration logical circuit 622. The user interface configurationlogical circuit 622 may include a localization logical circuit 616 and alanguage logical circuit 618.

In some embodiments, the external unity app 620 may be connected to thebusiness model configuration logical circuit 630. The business modelconfiguration 630 may have a product configuration logical circuit 632.The product configuration logical circuit 632 may be associated with asecurity configuration logical circuit 634.

In some embodiments, the business model configuration logical circuit630 may be connected to the data model standard database 640. In someembodiments, the data model standard database 640 may utilize a datamodel extension 642 to expand the data model standard database to allowfor different data-types associated with the external test 600.

In some embodiments, the data model standard 640 may be connected to thedelivery engine configuration 650. In some embodiments, the deliveryengine configuration logical circuit 650 may communicate with anassessment product list database. The assessment product list databasemay be accessed by learning tool integration configurations logicalcircuit 658 to determine what tests are associated with what testassessment frameworks, and how feedback is delivered to the examineeinterfaces. In some embodiments, the delivery engine configurationlogical circuit 650 may communicate with Q11 configurations logicalcircuit 654 to determine the best communication protocol to deliverinformation to the examinee interfaces. In some embodiments, thedelivery engine configuration logical circuit 650 may communicate withthe accommodations/accessibility configurations logical circuit 656. Theaccommodations/accessibility configurations logical circuit 656 may beconfigured to contribute to determining special delivery methods basedon the different characteristics of the test or examinee interface.

As used herein, the term engine might describe a given unit offunctionality that can be performed in accordance with one or moreembodiments of the technology disclosed herein. As used herein, anengine might be implemented utilizing any form of hardware, software, ora combination thereof. For example, one or more processors, controllers,ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routinesor other mechanisms might be implemented to make up a engine. Inimplementation, the various engines described herein might beimplemented as discrete engines or the functions and features describedcan be shared in part or in total among one or more engines. In otherwords, as would be apparent to one of ordinary skill in the art afterreading this description, the various features and functionalitydescribed herein may be implemented in any given application and can beimplemented in one or more separate or shared engines in variouscombinations and permutations. Even though various features or elementsof functionality may be individually described or claimed as separateengines, one of ordinary skill in the art will understand that thesefeatures and functionality can be shared among one or more commonsoftware and hardware elements, and such description shall not requireor imply that separate hardware or software components are used toimplement such features or functionality.

Where logical circuits or engines of the technology are implemented inwhole or in part using software, in one embodiment, these softwareelements can be implemented to operate with a computing or processingengine capable of carrying out the functionality described with respectthereto. One such example computing engine is shown in FIG. 7. Variousembodiments are described in terms of this example computing engine 700.After reading this description, it will become apparent to a personskilled in the relevant art how to implement the technology using othercomputing engines or architectures.

Referring now to FIG. 7, computing system 700 may represent, forexample, computing or processing capabilities found within desktop,laptop and notebook computers; hand-held computing devices (PDA's, smartphones, cell phones, palmtops, etc.); mainframes, supercomputers,workstations or servers; or any other type of special-purpose orgeneral-purpose computing devices as may be desirable or appropriate fora given application or environment. Computing engine 700 might alsorepresent computing capabilities embedded within or otherwise availableto a given device. For example, a computing engine might be found inother electronic devices such as, for example, digital cameras,navigation systems, cellular telephones, portable computing devices,modems, routers, WAPs, terminals and other electronic devices that mightinclude some form of processing capability.

Computing system 700 might include, for example, one or more processors,controllers, control engines, or other processing devices, such as aprocessor 704. Processor 704 might be implemented using ageneral-purpose or special-purpose processing engine such as, forexample, a microprocessor, controller, or other control logic. In theillustrated example, processor 704 is connected to a bus 702, althoughany communication medium can be used to facilitate interaction withother logical circuits of computing engine 700 or to communicateexternally.

Computing system 700 might also include one or more memory engines,simply referred to herein as main memory 708. For example, preferablyrandom access memory (RAM) or other dynamic memory, might be used forstoring information and instructions to be executed by processor 704.Main memory 708 might also be used for storing temporary variables orother intermediate information during execution of instructions to beexecuted by processor 704. Computing engine 700 might likewise include aread only memory (“ROM”) or other static storage device coupled to bus702 for storing static information and instructions for processor 704.

The computing system 700 might also include one or more various forms ofinformation storage mechanism 710, which might include, for example, amedia drive 712 and a storage unit interface 720. The media drive 712might include a drive or other mechanism to support fixed or removablestorage media 714. For example, a hard disk drive, a floppy disk drive,a magnetic tape drive, an optical disk drive, a CD or DVD drive (R orRW), or other removable or fixed media drive might be provided.Accordingly, storage media 714 might include, for example, a hard disk,a floppy disk, magnetic tape, cartridge, optical disk, a CD or DVD, orother fixed or removable medium that is read by, written to or accessedby media drive 712. As these examples illustrate, the storage media 714can include a computer usable storage medium having stored thereincomputer software or data.

In alternative embodiments, information storage mechanism 710 mightinclude other similar instrumentalities for allowing computer programsor other instructions or data to be loaded into computing engine 700.Such instrumentalities might include, for example, a fixed or removablestorage unit 722 and an interface 720. Examples of such storage units722 and interfaces 720 can include a program cartridge and cartridgeinterface, a removable memory (for example, a flash memory or otherremovable memory engine) and memory slot, a PCMCIA slot and card, andother fixed or removable storage units 722 and interfaces 720 that allowsoftware and data to be transferred from the storage unit 722 tocomputing engine 700.

Computing engine 700 might also include a communications interface 724.Communications interface 724 might be used to allow software and data tobe transferred between computing engine 700 and external devices.Examples of communications interface 724 might include a modem orsoftmodem, a network interface (such as an Ethernet, network interfacecard, WiMedia, IEEE 802.XX or other interface), a communications port(such as for example, a USB port, IR port, RS232 port Bluetooth®interface, or other port), or other communications interface. Softwareand data transferred via communications interface 724 might typically becarried on signals, which can be electronic, electromagnetic (whichincludes optical) or other signals capable of being exchanged by a givencommunications interface 724. These signals might be provided tocommunications interface 724 via a channel 728. This channel 728 mightcarry signals and might be implemented using a wired or wirelesscommunication medium. Some examples of a channel might include a phoneline, a cellular link, an RF link, an optical link, a network interface,a local or wide area network, and other wired or wireless communicationschannels.

In this document, the terms “computer program medium” and “computerusable medium” are used to generally refer to media such as, forexample, memory 708, storage unit 720, media 714, and channel 728. Theseand other various forms of computer program media or computer usablemedia may be involved in carrying one or more sequences of one or moreinstructions to a processing device for execution. Such instructionsembodied on the medium, are generally referred to as “computer programcode” or a “computer program product” (which may be grouped in the formof computer programs or other groupings). When executed, suchinstructions might enable the computing engine 700 to perform featuresor functions of the disclosed technology as discussed herein.

While various embodiments of the disclosed technology have beendescribed above, it should be understood that they have been presentedby way of example only, and not of limitation. Likewise, the variousdiagrams may depict an example architectural or other configuration forthe disclosed technology, which is done to aid in understanding thefeatures and functionality that can be included in the disclosedtechnology. The disclosed technology is not restricted to theillustrated example architectures or configurations, but the desiredfeatures can be implemented using a variety of alternative architecturesand configurations. Indeed, it will be apparent to one of skill in theart how alternative functional, logical or physical partitioning andconfigurations can be implemented to implement the desired features ofthe technology disclosed herein. Also, a multitude of differentconstituent engine names other than those depicted herein can be appliedto the various partitions.

Additionally, with regard to flow diagrams, operational descriptions andmethod claims, the order in which the steps are presented herein shallnot mandate that various embodiments be implemented to perform therecited functionality in the same order unless the context dictatesotherwise.

Although the disclosed technology is described above in terms of variousexemplary embodiments and implementations, it should be understood thatthe various features, aspects and functionality described in one or moreof the individual embodiments are not limited in their applicability tothe particular embodiment with which they are described, but instead canbe applied, alone or in various combinations, to one or more of the someembodiments of the disclosed technology, whether or not such embodimentsare described and whether or not such features are presented as being apart of a described embodiment. Thus, the breadth and scope of thetechnology disclosed herein should not be limited by any of theabove-described exemplary embodiments.

Terms and phrases used in this document, and variations thereof, unlessotherwise expressly stated, should be construed as open ended as opposedto limiting. As examples of the foregoing: the term “including” shouldbe read as meaning “including, without limitation” or the like; the term“example” is used to provide exemplary instances of the item indiscussion, not an exhaustive or limiting list thereof; the terms “a” or“an” should be read as meaning “at least one,” “one or more” or thelike; and adjectives such as “conventional,” “traditional,” “normal,”“standard,” “known” and terms of similar meaning should not be construedas limiting the item described to a given time period or to an itemavailable as of a given time, but instead should be read to encompassconventional, traditional, normal, or standard technologies that may beavailable or known now or at any time in the future. Likewise, wherethis document refers to technologies that would be apparent or known toone of ordinary skill in the art, such technologies encompass thoseapparent or known to the skilled artisan now or at any time in thefuture.

The presence of broadening words and phrases such as “one or more,” “atleast,” “but not limited to” or other like phrases in some instancesshall not be read to mean that the narrower case is intended or requiredin instances where such broadening phrases may be absent. The use of theterm “engine” does not imply that the logical circuits or functionalitydescribed or claimed as part of the engine are all configured in acommon package. Indeed, any or all of the various logical circuits of anengine, whether control logic or other logical circuits, can be combinedin a single package or separately maintained and can further bedistributed in multiple groupings or packages or across multiplelocations.

Additionally, the various embodiments set forth herein are described interms of exemplary block diagrams, flow charts and other illustrations.As will become apparent to one of ordinary skill in the art afterreading this document, the illustrated embodiments and their variousalternatives can be implemented without confinement to the illustratedexamples. For example, block diagrams and their accompanying descriptionshould not be construed as mandating a particular architecture orconfiguration.

I claim:
 1. A system for administering a secure examination comprising:a plurality of examinee interfaces; a gateway; and a local examinationserver, the local examination server comprising a network adapter, asecurity system, a processor, and a non-transitory memory with computerexecutable instructions embedded thereon; wherein the network adapterprovides a first network connection to a central examination serverthrough the gateway and a second network connection to the plurality ofexaminee interfaces; wherein the computer executable instructions causethe processor to: obtain a plurality examination items from the centralexamination server; transmit the examination items to the plurality ofexaminee interfaces; and obtain, from the examinee interfaces, answerscorresponding to the examination items; transmit, to the centralexamination server, the answers after all examinations have beencompleted; and wherein security system is configured to: perform a firstscan of the plurality of examinee interfaces before first use to recordproperties of each of the plurality of examinee interfaces and verifythat the examinee interface conform to a predetermined configuration;perform a second scan of the plurality of examinee interfaces and thefirst and second network connections to verify the first and secondnetwork connections and the plurality of examinee interfaces conform tothe predetermined configuration; enter an examination mode, wherein theobtained examination item is displayed to the plurality of examineeinterfaces within a secure examination window; disable access torestricted applications and system functions; monitor the first andsecond network connections and plurality of examinee interfaces whilethe examinee interfaces are in examination mode to verify conformancewith the predetermined configuration; and cause the examinee interfacesto exit examination mode after completion of the examination.