The present invention relates to a computer-implemented method and to a system for the automated learning management, usable for online learning (e-learning) and/or for the automation of in-person learning.
Online learning (e-learning) platforms are well known and generally rely on the use of multimedia technologies and Internet connectivity to improve the quality of learning for users, by facilitating access to resources and services, remote material exchanges and remote collaboration.
However, the platforms of known type do require, for much of their core functionality, significant human input adapted to validate and verify the most sensitive and delicate parts of the usage process.
For example, as is well known, user identification plays a key role within platforms that issue certificates and certifications, as the identity of the person must be verified beforehand.
However, the user enrollment and verification phase must be performed in-person, a process that is often time-consuming and resource intensive.
In addition, current e-learning platforms are not able to adequately follow the user along his training path, in fact depriving themselves of information such as the degree of attention and involvement of the users themselves during the lessons followed.
The main aim of the present invention is to devise a computer-implemented method and a system for the automated learning management that will minimize human intervention while also ensuring, autonomously and automatically, the basic steps that accompany the user during use.
Another object of the present invention is to devise a computer-implemented method and a system for the automated learning management that allow active monitoring of user’s behavior during lessons, so as to extrapolate useful information both for teaching evaluation and preparatory to the user’s final assessment.
Another object of the present invention is to devise a computer-implemented method and a system for the automated learning management that allow for completely transparent management of the user’s sensitive data in the hands of individual users.
Another object of the present invention is to devise a computer-implemented method and a system for the automated learning management that allow the issue of certificates proving the passing of a given course in digital format and the certification of the same, thus allowing the integration and subsequent use by third parties of the aforementioned certificates, subject to authorization by the user.
The objects set out above are achieved by the present computer-implemented method for the automated learning management according to the characteristics of claim 1.
The objects set out above are achieved by the present system for the automated learning management according to the characteristics of claim 18.
Other characteristics and advantages of the present invention will become more evident from the description of a preferred, but not exclusive, embodiment of a computer-implemented method and a system for the automated learning management, illustrated by way of an indicative, yet non-limiting example, in the accompanying tables of drawings wherein:
The computer-implemented method and the system according to the invention aim to offer e-learning courses or in-presence courses to the enrolled users, to monitor their degree of attention during the learning sessions (e-learning or in-person) and to issue certificates of participation and detailed digital certificates on the overall progress of the user, including the final assessment.
In actual facts, the method and the system according to the invention automate the entire process of interacting with the users by carrying out the following activities:
In addition, the entire process fully complies with GDPR regulations to safeguard the users’ privacy and personal data.
In particular, as schematically shown in
The automated learning management system comprises a software and/or hardware platform for the execution of the steps of all the phases of the method according to the invention. Such a platform is schematized in
Specifically, the phase 1 of registration comprises at least the steps described below.
First, the phase 1 of registration comprises a step 11 of receiving registration information by the user U (social security number, first name, last name, date of birth) and of receiving an identity document ID of the user U comprising certified biometric information.
Therefore, a new user U must first provide, in addition to conventional registration information, an identity document ID bearing certified biometric information.
In addition, the phase 1 of automatic registration comprises a step 12 of automatic verification of the identity of the user U.
Specifically, such a step of verification 12 comprises a step 121 of acquiring biometric data of the user U by means of at least one electronic acquisition device D1 and a step 122 of comparing the acquired biometric data (face, fingerprint, voice print, etc.) with the certified biometric information contained in the identity document ID.
In the event of such verification being positive, i.e., in the event of the acquired biometric data corresponding to the certified biometric information, the phase 1 of automatic registration comprises a step 13 of creation of the profile P of the user U. In particular, such user profile P comprises at least the registration information and the acquired biometric data.
Specifically, the certified biometric information comprises at least one of the following: a photo of the user U (such as e.g. a photograph of the user’s valid ID card, driver’s license, or passport), a fingerprint of the user U, a voice print of the user U, a retinal scan of the user U, a handwritten signature or a fingerprint of the user U, behavioral information traceable to the user U, comprising, e.g., previous responses of the user U to specific and predefined questions.
According to a possible embodiment, the step 12 of automatic verification of the identity of the user U may comprise an analysis of the validity of the identity document ID. For example, such further analysis may comprise checking the expiration date of the identity document ID and/or of the associated name.
Preferably, the electronic acquisition device D1 for acquiring the biometric data of the user comprises at least one of the following: a fingerprint reader, a video camera (webcam) configured to acquire at least one image of the face of the user U, a microphone configured to acquire a voice print of the user U, a retinal scanner, a 3D recognition sensor, a handwriting reader with a stylus for signature/text input. Thus, possible solutions involve fingerprint recognition, retinal recognition, voice print recognition, face recognition, signature and/or handwriting recognition.
In addition, according to a possible embodiment, the phase 1 of registration comprises at least one step 14 of verification of the actual presence of the user U during the course.
In particular, according to a possible and preferred embodiment, such step 14 of verification of the presence of the user U comprises a step 141 of acquiring, by means of at least one video camera D1, a plurality of images of the face of the user U in different positions and/or of acquiring, by means of at least one microphone D1, at least one predefined sentence spoken by the user U.
For example, the movements of the face to certain positions can be required from the user U via specific on-screen instructions or audio requests.
Furthermore, the step 14 of verification of the presence of the user U comprises a step 142 of ascertaining the presence of the user U by means of a biometric recognition algorithm, starting from the acquired images and/or the acquired sentences.
In particular, the biometric recognition algorithm used to ascertain the user’s presence depends on the type of biometric data being analyzed. For example, a webcam can be used to capture information about the mood and movements of the user U, while interactive pop-ups can be shown on screen which must be clicked by the users themselves. These algorithms can be combined to increase the accuracy thereof.
Therefore, in the case of biometric face recognition, for example, it is possible to verify the actual presence in front of the device D1 of the user U to be registered, e.g. by using a simple webcam. The extrapolated images can be analyzed in real time and compared, for example, with the image on the requested identity document ID (ID card, driver’s license, passport). If the verification is successful, the identification of the user U for the purposes of registration on the platform S can be considered completed.
As schematically shown in
In particular, the electronic control device D2 of the participation and attention data A comprises at least one of the following: a fingerprint reader, a video camera (webcam) configured to acquire at least one image of the face of the user U, a microphone configured to acquire a voice print of the user U, a retinal scanner, a 3D face recognition sensor, a mouse and a keyboard (used, e.g., to interact with interactive pop-ups displayed on the screen).
Conveniently, according to a possible and preferred embodiment, the electronic control devices D2 used for monitoring correspond, at least partly, to the electronic acquisition devices D1 used during the previous registration.
Specifically, according to a possible embodiment, the step 21 of acquiring participation and attention data A of the user U comprises the use of an active interaction algorithm with the user U, configured to communicate directly with such a user to request and verify predetermined actions by means of the electronic control device D2.
According to a possible embodiment, the step 21 of acquiring participation and attention data A of the user U comprises, in addition to or as an alternative to the active interaction algorithm, a passive detection algorithm, configured to detect the movements and actions of such a user by means of the electronic control device D2 during the training course.
These algorithms may be of different types depending on the type of device used and available to the user U. In addition, such algorithms may be combined with each other to obtain more accurate results.
According to a possible embodiment, the electronic control device D2 comprises at least one video camera and the step 21 of acquiring participation and attention data A of the user U comprises:
For example, during the comparison it is possible to check whether the gaze of the user U follows the slide input direction.
The participation and attention data A may comprise at least one of the following:
response of the user U to pop-ups on screen, movements of the gaze of the user U, indications relating to patterns proposed on screen and followed or not by the user U, indications relating to the response or not by the user U to interactions with at least one electronic control device D2, indications relating to the passive response of the user U to stimuli such as showing an image on screen.
Therefore, during normal course attendance, possibly divided into sessions, the user U is invited to participate in the training, in front of their computer or via other electronic control devices D2 both mobile and wearable, by reading, listening to the proposed contents, interacting in a virtual environment and/or in a training video game.
It cannot however be ruled out the monitoring of the users during the training courses to be held in-person, using appropriate electronic control devices D2. In such a case, for example, the electronic control devices D2 may comprise a plurality of video cameras suitably arranged and oriented inside the area in which the course is held.
Thus, thanks to the use of dedicated devices (webcam, microphone, retinal scanner, fingerprint recognizer or other devices) with which the electronic control device D2 used by the user U must be provided, essential information about their degree of attention to what is presented to them is retrieved.
Conveniently, the same tools allowing for the identification and verification of the user during the registration phase, may be used during the monitoring phase to assess the degree of interaction of the user U with the system, for example, by distinguishing a photo placed in front of the webcam from the actual presence of the user U, by analyzing the responses verbally provided by the user, up to the possibility of following the gaze of the user U, thus defining the points of interest on the screen on which the course is presented and then recording any drops in attention.
In addition, the participation and attention data A of several users U acquired in this way can be analyzed, in an anonymous fashion, to determine the overall degree of attention of the users, thus of an entire class, towards a given course. Therefore, the analysis carried out using the method according to the invention strongly helps the platform S in the evaluation phase of the individual user, but it also provides interesting data to support the course evaluation, by providing useful feedback on the overall degree of attention of the users. These suggestions may help the course creators understand the weaknesses of the lessons, allowing them to improve them.
As schematically shown in
Specifically, the generated certificate C comprises at least one of the following information: references of the course passed, final assessment, percentage of modules followed or successfully passed and execution time of the examination. Moreover, the certificate C, in addition to proving the passing of the course, contains information such as the quality and degree of preparation of the users U, their degree of attention and the interest shown during the course.
Advantageously, as shown in
Therefore, at the end of the course, the user U is required to take an examination that evaluates his/her preparation on the subject matter.
The platform S, in assessing the exam, may use the previously collected participation and attention data A of the user U.
This examination, whether passed, qualifies the user U for the topics covered in the course. Therefore, if the assessment achieved turns out to be positive, the method according to the invention creates a certificate C containing the user’s information, digitally signs it to guarantee the authenticity thereof, preferably with an asymmetric key algorithm, and delivers it to the users themselves. Conveniently, the method provides for the revocation of the issued certificates C, under predefined conditions.
As schematically shown in
Advantageously, as shown in
In particular, according to a preferred embodiment, the step 51 of authentication comprises the performance of an asymmetric encryption of personal information I starting from a private key K of the user U, for the generation of a digital signature F verifiable by means of a public key of the users themselves.
Specifically, as shown in
Furthermore, the step of authenticating 51 comprises a step 513 of associating the digital signature F with the personal information I to obtain the authenticated personal information IF.
Preferably, the step of masking 52 comprises the performance of a cryptographic hash function on the authenticated personal information IF to obtain the masked information H2.
Advantageously, the step 53 of uniquely associating the masked information H2 with a time stamp T is implemented by means of a block chain B.
As shown in the diagram in
Therefore, the method and the system according to the invention process the data provided by the user U and produced during the entire user experience in a completely anonymous and transparent way.
This is ensured by the use of an asymmetric key encryption mechanism that ensures the ownership of the personal information produced, in combination with the use of a hashing algorithm, e.g. of the SHA-256 type, which allows masking the personal information I to anyone who is not the owner of the data, or authorized by the same.
Downstream of this processing, the system receives the masked information and provides, through the use of APIs (e.g. Web3 for JavaScript or Python), to upload it to the blockchain (e.g. Ethereum).
This operation ensures that the masked information is accessible to any third party entity or individual and provides a legally valid link to a time stamp.
In this way, the user U owner of the information may, at their discretion, grant permission for unencrypted viewing of, e.g., one of their certificates C.
At that point, the body to which the authorization has been granted can easily verify that the certificate C has been issued by the platform S, has actually been obtained by the user U involved and can place the issue in a specific time instant.
The platform S of the system according to the invention comprises:
In addition, the platform S comprises:
In addition, the platform S comprises an examination software module for the performance of the phase 3 of automatic verification of the skills of the user U and for the generation of the certificate C of attendance of said course.
Furthermore, the platform S comprises a remote computing unit comprising means for performing the phase 5 of authentication and encryption of the collected personal information I and of the phase 6 of verifying the personal information I.
Conveniently, the remote computing unit comprises at least one remote server configured to communicate with a blockchain technology B.
It has in practice been ascertained that the described invention achieves the intended objects.
In particular, the fact is emphasized that the computer-implemented method and the system according to the invention allow drastically reducing human intervention and guarantee, in an autonomous and automatic manner, the fundamental steps that accompany the user during use.
In particular, the method and the system according to the invention allow achieving multiple benefits, listed below.
In particular, the method and the system according to the invention allow for the active monitoring of the user’s behavior during the lessons, so as to extrapolate useful information for both the evaluation of the teaching, and preparatory to the final assessment of the user.
Moreover, the method and the system according to the invention allows for a completely transparent management of the sensitive user data in the hands of individual users. The platform does not know any personal data, as all collected data are encrypted and signed by the user, and then uploaded to the blockchain. This ensures that the platform managers cannot access or use any confidential data and, at the same time, returns full ownership of their personal information to the user, allowing them to exploit it as they see fit.
In addition, the method and the system according to the invention allow the issue of certificates proving the passing of a given course in digital format and the notarization of the same on the blockchain, thus allowing the integration and subsequent use by third party entities of the aforementioned certificates, subject to the user’s authorization.
Number | Date | Country | Kind |
---|---|---|---|
102020000007756 | Apr 2020 | IT | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2021/052956 | 4/9/2021 | WO |