1. Field of the Invention
The present invention relates to the field of remote computing and, more specifically, the present invention relates to the field of security in remote computer environments.
2. Description of the Related Art
The distance learning movement is a field of education that focuses on teaching methods and technology with the aim of delivering teaching and education to students who are not physically present in a traditional educational setting, such as a classroom. The distance learning process creates and provides access to learning, usually via the Internet, when the source of information and the learners are separated by time and distance, or both.
One of the issues associated with distance learning is the verification of presence and identity of students. The teaching provider has an interest in verifying that a student is actually sitting at a computer and interacting with it, so as to ensure that the student is present during a class. It is also important that the teaching provider verify the identity of the student, so as to prevent the student from having another person attend a class or take an exam. The currently available distance learning software does not adequately solve the aforementioned problems with the prior art.
Therefore, what is needed is a system and method for improving the problems with the prior art, and more particularly for a more efficient system and method for verifying the presence and identity of remote users of a computer system.
Embodiments of the present invention address deficiencies of the art in respect to distance learning and provide a novel and non-obvious system and method for remotely verifying presence and identity in a distance learning environment. In an embodiment of the invention, a system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
In another embodiment of the invention, a method for verifying presence and identity of a user on a remote computer comprises receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer; reading, by a processor on the remote computer, the encrypted key from the digital key; transmitting, by the processor, the encrypted key to the server over the networked communications system; capturing, by a computer program executing on the remote computer, behavioral data of the user; and transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
Additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The aspects of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
The accompanying drawings, which are incorporated in and constitute part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. The embodiments illustrated herein are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown, wherein:
The present invention improves upon the problems with the prior art by providing verification of remote users of a computer system in a user-friendly and safe manner. The present invention allows for more secure user verification by requiring that users carry and utilize small, unobtrusive security tokens that hold encrypted keys unique to the user. The present invention further allows for the automatic and seamless storage and transmittal of behavioral data of the user during usage, which may be used to verify the presence and interaction of the user at the remote computer.
In one embodiment, the digital key 135 comprises a YubiKey, manufactured by Yubico, which is a device that acts as a USB keyboard and provides secure authentication by a one-time password that is encrypted using the AES encryption algorithm with a 128-bit key. The Yubikey has four modes of operation including Standard Yubico 12 character ID+32 character OTP, OATH 6 or 8 digit OTP for use with third party OATH servers, Static pass code including 1-64 character for legacy login applications, and challenge-response functionality using client software.
The method of the present invention begins with a user 130 using his computer 132 to log onto server 102 over the network 106 using his credentials. The user 130 may utilize a specialized secure web browser to log in and interact with server 102. An encrypted key may be read from the digital key 135 and transmitted to the server 102. In one embodiment, a password or key is automatically written into a browser text field when the user 130, upon being prompted, presses a button on the digital key 135. Encrypted data may be read from the digital key 135 and transmitted to the server 102 at random intervals.
Upon receiving an encrypted key, the server 102 decrypts the data and stores it. The specialized web browser may capture behavioral data of the user 130 and other data, such as session identifiers, a number of times the digital key has powered up, a session count, user names, time deltas between events, and device identifiers. The web browser may also send the behavioral and other data to the server 102 at certain time intervals. The behavioral and other data may be used to determine the actual presence of the user 130 at the computer 132.
In one embodiment of the present invention, when a user 130 enters a portion of the web site that requires additional verification, such as a quiz or a test, the user 130 is presented with a popup window requesting a phone number and a pin number. When the user 130 calls the number the user 130 will be instructed to enter the pin number. After entering the pin number the popup window text will change displaying a random message to record via voice. After recording the voice message the popup window will show a textbox to enter an encrypted key from the digital key 135, such as the Yubico key. The information from the encrypted key and voice recording is stored in database 104 for an administrator or instructor to view or analyze. The voice recording may also be analyzed with voice analyzing software.
Although specific embodiments of the invention have been disclosed, those having ordinary skill in the art will understand that changes can be made to the specific embodiments without departing from the spirit and scope of the invention. The scope of the invention is not to be restricted, therefore, to the specific embodiments. Furthermore, it is intended that the appended claims cover any and all such applications, modifications, and embodiments within the scope of the present invention.
This application is a continuation application and claims priority to U.S. provisional application No. 61/528,024, entitled “REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY” filed on Aug. 26, 2011, which claims priority to U.S. provisional application No. 61/405,643, entitled USB Device coupled to a Decision-making system. System, method, and computer program product for authenticating into a website with microcontroller, filed on Oct. 21, 2010.
Ser. No. 11/105,962
APPARATUS AND METHOD FOR COMPUTER BASED EXAMINATIONS.
Ser. No. 11/734,149
SYSTEM FOR AND METHODS OF STORING AND COMPARING COMPUTER GENERATED CONTINUOUS VECTOR LINES THROUGH A NON-SECURE OR A SECURE COMMUNICATION CHANNEL.
Ser. No. 12/287,336
METHODS FOR PERFORMING SECURE ON-LINE TESTING WITHOUT PRE-INSTALLATION OF A SECURE BROWSER.
Ser. No. 12/674,142
DEVICE AND METHOD FOR GENERATING DYNAMIC CREDIT CARD DATA.
This application is a continuation application and claims priority to U.S. provisional application No. 61/528,024, entitled “REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY” filed on Aug. 26, 2011, which claims priority to U.S. provisional application No. 61/405,643, filed on Oct. 21, 2010.
Number | Date | Country | |
---|---|---|---|
61528024 | Aug 2011 | US | |
61405643 | Oct 2010 | US |