Embodiments described herein generally relate to systems and methods for streamlined training and, more specifically, to seamless authentication of users of electronic training platforms.
In online training industry, there are several issues that revolve around the accessibility and user-friendliness of training programs. One common challenge is that these training initiatives tend to be unnecessarily cumbersome and often hidden behind barriers, primarily in the form of mandatory logins. This problem manifests via complexity, restricted access, data privacy issues, increased time consumption, and disengagement.
Specifically, many training programs are needlessly complex, making it difficult for learners to navigate through the materials effectively. Overly complicated interfaces and convoluted content structures can hinder the learning process and deter participation. Regarding restricted access, many current solutions have a requirement for logins or user accounts that creates a barrier to entry for individuals who could benefit from the training. This exclusivity limits the reach of valuable knowledge and deprives potential learners of opportunities for growth. Regarding data privacy, the need to create accounts and provide personal information raises concerns about data privacy and security. Users may be hesitant to share data, especially when they are unsure about the purpose of collecting such information. These logins also often add an unnecessary step that consumes valuable time. Users may be reluctant to engage in training if they perceive it as a time-consuming process. Additionally, the cumbersome training experiences can lead to disengagement and a lack of motivation among learners. When accessing training materials becomes an arduous task, it diminishes the enthusiasm and willingness to participate. Thus, a need exists in the industry for systems and methods for streamlined training.
Embodiments for streamlined training are provided. One embodiment of a method includes granting a user with access to an organization-managed device, determining that the user has been assigned third party training software, and determining an identifier type for the third party training software. Some embodiments include locating a user identifier associated with another portion of the organization-managed device that complies with the identifier type for the third party training software, automatically and without user intervention using the user identifier to identify the user for the third party training software, and providing a training widget to the user. Some embodiments include determining that the user is deficient on training and in response to determining that the user is deficient on training, physically restricting access to other third party software provided via the organization-managed device.
Embodiments of a system include a cloud device for providing third party training software to a user and a client device that includes a memory component and a processor, the memory component storing logic that causes the processor to prompt the user for user credentials to access the client device, wherein the user credentials include a user identifier, receive the user credentials, and determine whether the user credentials authenticate the user as an authorized user of the client device. In some embodiments, in response to determining that the user credentials authenticate the user, the logic causes the system to grant the user access to the client device, determine that the user has been assigned third party training software to complete a training program, and automatically and without user intervention, identify the user with the user identifier for using the third party training software. In some embodiments, the logic causes the system to provide a training widget to the user, determine that the user is deficient on training, and in response to determining that the user is deficient on training, physically restrict access to other third party software provided via the client device.
Embodiments of a non-transitory computer-readable storage medium include logic that causes a computing device to determine that a user has been assigned third party training software, determine an identifier type for the third party training software, and locate a user identifier associated with another portion of the organization-managed device that complies with the identifier type for the third party training software. In some embodiments, the logic causes the computing device to identify the user for the third party training software, provide a training widget to the user, and determine that the user is deficient on training. In some embodiments, the logic causes the computing device to physically restrict access to other third party software provided via the organization-managed device in response to determining that the user is deficient on training.
The embodiments set forth in the drawings are illustrative and exemplary in nature and not intended to limit the disclosure. The following detailed description of the illustrative embodiments can be understood when read in conjunction with the following drawings, where like structure is indicated with like reference numerals and in which:
Embodiments disclosed herein include systems and methods for providing streamlined training. Some embodiments enable the integration of training modules seamlessly into existing websites, intranets, and modern web applications, thereby simplifying user access to educational content. In some embodiments, users may be authenticated using an email address or other user identifier, eliminating the need for additional user accounts, usernames, or passwords. Some embodiments are configured to be easily embedded within various web-based platforms, allowing for versatile deployment. Some embodiments provide a training portal user interface that is customizable to match the visual identity and branding of the host application. Some embodiments provide robust tracking and analytics tools provide real-time insights into user engagement and progress. Embodiments are also scalable to accommodate a range of user numbers, making it suitable for organizations of various sizes.
Similarly, some embodiments include an embedded application provided into a parent application or website that provides the ability to interrupt an end user's workflow to communicate that training is required or that the use needs to complete a required training module, and ultimately, to force a user to take the training if the proper timing is appropriate. Using any of the authentication processes described herein, embodiments may then use two identifiers, a training number and a training email, to return the proper settings and required training for that specific end user.
Embodiments provided herein also include a training wall. If the training is enabled and the user needs to be notified or forced to take training, embodiments may automatically open full screen, ready for the user to take the training, locking the user out of other applications.
As such, embodiments described herein provide online training delivery, which streamlines the user experience and promotes engagement. These embodiments provide a unique combination of user identification, integration flexibility, and customizable design. The systems and methods for providing streamlined training incorporating the same will be described in more detail, below.
Referring now to the drawings,
Similarly, the client(s) 10 may be configured as a personal computer, mobile device, laptop, server, and/or other computing device that is configured for interacting with a user to provide training. The client 10 may be coupled to the network 11 and receive data from one or more of the servers 12. While three clients 10 are depicted in
Server(s) 12 (also referred to herein as the cloud 12 or cloud device) may also be coupled to the network 11 and may include any server, personal computer, laptop, mobile device, or other computing device that can provide training, applications, and/or data to the clients 10 via the network 11. While three servers 12a, 12b, and 12n are depicted in
Specifically, while the servers 12a, 12b, and 12n may be part of a server farm from a single entity, some embodiments may be configured such that at least one of the servers 12 may be content server of a third party. As an example, some embodiments may be configured to provide training via a first server 12 controlled by a first entity, but the training portal, training wall, etc. may be provided by a second server 12 controlled by a second entity. As such, discussion herein regarding the servers 12 and/or the cloud 12 may refer to any remotely located resource for providing the functionality described herein.
Similarly, the adaptive training logic 144b may provide an adaptive training option 101b, which may be provided by the embedded training portal 101 (such as depicted in
Similarly, authenticated learners 33a may be provided the embedded training portal 101 via a different web domain 100b that requires the client 10 to determine an identity of the user accessing the embedded training portal 101. The web domain 100b may be provided via the third party site 102 via the web browser 103.
In some embodiments, an administrator may set up a widget or script to collect and pass the user identifier to the third party site 102 via a configuration file. Specifically, some embodiments may be configured to authenticate a user upon logging into the client 10. The user may be prompted to enter a username and password. In such an embodiment, upon authentication into the client 10, the script may scrape the username from the login for passing to the third party site 102. Alternatively or in addition, some embodiments may include an email platform, such as Outlook®, Gmail®, etc. These embodiments may scrape the email address from the email platform for identifying the user with the third party site 102.
Some embodiments may be configured to cause a deployment/run script to query a domain controller for the user email address. If this is not successful, these embodiments may use fallback processes to detect an email address. Some embodiments may provide an administrator with options for web deployment, desktop deployments or SharePoint deployments.
In some embodiments, the client 10 may operate via a company virtual private network (VPN). The company may set up a VPN tunnel with the third party site 102 such that user credentials may be communicated through the tunnel. In some embodiments, MAC addresses may be stored by the third party site 102 to identify company-affiliated computers. Thus, scraping a user identifier from a program on the client 10 may be performed to identify the user to the third party site 102. As indicated above, the identifier may be an email address, employee number, name, social security number, or other user identifier.
Once the user is identified, embodiments of the embedded training portal 101 may activate a training wall and/or insert alerts on the widget that tells the users how many items they need to complete. Specifically, upon entering the training program, the embedded training portal 101 either by the third-party site 102 and/or the downloaded software 104 may be configured to restrict user access to all or a portion of the desktop or third-party site otherwise accessible by the client 10. This may be accomplished by enabling the training wall in the configuration for the widget. Embodiments may also configure the number of days to show the training wall before the deadline for training. Some embodiments may display the training wall but allow users to bypass access block until the deadline has been reached.
Additionally, the user may traverse the training program. With the user identification, the client 10 may report to the cloud 12 data related about the user interaction with the training platform (e.g., which programs were accessed, completion status, testing results, etc.). Thus, if the user leaves and returns to the training platform (on this client 10 and/or another client 10) and is again identified by that client 10, the user may seamlessly return to the same point in the training.
As illustrated, the security tips widget 200 may provide a security topics section 212 for the user to investigate various security topics. The articles provided in the security topics section 212 may be part of the training provided by the third party site 102 and/or the articles may be independently provided independently from the third party site 102. As an example, embodiments of the downloaded software 104 may be configured to determine topics of training provided by the third party site 102. This determination may be made from information sent by the third party site 102 and/or via a scanning of materials on the third party site 102. Regardless, the downloaded software 104 may be configured to cause the client 10 to access one or more articles associated with the topics provided by the third party site 102. These articles may be from a repository provided to the security tips widget 200, may be provided by the third party site 102, and/or may be accessed via the internet or other public repository.
Also provided in the user interface 210 is a quiz section 214. Similar to the security topics section 212, the quiz section 214 may be a quiz that may or may not relate to the training content provided by the third party site 102. Specifically, some embodiments may be configured to provide merely a security/phishing quiz that may not have any relation to the third party site 102. However, some embodiments may be configured to determine the content of the training provided via the third party site 102 and select (or create) a quiz that tests knowledge of the third party site 102. In some embodiments, the quiz may be customized to the actions the user takes. As an example, if the downloaded software 104 detects that the user often opens an email and immediately opens images or selects links, the quiz may have questions associated with deterring that type of risky behavior. Regardless, in embodiments where the quiz provided by the downloaded software 104 is custom to the training provided via the third party site 102, the quiz may be part of the requirements of the training and/or may simply be a practice quiz to make sure that the user completes the training.
Similarly, the security tips widget 200 may also provide a security courses section 216. The security courses section 216 may again include courses that that relate to the training provided by the third party site 102 and/or may be courses associated with actions the user takes. In some embodiments, the courses are standard and/or may be selected based on the user's performance on the quiz.
Regardless, in response to selection of the embedded training option 101a, the training may be provided by the third party site 102. While embodiments discussed above indicate that the downloaded software 104 may be provided in response to content provided by the third party site 102, some embodiments may customize the training data provided by the third party site 102, based on user interaction with the security tips widget 200. More specifically, if the user has interacted with the articles, quizzes, and security courses, those results may be provided to the third party site 102, which may customize the training based on the user's current security understanding. In some embodiments, a determination may be made whether the user needs training or what level of training should be required based on at least these metrics. In some embodiments, the downloaded software 104 may similarly monitor usage by the user to make this determination.
It will be understood that some embodiments may be configured such that the security tips widget 200 may launch upon a determination that the user accesses the third party site 102. However, some embodiments may be configured such that the security tips widget 200 causes the client 10 to open third party site 102 to assist in the training.
As will be understood,
A team invitations component 324 may be configured for sending and tracking team invitations for training and/or other events. Administrators can invite users to join specific teams, ensuring that team structures align with organizational needs and objectives. Similarly, a teams component 326 may provide options to view and manage a list of existing teams. Each team may have a unique identity, purpose, and/or composition, contributing to efficient team-based training initiatives. A sites component 328 may identify deployments by domain, usage and billing for the portal are also tracked and organized by site. Specifically, the sites component 328 may include a listing of third party sites 102 that provide the various training to the users. A widget actions component 330 may also be included for providing an overview of available widget actions that are provided to users and/or teams of users.
The administrator portal 310 also includes a widget categories component 332, which may categorize widgets based on functionality and/or content type. This categorization helps administrators and trainers easily identify and select appropriate widgets for specific training modules, ensuring content relevance. A required training widgets component 334 may provide widgets that are mandatory for specific end users of a specific site and/or for teams of users. Administrators can adjust delivery mode for a specific sites to ensure that critical training content is completed. An activities component 336 may also be provided, which tracks and logs user interactions with widgets during training sessions. This component provides valuable data on user engagement, progress, and performance, aiding in the assessment of training effectiveness and customization of future content.
In summary, the administrator portal 310, as depicted in
In block 452, settings data may be loaded for providing and monitoring training. In block 454, the widget may be provided. In block 456, a determination may be made regarding whether the user selects the widget. If not, in block 458, the user continues with other work. If in block 456, the use selects the widget, in block 460, the training may be provided to the user.
In block 466, a determination may be made regarding whether the user requires training. If so, at block 468, a determination may be made regarding whether the training wall is to be enabled. If so, at block 470, the adaptive training logic 144b may cause the client 10 to provide a training portal with the wall. In some embodiments, the training portal may be a fully engaged program with transparent background covering the entire display to prevent other activity by the user. The process proceeds to block 478 where the user participates in the training.
If at block 468, the training wall is not enabled or at block 466 the user does not require training, the process proceeds to block 472, where the widget is provided for display. In block 474, a determination is made regarding whether the user selected the widget. If not, the user may continue his/her work in block 476. If the user selects the widget, the user may participate in the training at block 478.
The memory component 140 may store operating logic 742, the embedded training logic 144a and the adaptive training logic 144b. Each of these logic components may include a plurality of different pieces of logic, each of which may be embodied as a computer program, firmware, and/or hardware, as an example. A local communications interface 746 is also included in
The processor 730 may include any processing component operable to receive and execute instructions (such as from a data storage component 736 and/or the memory component 140). As described above, the input/output hardware 732 may include and/or be configured to interface with speakers, microphones, and/or other input/output components.
The network interface hardware 734 may include and/or be configured for communicating with any wired or wireless networking hardware, including an antenna, a modem, a LAN port, wireless fidelity (Wi-Fi) card, WiMAX card, mobile communications hardware, and/or other hardware for communicating with other networks and/or devices. From this connection, communication may be facilitated between the client 10 and other computing devices.
The operating logic 742 may include an operating system and/or other software for managing components of the client 10. As discussed above, the embedded training logic 144a may be configured to cause the processor 730 to provide training via a web portal, as described herein. The adaptive training logic 144b may be configured to cause the processor 730 to provide training via a desktop widget and/or other desktop application on the client 10.
It should be understood that while the components in
As an example, one or more of the functionalities and/or components described herein may be provided by the client 10 and/or the server 12. Depending on the particular embodiment, any of these devices may have similar components as those depicted in
Additionally, while the client 10 is illustrated with the embedded training logic 144a and the adaptive training logic 144b as separate logical components, this is also an example. In some embodiments, a single piece of logic may provide the described functionality. It should also be understood that while the embedded training logic 144a and the adaptive training logic 144b are described herein as the logical components, this is also an example. Other components may also be included, depending on the embodiment.
As illustrated above, various embodiments for providing streamlined training are disclosed. As discussed above, there are currently issues regarding improving the technical accessibility of training, while at the same time providing electronic training platforms that are both secure and have the ability to track learners. Embodiments provided herein solve these and other technical problems by providing an electronic platform that tracks users by computing device and email address. This improves the technical field by allowing users to not have to log into a training platform, but instead have a seamless, integrated experience to electronic training. Additionally, embodiments provided herein cannot be performed by the human mind with pen and paper because the technology is necessarily rooted in computer networking. Specifically, a purpose of this disclosure is to provide tracking and seamless authentication of computerized training. It would be impossible for a human to track and authenticate a training user.
While particular embodiments and aspects of the present disclosure have been illustrated and described herein, various other changes and modifications can be made without departing from the spirit and scope of the disclosure. Moreover, although various aspects have been described herein, such aspects need not be utilized in combination. Accordingly, it is therefore intended that the appended claims cover all such changes and modifications that are within the scope of the embodiments shown and described herein.
It should now be understood that embodiments disclosed herein include systems, methods, and non-transitory computer-readable mediums for providing streamlined training. It should also be understood that these embodiments are merely exemplary and are not intended to limit the scope of this disclosure.
This application claims the benefit of U.S. Provisional Application Ser. No. 63/624,331 filed on Jan. 24, 2024, which is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
63624331 | Jan 2024 | US |