Sign In to Follow Application
View All Documents & Correspondence

Methods And Systems For Securing A Network

Abstract: A method for securing network-operations in a client-server architecture is provided. The method comprises authenticating, at a server, a client system based on a received access-request from the client; disconnecting, the server from client system during operation performed upon the client system for a first pre-determined period; reconnecting, the client system with the server network for a second pre-determined period after an elapse of the first pre-determined period of time; communicating, during the second time period, data pertaining to the operation upon the client system to the server during the first predetermined time period; and disconnecting the client-system upon detecting intrusion into the network by an unidentified device through said client system.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
27 April 2020
Publication Number
44/2021
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
mail@lexorbis.com
Parent Application

Applicants

Aptech Limited
Aptech House, A-65, MIDC, Marol, Andheri (E),Mumbai – 400093, Maharashtra, India

Inventors

1. MALIK, Neeraj
Aptech Ltd. 1st Floor, B-26, 27, Sector-1, Noida - 201301, Uttar Pradesh, India
2. JHA, Pankaj
Aptech Ltd. 2nd Floor, Compound of New Haven Enterprise Pvt Ltd., 49 H, Parsi Panchayat Road, Near Champion Seals & Packaging Pvt. Ltd., Andheri (E) Mumbai - 400069, India
3. JAIN, Bhavesh
Aptech Ltd. 2nd Floor, Compound of New Haven Enterprise Pvt Ltd., 49 H, Parsi Panchayat Road, Near Champion Seals & Packaging Pvt. Ltd., Andheri (E) Mumbai - 400069, India
4. PODDAR, Manisha
Aptech Ltd. 2nd Floor, Compound of New Haven Enterprise Pvt Ltd., 49 H, Parsi Panchayat Road, Near Champion Seals & Packaging Pvt. Ltd., Andheri (E) Mumbai - 400069, India
5. GAUTAM, Sharda J
Aptech Ltd. 2nd Floor, Compound of New Haven Enterprise Pvt Ltd., 49 H, Parsi Panchayat Road, Near Champion Seals & Packaging Pvt. Ltd., Andheri (E) Mumbai - 400069, India

Specification

Claims:1. A method for securing network-operations , the method comprising:
authenticating (step 404), at a server, a client system based on a received access-request from the client;
Disconnecting (step 406), the server the from client system during operation performed upon the client system for a first pre-determined period;
Reconnecting (step 408), the client system with the server network for a second pre-determined period after an elapse of the first pre-determined period of time
Communicating (step 408), during the second time period, data pertaining to the operation upon the client system to the server during the first predetermined time period; and
disconnecting (step 414) the client-system upon detecting intrusion into the network by an unidentified device through said client system.
2. The method according to claim 1, wherein Exam Player detects the intrusion by the device defined as one or more of external device, a virtual machine or a VGA cable connected to the client system.
3. The method according to claim 2, wherein the method comprise temporarily suspending the connection between the network and client system upon detecting the network-intrusion.
4. The method according to claim 1, wherein the client system is defined by at least one of a computer, a laptop, a tab.
5. The method according to claim 1, wherein the server interacts with the client system as a part of executing an online-examination defined by a plurality of question with a corresponding plurality of options designated as answer.
6. The method according to claim 1, wherein the access-request from the client system comprises a set of login-credentials communicated by the client system.
7. The method according to claim 1, wherein the server authorizes the request by matching the set of login credentials with another set of login credentials previously stored at the server.
8. The method according to claim 1, wherein the Exam Player detects the presence of intrusion by the device through the client system during predetermined the second time period designated for receiving of the data from the client device
9. A client-server (102, 104) based distributed system (100) for securing network-operations, the system (100) configured for :
authenticating (step 404), at a server, a client system based on a received access-request from the client;
Disconnecting (step 406), the server the from client system during operation performed upon the client system for a first pre-determined period;
Reconnecting (step 408), the client system with the server network for a second pre-determined period after an elapse of the first pre-determined period of time
Communicating (step 408), during the second time period, data pertaining to the operation upon the client system to the server during the first predetermined time period; and
disconnecting (step 414) the client-system upon detecting intrusion into the network by an unidentified device through said client system.
, Description:TECHNICAL FIELD
[1] The present disclosure generally relates to verification of a client system, and particularly relates to verification of the client system in a network.
BACKGROUND
[2] Typically, when an online examination is taking place, the systems employed in the examination remain connected in the network during the course of examination. The examination is conducted through the interconnected computers in network for example through a client-server architecture. The networked computers are always susceptible to network-based attack or hacking and such vulnerability poses a major drawback to the systems.
[3] In an example, the network attacks may be done by the hackers trying to access the examination questions for leaking to the outside world. In other example, with the emergence of state of the art technologies, one may also resort to access the online examination questions through interfacing drives such USB, flash drives at a candidate’s terminals, relay the questions wirelessly and gather the answers in real-time.
[4] There have been state of the methods to prevent network and other type of attacks upon online examination conducting infrastructure, but the same very often fall short of plugging the loophole. For example, a hacker may afford to isolate a client computer from server for some time, execute the malicious activity and extract information, and thereby restore connection. Such manoeuvres are often detected long time after the occurrence of malicious attack and leaves things incurable.
[5] Overall, the current online examination scheme often fall short of detecting the online-fraud at the right time and location, thereby posing a grave challenge to the integrity of the whole online examination infrastructure.
[6] In an example of a current scenario, issue related to exam mishandling / compromise takes place because the candidate machine is connected to the local area network for the entire exam duration. Any network expert can enter the LAN and hack the candidate machine using multiple tools such as Remote Access Tool and Remote Desktop Protocol.

[7] In another example current scenario, one way to compromise exam is to access the candidate machine either through network or secondary screen or virtual machine.

[8] So, there is a need of a solution which duly protects the online examination mechanism from the hacking, fraud and other spurious attacks.
[9] Also, there is a need of a solution that keeps a check on the system before and during the examination to prevent occurrence of any type of attack against the systems before and during the examination.
SUMMARY
[10] This summary is provided to introduce a selection of concepts in a simplified format that are further described in the detailed description of the present disclosure. This summary is not intended to identify key or essential inventive concepts of the claimed subject matter, nor is it intended for determining the scope of the claimed subject matter. In accordance with the purposes of the disclosure, the present disclosure as embodied and broadly described herein, describes method and system for managing communications in user equipment with a plurality of subscriber identity modules.
[11] A method for securing network-operations in a client server architecture is provided. The method comprises authenticating, at a server, a client system based on a received access-request from the client; disconnecting, the server the from client system during operation performed upon the client system for a first pre-determined period; reconnecting, the client system with the server network for a second pre-determined period after an elapse of the first pre-determined period of time; communicating, during the second time period, data pertaining to the operation upon the client system to the server during the first predetermined time period; and disconnecting the client-system upon detecting intrusion into the network by an unidentified device through said client system.
[12] In accordance with some example embodiments of the inventive concepts, a method for verifying security of a client system in a network is disclosed. The method includes connecting the client system with the network for communicating with a server through a procedure installed in the client system. The method includes receiving a request at the server from the client system to provide an access to the procedure, the server authorizes the request and provides access to the client system. The method includes disconnecting by the procedure the client system from the network for a pre-determined period of time when an action is performed on the procedure; The method includes reconnecting, by the procedure, the client system with the network after the pre-determined period of time for another pre-determined period of time for communicating data related to the action performed on the procedure to the server. The method includes capturing, by the client system, during the another pre-determined period of time information related to the network, wherein the information identifies the network. The method includes comparing, by the client system, the information with a pre-stored information related to the network. The method includes stopping the procedure when the information does not match with the pre-defined information.
[13] These aspects and advantages will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings and claims.
BRIEF DESCRIPTION OF THE DRAWINGS
[14] FIG. 1 illustrates a network environment depicting the interaction between a client system equipped with a procedure and a server through a network;
[15] FIG. 2 illustrates the client system in accordance with some example embodiments of the inventive concepts; and
[16] FIG. 3 illustrates the server in accordance with some example embodiments of the inventive concepts; and
[17] FIG. 4 illustrates flow diagram of a method for managing for verifying security of the client system in the network, in accordance with some example embodiments of the inventive concepts.
[18] FIG. 5 illustrates an example implementation in accordance with some example embodiments of the inventive concepts
[19] Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION
[20] For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
[21] It will be understood by those skilled in the art that the foregoing general description and the following detailed description are explanatory of the invention and are not intended to be restrictive thereof.
[22] Reference throughout this specification to “an aspect”, “another aspect” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase “in an embodiment”, “in another embodiment” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
[23] The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises... a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
[24] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skilled in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
[25] For the sake of clarity, the first digit of a reference numeral of each component of the present disclosure is indicative of the Figure number, in which the corresponding component is shown. For example, reference numerals starting with digit “1” are shown at least in Figure 1. Similarly, reference numerals starting with digit “2” are shown at least in Figure 2.
[26] Embodiments of the present subject matter are described below in detail with reference to the accompanying drawings.
[27] Fig. 1 illustrates an example network environment 100 for verifying security of a number of client systems 102-1,102-2….102-N present in the example network environment 100. In an example embodiment, the client systems 102 may be any of a laptop, a tab, a personal computer or the like. The client systems 102 are connected to a network in the example network environment 100. The network may be any of LAN, MAN, WAN or the like. The client systems 102 include a procedure installed onto the client systems 102. In an example embodiment, the procedure may be based on an examination procedure to conduct online examination at the client systems 102 through the network.
[28] In an example embodiment, the procedure may be capable of detecting presence of a suspicious hardware component attached to the client systems 102. The suspicious hardware component may be an external hard drive such as a pen drive, a hard disk or a VGA cable/HDMI cable attached to the systems 102. In another example embodiment, the procedure may be capable of detecting presence of another network, a virtual machine present in an environment of the client systems 102 for compromising with integrity of the procedure and theft of content present in the procedure for the purpose of leaking the content. In an example embodiment, the content may be a set of questions answerable by a user with an access to the procedure at the client systems 102.
[29] The example network environment 100 further includes a server 104 in a two-way communication with the client systems 102 through the network. The server 104 is capable of communicating with ‘N’ number of client systems 102 simultaneously. In an example embodiment, the server may be capable of communicating with 220 client systems 102. The server 104 receives information from the client systems 102 and generates instructions for the procedure based upon the instructions.
[30] In an example embodiment, the information may be related to the detection of the suspicious component connected to one or more of the client systems 102, presence of another network or the virtual machine at one or more of the client systems 102, an attempt to login a number of times at the client system 102 or the like. In another example embodiment, the information may be related to multiple actions performed on the procedure such as entering login credentials to access the procedure, selecting an option from the number of options, logging out of the procedure.
[31] The instructions generated by the Exam Player may be related to stopping the procedure related to networking interaction with client-system 102 based upon the information received by the Exam Player indicating presence of any of the suspicious hardware components, the another network and the virtual machine at the client systems 102. In an example embodiment, the Exam Player may be capable of stopping the interaction with client by suspending connection temporarily based on the information received from the client systems 102 or any other trigger.
[32] FIG. 2 illustrates a schematic block diagram of a system 200 including the client system 102 incorporated with a procedure. In an example embodiment, the procedure may be an examination procedure. Examples of the client system 102 include, but not limited to, personal computers, tablets, laptops. The client system 102 may include a number of applications that enable a user of the client system 102 to avail various services. Examples of the applications include, but not limited to, browsing application, chat application, media sharing application, streaming media application, social network application, email application, billing application etc.
[33] The client system 102 may include at least one processor 202 (also referred to herein as “the processor 202”), a memory 204, module(s) 206, a communication interface unit(s) 208, a display unit 210, resource(s) 212, data 214, and/or the procedure. The processor 202, the memory 204, the module(s) 206, the communication interface unit(s) 208, the display unit 210, the resource(s) 212, and/or the procedure may be communicatively coupled with each other via a bus (illustrated using directional arrows). The client system 102 may also include one or more input devices (not shown in the figure) such as a microphone, a stylus, a number pad and/or any other device operative to interact with the client system 102. The client system 102 may also include one or more output devices (not shown in the figure) such as speakers, etc. The data 214 may serve, amongst other things, as a repository for storing data processed, received, and/or generated by the module(s) 206.
[34] The processor 202 may be a single processing unit or a number of units, all of which could include multiple computing units. The processor 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, processor cores, multi-core processors, multiprocessors, state machines, logic circuitries, application-specific integrated circuits, field-programmable gate arrays and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the processor 202 may be configured to fetch and/or execute computer-readable instructions and/or data stored in the memory 204.
[35] The memory 204 may include any non-transitory computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and/or dynamic random access memory (DRAM), and/or non-volatile memory, such as read-only memory (ROM), erasable programmable ROM (EPROM), flash memory, hard disks, optical disks, and/or magnetic tapes.
[36] The module(s) 206, amongst other things, may include routines, procedures, objects, components, data structures, etc., which perform particular tasks or implement data types. The module(s) 206 may also be implemented as, signal processor(s), state machine(s), logic circuitries, and/or any other device or component that manipulate signals based on operational instructions. The modules(s) 206 may include Wi-Fi module.
[37] Further, the module(s) 206 may be implemented in hardware, instructions executed by at least one processing unit, for e.g., processor 202, or by a combination thereof. The processing unit may be a general-purpose processor which executes instructions to cause the general-purpose processor to perform operations or, the processing unit may be dedicated to performing the required functions. In another aspect of the present disclosure, the module(s) 206 may be machine-readable instructions (software) which, when executed by a processor/processing unit, may perform any of the described functionalities.
[38] In some example embodiments, the module(s) 206 may be machine-readable instructions (software) which, when executed by a processor/processing unit, perform any of the described functionalities.
[39] The communication interface unit(s) 208 may enable (e.g., facilitate) communication by the client system 102. The display unit 210 may display various types of information (for example, media contents, multimedia data, text data, etc.) to a user of the client system 102. The display unit 210 may include, but is not limited to, a liquid crystal display (LCD), a light-emitting diode (LED) display, an organic LED (OLED) display, a plasma cell display, an electronic ink array display, an electronic paper display, a flexible LCD, a flexible electrochromic display, and/or a flexible electrowetting display.
[40] The resource(s) 212 may be physical and/or virtual components of the client system 102 that provide inherent capabilities and/or contribute towards the performance of the client system 102. Examples of the resource(s) 212 may include, but are not limited to, a memory (e.g., the memory 204), a power unit (e.g. a battery), a display unit (e.g., the display unit 210), etc. The resource(s) 212 may include a power unit/battery unit, a network unit (e.g., the communication interface unit 208), etc., in addition to the processor 202, the memory 204, and the display unit 210.
[41] A procedure or set of instructions are installed on the client system 102. The procedure can be software such as part of the module(s) 206. In an example embodiment, the procedure may be based on an examination procedure to conduct online examination at the client systems 102 through the network. The procedure may include content a number of questions and a number of options as the corresponding choices as solution to each of the questions. In an example embodiment, the procedure communicates in a two-way communication with the server 104 through a network standard such as LAN, MAN, WAN or the like.
[42] The procedure is capable of transmitting information related to the client system 102 to the server 104. In one example embodiment, the information may be related to multiple actions performed on the procedure such as entering login credentials to access the procedure, selecting an option from the number of options, logging out of the procedure. In an example embodiment, the information may be related to the detection of the suspicious component connected to one or more of the client systems 102 or presence of another network or the virtual machine at one or more of the client systems 102.
[43] The procedure receives a set of login credentials from a user as an input and transmits the login credentials to the server 104 for authentication. The server 104 authenticates the user and provides the access of the procedure to the user. When the user requests for the access to the set of questions, the server 104 receives the request and generates an OTP and a notification. The OTP is transmitted to the user and the notification is transmitted to mail ID of the user. The notification includes information about the request received at the server 104. When the user ends the OTP to the server 104, the server 104 authorizes the user and provides access of the set of questions to the user.
[44] The procedure disconnects the client system 102 from the network for a pre-determined period of time when an action is performed on the client system for a first time period say 5 minutes. The procedures further allows the client system 102 to reconnect with the network for another pre-determined amount (say for seconds) after elapse of said example time interval of 10 minutes to transmit the information accumulated at the client systems 102 during the example first time interval to the server 104. In an example embodiment, the client system 102 may be additionally capable of further capturing data providing communication between the client systems 102 and the server 104 (such as type of the network) and comparing the data with a pre-stored data related to the network.
[45] In an example embodiment, the pre-stored data is logged by the client system 102 before or during the user accesses the procedure within the client system 102. An administrator accesses the procedure with another set of credentials and captures the pre-stored data related to the network. The data is compared with the pre-stored data. When the data captured during the another pre-determined period of time is not same as the pre-stored data, the client system 102 communicates the information to the server 104 during said second time period of data-transfer or even in real-time. The server 104 receives and processes the information. The Exam Player further generates instructions relating to stopping the operation at the client systems 102. The client system 102 receives the instructions from the Exam Player and the procedure is stopped.
[46] In one example embodiment, the client system 102 receives an alert from an USB connector when an external drive is connected to the USB connector. The external drive can be a pen drive, a hard disk or the like. The client system 102 communicates the information related to the presence of the external drive to the Exam Player through the procedure. In one example embodiment, the USB connector may be capable of communicating with the procedure and transmits the alert to the procedure when an external device is connected to the USB connector. The procedure may transmit the information related to the presence of the external drive to the Exam Player.
[47] The Exam Player receives and processes the information to generate instructions. The instruction may be transmitted to the client system 102. The instructions relate to stopping the procedure when the external drive is detected as unauthorized intrusion into the network through the client system 102. In one example embodiment, the Exam Player may be capable of stopping the procedure automatically in real-time without any trigger from the client system 102 when the information is processed related to the presence of the external hard drive connected to the client system 102.
[48] In another example embodiment, the client system 102 may be capable of detecting presence of a virtual machine in the client system 102. The client-system 102 further transmits the information related to the detection of the virtual-machine to the Exam Player. In an example embodiment, the Exam Player client system 102 may be capable of detecting presence of the virtual-environment and generate the information for the Exam Player. The Exam Player generates instruction based upon the information to stop the procedure. In another example embodiment, the Exam Player may be capable of stopping the procedure by itself based upon the information indicating presence of the virtual machine.
[49] In another example embodiment, an attempt to login at the client system 102 multiple times is detected and the information related to the attempts is transmitted to the server 104. The server 104 generates instruction based upon the information to stop the procedure. In another example embodiment, the server 104 may be capable of stopping the procedure by itself based upon the information indicating attempts.
[50] The Exam Player may further be capable of detecting a VGA cable or a HDMI cable in connection to the client system 102. The Exam Player further generates the information related to the detection of the VGA cable or the HDMI cable transmits the information through the procedure to the Exam Player. In one embodiment, the procedure installed in the client system 102 detects the VGA cable or the HDMI cable in connection to the VGA port and transmits the information to Exam Player. In another embodiment, the Exam Player may be capable of detecting the presence of the VGA cable or HDMI cable and stopping the procedure.
[51] Fig. 3 illustrates a system 300 including the server 104 of a system 300 of the present invention. In an example embodiment, the server 104 communicates in a two-way communication with the client systems 102 through the network. The server 104 receives information related to the client systems 102 and stores the information in a database repository. The server 104 may be capable of communicating with ‘N’ number of client systems 102 in the network. In one example embodiment, ‘N’ may be 200. The server 104 further communicates with a backup server 302. The Exam Player may be capable of generating instructions to stop a procedure installed in the client systems 102 based upon the information received from the client systems 102.
[52] The server 104 includes a memory 304, a processor 306 coupled to the memory 304 and a transceiver 308. The server 104 communicates with the client systems 102 through the transceiver 308. The transceiver 308 receives the information related to the client systems 102. The memory 304 stores the information in the database repository.
[53] In one example embodiment, the information may be related to detection of a second network. In another embodiment, the information may be related to detection of an external drive such as pen drive, hard disk connected to one or more of the client systems 102. In another example embodiment, the information can be related to detection of VGA cable/HDMI cable connected to the one or more of the client systems 102. In another embodiment, the information can be related to detection of an attempt to login multiple times on one or more of the client systems 102, detection of a virtual machine in an environment in one or more of the client systems 102.
[54] The processor 306 may be capable of processing the information and may generate instructions for the procedure installed on the client systems 102. The instructions are transmitted to the client device through the transceiver 308. The instructions may be related to stopping the procedure. In one embodiment, the Exam Player may instruct the client system 102 to disconnect from the network. In another embodiment, the Exam Player may be capable of stopping the procedure by itself without generating any instruction for the procedure or the client systems 102. In one embodiment, the Exam Player may be capable of disconnecting the client systems 102 from the network.
[55] Fig. 4 illustrates a flow diagram for a method 400 for verifying security of the client system in the network, in accordance with the embodiment of the present disclosure. The method 400 may be implemented by the procedure installed in the client system using components thereof and/or the processor 202 in the client system, as described above. Further, for the sake of brevity, details of the present disclosure that are explained in details in the description of FIG. 1 to FIG. 3 are not explained in detail in the description of FIG. 4.
[56] At block 402, the method 400 includes connecting the client system with the network for communicating with the server through the a program or store procedure installed in the client system. The client system is connected to the network to communicate information related to the client system to the server through the network. The server further generates instruction based upon the information and transmits to the client system.
[57] At block 404, the method 400 includes receiving a request at the server to provide an access to the procedure from the client system, the server processes the request and authorizes the request and provides access to the client system upon authentication. The procedure installed at the client system communicates with the server bi-directionally.
[58] At block 406, the method 400 includes disconnecting the client system from the network by the procedure for a first pre-determined period of time when an action is performed on the procedure. The action may be entering login credentials into the procedure or staring examination.
[59] At block 408, the method 400 includes reconnecting the client system with the network by the procedure after the first pre-determined period of time for another pre-determined period of time (say second time period) for communicating the information related to the action performed on the procedure to the server.
[60] At block 410, the method 400 includes capturing, by the client system, during another or second pre-determined period of time information related to the network, wherein the information identifies the network.
[61] At block 412, the method 400 includes comparing, by the client system, the information with a pre-stored information related to the network.
[62] At block 414, the method 400 includes stopping the procedure or halting the connection between the client-server when the information does not match with the pre-defined information. More specifically, upon detecting intrusion into the network by an unidentified device through, the connection is suspended.
[63] FIG. 5 illustrates an example implementation in accordance with some example embodiments of the inventive concepts and based on the client 102 system and the server system 104 as depicted in previous figures.
[64] The distributed architecture 100 as shown comprises the primary-server 104 deployed for every 200 candidates or client systems 102. For every primary server 104, there is a backup server. These servers in turn are connected to every candidate machine 102 over local area network for entire duration of the exam. This connection enables the candidate to login and start the exam at the specified time. Moreover, the servers 104 are connected to a Data Center over Internet. This enables the candidates’ responses to sync to the Data Center.
[65] In operation, as a part of ‘network on/off’ during the exam, the candidate machine 104 is connected over the LAN at the time of log in. Once the candidate starts the exam, the candidate machine will be disconnected from the network and now it will act as a standalone machine. After the predefined time say 10 minutes, the candidate machine will be reconnected to the LAN and candidate responses will be synced to the local primary server. The syncing of response from Candidate machine to local exam server will not take more than 20 seconds. Once the entire responses are synced for a candidate, his/her machine will again be made standalone and disconnected from LAN.
[66] The network on/off invention works to its advantage the feature that any standalone machine cannot be hacked until and unless it is connected to internet and/or any external device is used to corrupt the system. To handle exam mishandling or compromise, even if someone has already taken the candidate machine on remote before the examination using remote access tools or remote desktop protocol, the same falls short of comprising the security. In accordance with the present subject matter, once the candidate logs in the candidate machine will be disconnected from the network within seconds and all the previously established connections will be terminated.
[67] Further, the present system 100 facilitates an identification or intrusion by a new network, secondary screen and a virtual Machine. In the computer-based examination process, prior to the conduct of examination, dry runs are carried out on all the machines on which examination is supposed to happen. Dry run is an exact replica of examination wherein dummy ids are used to login onto every machine and check whether the machine configuration will support the examination. The status of pre, during and post exam activities are captured and displayed on exam monitoring console. During the dry run, the system captures and keeps a track of the type of network available such as LAN, Internet, WiFi, Bluetooth in the examination center on candidate machine. On the day of the examination, the system again captures the type of network available in the examination center on candidate machines. This way system identifies introduction of any new network on the candidate machine.
[68] The exam is terminated for the candidates in case any of the following is identified on the candidate machine:
New Network
One or more secondary-screen using HDMI / VGA
Virtual Machine
[69] In all such cases, the exam is terminated for the candidate, logs are maintained, and issue is notified on the Data Center. The system checks for new network and secondary screen during the examination too and exam is stopped then and there.
[70] In an implementation, the present subject matter at least renders a Time Hardening feature, wherein Test Node date time sync with an ATC server date time. This feature maintains the Test Node, Candidate log data and ATC server with proper date time.
[71] The present subject matter addressed issues related to exam compromise and hence renders the system robust, secure and full proof, thereby lending a candidate a better exam experience. The present subject matter at-least handles the intrusion issues that arise from continuous connection between candidate Machine and local exam server for the entire exam duration.

[72] While specific language has been used to describe the present disclosure, any limitations arising on account thereto, are not intended. As would be apparent to a person in the art, various working modifications may be made to the method in order to implement the inventive concepts as taught herein. The drawings and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. Clearly, the present disclosure may be otherwise variously embodied, and practiced within the scope of the following claims.

Documents

Application Documents

# Name Date
1 202021017921-AMENDED DOCUMENTS [28-12-2020(online)].pdf 2020-12-28
1 202021017921-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [27-04-2020(online)].pdf 2020-04-27
2 202021017921-FORM 13 [28-12-2020(online)].pdf 2020-12-28
2 202021017921-STATEMENT OF UNDERTAKING (FORM 3) [27-04-2020(online)].pdf 2020-04-27
3 202021017921-Proof of Right [27-11-2020(online)].pdf 2020-11-27
3 202021017921-FORM 1 [27-04-2020(online)].pdf 2020-04-27
4 Abstract1.jpg 2020-07-15
4 202021017921-DRAWINGS [27-04-2020(online)].pdf 2020-04-27
5 202021017921-DECLARATION OF INVENTORSHIP (FORM 5) [27-04-2020(online)].pdf 2020-04-27
5 202021017921-FORM-26 [07-07-2020(online)].pdf 2020-07-07
6 202021017921-COMPLETE SPECIFICATION [27-04-2020(online)].pdf 2020-04-27
7 202021017921-DECLARATION OF INVENTORSHIP (FORM 5) [27-04-2020(online)].pdf 2020-04-27
7 202021017921-FORM-26 [07-07-2020(online)].pdf 2020-07-07
8 202021017921-DRAWINGS [27-04-2020(online)].pdf 2020-04-27
8 Abstract1.jpg 2020-07-15
9 202021017921-FORM 1 [27-04-2020(online)].pdf 2020-04-27
9 202021017921-Proof of Right [27-11-2020(online)].pdf 2020-11-27
10 202021017921-STATEMENT OF UNDERTAKING (FORM 3) [27-04-2020(online)].pdf 2020-04-27
10 202021017921-FORM 13 [28-12-2020(online)].pdf 2020-12-28
11 202021017921-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [27-04-2020(online)].pdf 2020-04-27
11 202021017921-AMENDED DOCUMENTS [28-12-2020(online)].pdf 2020-12-28