Patents

Systems and methods for data quality and validity improvement in education institutional, degree, and course license management

Systems and methods for providing an accreditation management system (AMS) to validate educational resources by performing content validation operations comprising applying a cryptographic hash function to educational resources to generate a content validation hash, receiving a data stream from a computing device of a student user engaged with the educational resources, applying the cryptographic hash function to each educational resource to generate a content consumption hash, and comparing the content validation hash to the content consumption hash.

Abstract

Described are platforms, systems, media, and methods for providing an accreditation management system (AMS) to validate educational resources by performing content validation operations comprising: applying a cryptographic hash function to educational resources to generate a content validation hash; receiving a data stream from a computing device of a student user engaged with the educational resources; applying the cryptographic hash function to each educational resource to generate a content consumption hash; and comparing the content validation hash to the content consumption hash.

Patent Information

Patent Number

WO2024107645A1

Filing Date

2023-11-13

Publication Date

2024-05-23

Authority

WIPO (PCT)

Priority Date

2022-11-14

Application Number

PCT/US2023/079507

Original Assignee

Woolf Inc.

Inventors

Joshua BROGGI

Inventor

Oleksii BILOUS

Inventor

Oleksii PYSANKO

Inventor

Mykhailo MARYNENKO

Inventor

Keywords

educational resourcescryptographic hash functioncontent validationdata streamcontent consumptionaccreditation management system

Classifications

International Patent Classification (IPC)

H04L9/06

Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols - the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators

H04L9/0643

Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

G06Q10/00

Administration; Management

G06Q10/06

Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

G06Q10/063

Operations research, analysis or management

G06Q10/10

Office automation; Time management

G06Q30/00

Commerce

G06Q30/018

Certifying business or products

G06Q50/00

Information and communication technology ICT specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism

G06Q50/10

Services

G06Q50/20

Education

G06Q50/26

Government or public services

H04L9/32

Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols - including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

H04L9/3236

Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols - including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials - using cryptographic hash functions

G06Q2220/00

Business processing using cryptography

Summary

The invention provides systems and methods for data quality and validity improvement in education institutional, degree, and course license management. The systems utilize an accreditation management system (AMS) that validates educational resources through content validation operations.

Key features include:

  • Ingesting educational resources from remote learning management systems (LMS)
  • Applying cryptographic hash functions to generate content validation hashes
  • Generating unique keys for educational resources
  • Receiving data streams from student users engaged with the resources
  • Validating consumption of educational resources by extracting keys from data streams
  • Generating confidence levels by comparing content validation hashes to content consumption hashes

The technology ensures data integrity across all domains of record-keeping, with data logged in real-time. It enables educational providers to create digital versions of their organizations, governance workflows, learning programs, staff, students, and learning activities, while maintaining regulatory compliance.

Landscape Areas

Business, Economics & ManagementEngineering & Computer ScienceHuman Resources & OrganizationsStrategic ManagementEducational AdministrationEducational TechnologyData Mining & AnalysisComputer Security & Cryptography