-
公开(公告)号:US11922825B2
公开(公告)日:2024-03-05
申请号:US17459664
申请日:2021-08-27
Applicant: Anjali Chakradhar
Inventor: Anjali Chakradhar
CPC classification number: G09B7/00 , G06F16/285 , G06F21/6254 , G06F21/84 , G06V20/49 , H04N5/76
Abstract: A method and system for online proctoring of tests while preserving privacy of test-taker is disclosed. Proctoring data, which include video and audio data from at least one camera and a microphone monitoring the test-taker and the test environment, is chopped up into data fragments. Each fragment is altered to replace personally identifiable information, and the altered fragment is encrypted using a cryptographic key. The chronological order of fragments is also scrambled. Encrypted and altered data fragments are distributed to a pool of proctors who review the encrypted fragment for suspicious behavior. Suspicious fragments are further compared with original, unaltered versions of the fragments to confirm suspicious behavior, and render a verdict. The test-taker is aware of, and explicitly consents to the processing of a fragment by a proctor. A secure, custom viewer for the fragments also allows the test-taker to control the number of times a proctoring data segment can be viewed. Our method and system ensure the privacy of the proctoring data by explicitly authorizing every entity that processes a proctoring data fragment, and limiting number of views of the fragment, while allowing independent evaluation of proctoring data for different forms of cheating.
-
2.
公开(公告)号:US11845982B2
公开(公告)日:2023-12-19
申请号:US15855294
申请日:2017-12-27
Applicant: Anjali Chakradhar
Inventor: Anjali Chakradhar
IPC: C12Q1/6869 , C12Q1/6876 , C12N15/10 , G01N15/14 , G01N21/64 , G16B50/00
CPC classification number: C12Q1/6869 , C12N15/1086 , C12N15/1089 , C12Q1/6876 , G01N15/1429 , G01N15/1434 , G01N21/6428 , G01N2015/149 , G01N2021/6439 , G16B50/00
Abstract: A digital store comprising of a method to store digital data in live micro-organisms, and a method to selectively retrieve subsets of stored data, is disclosed. Digital data is represented as a plurality of key-value pairs. The proposed system stores copies of key-value pairs in a plurality of live micro-organisms. Upon presentation of a retrieval key, the proposed digital store retrieves the value associated with the retrieval key. Storage method for a key-value pair comprises of (a) mapping the key to a gene that expresses a unique fluorescent protein so that no two keys map to the same gene, (b) encoding the key-value pair as base-pair sequences, (c) synthesizing oligonucleotide chains from base-pairs for the key-value pair and the gene, (d) synthesizing recombinant DNA plasmids that have oligonucleotide chains for the key-value pair, the gene, and two primers, as foreign DNA inserts, (e) incorporation of recombinant DNA plasmids into live micro-organisms, (f) isolation of live micro-organisms that have absorbed the recombinant DNA plasmids, and (g) safe storage of population of live micro-organisms with embedded key-value pairs in a common pool. Retrieval of the value paired with a key comprises of (a) taking as input the retrieval key, and mapping the key to the specific gene for fluorescent protein, (b) taking a sample from the safe storage pool that contains live micro-organisms embedded with key-value pairs, (c) isolating the live micro-organisms that have expressed the gene by using high-speed fluorescence activated cell sorting or flow cytometry, (d) extracting DNA from the recombinant DNA plasmid in the isolated live micro-organisms, (d) selectively amplifying and sequencing only those DNA strands that contain the value for the key, and (e) decoding the base-pair sequence obtained after DNA sequencing to yield the value associated with the retrieval key.
We also disclose two important variations. The first variation relates to the storage step. The recombinant DNA plasmid is constructed to include additional non-fluorescent oligonucleotides and genes so that during the data retrieval step, the live micro-organisms that have absorbed the said plasmid can be sorted by cell sorters based on parameters of individual cells such as cell size, cell complexity, cell phenotype, cell structure, cell function, and magnetic or electrical properties. The second variation relates to both storage and retrieval of key-value pairs with large values. To store such a key-value pair, the large value is split into smaller blocks so that a block can fit into a recombinant DNA plasmid, and a distinct pair of primers is used for each block. A block's primer pair is used to selectively amplify and sequence only the DNA that encodes the data in the block, thereby enabling the retrieval of a specific block of the value, as opposed to retrieving the entire value associated with a key.-
3.
公开(公告)号:US20230386259A1
公开(公告)日:2023-11-30
申请号:US17828397
申请日:2022-05-31
Applicant: Anjali Chakradhar
Inventor: Anjali Chakradhar
CPC classification number: G06V40/28 , G06V40/10 , G06V20/52 , G06V20/625 , G06V10/70 , G06Q50/265
Abstract: A method of monitoring and reporting domestic abuse is disclosed. Our method and system allow a domestic abuse victim to report abuse in a safe, private, and automatic manner, and without the victim leaving any digital trail that can be traced back to the victim. Our real-time monitoring and reporting system also enables authorized agents to intervene in a timely manner and assist the victim. Our method and system detect a hand gesture made by a domestic abuse victim by analyzing video captured by an image or video capture device, and uses computer vision techniques to track the victim to a vehicle that the victim embarks or is already traveling in. Subsequently, our method positions a second image or video capture device to obtain a video that includes identifying attributes of the victim's vehicle. Computer vision techniques are used to detect the identifying attributes of the victim's vehicle like license plate, make and model of the car. The image frames that correspond to the hand gesture, identifying attributes of the victim, and identifying attributes of the victim's vehicle are transmitted in a secure and private manner to an authorized agent. Upon receipt of the information, the authorized agent can intervene in real-time to intercept the victim's vehicle and provide assistance.
-
-