Speech Note
Speech Note
Our team will introduce a method to check class attendance using the local area
network combined with random number tickets and a physical ticket with an 8-digit
PIN.
Our class was supposed to have 100 students. In the first step, we will write a code to
randomly generate 100 different 8-digit PINs and print each on tickets.
Then, when the students come to the classroom, they will each get a PIN ticket from
the professor to ensure that no one will get two tickets. On the ticket, the PIN of each
student is unique, and this PIN will be used with your name in the attendance check.
We designed a randomly generated 8-digit PIN card for each student because there
are 100 million possible combinations that an 8-digit number can generate, increasing
the difficulty for someone to guess the correct PIN to pass the attendance check
occasionally.
In the second step, we will build an interface for students to input their names with the
8-digit PIN they get. To ensure that anyone who signs the attendance register is in the
classroom, we use IP address filtering to restrict access to a website. In this method,
you limit access to the form only to devices connected to a specific IP address range,
which corresponds to the classroom network. This step will prevent devices outside
the classroom network from accessing the form.
In this step, students must connect to the local area network and submit a unique PIN
with the student's name. After that, all the attendance information will be collected
and stored in the system, which the professor can only assess.
Finally, we come to the last step. We will convert the data to a CSV file. Then, we can
quickly check who is absent from the class in two steps.
Step 1: We will prepare a dataset with all the students' names and PINs we generated.
By checking the duplicates, if more than one student uses the same PIN, it means that
someone may be cheating. We can randomly pick ten students to validate who is
attending the class. Then, we will drop all the duplicates of PINs in the attendance
sheet.
There are two possible results after we drop the duplicates. The first result is that the
remaining PINs must follow a student's name. In this result, we only need to drop the
duplicate names of the name column; the remaining names are the names of students
who do not attend the class.
The second result is that we will find PINs not in the original PIN column, which may
follow students' names. In this situation, someone may have made a mistake when
they input their PIN. You can resubmit the PIN again under this situation. Another
possibility is that someone uses a fake PIN to cheat the system.
Modify by chatGPT:
Our team has developed an innovative method to simplify the process of taking class
attendance. We are proud to present a system that utilizes the local area network in
combination with randomly generated physical cards, each containing an 8-digit PIN.
Let us dive into the specifics of this system. Firstly, to create the 8-digit PIN tickets,
we have written a code that will randomly generate 100 unique PINs. These PINs are
then printed onto physical tickets, which are distributed by the professor to the
individual students upon arrival in the classroom. This method is straightforward as
each student is given only one PIN, and this same number will be used to mark their
attendance against their name.
We have chosen to generate an 8-digit PIN for each student because there are 100
million possible combinations, making it nearly impossible for anyone to guess the
correct number. Therefore, any student attempting to cheat the system will find it
more accessible.
In step two, we have designed an online interface for students to enter their name and
unique PIN. Access to the website is restricted to the local area network using IP
address filtering. We chose this restriction method to only allow access to devices
connected to the specific IP address range corresponding to the classroom network.
Such a method will prevent devices outside the classroom network from accessing the
attendance form.
Once students have entered their name and unique PIN, the attendance information is
collected and securely stored within the system. The professor can only access this
information, ensuring that confidentiality and security are always maintained.
Two possible scenarios may occur after we delete duplicates. Firstly, there may be
remaining PINs that do not correspond to a student's name. In this case, we only need
to remove duplicate names from the name column to identify those absent from the
class.
Secondly, PINs may not be included in the original list of generated PINs to suggest
that someone has made an error when entering their unique PIN. If this happens,
students can resubmit their PIN. Alternatively, this could indicate that someone is
attempting to cheat the system by using a fake PIN, so we recommend that the
professor take additional measures to identify the person following further
verification.
Speech v1.0:
Page1:
Good evening, everyone. Today, we would like to give you a talk to introduce the
innovative method we developed for taking class attendance. Our creation is based on
2-factor authentication(2FA), including knowledge and location factors.
Page3:
In the first step, we designed an online interface by using the location factors that
restricted access by IP address. By doing this, only the students in the restricted area
can enter the interface. However, a problem is posed if we only restrict access by IP
address since VPN would be a tool used by the students to change their IP address and
enter the interface.
To solve this problem, the interface for taking attendance could add knowledge
factors by requiring students to enter an 8-digit PIN with their names. Each PIN
matches each student's name and is stored in a dataset, and the PINs are randomly
generated before each class by our professor to ensure that no same PIN is used for
the same student in different lectures. The professor would assign a unique PIN to
each of us upon their arrival to the class, thus preventing students from taking more
than one ticket to assist those absent from class in taking attendance. Since there are
100 million possible combinations of 8-digit numbers, this could prevent students
from quickly guessing their unique PINs, as students could barely type in the unique
PIN accurately without getting it from our professor. Those who unintentionally enter
the wrong PIN could enter the correct PIN again together with their names, and the
system would automatically update their record by replacing their old records. All
attendance records would be collected and stored within the system, and the
attendance records for each lecture would be converted to CSV files.
Page4:
In step two, we have designed an online interface for students to enter their name and
unique PIN.
Page5:
Access to the website is restricted to the local area network using IP address filtering.
We chose this restriction method to only allow access to devices connected to the
specific IP address range corresponding to the classroom network. Such a method will
prevent devices outside the classroom network from accessing the attendance form.
Once students have entered their name and unique PIN, the attendance information is
collected and securely stored within the system. The professor can only access this
information, ensuring that confidentiality and security are always maintained.
Page6:
Finally, we came to the attendance checking step.
Page7:
The professor could check attendance by comparing the records with the dataset
containing each student's unique PINs and names. After removing the duplicates, any
double entry of the same PIN could indicate a possibility of students cheating by
sharing the same PIN. Suppose the issue of the records with PINs not corresponding
to the students' names is present. In that case, it means that those students are absent
and cheating by using a VPN to enter the interface and trying to take attendance with
incorrect 8-digit numbers since those who have attended the class but wrongly entered
the PIN could resubmit the entries and replace the old records.
To ensure that confidentiality and security are maintained at all times, only the
professor could be able to access these files. To further safeguard the CSV files from
data leaks because of viewing by other people, we suggest setting up a password-
protected zip archive and enclosing these CSV files in it.
Page8:
That's all for our introduction of the attendance checking method. Thank you.