Systems and methods for providing a covert password manager
First Claim
1. A system configured to provide access to confidential information, comprising:
- a computing device having a processor and physical memory, the physical memory storing instructions that cause the processor to;
provide an application that is configured to protect confidential information, wherein the application comprises;
a confidential information manager module configured to perform management functions associated with accessing and managing the confidential information; and
a decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information;
in response to receiving a request to access the application, provide instructions for rendering an interface associated with the decoy function that includes an input form;
evaluate input received via the input form to determine whether the input is being provided to access the confidential information or to execute the decoy function, wherein evaluating the input at least includes analyzing one or more data types of the received input;
in response to determining that the input is being provided to access the confidential information, analyze at least a portion of the input to determine whether the input comprises valid login credentials; and
provide access to the confidential information in response to determining that valid login credentials have been submitted;
wherein the application provides access to a configuration interface that permits login credentials to be specified by selecting one or more keyboard events, click events or data form entry events, and by associating at least one expected data type with the input form.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to an application that is configured to provide secure access to confidential information. To protect the confidential information, the application may include functions that utilize a decoy application to disguise the functionality of the application. A unique sequence of inputs received through an interface associated with the decoy application may permit a user to access the confidential information. An authorized user that has been provided access to the confidential information may access configuration interfaces that permit the user to define the inputs that will serve as login credentials and to customize the appearance and functionality of the decoy application.
-
Citations
20 Claims
-
1. A system configured to provide access to confidential information, comprising:
-
a computing device having a processor and physical memory, the physical memory storing instructions that cause the processor to; provide an application that is configured to protect confidential information, wherein the application comprises; a confidential information manager module configured to perform management functions associated with accessing and managing the confidential information; and a decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information; in response to receiving a request to access the application, provide instructions for rendering an interface associated with the decoy function that includes an input form; evaluate input received via the input form to determine whether the input is being provided to access the confidential information or to execute the decoy function, wherein evaluating the input at least includes analyzing one or more data types of the received input; in response to determining that the input is being provided to access the confidential information, analyze at least a portion of the input to determine whether the input comprises valid login credentials; and provide access to the confidential information in response to determining that valid login credentials have been submitted; wherein the application provides access to a configuration interface that permits login credentials to be specified by selecting one or more keyboard events, click events or data form entry events, and by associating at least one expected data type with the input form. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for providing access to confidential information, comprising:
-
providing an application that is configured to protect confidential information, wherein the application comprises; a confidential information manager module configured to perform management functions associated with accessing and managing confidential information; and a decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information; in response to receiving a request to access the application, providing instructions for rendering an interface associated with the decoy function that includes an input form; storing data on a non-transitory computer storage medium that associates at least one expected data type with at least one input field of the input form; evaluating, with a processor, input received via the input form to determine whether an attempt is being made to access the confidential information or to execute the decoy function, wherein evaluating the input at least includes analyzing the at least one input field to determine whether input received via the at least one input field is associated with the expected data type; in response to determining an attempt is being made to access the confidential information, analyzing at least a portion of the input with the processor to determine whether the input comprises valid login credentials; providing access to the confidential information in response to determining that valid login credentials have been submitted; wherein the application provides access to a configuration interface that permits login credentials to be specified by selecting one or more keyboard events, click events or data form entry events, and by associating the at least one expected data type with the input form. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer storage medium comprising a computer readable program for protecting confidential information, wherein the computer readable program when executed on a computer causes the computer to:
-
provide an application that is configured to protect confidential information, wherein the application comprises; a confidential information manager module configured to perform management functions associated with accessing and managing the confidential information; and a decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information; in response to receiving a request to access the application, provide instructions for rendering an interface associated with the decoy function that includes an input form; evaluate input received via the input form to determine whether the input is being provided to access the confidential information or to execute the decoy function, wherein evaluating the input at least includes analyzing one or more data types of the received input; in response to determining that the input is being provided to access the confidential information, analyze at least a portion of the input to determine whether the input comprises valid login credentials; and provide access to the confidential information in response to determining that valid login credentials have been submitted; wherein the application provides access to a configuration interface that permits login credentials to be specified by selecting one or more keyboard events, click events or data form entry events, and by associating at least one expected data type with the input form. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification