Systems and methods for providing a covert password manager
First Claim
1. A system configured to provide access to confidential information, comprising:
- a computing device having a processor and physical memory, the physical memory storing instructions that cause the processor to;
provide an application that is configured to protect confidential information, wherein the application comprises;
a confidential information manager module configured to perform management functions associated with accessing and managing the confidential information; and
a decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information;
provide instructions for rendering an interface associated with the decoy function that includes an input form;
evaluate input received via the input form to determine whether the input is being provided to access the confidential information or to execute the decoy function; and
based on the determination of whether the input is being provided to access the confidential information or to execute the decoy function, execute either the management functions associated with the confidential information manager module or the decoy function associated with the decoy module.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to an application that is configured to provide secure access to confidential information. To protect the confidential information, the application may include functions that utilize a decoy application to disguise the functionality of the application. A unique sequence of inputs received through an interface associated with the decoy application may permit a user to access the confidential information. An authorized user that has been provided access to the confidential information may access configuration interfaces that permit the user to define the inputs that will serve as login credentials and to customize the appearance and functionality of the decoy application.
-
Citations
20 Claims
-
1. A system configured to provide access to confidential information, comprising:
a computing device having a processor and physical memory, the physical memory storing instructions that cause the processor to; provide an application that is configured to protect confidential information, wherein the application comprises; a confidential information manager module configured to perform management functions associated with accessing and managing the confidential information; and a decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information; provide instructions for rendering an interface associated with the decoy function that includes an input form; evaluate input received via the input form to determine whether the input is being provided to access the confidential information or to execute the decoy function; and based on the determination of whether the input is being provided to access the confidential information or to execute the decoy function, execute either the management functions associated with the confidential information manager module or the decoy function associated with the decoy module. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A method for providing access to confidential information, comprising:
-
providing an application that is configured to protect confidential information, wherein the application comprises; a confidential information manager module configured to perform management functions associated with accessing and managing confidential information; and a decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information; provide instructions for rendering an interface associated with the decoy function that includes an input form; evaluate input received via the input form to determine whether the input is being provided to access the confidential information or to execute the decoy function; and based on the determination of whether the input is being provided to access the confidential information or to execute the decoy function, execute either the management functions associated with the confidential information manager module or the decoy function associated with the decoy module. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer storage medium comprising a computer readable program for protecting confidential information, wherein the computer readable program when executed on a computer causes the computer to:
-
provide an application that is configured to protect confidential information, wherein the application comprises; a confidential information manager module configured to perform management functions associated with accessing and managing the confidential information; and a decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information; provide instructions for rendering an interface associated with the decoy function that includes an input form; evaluate input received via the input form to determine whether the input is being provided to access the confidential information or to execute the decoy function; and based on the determination of whether the input is being provided to access the confidential information or to execute the decoy function, execute either the management functions associated with the confidential information manager module or the decoy function associated with the decoy module. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification