Systems and methods for providing a covert password manager

Active Publication Date: 2016-02-23
FITZGERALD JOSEPH
View PDF38 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0004]The present invention relates to an application that is configured to provide secure access to confidential information (e.g., password information, medical information, financial information, personal contacts information or other type of confidential information). To protect the confidential information, the application may include functions that utilize a decoy application to disguise the functionality of the applicat

Problems solved by technology

On the other hand, the user may be denied access to the confidential information if the login credentials are not valid.
Providing access to confidential information in the manner described above presents security concerns.
Because the unauthorized users are aware of the location of the login interface, they can attempt to access the confidential information by manually entering l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for providing a covert password manager
  • Systems and methods for providing a covert password manager
  • Systems and methods for providing a covert password manager

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014]In the following description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the present invention.

[0015]In accordance with certain embodiments, an application is configured to provide secure access to confidential information. The confidential information may include password information, medical information, financial information, personal contacts information or other type of confidential information. To protect the confidential information, the application may initially present a user with a “decoy application” that is configured to display interfaces and perform functions that are unrelated to managing confidential information. The decoy application may be a separate application that is launched by application t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to an application that is configured to provide secure access to confidential information. To protect the confidential information, the application may include functions that utilize a decoy application to disguise the functionality of the application. A unique sequence of inputs received through an interface associated with the decoy application may permit a user to access the confidential information. An authorized user that has been provided access to the confidential information may access configuration interfaces that permit the user to define the inputs that will serve as login credentials and to customize the appearance and functionality of the decoy application.

Description

FIELD OF THE INVENTION[0001]The present principles are directed to systems and methods for protecting confidential information and, more particularly, to providing a password manager application that includes a covert login interface for accessing confidential information.BACKGROUND OF THE INVENTION[0002]Many computer applications are used to store confidential information. For example, an application may store confidential information such as password information, medical information, financial information or personal contact information. A user may be required to enter login credentials before the user is permitted to access the confidential information. For example, a user may be presented with a login screen that includes an input form for receiving a username and password. After the user has submitted the login credentials, the application may determine whether the login credentials are valid. If the login credentials are determined to be valid, the user is given access to the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31H04L29/06G06F21/45
CPCH04L63/083G06F21/45H04L63/10H04L63/08
Inventor FITZGERALD, JOSEPH
Owner FITZGERALD JOSEPH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products