主权项 |
1. A system configured to provide access to confidential information, comprising:
a computing device having a processor and physical memory, the physical memory storing instructions that cause the processor to:
provide an application that is configured to protect confidential information, wherein the application comprises:
a confidential information manager module configured to perform management functions associated with accessing and managing the confidential information; anda decoy module configured to disguise the management functions of the application by providing a decoy function and one or more associated interfaces that are unrelated to managing the confidential information;provide instructions for rendering an interface associated with the decoy function that includes an input form;evaluate input received via the input form to determine whether the input is being provided to access the confidential information or to execute the decoy function; andbased on the determination of whether the input is being provided to access the confidential information or to execute the decoy function, execute either the management functions associated with the confidential information manager module or the decoy function associated with the decoy module. |