System and methods for universal password control

ABSTRACT

A system and method is described for controlling the password(s) of one or more programs through a universal program. The universal control program allows access to one or more other programs and allows editing of the passwords of the other programs directly through the universal access program.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 11/692,867, entitled SYSTEM AND METHODS FOR UNIVERSAL PASSWORDCONTROL, filed on Mar. 28, 2007, which is a continuation of U.S. patentapplication Ser. No. 10/233,618 entitled SYSTEM AND METHODS FORUNIVERSAL PASSWORD CONTROL, filed on Sep. 4, 2002 and are both herebyincorporated by reference.

TECHNICAL FIELD

The present invention relates to systems and methods for controllingpasswords for multiple applications from at least a single source.

BACKGROUND

Time has become an increasingly precious commodity in today's society.Businesses are continuously devising new methods to decrease idle timefor routine activities. Such routine activities may include, forexample, repetitive procedures that may be a necessary buttime-consuming part of a typical business day. One such repetitiveactivity is updating passwords for system software and programs.

Computer system users typically have to remember a number of passwordsfor various programs. Each password usually allows the user access to aspecific software program or series of software programs. In certaininstances, a specific firewall password may allow access to loginsequences for a series of subsequent programs, each subsequent programrequiring its own password to operate. In such cases, many passwords areneeded and the user may be inundated with having to remember a series oftypically alphanumeric passwords.

This requirement not only tests the memory of a user, but also requiresan unnecessary and excessive amount of time to go through the accessroutine. Furthermore, more time is wasted when the passwords for each ofthe programs needs periodic updates. Finally, if the user forgets one ormore passwords, a system operator may need to be consulted to reset thepassword or re-initialize the routine. Thus, more time is needed to dealwith the password issues. Therefore, there is a need to provide a userwith a single universal system or method of controlling multiplepasswords for multiple programs.

SUMMARY

The present invention may be used as a way to decrease time required tochange, maintain, update, or control passwords for multiple programsfrom a given source platform. For example, a single control programcould control the passwords of a number of programs that are accessibleto the control program. The control program would enable a user tochange, modify, delete, or otherwise edit the passwords of othersoftware programs in electronic communication with the control program.

In an embodiment, such a control program can minimize the time requiredfor editing or changing the passwords of multiple programs. Furthermore,the control program would decrease the need to memorize multiplepasswords by electronically storing the passwords for the user. Finally,the control program could enable a user to instantly change allpasswords of all programs in electronic communication with the controlprogram by a few simple operations instead of having to access, log in,and change the password for each program individually.

As defined herein and through the written disclosure, a “program”encompasses a routine that performs a particular function by generallyreceiving a given input and producing a corresponding output. Theprogram may be a specific software routine, or part of a routine andconsidered a “subroutine” of the software routine. The program mayfurther be an access means, such that a user must successfully beallowed to log into the program in order to access a series of commandsthat are contained within the program. The program, as defined herein,is not limited to the examples set forth herein and may be any routinethat may be separable and operate independently of other routines.

An exemplary embodiment of the present invention is a system foraccessing multiple programs. The system includes a central programcapable of automatically accessing other secondary programs, a controlunit in communication with the central program, wherein the control unitallows controls of which secondary programs to access, and wherein thecontrol unit allows control of password access to the secondaryprograms.

Another exemplary implementation of the present invention is a systemfor accessing multiple programs. The system includes means forautomatically accessing multiple programs, means for controlling incommunication with the means for accessing, wherein the means forcontrolling allows control of which programs to access, and wherein themeans for controlling allows control of password access to the multipleprograms.

Yet another exemplary embodiment of the present invention is method forediting a password of a program through a central control program. Themethod includes accessing the central control program, selecting programfor which to edit the password, and editing the password for theselected program through the control program.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an exemplary embodiment of a system architecture thatrequires a series of passwords to access different tiers of programs.

FIG. 2 shows an exemplary embodiment of the present invention as asingle universal control program having control over the passwords ofmultiple programs.

FIG. 3 shows a visual display according to an exemplary embodiment ofthe present invention with multiple choices of programs to controlpasswords.

FIG. 4 shows an exemplary embodiment of a hierarchical control systemtypically used in a telephony-related system testing architecture.

FIG. 5 shows an exemplary embodiment of a system according to thepresent invention that provides an alternative to the hierarchicalpassword structure of the system shown in FIG. 4.

DETAILED DESCRIPTION

An exemplary system and method of the present invention includes auniversal program that is in communication with one or morepassword-accessed programs, routines, or subroutines. The universalprogram enables a user to control passwords of one or more programs thatare in communication with the universal program.

FIG. 1 shows an exemplary embodiment of a system 100 for accessing andcommunicating with multiple programs. The exemplary multi-tieredarchitecture shown in FIG. 1 has three tiers or levels of access forsake of simplicity, although any number of tiers, number of programs, orcombinations of program hierarchy is possible.

In the first tier 110, a single program 111 is accessed through aspecific password. Such a program 111 may allow a user access to theprogram once the proper password is accepted. Further, the program 111allows access to another series of programs in a second tier 120. Thesecond tier 120 includes exemplary secondary programs 121, 122, and 123.Each such program 121, 122, and 123 is further accessed through its ownspecific required password. Further, the program 111 in the first tiermay have to be re-programmed with the passwords of each of the programs121, 122, and 123 in the second tier 120 to enable the program 111 toaccess each of the programs 121, 122, and 123 automatically.

A third tier 130 of tertiary programs may exist including a series ofprograms 131, 132, 133, 134, and 135. Each such program in the thirdtier 130 requires its own password before the program may be accessed.Each of the passwords for each program in the third tier 130 may have tobe then programmed into each of the programs in the second tier 120 sothat the latter programs may access the former programs.

In the exemplary functional architectural structure shown in FIG. 1, auser may have to enter or update up to 27 different passwords to allowprogram 111 in the first tier 110 to control all programs in exemplarysubsequent tiers 120 and 130. The user would have to enter fivepasswords for the five programs 131, 132, 133, 134, and 135. Then theuser would have to enter each of the individualized passwords ofprograms 131, 132, 133, 134, and 135 into each of programs 121, 122, and123 in the second tier 120. The user would also have to enter a uniquepassword to access each of the programs 121, 122, and 123 in the secondtier 120. The user would have to enter each such unique password of eachprogram 121, 122, and 123 in second tier 120 into program 111. Finally,the user would enter a password to access program 111.

Thus, up to 27 total passwords must be entered or memorized by the user.Furthermore, if each such program in each of the three tiers 110, 120,and 130 has a requirement that its password be updated periodically, thesame arduous process must be repeated. For example, if each program hasa requirement to update its password every 60 days, the 27 passwordupdate process must be repeated within every 60 days. This process istime-consuming and tedious, and therefore potentially unpleasant for theuser. If the user does not update the passwords within the 60 day periodand/or forgets a single password, a system manager may have to beconsulted to reset part or the entire password system. Thus, the userwould be dependent on the system manager if the user forgets a passwordor fails to update the passwords in a timely fashion. This process isboth timely and expensive for both the user and the system manager.

Thus, because the process of updating multiple passwords on a regularbasis is so time consuming, there is a need for a new system thatstreamlines the password control process such that the user will nothave to spend inordinate amounts of time for setting, updating, orcontrolling passwords for various programs in communication with acentral control program.

An exemplary embodiment of the present invention is shown in FIG. 2 assystem 200 for controlling multiple passwords in multiple programs froma universal control program. In this exemplary system 200, a singlecentral control program 211 enables the user to access, control, orupdate passwords for various programs in communication with it.

As shown in the system 200 of FIG. 2, central program 211 is incommunication and interaction with a series of programs 221, 222, 223,231, 232, 233, 234, and 235. In this example, the series of programs221, 222, and 223 are hierarchical and use the series of programs 231,232, 233, 234, and 235 as sub-programs. For example, programs 231, 232,233, 234, and 235 have a sub-program relationship to programs 221, 222,and 223 in a similar manner as programs 131, 132, 133, 134, and 135 havewith programs 121, 122, and 123, respectively. Because central program211 has access to each of the programs 221, 222, 223, 231, 232, 233,234, and 235, the passwords of each of the latter programs may bechanged by the program 211. Furthermore, since central program 211 hascommunication with each program 221, 222, 223, 231, 232, 233, 234, and235, the central program 211 makes it possible to edit the passwords ofeach of the programs without going through serial layers of passwordaccess. Although in the example shown in FIG. 2, one control program 211is shown in communication with eight access programs, any number ofcontrol or access programs are possible, as long as each control programcan access and control the password of one or more other programs.

An exemplary embodiment of a means to allow a user control over variousprogram passwords through a control program is shown as system 300 inFIG. 3. Although the example shown is a visual display, such as, forexample, a computer screen, wherein the user may choose various options,the invention is not limited to such a choosing means. For example,other choosing means for different programs may include keyboard, mouse,touch-sensitive screen, voice-activated commands, or the like.

In the example shown in FIG. 3, system 300 includes an exemplarycomputer display that includes a list 310 of programs that areaccessible by the universal system. In the example shown, the system 300has access to five programs, System A, System B, System C, System D, andSystem E. However, any number of programs may be accessed by system 300.For each of the listed programs in system column 310, an indicator boxsignals whether the particular program has been highlighted for anoperation. For example, in the example shown in FIG. 3, the indicatorbox 315 for System B has been highlighted with an “X” to indicate thatan operation is about to be performed on System B. Optionally, an allsystem indicator box 316 may be provided that allows an operation to beperformed on all systems in system column 310.

For each of the programs listed in system column 310, a password may beadded, changed or modified. In an operations field 350 of the system300, old passwords may be changed to new passwords. For a given programthat is highlighted by an indicator box as shown in column 310, the usermay change the password by inputting the old password in area 360. Theuser also indicates a new password in area 362. Optionally, the newpassword may be re-entered in area 365. The verification process may bea part of the routine required to change or edit a password, and dependson whether indicator box 366 is highlighted with a marker, for example,an “X”.

Optionally, for each given program listed in column 310, a column 320indicates all programs 325 that utilize the same password. For example,the passwords for System B, D, and E are the same. Such a sharedpassword grouping would be helpful, for example, if a group of programsare all somewhat dependent on each other. One such dependent conditionis, for example, a hierarchical geometry, as shown in FIG. 1. When twoor more hierarchical programs are given the same password, it couldallow a user to access all such programs in the architecture with thesingle password, thereby streamlining the accessing process.

Each of the passwords for the programs listed in column 310 may bedisplayed in a column 330 to serve as a convenient means for keepingtrack of various program passwords. For example, in the example ofSystem B, the password is “KITTEN2”, the same password that is alsoshared by System D and System E. Thus, there is less requirement for theuser to remember various passwords for different programs and whichprograms may share particular passwords. Further, an indication of theactual password used for each related set of programs facilitates theinteraction of such programs when needed, and decreases the necessity ofremembering or keeping track of numerous passwords.

The above described exemplary system and method according to the presentinvention may be used in a variety of different manners and for avariety of different configurations. As long as there is a need to keeptrack of multiple passwords or there is a need to provide access tomultiple layers of programs, the exemplary systems and methods accordingto the present invention could act as a means to decrease time requiredto log into each program separately, update each program separately, orhave to remember multiple passwords. The exemplary systems and methodsdescribed herein may be applicable to, for example, telecommunicationstesting systems, utility companies, information technology testingsystems, any business or personal computer systems, any portablecomputer systems, such as personal data assistants (“PDA”) or the like,or any other system that could benefit from having a universal passwordcontrol program.

One particular example of a system that requires a user to spendexcessive amounts of time updating and controlling passwordsindividually per program is shown as testing system 400 in FIG. 4. Testsystem 400 may be used, for example, for testing telecommunication linesat various regions throughout the United States.

As presented in the example, various regional testing centers areseparated by localized geography and labeled as 431, 432, 433, 434, and435. Each such test center 431, 432, 433, 434, and 435 is designed totest the telecommunication lines of specific regions, such as Louisiana,Alabama, Georgia, Carolinas, and Florida, respectively. For example,upon receipt of a notice that a certain telecommunication test line inGeorgia is not operating properly at a proper speed, a technician wouldspecifically log into the test program 433, labeled as GASARTS, the testline system in Georgia. SARTS stands for “Switched Access Remote TestSystem”.

The GASARTS test program 433 may be designed to test only certaintelecommunication lines, but not all. For example, the SARTS testprograms in the third tier 430 of testing programs may only be designedto test telecommunication lines that have speed capacities of less than56K. Thus, although the technician may be able to access the specifictest program 431, 432, 433, 434, or 435 in the third tier 430 categoryto determine whether a particular test line is functioning properly, thetest line to be tested is limited to what the capacity of the SARTSsystem testing allows. For example, if the telecommunication line to betested has a speed rate greater than 56K, none of the SARTS testprograms 431, 432, 433, 434, or 435 may be used to determine thetelecommunication line's proper information relaying properties.

No matter which of the programs in the third tier 430 the technician hasto access, he or she will need to have password access to the program.Such password access is necessary for each of the five exemplary testprograms shown in the third tier 430. Thus, the technician will have topotentially memorize a total of five passwords to be able to access anyof the third tier programs 430 when such testing of the underlyingcommunication lines is required.

If there is some indication that a telecommunication line greater than56K speed may be having trouble relaying information, then none of thetest programs in the third tier 430 may be used to test the lines. Thus,a second tier of programs 420 have to be accessed to test the higherspeed telecommunication lines. The programs in the second tier 420 coverlarger geographic areas than the programs in the third tier 430. Thus,fewer programs are available in the second tier 420. In the exampleshown in FIG. 4, three programs are presented as 421, 422, and 423 torepresent the regional, north, and central geographical areas covered bythe programs. ITS stands for integrated testing system.

The ITS systems in programs 421, 422, and 423 enable a technician toaccess higher speed telecommunication lines (for example, higher than56K speed). However, the ITS systems also have the ability to testsystems less than 56K speed. In order to access particular test lines invarious regions, the ITS test programs 421, 422, and 423 may have toaccess particular SARTS programs 431, 432, 433, 434, and 435 in a givenSARTS localized region. Moreover, to access the particular SARTSsub-program 431, 432, 433, 434, or 435, ITS program 421, 422, or 423requires the password of the particular SARTS sub-program. Thus, each ofthe three exemplary programs 421, 422, 423 in the second tier 420 shouldbe input with each of the five passwords of the sub-programs 431, 432,433, 434, and 435 in communication with them.

Hence, a user, such as, for example, a technician, not only must keeptrack of each of the passwords for each program 421, 422, 423, 431, 432,433, 434, and 435, but must also update each of the second tier ITSprograms 420 with each of the five passwords of the third tier programs430 to allow the ITS programs to access the SARTS programs. Thisaccounts to a total of 23 password changes or updates. When taking intoaccount a system requirement to periodically change to a new passwordin, for example, every sixty days, this sums up to a total of 138password updates every year.

Adding another layer of authorization, a control program 411 in a firsttier 410 has authority to control the program for any ITS program 421,422, or 423 in the second tier 420. The first tier program 411 islabeled INTAS, which stands for “Integrated Testing and AnalysisSystem”. INTAS program 411 has its own password access system to enableauthorized users to access the program. Furthermore, INTAS program 411permits access of any communication line of any speed, thus having theability of both third tier SARTS programs 430 and second tier ITSprograms 420.

Under certain conditions, INTAS program 411 will have to access aparticular test line that is under the control of a specific SARTSprogram, such as, for example, FLSARTS 435 in Florida. When such arequirement is made, INTAS program 411 will have to access the properITS program, which in this example is ITS Central program 423. To accessITS Central program 423, INTAS needs to have the password for theprogram 423. Thus, INTAS program 411 should have accurate informationregarding the password of ITS programs 421, 422, and 423 in the secondtier 420. So INTAS program 411 accesses ITS Central 423, which in turnaccesses FLSARTS 435, allowing INTAS program 411 access to a particulartelecommunication test line. Thus, in this example, INTAS program 411 isaccessed through its own password, which in turn accesses ITS Central423 through an accurate stored password in INTAS 411, and which ITSCentral 423 accesses FLSARTS 435 through an accurate stored password inITS Central 423. Several passwords are needed to test a particulartelecommunication test line. This process may be slowed down byinaccurate passwords or a breakdown between the particular programs thatmust be accessed to finally reach the proper telecommunication testline. Thus, the system has drawbacks and shortcomings that make itinefficient and time-consuming.

FIG. 5 shows a system 500 as an exemplary embodiment according to thepresent invention designed to present a more streamlined and efficientsolution to the problems encountered in the system 400 described in FIG.4. The system 500 can include the same programs in the first tier 410,second tier 420, and third tier 430 as shown in FIG. 4. However, theprograms are arranged differently in the new system 500.

This new arrangement and access between programs as shown in FIG. 5allows for more efficient operation. Furthermore, it allows a singleprogram to update and access any of a variety of different subprogramsdirectly, without having to utilize intermediary programs. Thus the newarrangement and architecture of programs requires less time to updatepasswords in various subprograms, thereby saving time and increasingaccuracy of password storage between related programs.

In the exemplary system 500 shown in FIG. 5, INTAS program 411 hasdirect access to each of the ITS programs 421, 422, and 423, and each ofthe SARTS programs, 431, 432, 433, 434, and 435. Such direct access andcommunication between INTAS 411 and any of the sub-programs 421, 422,423, 431, 432, 433, 434, and 435 eliminates the need for intermediaryprograms and therefore eliminates the need for intermediary programs tostore accurate password information for the desired terminal programs.

For example, as described in the example described above with respect tothe system 400 in FIG. 4 above, the system 500 would eliminate therequirement for ITS Central 423 to store accurate and updated passwordinformation for FLSARTS 435 in order for INTAS 411 to access FLSARTS 435to test a communication line under control of FLSARTS 435. Under the newexemplary system 500, INTAS 411 would access FLSARTS 435 directly, asshown in FIG. 5. INTAS 411 could not only access each of the subprogramsdirectly, as shown in FIG. 5, but also update, change, edit, or deletethe passwords of each of these subprograms. A method of changing suchpasswords in the subprograms is described in the example above withrespect to FIG. 3. Other means of changing or updating passwords arepossible.

A given technical personnel may only be authorized to access certainlevels of programs 421, 422, 423, 431, 432, 433, 434, or 435, and so thepersonnel's password may not provide access to any other program otherthan the one(s) that are pre-authorized. Thus, this given personnel mayhave an INTAS program 411 that allows access to select subprograms, suchas, for example, only SARTS programs 434 and 435. This flexibility maybe established by a system manager that presents this personnel with alimited access INTAS program 411 that is only allowed access to selectITS and SARTS programs. Different level personnel may then be presentedwith a main access program 411 that has access to programs that are onlywithin the authorization limit of the specific personnel. Thus,personnel may only access, edit, and change the passwords of thoseprograms that have already been preauthorized for them.

One of the advantages of the methods and systems of this invention isthe minimization of time that a user would have to spend accessingmultiple programs. Furthermore, the user would save time by not havingto enter the password individually for each of the programs beingaccessed. Also, the user may edit, change, or update the password of oneor more programs from a single source used for storing multiple systempasswords. The single source may be, for example, a universal accessprogram that may or may not have its own password. Thus, the user, atmost, would have to remember a single password to access the universalaccess program, and then this program would store the passwords of allsecondary programs within communication with the central program. Also,the password would have the ability to change the password of all suchsecondary programs that are within communication with the universalprogram. Such secondary programs may need to have to be adjusted oredited to allow the universal program to access and change or otherwiseedit the passwords of such secondary programs.

Because less time has to be spent changing, updating, or editingpasswords in multiple programs, a user would benefit from the time savedby using a universal program that accesses the passwords of otherprograms in communication with it. Furthermore, the user would not haveto remember more than a single password, if even that, for the universalcontrol program, in order to access all programs. Thus, severaladvantages of the exemplary embodiments of the present inventiondescribed above include less time spent by a user in performing stepsrelated to password updating, accessing, and otherwise, and also lessrequirement to memorize multiple passwords.

In describing representative embodiments of the invention, thespecification may have presented the method and/or process of theinvention as a particular sequence of steps. However, to the extent thatthe method or process does not rely on the particular order of steps setforth herein, the method or process should not be limited to theparticular sequence of steps described. As one of ordinary skill in theart would appreciate, other sequences of steps may be possible.Therefore, the particular order of the steps set forth in thespecification should not be construed as limitations on the claims. Inaddition, the claims directed to the method and/or process of theinvention should not be limited to the performance of their steps in theorder written, and one skilled in the art can readily appreciate thatthe sequences may be varied and still remain within the spirit and scopeof the invention.

The foregoing disclosure of the embodiments of the invention has beenpresented for purposes of illustration and description. It is notintended to be exhaustive or to limit the invention to the precise formsdisclosed. Many variations and modifications of the embodimentsdescribed herein will be apparent to one of ordinary skill in the art inlight of the above disclosure. The scope of the invention is to bedefined only by the claims appended hereto, and by their equivalents.

1. A system, comprising: a processor; a memory, communicatively coupledto the processor, configured to store at least one computer-executablecomponent, the at least one computer-executable component comprising: aprogram configured to selectively access a plurality of programs via aninterface, and concurrently edit a plurality of passwords associatedwith the plurality of programs.
 2. The system of claim 1, wherein the atleast one computer-executable component further comprises: a controlunit configured to control which of the plurality of programs to accessand indicate which of the plurality of programs share a same password.3. The system of claim 1, wherein the program is further configured toedit the plurality of passwords associated with the plurality ofprograms and a plurality of passwords associated with a plurality ofsub-programs of the plurality of programs.
 4. The system of claim 1,wherein the program, the plurality of programs and a plurality ofsub-programs of the plurality of programs are related according to ahierarchical structure, the program is configured to control theplurality of programs and the plurality of sub-programs, the pluralityof programs are configured to control the plurality of sub-programs, andthe plurality of sub-programs are configured to control the plurality ofprograms or the program.
 5. The system of claim 1, wherein a pluralityof sub-programs of the plurality of programs, the plurality of programsand the program are related according to a hierarchical structure andaccessed based on respective passwords.
 6. The system of claim 1,wherein a plurality of sub-programs of the plurality of programs, theplurality of programs and the program are related according to ahierarchical structure, and a plurality of passwords associated with theplurality of sub-programs are stored by the plurality of programs toenable the plurality of programs to access the plurality ofsub-programs.
 7. The system of claim 1, wherein a plurality ofsub-programs of the plurality of programs, the plurality of programs andthe program are related according to a hierarchical structure, and theplurality of passwords associated with the plurality of programs and aplurality of passwords associated with the plurality of sub-programs arestored by the program to allow the program to access the plurality ofprograms and the plurality of sub-programs.
 8. The system of claim 1,wherein the program is further configured to indicate the plurality ofpasswords for the plurality of programs to a display of the system.
 9. Asystem, comprising: a memory; a processor, communicatively coupled tothe memory, configured to facilitate execution of at least onecomputer-executable component, comprising: a program configured toselectively access a plurality of programs; and a control componentconfigured to communicate with the program, control which of theplurality of programs to access, and indicate a set of programs of theplurality of programs that share a same password.
 10. The system ofclaim 9, wherein the plurality of programs are configured according to ahierarchical structure of the program, at least one program of theplurality of programs is configured to control one or more levels ofsub-programs defined according to the hierarchical structure, the one ormore levels of sub-programs are configured to control a next level ofsub-programs, and a last level of sub-programs controlled by a previouslevel of sub-programs is configured to control only the last level ofsub-programs.
 11. The system of claim 10, wherein the program is furtherconfigured to indicate which of the plurality of programs and which ofthe sub-programs share the same password.
 12. The system of claim 10,wherein the control component is further configured to edit theplurality of passwords associated with the plurality of programs and thesub-programs are configured according to the hierarchical structure ofthe program.
 13. The system of claim 12, wherein the control componentis further configured to edit the plurality of passwords associated withthe plurality of programs and passwords associated with the sub-programsfrom input received at a display screen.
 14. The system of claim 12,wherein the program is a universal access program further configured toaccess the plurality of programs and the sub-programs, and store a setof passwords that are associated with the plurality of programs and thesub-programs.
 15. A method, comprising: accessing, by a system includingat least one processor, programs having passwords that are accessible tothe system; and controlling, by the system, which of the programs toaccess, wherein the accessing includes concurrently editing thepasswords of the programs.
 16. The method of claim 15, wherein thecontrolling includes indicating which programs share a same password.17. The method of claim 15, wherein the controlling includes indicatingthe passwords for the programs.
 18. The method of claim 15, furthercomprising selecting at least two of the programs in connection with theconcurrently editing the passwords of the programs.
 19. The method ofclaim 15, wherein the controlling comprises controlling which of theprograms and which sub-programs of the programs to access.
 20. Themethod of claim 15, wherein the concurrently editing the passwords ofthe programs includes receiving an input from a display to edit thepasswords with a universal access program.
 21. A computer-readablestorage device comprising computer-executable instructions that, inresponse to execution, cause a computing system to perform operations,comprising: receiving a log on command and a password by a control unitexecuting a control program; presenting an interface includingpresenting a plurality of programs that are accessible by the controlunit; receiving a selection of programs from the plurality of programsfor which passwords are to be edited; and at least one of indicating aset of programs from the selection of programs that share a samepassword in the interface or indicating respective passwords of theprograms of the selection of programs in the interface.
 22. Thecomputer-readable storage device of claim 21, the operations furthercomprising: accessing the programs of the selection of programs by thecontrol program; and editing the respective passwords of the programs ofthe selection of programs by the control program.
 23. Thecomputer-readable storage device of claim 22, the operations furthercomprising: concurrently editing two or more of the passwords of theprograms of the selection of programs through the control program. 24.The computer-readable storage device of claim 21, the operations furthercomprising: accessing sub-programs of the programs of the selection ofprograms directly; and updating passwords of the sub-programs withouthaving to utilize an intermediary program.
 25. The computer-readablestorage device of claim 21, the operations further comprising: accessinga tier of programs of the plurality of programs that are configured in ahierarchical structure to the control program; and editing passwords ofthe tier of programs.
 26. A system, comprising: means for accessing aplurality of programs; and means for concurrently editing a plurality ofpasswords associated with the plurality of programs.
 27. The system ofclaim 26, wherein the means for concurrently editing is configured toconcurrently edit passwords of sub-programs of the plurality ofprograms.
 28. The system of claim 26, wherein the means for concurrentlyediting the plurality of passwords includes means for adding passwordsto the plurality of programs.