Security Enabled False Desktop Computing Environment

ABSTRACT

A computing system for securely managing access to resources of a computing device receives an input at a secure login of a user interface. The computing system compares the input to a plurality of stored security measures and activates one of an operating system or a configuration of a false desktop system. A user interface of the false desktop system shares characteristics with a user interface of an operating system and restricts access to specified files, data stores, applications, networking functions, and/or ports associated with the computing system. When configured, the false desktop system or the operating system is enabled based on the location of the computing system. When configured, the false desktop system deletes files, data stores, and applications of the operating system.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/850,186 filed Apr. 16, 2020, entitled “Security Enabled False DesktopComputing Environment”, which is incorporated by reference in itsentirety.

BACKGROUND

Aspects of the disclosure relate to managing access to resources of acomputing device. One or more aspects of the disclosure relate to adesktop management system capable of managing systems that controlaccess to the contents and peripherals of a computing device.

Today, computer use by employees and/or members of organizations (e.g.,business organizations, educational institutions, governmental entities,and the like) functions as a part of fundamental enterprise operations.Such users typically utilize these computing devices to perform theirduties and manage their responsibilities. In some cases, the computingdevices operated by the users may contain private information (personaland/or organizational), leading many users to utilize one or moresecurity measures (passwords, security keys, and the like) to secureaccess to the computing devices. In some cases, a user may be requiredto unlock a computing device to display the functionality and thecontents of the computing device to an external individual, such as to acustoms official at a border crossing. In some cases, to avoid allowingthe external individual access to any private information stored on thecomputing device, the user may intentionally erase the contents of thecomputing device. However, such extreme measures may require the user tomanually input a command to erase the contents of the computing device,without providing an alternative measure to provide restricted access tothe external individual of the public or non-private functionalityand/or the contents of the computing device.

SUMMARY

The following presents a simplified summary in order to provide a basicunderstanding of some aspects of the disclosure. The summary is not anextensive overview of the disclosure. It is neither intended to identifykey or critical elements of the disclosure nor to delineate the scope ofthe disclosure. The following summary merely presents some concepts ofthe disclosure in a simplified form as a prelude to the descriptionbelow.

Aspects of the disclosure provide effective, efficient, scalable, andconvenient technical solutions that address and overcome the technicalproblems associated with providing secure access to resources of acomputing device to an external individual.

A computing device may store private and/or non-public information inone or more storage areas and operate proprietary applications and/orsystems of the computing device. In some cases, such as during travel toa foreign country, a user may be required to grant access an externalindividual (e.g., a government agent or official) access to thecomputing device to allow the external individual to verify thecomputing device's functionality and/or to examine the computingdevice's contents. To comply with such requests and to still maintainthe security of the private information contained in the computingdevice, one or more alternative security methods may be applied. In somecases, a computing device may be equipped with a false desktop systemcapable of providing the appearance and functionality expected of theoperating system of the computing device, while also securely managingaccess to selected functionality, applications, and/or storedinformation of the computing device. The false desktop system may beactivated through user input, such as a login name and security key(e.g., a password) entered through a secure login process.

In some cases, the computing device may include a desktop managementsystem to configure and/or manage one or more configurations of thefalse desktop system. The desktop management system may be capable ofswitching between the user operating system and the false desktopsystem. Switching between system by the desktop management system mayinvolve inputting one or more security measures. For example, at asecure login interface of the computing device, the user may input astandard security key (e.g., a login name and password combination foruse in accessing aspects of an enterprise computing network) to allowstandard access to the computing device (e.g., the user interface of theoperating system) or an alternate security key to activate aconfiguration of the false desktop system. Additionally oralternatively, the false desktop system may be activated based on thelocation of the computing device. For example, a global positioningsystem (GPS) unit associated with the computing device may detect thecomputing device to be outside the user's defined location (e.g., state,province, country, and the like) and may trigger the desktop managementsystem to enable the false desktop system.

The false desktop may retain the same user interface system as the useroperating system of the computing device (e.g., the false desktop systemwill be visually similar to the user operating system). In some cases,one or more alternate security measures may be input at the secure logininterface of the computing device. Each of the one or more alternatesecurity measures may each correspond to different configurations of thefalse desktop system.

In some cases, the false desktop system may be configured to erase thecontent of the computing device after an alternate security measure isentered at the secure login of the computing device. In some cases, thefalse desktop system may be configured to erase the content of thecomputing device based on one or more consecutive inputs of thealternate security measure and/or security measure of the computingdevice. For example, the false desktop system may be configured to erasethe contents of the computing device after 5 consecutive inputs of analternate security key. In some cases, the false desktop system may beconfigured to disable input attempts at the secure login after the inputof one or more unknown security measures (e.g., the security key doesnot correspond to the operating system and/or a configuration of thefalse desktop system). Additionally or alternatively, in some cases, thefalse desktop system may be configured to enable a defined configurationof the false desktop system after the input of one or more unknownsecurity measures. The false desktop system may be configured to disableaccess to at least a portion of internal drives and/or shared networkdrives communicatively coupled to the computing device. In some cases,the false desktop system may be configured to disable the functionalityof ports of the computing device (e.g., a universal serial bus (USB)port, a secure digital (SD) card reader, a high-definition multimediainterface (HDMI) port, and the like). In some cases, the false desktopsystem may be configured to disable networking components of thecomputing device (e.g., a wireless network card, an ethernet port, atelecommunications network card). In some cases, the false desktopsystem may be configured to disable access to storage drives and/orexternal storage devices.

In some cases, the false desktop system may be configured to delete oneor more files, folders, data stores, and/or applications of thecomputing device. Additionally or alternatively, the false desktopsystem may be configured to disable access to one or more files,folders, data stores, and/or applications of the computing device. Forexample, the one or more files, folders, data stores, and/orapplications of the computing device may contain potentially privateinformation (e.g., confidential company information, export controlledmaterial, and the like). One or more applications operational in theuser operating system of the computing device may be accessible in thefalse desktop system. In some cases, the applications accessible via thefalse desktop system may have limited and/or restricted functionality.For example, functionality of a word processing application may bedisabled in the false desktop system to disable a user's ability toaccess and/or modify data of a text file. In some cases, the falsedesktop system may be configured to function as a read-only version ofthe user operating system. For example, the false desktop system mayhave equivalent functionality when compared to the user operating systemof the computing device with an exception being that the false desktopsystem may restrict the ability to use and/or modify certain elements ofthe user operating system (e.g., programs, files, folders, applications,and the like).

These features, along with many others, are discussed in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIG. 1 depicts an illustrative computing environment for managing accessto resources of a computing device in accordance with one or moreaspects described herein;

FIG. 2 depicts an illustrative event sequence for enabling a falsedesktop system according to aspects of this disclosure;

FIG. 3 depicts an illustrative computing interface for configuring afalse desktop system according to aspects of this disclosure;

FIG. 4 shows an illustrative decision scenario table where access todata resources is determined for users in accordance with one or moreaspects described herein;

FIG. 5 shows an illustrative operation complexity graph operatingenvironment in which various aspects of the disclosure may beimplemented in accordance with one or more aspects described herein; and

FIG. 6 shows an illustrative block diagram of workstations and serversthat may be used to implement the processes and functions of certainaspects of the present disclosure in accordance with one or more aspectsdescribed herein.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

The above-described examples and arrangements are merely some examplearrangements in which the systems described herein may be used. Variousother arrangements employing aspects described herein may be usedwithout departing from the invention.

A need has been identified for an improved and robust system capable ofsecurely managing access to resources of a computing device. Aspectsdescribed herein are directed to developing a system for a secure falsedesktop within a computing device that may be used to verify operabilityof the computing device to an external individual.

Today, most if not all, enterprise organizations (e.g., a financialinstitution, a medical provider, a governmental agency, an educationalinstitution, a business organization, and the like) use computingdevices to carry out fundamental organizational operations andactivities. One or more users (e.g., employees) of enterpriseorganization associated computing devices may operate these computingdevices to perform their duties and manage their responsibilities. Insome cases, such users may access, manage, and/or maintain private orotherwise non-public information via these computing devices. To protectprivate information accessed via the associated computing devices,enterprise organizations enable security measures (passwords, securitykeys, biometric information, and the like) for to manage access toand/or use of their associated computing devices.

In some cases, such as during travel, a user associated with a computingdevice may be required to unlock a computing device to display thefunctionality and the contents of the computing device to an externalindividual and at a location not associated with the enterpriseorganization. For example, while on travel in a foreign country, theuser may be asked by a travel officer to unlock a laptop computingdevice to allow the travel officer to verify the laptop computing deviceis operable. To avoid allowing access to private or nonpublicinformation (e.g., export controlled information, company trade secrets,proprietary information, and the like) stored on the computing device,the user may attempt to intentionally erase private information accessedvia the computing device. However, such an attempt to erase informationon the computing device may cause the user to be susceptible to seizureof their computing device and/or left without access to necessaryprivate or non-public information. As such, a need has been recognizedfor an improved system that may allow a user of a computing device toprovide an external individual access to the computing device, withoutexposing potentially private information.

In some cases, a user may secure a computing device (e.g., a cell phone,a laptop computer, a tablet, and the like) by defining and/or enablingone or more security measures (e.g., a password, a security key, a loginname,) to control access to selected features, applications, and/or datastored on the computing device. For example, each of the one or moresecurity measures may be associated with a different secureconfiguration of the computing device. Inputting the one or moresecurity measures at a secure login interface of the computing devicemay grant access, based on the different configured security levels, tothe computing device and the associated user interface. In some cases,the user may define and/or enable one or more alternate securitymeasures. Inputting the one or more alternate security measures at thesecure login of the computing device may grant access to a false desktopsystem via a desktop management system. The false desktop system may bea system capable of reflecting the appearance and functionality of theuser operating system of the computing device, while securely managingaccess to select features of the computing device. For example, after auser enters one or more of the alternate security measures at the securelogin, the desktop management system may enable the false desktopsystem, where the false desktop system resembles the user interface ofthe user operating system of the computing device. At a display coupledto the computing device, the user interface of the false desktop systemmay be at least similar to the user interface of the user operatingsystem.

In some cases, the desktop management system may automatically enablethe false desktop system. The desktop management system may beconfigured to enable the false desktop system based on the location ofthe computing device. The computing device may contain one or moresoftware and/or hardware devices capable of determining the location ofthe computing device. For example, a location sensing device (e.g., aglobal positioning system (GPS) unit, a location sensor operational on atelecommunications network, and the like) associated with the computingdevice may determine whether the computing device is outside aconfigured location (e.g., state, province, country, and the like) andmay trigger the desktop management system to enable the false desktopsystem upon login. In some cases, while the computing device is outsidea configured location, the desktop management system may enable thefalse desktop system after input of security measures associated withthe user operating system. To enable the user operating system while thecomputing device is outside a configured location, the desktopmanagement system may require one or more additional inputs of securitymeasures associated with the user operating system.

In some cases, the false desktop system may have one or moreconfigurations. The one or more configurations of the false desktopsystem may be modular, where functionality of the false desktop systemmay be disabled, enabled, modified, and/or altered. The one or moreconfigurations may be configured by the user of the computing deviceand/or the enterprise organization associated with the computing device.The one or more configurations may be configured at a configurationmodule of the desktop management system. The one or more configurationsof the false desktop system may be enabled through input of one or morealternate security measures. The one or more alternate security measuresmay be input at the secure login of the desktop management system. Forexample, a user may enter an alternate password at the secure login ofthe desktop management system, which may cause the desktop managementsystem to boot the computing device to a configuration of the falsedesktop system.

In some cases, the one or more alternate security measures associatedwith the one or more configuration of the false desktop system may beenabled for a certain period of time and/or may expire after a definedperiod of time. For example, the alternate security measures may beenabled for a period of 3 days while a user is traveling with acomputing device. After the 3-day time period expires, inputting the oneor more alternate security measures at the secure login of the computingdevice may have no response. In some cases, the false desktop system maybe enabled as the default mode of the computing device. For example, thecomputing device may boot to the false desktop system by default andrequire the input of a password of the user operating system to exit thefalse desktop system and enable the user operating system.

In some cases, the false desktop system may be configured to disableaccess to one or more ports of the computing device. For example, thefalse desktop system may be configured to disable the USB ports of thecomputing device. In some cases, the false desktop system may disableaccess to one or more storage devices of the computing device. Useraccess to one or more partitions of the one or more storage drives maybe disabled, while access to one or more alternate partitions of the oneor more storage drives may be allowed. Access to one or more removablemedia drives may be disabled in the false desktop system. For example,access to an external hard drive and a CD (compact disk) drive coupledto the computing device may be disabled. In some cases, networkingcomponents of the computing device may be disabled within the falsedesktop system. For example, ethernet ports and networking cards of thecomputing device may be disabled, which may prevent the computing devicefrom connecting to an outside network via ethernet and/or Wi-Ficonnections. Within the false desktop system, access to one or moreapplications may be disabled and/or restricted. For example, access to aproprietary business application may be disabled, while access to aspreadsheet application may be restricted to read-only access.

Additionally or alternatively, the false desktop system may beconfigured to generate false data for access in the false desktopsystem. The false data may be generated based on the informationassociated with the user (e.g., name, email address, employmentposition, and the like). For example, to allow an external individual toverify operability of the computing device (e.g. a customs agent at aborder crossing), one or more false email messages addressed to and/orsent from the user that contain language associated with the user may begenerated and made accessible in an email client platform of the falsedesktop system. The user may configure the information associated withthe user at the configuration module. In some cases, the desktopmanagement system may be configured to delete one or more elementsstored within the computing device after input of one or more alternatesecurity measures. For example, after input of an alternate securitymeasure at the secure login of the computing device, the desktopmanagement system may grant access to the corresponding configuration ofthe false desktop system, while the desktop management system deletesconfidential business information from a data store of the computingdevice. Additionally or alternatively, for example, after input of adifferent alternate security measure at the secure login of thecomputing device, the desktop management system may grant access to aconfiguration of the false desktop system, while the desktop managementsystem deletes a specific folder containing private informationassociated with the user.

In some cases, the elements deleted from storage locations within thecomputing device after input of an alternate security measure may bepreconfigured in the desktop management system. For example, a user mayconfigure the desktop management system to delete a specific partitionof a hard drive of the computing device after the alternate securitymeasure associated with each operation is entered. In some cases, theone or more alternate security measures may be input consecutively toperform the operations associated with each alternate security measure.For example, a user who wishes to delete a specific folder and deleteaccess to specific shared drive of the computing device mayconsecutively input the alternate security measures that correspond witheach operation.

FIG. 1 depicts an illustrative computing environment 100 for managingaccess to resources of a computing device in accordance with one or moreaspects described herein. The illustrative computing environment 100 mayinclude a user computing device 102. The user computing device 102 maybe one of a mobile device, a tablet, a laptop computer, a desktopcomputer and/or the like. The user computing device 102 may becommunicatively coupled to one or more external networks 160 (e.g., atelecommunications network, the Internet, a Wi-Fi network, and thelike). In some cases, the external network 160 may be a wired orwireless network, such as the networks described below with respect toFIGS. 4 and 5 . The user computing device 102 may comprise one or moreprocessors 103, which may execute computer-readable instructions toperform any of the functions described herein. Computer-readableinstructions may be stored in one or more of a storage device 104, aread-only memory (ROM) 118, a random access memory (RAM) 120, aremovable media 108 (e.g., a USB drive, a CD, a digital versatile disk(DVD)), and/or another type of computer-readable medium or memory.

In some cases, the user computing device 102 may comprise one or moreoutput devices, such as a display device 110 (e.g., an external orinternal display device). The user computing device 102 may include oneor more input devices 112. The one or more input devices 112 may includea remote control, a keyboard, a mouse, a track pad, a touch screen(which may be integrated with the display device 110), a microphone, andthe like. The user computing device 102 may also comprise one or morenetwork interfaces, such as a network input/output (I/O) interface 116(e.g., a network card) to communicate with the external network 160. Thenetwork I/O interface 116 may be a wired interface (e.g., electrical,radio frequency (RF), optical), a wireless interface (e.g., Wi-Fi),and/or a combination of a wired and a wireless interface. The networkI/O interface 116 may comprise a modem configured to communicate withthe external network 160. The user computing device 102 may optionallyinclude one or more devices capable of sensing the location of the usercomputing device 102, such as a location sensing device 114 (e.g., a GPSmicroprocessor). The location sensing device 114 may be configured toreceive and process global positioning signals and determine, withpossible assistance from the external network 160, a geographic positionof the user computing device 102. The location of the user computingdevice 102 may be obtained through triangulation via the externalnetwork 160 and/or via a separate location sensing device incommunication with and/or associated with the user computing device 102(e.g., location information received from a phone or other mobiledevice).

In some cases, the one or more storage devices 104 may be internally orexternally coupled to the user computing device 102. The one or morestorage devices 104 may include one or more of a hard disk drive, asolid-state drive (SSD), and/or any other type of computer-readablemedium or memory. The one or more storage devices 104 may have one ormore partitions (e.g., one or more storage locations within a storagedevice 104). In some cases, the one or more storage devices 104 maycontain a user operating system 130. One or more user operating systems130 may exist in the one or more storage devices 104. For example, auser computing device 102 may contain a storage device 104 (e.g., anSSD) that contains two user operating systems (e.g., 130). The useroperating system 130 may include a user interface 138. The userinterface 138 may be displayed at display device 110. The user interface138 may take input from the one or more input devices 112. For example,a user interface 138 of the user operating system 130 may receive inputsfrom a mouse and a keyboard communicatively coupled to the usercomputing device 102.

In some cases, the user operating system 130 may contain one or moresystem drivers 132. The one or more system drivers 132 may include oneor more files and/or groups of files that enable one or more elements ofthe user computing device 102 to interface and/or communicate with theuser operating system 130. For example, there may exist a system driver132 that enables an input device 112 (e.g., a keyboard, a mouse, atrackpad, a touchscreen, and the like) to interface with the usercomputing device 102 and the user operating system 130. Additionally oralternatively, for example, there may exist a system driver 132 thatenables a removeable media 108 (e.g., a USB drive) to interface with theuser computing device 102 and the user operating system 130 via a portof the user computing device 102.

In some cases, the user operating system 130 may contain one or moreapplications 134. The one or more applications 134 may include emailclient platforms, internet browsers, business productivity applications(e.g., a word processing application, a spreadsheet application, apresentation application, a file management system application and thelike), proprietary enterprise applications, and the like. The one ormore applications 134 may be capable of having modified and/orrestricted functionality. For example, an email client platform may haverestricted functionality, which may restrict an individual fromaccessing the email client platform at the user operating system 130 ofthe user computing device 102. The one or more applications 134 may notbe modifiable by an individual operating the user computing device 102.For example, a proprietary business application may not be able to bedeleted, moved, and/or copied from its location on the one or morestorage devices 104. The location of the one or more applications 134within the one or more storage devices 104 may be concealed and/orhidden. For example, a spreadsheet application stored within the one ormore storage devices 104 of the user computing device 102 may be hiddenfrom view via a file system browsing at the storage location of thespreadsheet application. Hiding the presence of the spreadsheetapplication may prevent the spreadsheet application from beingaccessible and/or searchable within a file directory system of the useroperating system 130.

In some cases, the user operating system 130 may include one or moredata stores 136. The one or more data stores 136 may be containedlocally within the one or more storage devices 104 of the user computingdevice 102. Additionally or alternatively, the one or more data stores136 may be located at a networked destination (e.g., shared networkdrives) accessible via the external network 160. The one or more datastores 136 may contain one or more files, folders, databases,applications 134, programs, and the like. The one or more data stores136 may not be modifiable by an individual operating the user computingdevice 102. For example, a specific folder may not be able to bedeleted, moved, and/or copied from its location on the one or morestorage devices 104. The storage location of the one or more data stores136 and/or contents of the one or more data stores 136 may be concealedand/or hidden. If the one or more data stores 136 are concealed and/orhidden, the one or more data stores 136 and their contents may not beaccessible and/or searchable within the user operating system 130. Forexample, a text file stored within the one or more storage devices 104of the user computing device 102 may be hidden. Hiding the presence ofthe text file may prevent the text file from being accessible and/orsearchable within a file directory system of the user operating system130. Access to the one or more data stores 136 and/or contents of theone or more data stores 136 may be disabled. For example, access to ashared network drive accessible via external network 160 may bedisabled.

In some cases, the one or more storage devices 104 may contain a falsedesktop system 140. The false desktop system 140 may be stored on aseparate partition and/or storage device 104 than the user operatingsystem 130. Additionally or alternatively, the false desktop system 140may be stored on the same partition and/or storage device 104 as theuser operating system 130. In some cases, the false desktop system 140may be capable of operating using one or more configurations toenable/disable selected applications (e.g., 134, 144), system drivers(e.g., 132, 142), and/or devices, enable/disable access to informationstored one or more storage devices (e.g., 104), and/or to selectivelydelete, hide or obfuscate information and/or applications (e.g., 134,144). The false desktop system 140 may be a copy and/or image of theuser operating system 130. Additionally or alternatively, the falsedesktop system 140 may be combined with the user operating system 130.In some cases, the false desktop system 140 may include a user interface148. The user interface 148 may be displayed at the display device 110.The user interface 148 may take input from the one or more input devices112. For example, a user interface 148 of the false desktop system 140may take inputs from a mouse and a keyboard communicatively coupled tothe user computing device 102. The user interface 148 of the falsedesktop system 140 may be at least visually similar to the userinterface 138 of the user operating system 130. For example, the userinterface 148 of the false desktop system 140 may visually resemble theuser interface 138 of the user operating system 130, which may preventan individual operating the user computing device 102 from determiningwhether they are accessing the user operating system 130 or the falsedesktop system 140. The false desktop system 140 may be read-only. Forexample, the false desktop system 140 and user interface 148 may beaccessible to an individual operating the user computing device 102 andthe individual may not be capable of modifying any element of the falsedesktop system 140.

In some cases, the false desktop system 140 may contain one or moresystem drivers 142. The one or more system drivers 142 may include oneor more files and/or groups of files that enable one or more elements ofthe user computing device 102 to interface and/or communicate withcomponents of the false desktop system 140. The one or more systemdrivers 142 may be equivalent to the one or more system drivers 132 ofthe user operating system 130. For example, there may exist a systemdriver 142 that enables an input device 112 (e.g., a keyboard, a mouse,a trackpad, a touchscreen, and the like) to interface with the usercomputing device 102 and the false desktop system 140. Additionally oralternatively, for example, there may exist a system driver 142 thatenables a removeable media 108 (e.g., a USB drive) to interface with theuser computing device 102 and the false desktop system 140. Additionallyor alternatively, the false desktop system 140 may contain one or moresystem drivers 142 that are different from the one or more systemdrivers 132 of the user operating system 130. In some cases, the one ormore system drivers 142 may allow for restrictions to peripherals of thefalse desktop system 140 that are not reflected in the user operatingsystem 130.

In some cases, the one or more storage devices 104 may contain one ormore applications 144. The one or more applications 144 may includeemail client platforms, internet browsers, business productivityapplications, proprietary enterprise applications, and the like. The oneor more applications 144 may be equivalent to the one or moreapplications 134 of the user operating system 130. The one or moreapplications 144 may have equivalent features, functions, and/oroperations as described for the one or more applications 134. In somecases, the one or more applications 144 may have their features,functions, and/or operations modified and/or restricted in comparison tothe one or more applications 134. For example, a presentationapplication may be fully operational in the user operating system 130,while the same presentation application may have read-only functionalityin the false desktop system 140. In some cases, the one or moreapplications 144 may be stored at the same storage locations and/orpartitions as the one or more applications 134. For example, anindividual accessing the false desktop system 140 may operate and accessan email client platform in the false desktop system 140, where theemail client platform is the same email client platform as that accessedin the user operating system 130, with the same storage location in theone or more storage devices 104. Additionally or alternatively, the oneor more applications 144 may be stored at separate storage locationsand/or partitions as the one or more applications 134 and may includeapplications different from the one or more applications 134.

In some cases, the false desktop system 140 may contain one or more datastores 146. The one or more data stores 146 may be equivalent to the oneor more data stores 136. For example, a data store 146 accessed in thefalse desktop system 140 may be the same data store with the samestorage location as a data store 136 in the user operating system 130.Additionally or alternatively, the one or more data stores 146 may beseparate and/or stored at different storage locations compared to theone or more data stores 136. In some cases, the one or more data stores146 may have features and functions equivalent to those described forthe one or more data stores 136. The one or more data stores 146 may becontained locally within the one or more storage devices 104 of the usercomputing device 102. Additionally or alternatively, the one or moredata stores 146 may be located at a networked destination (e.g., sharednetwork drives) accessible via the false desktop system 140. The one ormore data stores 146 may contain one or more files, folders, databases,applications 134, and the like that are equivalent to those stored inthe one or more data stores 136. In some cases, the one or more datastores 146 may have features and functions that are modified and/orrestricted in comparison to the one or more data stores 136. Forexample, a folder in the user operating system 130 may be fullyaccessible and modifiable by an individual operating the user computingdevice 102, whereas a similar folder in the false desktop system 140that has similar contents (e.g., the folder contains the same files,programs, applications, and the like) to the folder in the useroperating system 130 may not be accessible, may contain less data,and/or may contain false data.

In some cases, the one or more storage devices 104 may include a desktopmanagement system 150. In some cases, only one of the user operatingsystem 130 and the false desktop system 140 may be active and accessibleat the user computing device 102. The desktop management system 150 maymanage switching between the user operating system 130 and the falsedesktop system 140. Switching between the user operating system 130 andthe false desktop system 140 may utilize a secure login 152 of thedesktop management system 150. The secure login 152 may be displayed atdisplay device 110 of the user computing device 102. An individual mayinput one or more security measures (e.g., a password, a security key, alogin name) at a secure login 152 of the desktop management system 150.The one or more security measures may be input using the one or moreinput devices 112 (e.g., a keyboard, a mouse) of the user computingdevice 102. The one or more security measures may correspond to enablingand/or disabling the user operating system 130 and/or the false desktopsystem 140. In some cases, the one or more security measures may be alogin name, a password, and/or combination of a login name and apassword. A specific login name may be associated with one or morepasswords and/or one or more configurations of the false desktop system140, with each password corresponding to a configuration of the falsedesktop system 140. For example, an individual may enter a password atthe secure login 152 that grants access to the user operating system130. At the user operating system 130, the individual may access thesecure login 152 and input an alternate login and password pair thatdisables the user operating system 130 and enables the false desktopsystem 140 at the user computing device 102. Additionally oralternatively, for example, the individual may enter an alternatepassword at the secure login 152 to enable and access the false desktopsystem 140. The secure login 152 may act as a gateway to the useroperating system 130 and/or the false desktop system 140.

In some cases, the input of the one or more security measures at thesecure login 152 may cause the desktop management system 150 to enableone or more features and/or configurations of the false desktop system140. For example, entering a first password at the secure login 152 mayenable a false desktop system 140 with restricted access to the one ormore applications 144 (e.g., a first configuration). Additionally oralternatively, for example, entering a second password at the securelogin 152 may enable a false desktop system 140 with restricted accessto the one or more applications 144 and disabled removable media 108(e.g., a second configuration). In some cases, after input of one ormore incorrect security measures at the secure login 152 (e.g., theentered password does not correspond to enabling the user operatingsystem 130 and/or the false desktop system 140), the desktop managementsystem 150 may enable a defined configuration of the false desktopsystem 140. For example, after an individual enters a password at thesecure login 152 that does not correspond to the user operating system130 and/or the false desktop system 140, the desktop management system150 may grant access to a configuration to the false desktop system 140to prevent further password attempts by the individual. Additionally oralternatively, in some cases, after input of one or more incorrectsecurity measures at the secure login 152, the desktop management system150 may disable access to and/or security measure input attempts at thesecure login 152 indefinitely and/or for a time period.

In some cases, the user operating system 130 may be the default mode ofthe user computing device 102. The default mode of the user computingdevice 102 may be the system (e.g., user operating system 130, falsedesktop system 140) that is booted and/or loaded from the one or morestorage devices 104 by the desktop management system 150 when the usercomputing device 102 is accessed (e.g., powered on, woken from sleep,unlocked, and the like). The user operating system 130 and/or the falsedesktop system 140 may be active (e.g., loaded from the one or morestorage devices 104) and ready to be enabled by the desktop managementsystem 150, without the need to be booted and/or loaded from the one ormore storage devices 104. In some cases, a user may configure thedesktop management system 150 to enable the false desktop system 140 asthe default mode of the user computing device 102. The default mode ofthe user computing device may be configured using the secure login 152and/or a configuration module 154 of the desktop management system 150.

In some cases, the desktop management system 150 may include aconfiguration module 154 to configure the one or more configurations ofthe false desktop system 140. The configuration module 154 may bedisplayed at the display device 110 and/or take one or more inputs fromthe one or more input devices 112 (e.g., a mouse, a keyboard). Theconfiguration module 154 may allow a user to enable and/or disable thefeatures, functions, and/or peripherals of the user operating system 130and/or the false desktop system 140 described herein. For example, auser accessing the configuration module 154 of the desktop managementsystem 150 may be able to configure a false desktop system 140 therestricts, hides, and/or deletes selected files, folders, applications144, and/or data stores 146. At the configuration module 154, the usermay configure one or more security measures for association with the oneor more configurations of the false desktop system 140. For example, auser may define a first password for a first configuration of the falsedesktop system 140 and define a second password for a secondconfiguration of the false desktop system 140. In some cases, a user mayconfigure the desktop management system 150 to enable one or moreconfigurations of the false desktop system 140 based on successive inputof the one or more security measures within a certain time period. Forexample, if a user enters a first login name and password at the securelogin 152 of the desktop management system 150 twice within a 30 secondperiod, a specific configuration of the false desktop system 140 may beenabled, where the configuration may different from a configurationenabled by entering first password once. In some cases, the one or moresecurity measures corresponding to one or more configurations of thefalse desktop system 140 may be time-sensitive and may expire after acertain period of time. For example, a password may be configured toenable a configuration of the false desktop system 140 for 7 days. Ifthe password is entered at the secure login 152 within the 7-dayinterval, the corresponding configuration of the false desktop system140 may be enabled. If the password is entered at the secure login 152after the 7-day interval expires, the secure login 152 may register anincorrect password attempt, as the password will have expired and wouldnot correspond to an active configuration of the false desktop system140.

In some cases, at the configuration module 154, the user may configurethe desktop management system 150 to disable one or more portsassociated with the one or more removable media 108, input devices 112,and/or network I/O interface 116 of the user computing device 102. Theone or more ports may be disabled by configuring the associated systemdrivers (e.g., 132, 142). For example, the user may configure thedesktop management system 150 to disable the network I/O interface 116in a configuration of the false desktop system 140. Additionally, oralternatively, for example, the user may configure the desktopmanagement system 150 to disable the ports for one or more removablemedia 108, disabling the use of external storage devices that arecommunicatively coupled to the user computing device 102 by a USBconnection. At the configuration module 154, the user may configure thedesktop management system 150 to delete the contents of the one or morestorage devices 104 based on the input of one or more security measuresat the secure login 152. For example, entering a password at the securelogin 152 may trigger the desktop management system 150 to delete thecontents of the one or more data stores 136 and 146. In some cases, atthe configuration module 154, the user may enable and/or disablelocation-based functionality associated with the user operating system130 and/or false desktop system 140. For example, the desktop managementsystem 150 may disable the location sensing device 114 and/or any otherlocation tracking element of the user computing device 102. The locationsensing device 114 and/or other location tracking element of the usercomputing device 102 may be disabled by configuring the associatedsystem drivers (e.g., 132, 142).

In some cases, the desktop management system 150 may enable the useroperating system 130 or the false desktop system 140 as the default modebased on the location of the user computing device 102. The desktopmanagement system 150 may monitor the location of the user computingdevice 102 based on location information from the location sensingdevice 114 and/or via the external network 160. In some cases, thedesktop management system 150 may be configured to enable and/or disablethe false desktop system 140 based on the location of the user computingdevice 102. For example, if the user associated with the user computingdevice 102 is based in a country (e.g., the United States), the desktopmanagement system 150 may be configured to enable the false desktopsystem 140 if the user computing device 102 exits the United States. Assuch, the false desktop system 140 may be disabled by the desktopmanagement system 150 if the user computing device 102 reenters theUnited States. Additionally or alternatively, for example, the desktopmanagement system 150 may be configured to enable and/or disable thefalse desktop system 140 when the user computing device 102 entersand/or exit a configured location (e.g., a city, a state, a province, acountry and/or a portion of same) and/or area around a configuredlocation. For example, a country may be defined to be hostile in theconfiguration module 154. As such, the desktop management system 150 maybe configured to enable the false desktop system 140 as the default modeof the user computing device 102 when the user computing device 102enters a defined radius around certain geographical coordinates of thecountry defined to be hostile. Additionally or alternatively, forexample, a configuration of the false desktop system 140 may be enabledwhen the user computing device 102 exits the perimeter of a definedlocation (e.g., an office building associated with the enterpriseorganization associated with the user) and disabled when the usercomputing device 102 enters the perimeter of the defined location.

The desktop management system 150 may enable and/or disable one or morefeatures of the user operating system 130 and the false desktop system140. The one or more features may be enabled and/or disabled based onthe input of one or more security measures. For example, the desktopmanagement system 150 may modify a system driver 142 to disable thenetwork I/O interface 116 in the false desktop system 140. This mayprevent an individual operating the user computing device 102 in thefalse desktop system 140 from connecting the user computing device 102to one or more external networks 160 via a wired and/or a wirelessconnection. Additionally or alternatively, for example, the desktopmanagement system 150 may disable an application 144 of the falsedesktop system 140. In some cases, the input of the one or more securitymeasures at the secure login 152 may cause the desktop management system150 to delete one or more elements of the user operating system 130and/or the false desktop system 140. For example, entering a password atthe secure login 152 may trigger the desktop management system 150 toenable the false desktop system 140 and delete a data store 136containing private information from the user operating system 130. If adata store 146 containing content corresponding to the data store 136exists in the false desktop system 140, the desktop management system150 may delete the data store 146, ensuring that the private informationof the corresponding deleted data store 136 is not available for accessin the data store 146.

In some cases, the desktop management system 150 may generate falsedata. The false data may be generated based on one or more templatefalse data files (e.g., email messages, documents, spreadsheets, and thelike) stored in the desktop management system 150. The template falsedata files may be files with predetermined locations in the data filesto insert user information, where the files may appear as actual data inone or more applications 144. The false data may be accessible in thefalse desktop system 140. The false data may include one or more filesand/or folders. The false data may be generated to include informationassociated with the user (e.g., a name, an email address, an employmenttitle) of the user computing device 102. In some cases, the false datamay be stored in a location of the one or more storage devices 104 thatis associated with the one or more applications 144. Access to the falsedata may be enabled within the false desktop system 140, while access toother types of data is disabled. For example, the desktop managementsystem 150 may generate a false email message based on the user's nameand email address, using a template false email message of the desktopmanagement system 150. The false email message may be accessible in anemail client platform (e.g., application 144) of the false desktopsystem 140, where access to email messages is otherwise disabled. Thefalse email message may allow an external individual to verifyfunctionality of an email client platform (e.g., application 144) of thefalse desktop system 140, without exposing private email informationcontained in the email client platform. Additionally or alternatively,for example, the desktop management system 150 may generate a falsespreadsheet file with information associated with the user, where thefalse spreadsheet file is generated based on a predetermined falsespreadsheet file (e.g., the file contains predetermined data) from thedesktop management system 150. The false spreadsheet file may beaccessible in a spreadsheet application (e.g., application 144) of thefalse desktop system 140.

The functionality of the user operating system 130, the false desktopsystem 140, the desktop management system 150, and user computing device102 described herein may be altered and/or combined in any way withoutdeparting from the present disclosure.

FIG. 2 depicts an illustrative event sequence 200 for enabling a falsedesktop system 140 according to aspects of this disclosure. The eventsshown in the illustrative event sequence 200 are illustrative andadditional events may be added, or events may be omitted, withoutdeparting from the scope of the disclosure. At 202, an individual mayboot and/or wake the user computing device 102. This may includepowering on the user computing device 102, waking the user computingdevice 102 from a “sleep” mode, and/or otherwise starting up the usercomputing device 102. After the user computing device 102 is active at202, the desktop management system 150 may display the secure login 152at the display device 110 of the user computing device 102 at 204. At206, the secure login 152 may receive one or more inputs. The one ormore inputs may originate from one or more input devices 112 of usercomputing device 102. For example, an individual may enter one or morekeystrokes at a keyboard (e.g., an input device 112) communicativelycoupled to the user computing device 102. At 208, the received input maybe compared to stored inputs contained in the desktop management system150. The comparison may be made by the desktop management system 150.The stored input may be one or more security measures (e.g., loginnames, passwords) that correspond to one or more configurations of thefalse desktop system 140 and/or the user operating system 130.

At 210, the desktop management system 150 may determine if the receivedinput corresponds to one or more of the stored inputs of the desktopmanagement system 150. If the received input does match one or morestored inputs at 210, the desktop management system 150 may determine ifthe matching stored input corresponds to a configuration of the falsedesktop system 140 at 215. If the matching stored input does notcorrespond to a configuration of the false desktop system 140 at 215,the desktop management system 150 may enable and/or activate the useroperating system 130 at 216. The user interface 138 of the useroperating system 130 may be displayed at the display device 110 of theuser computing device 102 after enablement/activation. If the matchingstored input corresponds to a configuration of the false desktop system140 at 215, the desktop management system 150 may enable and/or activatethe corresponding configuration of the false desktop system 140 at 218.The user interface 148 of the corresponding configuration of the falsedesktop system 140 may be displayed at the display device 110 of theuser computing device 102 after enablement/activation.

If the received input does not match one or more stored inputs at 210,the desktop management system 150 may determine if a configured inputattempts limit is reached at the secure login 152 at 225. If theconfigured input attempts limit is not reached at the secure login 152at 225, the desktop management system 150 may display the secure login152 at the display device 110 of the user computing device 102 at 204.If the configured input attempts limit is reached at the secure login152 at 225, the desktop management system 150 may determine whether toenable a defined configuration of the false desktop system 140 at 235.The desktop management system 150 may be configured to enable aconfiguration of the false desktop system 140 or disable/lock the securelogin 152. If the desktop management system 150 is configured to enablea configuration of the false desktop system 140 at 235, the desktopmanagement system 150 may enable the defined configuration of the falsedesktop system 140 at 236. The desktop management system 150 may beconfigured to enable the false desktop system 140 after the attemptslimit is reached at the secure login 152 to prevent further inputattempts by an individual operating the user computing device 102. Ifthe desktop management system 150 is not configured to enable aconfiguration of the false desktop system 140 at 235, the desktopmanagement system 150 may lock and/or disable the secure login 152 at238. Locking and/or disabling the secure login 152 may prevent one ormore inputs attempts at the secure login 152. The secure login 152 mayremain locked and/or disabled at 238 for a defined period of time and/orindefinitely until a system administrator intervenes to unlock and/orenable the secure login 152.

FIG. 3 depicts an illustrative example computing interface 300 forconfiguring a false desktop system 140 according to aspects of thisdisclosure. The illustrative example computing interface 300 may includea display device 110 coupled to the user computing device 102. Displayedat the display device 110 may be the configuration module 154 forconfiguring one or more configurations of the false desktop system 140.The configuration module 154 may include one or more selectable and/ormodifiable elements. The configuration module 154 may receive input fromone or more input devices 112. Element 310 may display and/or allow theuser to configure the name of the configuration of the false desktopsystem 140 that is currently being configured within the configurationmodule 154. Element 320 may display and/or allow the user to configurethe login name associated with the configuration of the false desktopsystem. Element 330 may display and/or allow the user to configure thesecurity key associated with the configuration and login name of thefalse desktop system 140 that is currently being configured within theconfiguration module 154. The security key may be modified within theconfiguration module 154 by a user operating the user computing device102.

Element 332 may allow a user to configure the settings and/orpreferences associated with the security key for a configuration of thefalse desktop system 140. A user may configure an attempt limit at thesecure login 152 and configure the result of reaching the attempt limitat 332. In some cases, the user may configure the desktop managementsystem 150 to enable a configuration of the false desktop system 140and/or to disable further login attempts at the secure login 152. Forexample, a user may configure the secure login 152 to allow 5unsuccessful login attempts. After 3 unsuccessful login attempts (e.g.the entered login name and/or security key fails to correspond to theuser operating system 130 and/or a configuration of the false desktopsystem 140), the user may have configured the desktop management system150 to disable further attempts at the secure login 152. In some cases,at element 332, a user may configure the desktop management system 150to require one or more successive inputs of the security key to enable aconfiguration of the false desktop system 140. For example, a user mayconfigure the desktop management system 150 to require 3 successiveinputs of the security key “password_2” with the login name “login_2” toenable “configuration_1” of the false desktop system 140, where the 3successive inputs are received at the secure login 152 within aconfigured period of time. In some cases, at 332, a user may configurean expiration date for the login name, security key, and/orconfiguration of the false desktop system 140. For example, a user mayconfigure the security key for “configuration_1” to be “login_2” with“password_2”. The user may configure “password_2” to expire 3 days fromthe date of configuration. After the 3 days, the security key“password_2” will fail to enable “configuration_1” using “login_2” ofthe false desktop system 140, unless the user reconfigures theexpiration date at 332 within the configuration module 154.

Element 334 may allow the user to define location-based functionalityfor the configuration of the false desktop system 140. For example, theuser may configure the configuration “configuration_1” to be the defaultmode of the user computing device 102 while the user computing device102 is in a certain location. Additionally or alternatively, the usermay configure “configuration_1” to only be accessible via the securelogin 152 while located outside of defined location. Element 336 mayallow a user to configure personal information associated with the user.The personal information input by the user at the configuration module154 may be used in the generation of false data. For example, a user mayprovide their name and email address at element 336. The name and emailaddress may be used by the desktop management system 150 to generate afalse email message for access in “configuration_1” of the false desktopsystem 140. Element 338 may allow a user to configure the desktopmanagement system 150 to restrict access to one or more selected files,folders, data stores, and/or storage devices of the user computingdevice 102 in a configuration of the false desktop system 140. A usermay be able to restrict access and/or hide the storage location of theone or more selected files, folders, data stores, and/or storagedevices. For example, a user may select a document file as havingrestricted access in “configuration_1” of the false desktop system 140,which may prevent an individual from accessing and/or opening thedocument file. Additionally or alternatively, for example, a user mayselect a data store to be hidden at element 338, which may prevent anindividual from accessing, locating, and/or searching for the data storewithin a file directory system in “configuration_1” of the false desktopsystem 140. Element 340 may allow a user to configure the desktopmanagement system 150 to delete one or more selected files, folders,data stores, and/or storage devices of the user computing device 102 ina configuration of the false desktop system 140. For example, a user mayselect a specific partition of storage device 104 for deletion in“configuration_1” of the false desktop system 140.

Element 342 may allow a user to configure the desktop management system150 to enable and/or disable one or more system drivers (e.g., 132, 142)for peripherals, components, and ports of the user computing device 102in a configuration of the false desktop system 140. For example, a usermay configure the desktop management system 150 to disable system driver(e.g., 142) for the USB ports of the user computing device 102 in“configuration_1”. Additionally or alternatively, for example, the usermay configure desktop management system 150 to disable the system driver(e.g., 142) for the location sensing device 114 in “configuration_1”.Element 344 may allow a user to configure the network settings andpreferences in a configuration of the false desktop system 140. Thenetwork settings and preferences may be configured by modifying one ormore system drivers (e.g., 132, 142) associated with the network I/Ointerface 116. For example, element 344 may allow a user to disable thenetwork I/O interface 116 in “configuration_1”, preventing an externalnetwork 160 from connecting to the user computing device 102 via awireless (e.g., Wi-Fi) and/or wired (e.g., ethernet) connection.

Element 346 may allow a user to configure the desktop management system150 to restrict access and/or delete one or more applications of theuser computing device 102 in a configuration of the false desktop system140. A user may be able to restrict access to and/or delete one or moreselected applications (e.g., 134, 144). For example, a user may select aproprietary business application (e.g., 144) to have restricted accessin “configuration_1” of the false desktop system 140, which may preventan individual from accessing and/or opening the proprietary businessapplication (e.g., 144). Additionally or alternatively, for example, auser may select proprietary business application (e.g., 144) fordeletion in “configuration_1”. Element 348 may allow a user to selectone or more applications (e.g., 134, 144) for the desktop managementsystem 150 to generate false data for access in the one or moreapplications (e.g., 134, 144). For example, a user may select an emailclient platform (e.g., application 144), where the desktop managementsystem 150 will generate false email messages for access in the emailclient platform using personal information of the user input at element336. Element 350 may allow a user to configure the desktop managementsystem 150 to enable a configuration of the false desktop system 140 asa read-only computing environment. For example, a user may select aread-only environment for “configuration_1” of the false desktop system140, where the computing environment is read-only and does not allow formodification or alteration to any element of “configuration_1”.

FIG. 4 shows an illustrative decision scenario table 400 where access todata resources is determined for users in accordance with one or moreaspects described herein. In table 400, the “Login Name” may correspondto the specific login name input at the secure login 152. The “SecurityKey” may correspond to the specific security key input at the securelogin 152. The “Access Result” may describe the result of the inputentered at the secure login 152 (e.g., whether entering the inputenabled the user operating system 130 and/or enabled a configuration ofthe false desktop system 140). The inputs of “login_1” with “password_1”at the secure login 152 may correspond to an “Access Result” of enablingand/or allowing access to the user operating system 130 and theassociated user interface 138 at user computing device 102. The inputsof “login_2” with “password_2” at the secure login 152 may correspond toan “Access Result” of enabling and/or allowing access to“configuration_1” of the false desktop system 140 and the associateduser interface 148 at user computing device 102. The inputs of “login_1”with “password_2” at the secure login 152 may correspond to an “AccessResult” of enabling and/or allowing access to “configuration 2” of thefalse desktop system 140 and the associated user interface 148 at usercomputing device 102. As such, “login_1” may correspond to both the useroperating system 130 and the “configuration 2” of the false desktopsystem 140, while “password_2” corresponds to both “configuration_1” and“configuration_2” of the false desktop system 140 at user computingdevice 102. The inputs of “login_3” with “password_3” at the securelogin 152 may correspond to an “Access Result” of invalid access, wherethe combination of the inputs does not correspond to enabling and/orallowing access to the user operating system 130 and a configuration ofthe false desktop system 140 that has been configured at theconfiguration module 154. The inputs of “login_4” with “password_4” atthe secure login 152 may correspond to an “Access Result” of enablingand/or allowing access to “configuration_3” of the false desktop system140 and the associated user interface 148 at user computing device 102.

FIG. 5 shows an illustrative operating environment in which variousaspects of the present disclosure may be implemented in accordance withone or more example embodiments. Referring to FIG. 5 , a computingsystem environment 500 may be used according to one or more illustrativeembodiments. The computing system environment 500 is only one example ofa suitable computing environment and is not intended to suggest anylimitation as to the scope of use or functionality contained in thedisclosure. The computing system environment 500 should not beinterpreted as having any dependency or requirement relating to any oneor combination of components shown in the illustrative computing systemenvironment 500.

The computing system environment 500 may include an illustrative falsedesktop computing device 501 having a processor 503 for controllingoverall operation of the false desktop computing device 501 and itsassociated components, including a Random Access Memory (RAM) 505, aRead-Only Memory (ROM) 507, a communications module 509, and a memory515. The false desktop computing device 501 may include a variety ofcomputer-readable media. Computer-readable media may be any availablemedia that may be accessed by the false desktop computing device 501,may be non-transitory, and may include volatile and nonvolatile,removable and non-removable media implemented in any method ortechnology for storage of information such as computer-readableinstructions, object code, data structures, program modules, or otherdata. Examples of computer-readable media may include Random AccessMemory (RAM), Read Only Memory (ROM), Electronically ErasableProgrammable Read-Only Memory (EEPROM), flash memory or other memorytechnology, Compact Disk Read-Only Memory (CD-ROM), Digital VersatileDisk (DVD) or other optical disk storage, magnetic cassettes, magnetictape, magnetic disk storage or other magnetic storage devices, or anyother medium that can be used to store the desired information and thatcan be accessed by the false desktop computing device 501.

Although not required, various aspects described herein may be embodiedas a method, a data transfer system, or as a computer-readable mediumstoring computer-executable instructions. For example, acomputer-readable medium storing instructions to cause a processor toperform steps of a method in accordance with aspects of the disclosedembodiments is contemplated. For example, aspects of method stepsdisclosed herein may be executed by the processor 503 of the falsedesktop computing device 501. Such a processor may executecomputer-executable instructions stored on a computer-readable medium.

Software may be stored within the memory 515 and/or other digitalstorage to provide instructions to the processor 503 for enabling thefalse desktop computing device 501 to perform various functions asdiscussed herein. For example, the memory 515 may store software used bythe false desktop computing device 501, such as a user operating system517, one or more application programs 519, and/or an associated database521. In addition, some or all of the computer executable instructionsfor the false desktop computing device 501 may be embodied in hardwareor firmware. Although not shown, the RAM 505 may include one or moreapplications representing the application data stored in the RAM 505while the false desktop computing device 501 is on and correspondingsoftware applications (e.g., software tasks) are running on the falsedesktop computing device 501.

The communications module 509 may include a microphone, a keypad, atouch screen, and/or a stylus through which a user of the false desktopcomputing device 501 may provide input, and may include one or more of aspeaker for providing audio output and a video display device forproviding textual, audiovisual and/or graphical output. The computingsystem environment 500 may also include optical scanners (not shown).

The false desktop computing device 501 may operate in a networkedenvironment supporting connections to one or more remote computingdevices, such as the computing devices 541 and 551. The computingdevices 541 and 551 may be personal computing devices or servers thatinclude any or all of the elements described above relative to the falsedesktop computing device 501.

The network connections depicted in FIG. 5 may include a Local AreaNetwork (LAN) 525 and/or a Wide Area Network (WAN) 529, as well as othernetworks. When used in a LAN networking environment, the false desktopcomputing device 501 may be connected to the LAN 525 through a networkinterface or adapter in the communications module 509. When used in aWAN networking environment, the false desktop computing device 501 mayinclude a modem in the communications module 509 or other means forestablishing communications over the WAN 529, such as a network 531(e.g., public network, private network, Internet, intranet, and thelike). The network connections shown are illustrative and other means ofestablishing a communications link between the computing devices may beused. Various well-known protocols such as Transmission ControlProtocol/Internet Protocol (TCP/IP), Ethernet, File Transfer Protocol(FTP), Hypertext Transfer Protocol (HTTP) and the like may be used, andthe system can be operated in a client-server configuration to permit auser to retrieve web pages from a web-based server. Any of variousconventional web browsers can be used to display and manipulate data onweb pages.

The disclosure is operational with numerous other computing systemenvironments or configurations. Examples of computing systems,environments, and/or configurations that may be suitable for use withthe disclosed embodiments include, but are not limited to, personalcomputers (PCs), server computers, hand-held or laptop devices, smartphones, multiprocessor systems, microprocessor-based systems, set topboxes, programmable consumer electronics, network PCs, minicomputers,mainframe computers, distributed computing environments that include anyof the above systems or devices, and the like that are configured toperform the functions described herein.

FIG. 6 shows an illustrative block diagram of workstations and serversthat may be used to implement the processes and functions of certainaspects of the present disclosure in accordance with one or more exampleembodiments. For example, an illustrative system 600 may be used forimplementing illustrative embodiments according to the presentdisclosure. As illustrated, the system 600 may include one or moreworkstation computers 601. The workstation 601 may be, for example, adesktop computer, a smartphone, a wireless device, a tablet computer, alaptop computer, and the like, configured to perform various processesdescribed herein. The workstations 601 may be local or remote, and maybe connected by one of the communications links 602 to a computernetwork 603 that is linked via the communications link 605 to the falsedesktop server 604. In the system 600, the false desktop server 604 maybe a server, processor, computer, or data processing device, orcombination of the same, configured to perform the functions and/orprocesses described herein. The false desktop server 604 may be used tostore the user operating system 130, false desktop system 140, anddesktop management system 150, as well as execute the one or morefunctions described herein for these systems.

The computer network 603 may be any suitable computer network includingthe Internet, an intranet, a Wide-Area Network (WAN), a Local-AreaNetwork (LAN), a wireless network, a Digital Subscriber Line (DSL)network, a frame relay network, an Asynchronous Transfer Mode network, aVirtual Private Network (VPN), or any combination of any of the same.The communications links 602 and 605 may be communications linkssuitable for communicating between the workstations 601 and the falsedesktop server 604, such as network links, dial-up links, wirelesslinks, hard-wired links, as well as network types developed in thefuture, and the like.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored as computer-readable instructions on a computer-readable mediumsuch as a hard disk, optical disk, removable storage media, solid-statememory, RAM, and the like. The functionality of the program modules maybe combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,Application-Specific Integrated Circuits (ASICs), Field ProgrammableGate Arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may be and/or include one or more non-transitorycomputer-readable media.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,one or more steps described with respect to one figure may be used incombination with one or more steps described with respect to anotherfigure, and/or one or more depicted steps may be optional in accordancewith aspects of the disclosure.

1. A system, comprising: a location sensing device configured toassociate a location to a computing device; the computing device,comprising: a processor; and memory storing computer-readableinstructions that, when executed by the processor, cause the computingdevice to: receive, from the location sensing device, a locationindication; determine, based on the location indication and a use of afirst security key or a second security key of a plurality of securitykeys, whether to enable a user operating system or a false desktopsystem as a default mode of the computing device; enable, during a loginto the computing device and based on a received input of the firstsecurity key of the plurality of security keys, the default mode of thecomputing device; and enable, during the login to the computing deviceand based on the received input of the second security key of theplurality of security keys, a false desktop mode of the computingdevice, wherein the false desktop mode comprises one or more alternatesecurity measures that each correspond to a different configuration ofthe false desktop mode and is populated with false data appearing to beassociated with a user corresponding to the first security key.
 2. Thesystem of claim 1, wherein the instructions, when executed by theprocessor, cause the computing device to: enable, during the login tothe computing device and based on a received input of a third securitykey of the plurality of security keys, a non-default mode of thecomputing device.
 3. The system of claim 1, wherein the instructions,when executed by the processor, cause the computing device to:configure, by a configuration module, the false desktop system torestrict access to specified files, data stores, applications, andstorage drives of the computing device.
 4. The system of claim 1,wherein the instructions, when executed by the processor, cause thecomputing device to: configure, by a configuration module, the falsedesktop system to restrict access to an external network communicativelycoupled to the computing device.
 5. The system of claim 1, wherein theinstructions, when executed by the processor, cause the computing deviceto: configure, by a configuration module, the false desktop system todisable specified ports associated with the computing device.
 6. Thesystem of claim 1, wherein the instructions, when executed by the one ormore processors, cause the computing device to: configure, by aconfiguration module, the false desktop system to erase specifiedcontent located in a plurality of storage drives of the computingdevice.
 7. The system of claim 1, wherein the instructions, whenexecuted by the processor, cause the computing device to: configure, bya configuration module, the false desktop system to function as aread-only copy of the user operating system.
 8. A computing platform,comprising: a processor; and memory storing computer-readableinstructions that, when executed by the processor, cause the computingplatform to: receive, from a location sensing device associated with thecomputing platform, a location indication; determine, based on thelocation indication and a use of a first security key or a secondsecurity key of a plurality of security keys, whether to enable a useroperating system or a false desktop system as a default mode of thecomputing platform; enable, during a login to the computing platform andby a desktop management system, the default mode of the computingplatform based on a received input of the first security key of aplurality of security keys; and enable, during the login to thecomputing platform and by the desktop management system, a false desktopmode of the computing platform based on the received input of the secondsecurity key of the plurality of security keys, wherein the falsedesktop mode comprises one or more alternate security measures that eachcorrespond to a different configuration of the false desktop system andis populated with false data appearing to be associated with a usercorresponding to the first security key.
 9. The computing platform ofclaim 8, wherein the instructions, when executed by the processor, causethe computing platform to: enable, during the login to the computingplatform and based on a received input of a third security key of theplurality of security keys, a non-default mode of the computingplatform.
 10. The computing platform of claim 8, wherein theinstructions, when executed by the processor, cause the computingplatform to: configure, by a configuration module of the desktopmanagement system, the false desktop system to restrict access tospecified files, data stores, applications, and storage drives of thecomputing platform.
 11. The computing platform of claim 8, wherein theinstructions, when executed by the one or more processors, cause thecomputing platform to: configure, by a configuration module, the falsedesktop system to restrict access to an external network communicativelycoupled to the computing platform.
 12. The computing platform of claim8, wherein the instructions, when executed by the processor, cause thecomputing platform to: configure, by a configuration module, the falsedesktop system to disable specified ports associated with the computingplatform.
 13. The computing platform of claim 8, wherein theinstructions, when executed by the processor, cause the computingplatform to: configure, by a configuration module, the false desktopsystem to erase specified content located in a plurality of storagedrives of the computing platform.
 14. The computing platform of claim 8,wherein the instructions, when executed by the processor, cause thecomputing platform to: configure, by a configuration module, the falsedesktop system to function as a read-only copy of the user operatingsystem.
 15. The computing platform of claim 8, wherein the instructions,when executed by the processor, cause the computing platform to:disable, based on a configuration of the false desktop system, acommunication interface of the computing platform.
 16. A method,comprising: determining, by a location sensing device associated with acomputing platform, a location of the computing platform; determining,based on the location of the computing platform and a use of a firstsecurity key or a second security key of a plurality of security keys,whether to enable a user operating system or a false desktop system as adefault mode of the computing platform; enabling, during a login to thecomputing platform and by a desktop management system, the default modeof the computing platform based on a received input of the firstsecurity key of a plurality of security keys; and enabling, during thelogin to the computing platform and by the desktop management system, afalse desktop mode of the computing platform based on the received inputof the second security key of the plurality of security keys, whereinthe false desktop mode comprises one or more alternate security measuresthat each correspond to a different configuration of the false desktopsystem and is populated with false data appearing to be associated witha user corresponding to the first security key.
 17. The method of claim16, further comprising: enabling, during the login to the computingplatform and by the desktop management system, a non-default mode of thecomputing platform based on a received input of a third security key ofthe plurality of security keys; and disabling, based on use of the thirdsecurity key, at least one system driver for a port within thenon-default mode of the computing platform.
 18. The method of claim 16,further comprising: configuring, by a configuration module of thedesktop management system, the false desktop system to restrict accessto specified files, data stores, applications, and storage drives of thecomputing platform.
 19. The method of claim 16, further comprising:configuring, by a configuration module of the desktop management system,the false desktop system to disable specified ports associated with thecomputing platform.
 20. The method of claim 16, further comprising:configuring, by a configuration module of the desktop management system,the false desktop system to erase specified content located in aplurality of storage drives of the computing platform.