STEALTH MODE FOR WIRELESS COMMUNICATIONS DEVICE
First Claim
1. A device comprising:
- memory having executable instructions stored thereon; and
a processor coupled to the memory, the processor configured to execute the executable instructions to effectuate operations comprising;
activating a stealth mode on the device;
inconspicuously performing functions in the stealth mode while concurrently performing functions in any mode other than the stealth mode, wherein;
no indication of performance of any function in the stealth mode is provided by the device to a user of the device; and
performance of any function in any mode other than the stealth mode appears to a user of the device as it would if the stealth mode were not activated;
rendering no indication of performance of any function in the stealth mode;
rendering any indication of any function in any mode other than the stealth mode as though the stealth mode were not activated;
determining if a received communication is authorized;
if it is determined that the received communication is authorized, processing the received communication in the stealth mode; and
if it is determined that the received communication is not authorized, processing the received communication in the a mode other than the stealth mode.
1 Assignment
0 Petitions
Accused Products
Abstract
A device is configured to enter a stealth mode in response to a trigger and/or triggering event. The trigger/triggering event can be a voice command, a depression(s) of a button(s) or pattern of buttons on the device, a keyboard and/or softkey entry, entry of a pattern on the display of the device, a designated movement of the device, detection of an event, and/or lack of detection of an event. The device activates the stealth mode without any indication to the user of the device that the device is activating the stealth mode. The stealth mode operates concurrently with all other functions of the device. A virtual secure channel can be established that allows communication with the device without providing an indication that the device is communicating via the virtual secure channel. A token can be utilized for authentication and to discriminate be stealth and normal modes.
21 Citations
20 Claims
-
1. A device comprising:
-
memory having executable instructions stored thereon; and a processor coupled to the memory, the processor configured to execute the executable instructions to effectuate operations comprising; activating a stealth mode on the device; inconspicuously performing functions in the stealth mode while concurrently performing functions in any mode other than the stealth mode, wherein; no indication of performance of any function in the stealth mode is provided by the device to a user of the device; and performance of any function in any mode other than the stealth mode appears to a user of the device as it would if the stealth mode were not activated; rendering no indication of performance of any function in the stealth mode; rendering any indication of any function in any mode other than the stealth mode as though the stealth mode were not activated; determining if a received communication is authorized; if it is determined that the received communication is authorized, processing the received communication in the stealth mode; and if it is determined that the received communication is not authorized, processing the received communication in the a mode other than the stealth mode. - View Dependent Claims (2, 4, 5, 6, 7)
-
-
8. A method comprising:
-
activating a stealth mode on a device; inconspicuously performing functions on the device in the stealth mode while concurrently performing functions in any mode other than the stealth mode, wherein; no indication of performance of any function in the stealth mode is provided by the device to a user of the device; and performance of any function in any mode other than the stealth mode appears to a user of the device as it would if the stealth mode were not activated; rendering no indication of performance of any function in the stealth mode; rendering any indication of any function in any mode other than the stealth mode as though the stealth mode were not activated; determining if a received communication is authorized; if it is determined that the received communication is authorized, processing the received communication in the stealth mode; and if it is determined that the received communication is not authorized, processing the received communication in the a mode other than the stealth mode. - View Dependent Claims (9, 11, 12, 13)
-
-
14. A computer-readable storage medium that is not a propagating signal per se, the computer-readable storage medium having stored thereon executable instructions that when executed by a processor cause the processor to effectuate operations comprising:
-
activating a stealth mode on a device; inconspicuously performing functions on the device in the stealth mode while concurrently performing functions in any mode other than the stealth mode, wherein; no indication of performance of any function in the stealth mode is provided by the device to a user of the device; and performance of any function in any mode other than the stealth mode appears to a user of the device as it would if the stealth mode were not activated; rendering no indication of performance of any function in the stealth mode; rendering any indication of any function in any mode other than the stealth mode as though the stealth mode were not activated; determining if a received communication is authorized; if it is determined that the received communication is authorized, processing the received communication in the stealth mode; and if it is determined that the received communication is not authorized, processing the received communication in the a mode other than the stealth mode. - View Dependent Claims (15, 17, 18, 19, 20)
-
Specification