Stealth mode for wireless communications device
First Claim
1. A device comprising:
- memory having executable instructions stored thereon; and
a processor coupled to the memory, the processor configured to execute the executable instructions to perform operations comprising;
activating a stealth mode on the device responsive to detection of a trigger;
inconspicuously performing functions in the stealth mode while concurrently performing functions in any mode other than the stealth mode, wherein;
no indication of performance of any function in the stealth mode is provided by the device to a user of the device; and
performance of any function in any mode other than the stealth mode appears to a user of the device as it would if the stealth mode were not activated;
rendering no indication of performance of any function in the stealth mode;
rendering any indication of any function in any mode other than the stealth mode as though the stealth mode were not activated;
determining from a received communication if a token is included with the communication;
if it is determined that a token is included with the communication, processing the received communication in the stealth mode; and
if it is determined that a token is not included with the communication, processing the received communication in the a mode other than the stealth mode.
1 Assignment
0 Petitions
Accused Products
Abstract
A device is configured to enter a stealth mode in response to a trigger and/or triggering event. The trigger/triggering event can be a voice command, a depression(s) of a button(s) or pattern of buttons on the device, a keyboard and/or softkey entry, entry of a pattern on the display of the device, a designated movement of the device, detection of an event, and/or lack of detection of an event. The device activates the stealth mode without any indication to the user of the device that the device is activating the stealth mode. The stealth mode operates concurrently with all other functions of the device. A virtual secure channel can be established that allows communication with the device without providing an indication that the device is communicating via the virtual secure channel. A token can be utilized for authentication and to discriminate be stealth and normal modes.
28 Citations
17 Claims
-
1. A device comprising:
-
memory having executable instructions stored thereon; and a processor coupled to the memory, the processor configured to execute the executable instructions to perform operations comprising; activating a stealth mode on the device responsive to detection of a trigger; inconspicuously performing functions in the stealth mode while concurrently performing functions in any mode other than the stealth mode, wherein; no indication of performance of any function in the stealth mode is provided by the device to a user of the device; and performance of any function in any mode other than the stealth mode appears to a user of the device as it would if the stealth mode were not activated; rendering no indication of performance of any function in the stealth mode; rendering any indication of any function in any mode other than the stealth mode as though the stealth mode were not activated; determining from a received communication if a token is included with the communication; if it is determined that a token is included with the communication, processing the received communication in the stealth mode; and if it is determined that a token is not included with the communication, processing the received communication in the a mode other than the stealth mode. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
activating a stealth mode on a device responsive to detection of a trigger; inconspicuously performing functions on the device in the stealth mode while concurrently performing functions in any mode other than the stealth mode, wherein; no indication of performance of any function in the stealth mode is provided by the device to a user of the device; and performance of any function in any mode other than the stealth mode appears to a user of the device as it would if the stealth mode were not activated; rendering no indication of performance of any function in the stealth mode; rendering any indication of any function in any mode other than the stealth mode as though the stealth mode were not activated; determining from a received communication if a token is included with the communication; if it is determined that a token is included with the communication, processing the received communication in the stealth mode; and if it is determined that a token is not included with the communication, processing the received communication in the a mode other than the stealth mode. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A computer-readable storage medium that is not a transient signal per se, the computer-readable storage medium having stored thereon executable instructions, the instructions, when executed by the computer, cause the computer to perform operations comprising:
-
activating a stealth mode on a device responsive to detection of a trigger; inconspicuously perform functions on the device in the stealth mode while concurrently performing functions in any mode other than the stealth mode, wherein; no indication of performance of any function in the stealth mode is provided by the device to a user of the device; and performance of any function in any mode other than the stealth mode appears to a user of the device as it would if the stealth mode were not activated; rendering no indication of performance of any function in the stealth mode; rendering any indication of any function in any mode other than the stealth mode as though the stealth mode were not activated; determining from a received communication if a token is included with the communication; if it is determined that a token is included with the communication, processing the received communication in the stealth mode; and if it is determined that a token is not included with the communication, processing the received communication in a mode other than the stealth mode. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification