US 11,736,910 B2
System and method for acquiring data with a handheld device
Brittin Kane, Clermont, FL (US); Joseph Daniel McCall, Sanford, FL (US); Joshua Witter, Vestal, NY (US); and Jason Alan Stonebraker, Orlando, FL (US)
Assigned to Intrepid Networks, LLC, Clermont, FL (US)
Filed by Intrepid Networks, LLC, Orlando, FL (US)
Filed on May 24, 2021, as Appl. No. 17/329,113.
Application 17/329,113 is a division of application No. 15/974,653, filed on May 8, 2018, granted, now 11,019,464.
Application 15/974,653 is a division of application No. 14/648,076, granted, now 9,980,101, issued on May 22, 2018, previously published as PCT/US2013/077260, filed on Dec. 20, 2013.
Claims priority of provisional application 61/730,660, filed on Nov. 28, 2012.
Prior Publication US 2021/0409910 A1, Dec. 30, 2021
Int. Cl. H04W 4/08 (2009.01); G06Q 50/26 (2012.01); G06Q 10/10 (2023.01); G06F 15/167 (2006.01); H04L 67/1097 (2022.01); G06F 21/62 (2013.01); G06F 9/445 (2018.01); G06F 3/041 (2006.01); G06F 21/31 (2013.01); G06F 21/64 (2013.01); G06Q 10/063 (2023.01); H04W 24/08 (2009.01); G06F 3/0488 (2022.01); G06F 3/04817 (2022.01); G06F 16/955 (2019.01); G06F 21/60 (2013.01); G06F 3/06 (2006.01); G06F 21/55 (2013.01); G06F 12/14 (2006.01); H04L 67/01 (2022.01); H04L 9/40 (2022.01); G06F 3/0482 (2013.01); H04L 41/22 (2022.01)
CPC H04W 4/08 (2013.01) [G06F 3/041 (2013.01); G06F 3/0488 (2013.01); G06F 3/04817 (2013.01); G06F 3/062 (2013.01); G06F 9/445 (2013.01); G06F 12/14 (2013.01); G06F 15/167 (2013.01); G06F 16/9554 (2019.01); G06F 21/31 (2013.01); G06F 21/556 (2013.01); G06F 21/604 (2013.01); G06F 21/62 (2013.01); G06F 21/629 (2013.01); G06F 21/6218 (2013.01); G06F 21/64 (2013.01); G06Q 10/063 (2013.01); G06Q 10/10 (2013.01); G06Q 50/26 (2013.01); G06Q 50/265 (2013.01); H04L 63/10 (2013.01); H04L 63/302 (2013.01); H04L 67/01 (2022.05); H04L 67/1097 (2013.01); H04W 24/08 (2013.01); G06F 3/0482 (2013.01); G06F 2203/04104 (2013.01); G06F 2221/2143 (2013.01); H04L 41/22 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A method for covertly acquiring data comprising:
providing a first hand-held electronic device having a processor, a storage medium, operating system software executable on the processor, a touch screen capable of initiating execution of consumer software applications by the processor with gestures made on the touch screen by one or more fingers, and consumer application software containing first program steps stored in the storage medium and executable on the processor by making a gesture on the touch screen, the first program steps including display of graphic or text information,
storing in the storage medium of the hand-held device covert application software, containing second program steps executable on the processor, that can be launched from the touch screen, and
initiating monitoring of information about an activity associated with the first device by running the covert application software in a first configuration where,
(i) in order to run the covert application software in the first configuration, a log-in must first be input to the first device, and
(ii) when running the covert application software in the first configuration, no image which overtly exhibits a self-evident association with the covert application software can be viewed on the display to identify the covert application software or to indicate that the covert application software is running on the client, the method further including
a. prior to initiating monitoring with the covert application software, displaying a feature on the touch screen accessible with the touch screen display, having no self-evident association with the covert application software, wherein the touch screen displaying the feature is responsive via the touch screen display to application of a gesture or key sequence to present a log-in screen or a prompt to input the log-in to the device to run the covert application software in the first configuration by inputting via the touch screen display a predefined gesture or key sequence after the log-in screen or prompt is first displayed;
b. inputting the log-in via the touch screen in response to the log-in screen; and
c. after inputting the log-in, initiating the running of the covert application software according to the first configuration without providing display of any image which specifically identifies the covert application software and indicates that the covert application software is currently running on the client.