Add-on modem for wireless devices and methods useful in conjunction therewith

ABSTRACT

System for ex post facto upgrading of at least one Legacy personal communication device including a legacy modem and lacking at least one desired wireless communication feature, the system comprising an up-graded communication device including an auxiliary modem physically connected via an ex post facto physical connection to a Legacy personal communication device having at least one legacy wireless output channel which has been neutralized or disabled.

FIELD OF THE INVENTION

The present invention relates generally to communications systems andmore particularly to wireless communications systems.

BACKGROUND AND SUMMARY

The disclosures of all publications and patent documents mentioned inthe specification, and of the publications and patent documents citedtherein directly or indirectly, and of specifications of mentionedprotocols are hereby incorporated by reference.

A dongle is a small piece of hardware that attaches to computer, TV, orother electronic device, and that, when attached, enables additionalfunctions such as security, copy protection, audio, video, games, data,or other services. The dongle typically attaches via an electricalconnector to an external bus of the computer or appliance.

Use of auxiliary hardware to enhance cyber-security is well known. Forexample, Bank haPoalim provides customers with a minikey and a temporaryidentification code for initial identification. After installation, theclient has an identification code for her or his minikey. The minikey iscompatible with a computer having a USB port, an operating system whichis Windows XP SP3 or higher, and a browser which is Internet Explorerversion 7 or higher. The minikey is operative in association withminikey software which may be downloaded from the bank's website, fromthe CD or from the installation file on the FIG Online website.

According to the following http link:

searchconsumerization.techtarget.com/definition/mobile-application-processor,tan application processor or “mobile application processor is a systemon a chip (SoC) designed to support applications running in a mobileoperating system environment. A mobile application processor provides aself-contained operating environment that delivers all systemcapabilities needed to support a device's applications, including memorymanagement, graphics processing and multimedia decoding. Mobileapplication processors may be independent from other specializedprocessors in the same mobile device, such as a phone's baseband(wireless communications) processor.

Some vendors manufacture their own mobile application processors. Othervendors purchase their mobile application processors, using them asoriginal equipment manufacturer (OEM) components. For example, theQualcomm Snapdragon mobile application processor is contained in manysmart phones that use Snapdragon to run the Android operating system andAndroid applications. In this way, every phone manufacturer need notdevelop its own mobile application processor (although they can); thisapproach reduces bill-of-materials (BoM) cost and makes it possible todevelop low-cost “smart” consumer electronics. A wide variety of mobiledevices contain mobile application processors, including feature phones,smartphones, tablets, eReaders, netbooks, automotive navigation devicesand gaming consoles.

Sending AT commands via USB is known, e.g. as described at the followinghttp links:

stackoverflow.com/questions/8029166/send-and-read-result-of-an-at-command-to-a-usb-modem-in-c-sharpstackoverflow.com/questions/5937119/sending-at-command-to-a-usb-connected-gprs-modem-in-c-sharpsocial.msdn.microsoft.com/Forums/en-US/f4013d7e-fd55-47c0-be99-b614005b670d/send-at-commands-through-usb-cable-using-a-c-program?forum=vcgeneral ubuntuforums.org/showthread.php?t=1877148brunomgalmeida.wordpress.com/2012/04/06/send-at-commands-to-usb- modem/.

Mobile phones typically employ an Application Processor coupled to twoor more Appliances (such as keyboard, display, microphone, speaker,etc.) and to two or more Modems and associated RF Front-ends (forcommunicating, e.g., in either 3G or 4G cellular standards).

Reference is now made to co-pending Israeli Patent Application No.207180 “Switched application processor apparatus for cellular devices”,published 31 Jan. 2013 and incorporated herein by reference, includingto FIGS. 1, 8 therein (FIGS. 1-2, herein) which may be described as perthe section in italics hereinbelow:

“Attention is drawn to FIG. 1 illustrating schematically an exemplaryprior art mobile telephone system architecture 100. As shown, the system100 includes the two antennae 101 and 102 and associated modems 103 and104 (e.g., operating in either 3G or 4G cellular standards or Wifi orBluetooth or NFC) both coupled to application processor 105, which inturn is coupled to a plurality of appliances. Depending on variouscriteria, such as the selected appliance by the user and the requiredcommunication constraints (say 3G or 4G communication), the applicationprocessor 105 communicates to the appropriate modem and the appropriateappliance.

Attention is now drawn to FIG. 2, illustrating prior art implementationarchitecture and exemplary processing routes. It is shown that theadditional application processor (Application Processor 2 208) and therelevant Switches (205 and 210) and Controller 207 are implemented as aseparated (removable or permanent) add-on unit 215 to typical cellulardevice 214. The interfaces between the typical cellular device 214 andthe additional switched application processor add-on unit 215 includemodems to application processors interface 212 and applicationprocessors to appliances interface 213.

Thus, for example, a given processing route (as prescribed by controller207) includes antenna RF1 and its associated Modem 1 (201 and 203),Application Processor 1 209 and given appliance or appliances (asselected by the user from the possible set of Appliances 211). Inaccordance with a certain other example, another processing route isprescribed by Controller 207, and it includes antenna RF2 and itsassociated Modem 2 (202 and 204), Pre-processing Application 206 (e.g.,firewall), Application Processor 2 208 and given appliance or appliances(as selected by the user from the possible set of Appliances 211). Othervariants are applicable (e.g., including modem 1 203 and AP2 208).”

Certain embodiments seek to neutralize existing wireless output channelsof a legacy wireless device e.g smartphone.

Certain embodiments seek to add an external auxiliary modem andapplication processor (i.e. security processor) to a legacy wirelessdevice via a physical link e.g. USB.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic illustration of a typical cellular device systemarchitecture;

FIG. 1a is a diagram of an embodiment in which an application processoris made to communicate with an auxiliary modem, via a physical interfacebetween the auxiliary modem and a legacy smart phone, such that datafrom applications provided by the application processor are exported tothe auxiliary modem rather than to the legacy smartphone modem.

FIG. 1b is a typical cell or other network portion in a wireless e.g.cellular communication system.

FIG. 2 is a schematic illustration of a typical cellular device systemarchitecture including additional application processor/s, Switches andController that are implemented as a separated add-on unit;

FIG. 3 is a schematic illustration of a typical cellular device systemarchitecture including additional Modem and RF that are implemented as aseparated add-on unit;

FIG. 4 is a schematic illustration of a typical cellular device systemarchitecture including additional Application processor, Modem and RFthat are implemented as a separated add-on unit;

FIG. 5 is a schematic illustration of a typical cellular device systemarchitecture including additional Application processor, Modem and RFthat are implemented as a separated add-on unit; and the typicalcellular device interfaces between the application processor/s and thewireless modem/s are disabled;

FIG. 6 is a schematic illustration of a cellular device systemarchitecture which is a modification of the system of FIG. 2 including athird RF-modem “branch” connected to the modem—AP switch.

Computational components described and illustrated herein can beimplemented in various forms, for example, as hardware circuits such asbut not limited to custom VLSI circuits or gate arrays or programmablehardware devices such as but not limited to FPGAs, or as softwareprogram code stored on at least one intangible computer readable mediumand executable by at least one processor, or any suitable combinationthereof. A specific functional component may be formed by one particularsequence of software code, or by a plurality of such, which collectivelyact or behave or act as described herein with reference to thefunctional component in question. For example, the component may bedistributed over several code sequences such as but not limited toobjects, procedures, functions, routines and programs and may originatefrom several computer files which typically operate synergistically.

Data can be stored on one or more intangible computer readable mediastored at one or more different locations, different network nodes ordifferent storage devices at a single node or location.

It is appreciated that any computer data storage technology, includingany type of storage or memory and any type of computer components andrecording media that retain digital data used for computing for aninterval of time, and any time of information retention technology, maybe used to store the various data provided and employed herein. Suitablecomputer data storage or information retention apparatus may includeapparatus which is primary, secondary, tertiary or off-line; which is ofany type or level or amount or category of volatility, differentiation,mutability, accessibility, addressability, capacity, performance andenergy use; and which is based on any suitable technologies such assemiconductor, magnetic, optical, paper and others.

DETAILED DESCRIPTION

Fleets of legacy personal (commercial off-the-shelf—COTS) wirelesscommunication devices abound, including but not limited to fleets of oneor more of the following: smartphones, tablets, cellular telephones.PDAs (personal digital assistants), Netbooks, PDA phones, and otherhandheld and/or pocket-sized mobile communication devices running mobileoperating systems such as but not limited to Android, Blackberry, AppleiOS, Windows based, Symbian based, WebOS, Linux.

It may be desired to enhance security to prevent sensitive data fromflowing, from these devices to hackers or to enable higher securityapplications such as enabling finance bank transactions made using thewireless communication device. One way to do this is by adding asoftware security layer, however, the disadvantage is that a softwaresecurity layer is harder to hack and is more secure than the Legacypersonal communication devices' software, but like all software, one mayassume that it too can be breached and hacked albeit with moredifficulty.

Another way to prevent sensitive data from flowing from legacy personalcommunication devices to hackers is to replace the Legacy personalcommunication devices (i.e. commercial of the shelf) with customizedsecure personal communication devices providing security byhardware/firmware (and also optionally software) means. Security isenhanced relative to the previous method of adding a software securitylayer. However, the disadvantage is the great expense and inconvenienceto end-users and their organizations, of totally replacing an existingfleet of Legacy personal communication devices with a completelydifferent and specialized fleet of personal communication devices; bothin initial deployment and in becoming disassociated from whichsoeverupdates may be provided upon occasion to the Legacy personalcommunication devices.

FIG. 1a and FIG. 3, which may be combined, illustrate examples of asystem for augmenting a Legacy personal communication device or eachmember of a fleet of Legacy personal communication devices, with asecure communication device including an auxiliary modem (e.g. anysuitable, conventional e.g. commercially available cellular modern) andassociated application processor (i.e. security processor) to enhancesecurity of the auxiliary modem relative to the low level of securityenjoyed by the legacy modem of the Legacy personal communication device.The aux modem (and optionally additional security processor) may bephysically connected to the Legacy personal communication device e.g.via the USB connector (i.e. mini-USB, micro-USB, etc.) thereof. Thesecure communication device may for example be configured as a jacket orenvelope, whose interior has dimensions which match the externaldimensions of the (COTS) Legacy personal communication device, such thatthe Legacy personal communication device may easily be slipped into thesecure communication device. The secure communication device may alsoincorporate, aside from electronics as described herein, conventionalphysical protection elements to protect the Legacy personalcommunication device from breakage e.g. if dropped or otherwisesubjected to physical force. Alternatively, the secure communicationdevice may be configured, say, to adhere to the back of, or wrap aroundand be fastened to (even via Velcro), the Legacy personal communicationdevice. Optionally the secure communication device may also includeadditional battery and/or additional antenna (i.e. enhanced antenna)and/or enhanced RF part for the modem route (i.e. higher output powerfor the power amplifier).

In addition to provision of the auxiliary modem and associated securitymodule, some or all of the wireless output channels (cellular modem,Bluetooth, wifi) of the Legacy personal communication devices areneutralized such that, typically, the only pathway for wirelesslyextracting possibly sensitive data from the Legacy personalcommunication device is via the secure communication device physicallyconnected thereto. Any suitable method (e using hardware and/oroperating system and/or kernel) may be employed to neutralize these.Known solutions, e.g. for disabling smart phone cameras, are describedin: SARTANI, Ram and SIMANOVSKI, Anatoly, Israel Published PatentApplication IL2012/050257, published Jan. 24, 2013; in U.S. Pat. No.7,414,529 (Boss et al.); and Published US Patent application No.2009/0181716 (Benco et al.).

The security module may comprise:

a. a conventional cryptographic security sub-module operative to securethe output channel of the auxiliary modem cryptographically, using asuitable protocol such as (for commercial applications) AES (AdvancedEncryption Standard); and/or

b. a data security sub-module operative to secure the USB channel of theLegacy personal communication device and/or of the customized securepersonal communication device, using conventional data security orcyber-defense technology such as commercial level data security orcyber-defense technology. For example, a “gatekeeper” may be provided todetermine whether one who seeks to download from the smart phone via theUSB connection, is or is not authorized. Known data security solutionsfor protecting the USB output channel of a smart phone include:

i. “Data leakage. When charging a smartphone from a PC, or connecting itto a USB port in a car or plane, we rarely consider the possibility thatinformation may be exchanged, as well as power . . . the connected PCcan upload all the relevant files from the smartphone. This isespecially annoying if you store confidential photos on your smartphone.This behavior is more frequent than it might seem—the automatic uploadof photos is a standard setting of many photo album managers, Dropboxand similar applications. If the smartphone automatically connects whenit is in removable media mode (UMS, Mass storage), that makes all filesin the internal storage accessible to the PC. These may includedocuments as well as various data backup copies created by applicationsand many other things. The easiest, and usually quite effective, way toavoid these problems is to switch off the smartphone completely beforecharging it and keeping it switched off until the procedure is completed. . . . If you need to stay connected, you will have to study thesettings of your smartphone carefully. If, when connected to a PC orentering the settings sub-section you are invited to choose a mode toconnect with a PC, the best default option would be to choose “Onlycharge,” selecting other temporary modes manually as required. With somesmartphones you can enable a protection code, which needs to be enteredto establish a connection to the PC. For some Android smartphonesadditional applications are available that can implement the protectionalternatives described above.” See the following link:blog.kaspersky.com/charging-your-smartphone/

ii. CopyNotify! Software which “restricts the unauthorized copying ofcorporate data via USB Drives”; see the following link:copynotify.com/CopyNotify.html

According to certain embodiments, the secure communication device'sauxiliary modem supports communication in frequency bands assigned,typically by governmental authorities, to special users such asemergency service providers (firefighters, police, triage medicalservices etc.) thereby to provide this “special frequency band” featureex post facto to Legacy personal communication devices whose modemsupports communication only in frequency bands assigned to the generalpublic.

According to certain embodiments, such as but not limited to theembodiment of FIG. 1 a, the application processor is made to communicatewith the auxiliary modem, via the physical interface (e.g. usbconnection) between the auxiliary modem and the legacy smart phone, suchthat suitable data from the applications provided by the applicationprocessor, are exported to the auxiliary modern rather than to thelegacy smartphone modem. Typically, the application processor chip'slegs communicate physically via the USB or other physical connection,with the auxiliary modem (also termed herein “virtual modem”).

Typically, apparatus operative to maintain latency is provided.

As is well known, the Hayes command set is a protocol or languageproviding commands e.g. so-called AT commands, for communication betweena processor and modem; these commands can subdivide into four groups:basic command set—extended command set—proprietary command set—andregister commands. The solution may allow “at” commands to be conveyedfrom the auxiliary modem to and from a legacy smart phone, via USBprotocol e.g. Provision of an AT command proxy, on the applicationprocessor. The AT command proxy typically communicates with the securecommunication device's security module, if provided, The AT commandproxy may be designed to be treated the same, by the applicationprocessor, as any other application would be treated, but in fact servesas a bridge between the application processor and the auxiliary modem.Some or all of the teachings of the following known technologies forsending AT commands via USB, mutatis mutandis, may be employed herein:

stackoverflow.com/questions/8029166/send-and-read-result-of-an-at-command-to-a-usb-modem-in-c-sharpstackoverflow.com/questions/5937119/sending-at-command-to-a-usb-connected-gprs-modem-in-c-sharpsocial.msdn.microsoft.com/Forums/en-US/f4013d7e-fd55-47c0-be99-b614005b670d/send-at-commands-through-usb-cable-using-a-c-program?forum=vcgeneral ubuntuforums.org/showthread.php?t=1877148brunomgalmeida.wordpress.com/2012/04/06/send-at-commands-to-usb- modem/

A particular advantage of providing a secure communication system whichaugments a Legacy personal communication device, as described herein, isthat r & d and deployment costs for many elements of the Legacy personalcommunication device, such as but not limited to the screen MMI(man-machine interface), applications, etc. are obviated.

It is appreciated that certain embodiments of the invention havesignificant and far-reaching applications such as but not limited to:

a. enhancing various security-related features of the legacy smart phonesuch as cyber defense or data security functions and/or cyber functionsand/or interference coping functions.

b. adding new-generation functionality to previous-generation legacysmart phones (e.g. adding 4th generation functionality to a fleet of3rd-generation phones)

c. converting a fleet of legacy smart phones capable of communicatingonly in frequency bands available to the public, into a fleet capable ofcommunicating only or also in emergency-frequency-band, and vice versa.

d. Conventionally, an application processor chip in smart phonecommunicates physically, via its “legs”, with the legacy modem in legacysmart phone; a conventional software layer in legacy smart phonessupports the conununication between the application processor and thelegs connected to the legacy modem.

FIG. 6 is a schematic illustration of a cellular device systemarchitecture which is a modification of the system of FIG. 2 including athird RF-modem “branch” connected to the modem—AP switch.

An Add-on Apparatus for Synchronization of Frequency DiversityCommunications and Methods Useful In Conjunction Therewith are describedin detail, in copending PCT application PCT/IL2014/050437 , published asWO/2014/188413 on 27 Nov. 2014.

It is appreciated that terminology such as “mandatory”, “required”,“need” and “must” refer to implementation choices made within thecontext of a particular implementation or application describedherewithin for clarity and are not intended to be limiting since in analternative implantation, the same elements might be defined as notmandatory and not required or might even be eliminated altogether.

It is appreciated that software components of the present inventionincluding programs and data may, if desired, be implemented in ROM (readonly memory) form including CD-ROMs, EPROMs and EEPROMs, or may bestored in any other suitable typically non-transitory computer-readablemedium such as but not limited to disks of various kinds, cards ofvarious kinds and RAMs. Components described herein as software may,alternatively, be implemented wholly or partly in hardware, if desired,using conventional techniques. Conversely, components described hereinas hardware may, alternatively, be implemented wholly or partly insoftware, if desired, using conventional techniques.

Included in the scope of the present invention, inter alia, areelectromagnetic signals carrying computer-readable instructions forperforming any or all of the steps of any of the methods shown anddescribed herein, in any suitable order; machine-readable instructionsfor performing any or all of the steps of any of the methods shown anddescribed herein, in any suitable order; program storage devicesreadable by machine, tangibly embodying a program of instructionsexecutable by the machine to perform any or all of the steps of any ofthe methods shown and described herein, in any suitable order; acomputer program product comprising a computer useable medium havingcomputer readable program code, such as executable code, having embodiedtherein, and/or including computer readable program code for performing,any or all of the steps of any of the methods shown and describedherein, in any suitable order; any technical effects brought about byany or all of the steps of any of the methods shown and describedherein, when performed in any suitable order; any suitable apparatus ordevice or combination of such, programmed to perform, alone or incombination, any or all of the steps of any of the methods shown anddescribed herein, in any suitable order; electronic devices eachincluding a processor and a cooperating input device and/or outputdevice and operative to perform in software any steps shown anddescribed herein; information storage devices or physical records, suchas disks or hard drives, causing a computer or other device to beconfigured so as to carry out any or all of the steps of any of themethods shown and described herein, in any suitable order; a programpre-stored e.g. in memory or on an information network such as theInternet, before or after being downloaded, which embodies any or all ofthe steps of any of the methods shown and described herein, in anysuitable order, and the method of uploading or downloading such, and asystem including server/s and/or chimes for using such; and hardwarewhich performs any or all of the steps of any of the methods shown anddescribed herein, in any suitable order, either alone or in conjunctionwith software. Any computer-readable or machine-readable media describedherein is intended to include non-transitory computer- ormachine-readable media.

Any computations or other forms of analysis described herein may beperformed by a suitable computerized method. Any step described hereinmay be computer-implemented. The invention shown and described hereinmay include (a) using a computerized method to identify a solution toany of the problems or for any of the objectives described herein, thesolution may include at least one of a decision, an action, a product, aservice or any other information described herein that impacts, in apositive manner, a problem or objectives described herein; and (b)outputting the solution.

The scope of the present invention is not limited to structures andfunctions specifically described herein and is also intended to includedevices which have the capacity to yield a structure, or perform afunction, described herein, such that even though users of the devicemay not use the capacity, they are, if they so desire, able to modifythe device to obtain the structure or function.

Features of the present invention which are described in the context ofseparate embodiments may also be provided in combination in a singleembodiment.

For example, a system embodiment is intended to include a correspondingprocess embodiment. Also, each system embodiment is intended to includea server-centered “view” or client centered “view”, or “view” from anyother node of the system, of the entire functionality of the systemcomputer-readable medium, apparatus, including only thosefunctionalities performed at that server or client or node.

Conversely, features of the invention, including method steps, which aredescribed for brevity in the context of a single embodiment or in acertain order may be provided separately or in any suitablesubcombination or in a different order. “e.g.” is used herein in thesense of a specific example which is not intended to be limiting.Devices, apparatus or systems shown coupled in any of the drawings mayin fact be integrated into a single platform in certain embodiments ormay be coupled via any appropriate wired or wireless coupling such asbut not limited to optical fiber, Ethernet, Wireless LAN, HomePNA, powerline communication, cell phone, PDA, Blackberry GPRS, Satelliteincluding GPS, or other mobile delivery. It is appreciated that in thedescription and drawings shown and described herein, functionalitiesdescribed or illustrated as systems and sub-units thereof can also beprovided as methods and steps therewithin, and functionalities describedor illustrated as methods and steps therewithin can also be provided assystems and sub-units thereof. The scale used to illustrate variouselements in the drawings is merely exemplary and/or appropriate forclarity of presentation and is not intended to be limiting.

The invention claimed is:
 1. A system for ex post facto upgrading of atleast one legacy personal communication device including a legacy modemand lacking at least one desired wireless communication feature, thesystem comprising: an upgraded communication device including anauxiliary cellular modem, e.g. a commercially available cellular modemphysically connected via an ex post facto physical connection to alegacy personal communication device having at least one legacy wirelessoutput channel which has been neutralized.
 2. A system according toclaim 1, wherein the legacy personal communication device has a USB portand wherein said auxiliary modem's ex post facto physical connection tothe legacy personal communication device is via the USB port.
 3. Asystem according to claim 1, wherein said upgraded communication devicealso includes a security module, disposed intermediate said ex postfacto physical connection and said auxiliary modem, which provides atleast one desired cellular communication security feature lacking in thelegacy personal communication device.
 4. A system according to claim 3,wherein said at least one desired cellular communication securityfeature lacking in said legacy personal communication device comprisescryptographic protection for data wirelessly exiting the legacy personalcommunication device, and wherein said cryptographic protection isprovided by providing encrypting functionality in said security module.5. A system according to claim 3, wherein said at least one desiredcellular communication security feature lacking in said legacy personalcommunication device comprises data security protection for data exitingthe legacy personal communication device via a USB port, and whereinsaid data security protection is provided by providing cyber defensefunctionality in said security module.
 6. A system according to claim 3,wherein said at least one desired cellular communication securityfeature lacking in said legacy personal communication device comprisesability to cope with interference, and wherein said ability is providedby providing interference coping functionality in said security module.7. A system according to claim 1, wherein said at least one desiredwireless feature comprises at least one next-generation cellularcommunication feature lacking in said legacy personal communicationdevice.
 8. A system according to claim 7, wherein said legacy personalcommunication device is a 3rd generation device, and wherein said atleast one desired cellular communication feature comprises at least one4th-generation feature.
 9. A system according to claim 1, wherein thelegacy personal communication device includes a modem which supportscommunication only in a first legacy frequency band, and wherein theauxiliary modem supports cellular communication in at least a secondfrequency band differing from said first frequency band, thereby toprovide to the legacy personal communication device, ex post facto,capability of communicating in a frequency band other than the solelegacy frequency band supported by the legacy personal communicationdevice.
 10. A system according to claim 1, wherein the legacy personalcommunication device further comprises an application processor chipwhich communicates physically, via its legs and supported by a legacysoftware layer, with the legacy modem, and wherein said auxiliary modemalso communicates physically with said application processor chip.
 11. Asystem according to claim 10, wherein the application processor chipprovides applications, and wherein said upgraded communication devicecauses the application processor chip to communicate with the auxiliarymodem, via said ex post facto physical connection, including causingsuitable data from said applications provided by the applicationprocessor chip, to be exported to the auxiliary modem rather than to thelegacy modem.
 12. A system according to claim 10, wherein theapplication processor chip provides applications, and wherein saidupgraded communication device causes the application processor chip tocommunicate with the auxiliary modem, via said ex post facto physicalconnection, including causing suitable data from the applicationsprovided by the application processor, to be exported to the auxiliarymodem rather than to the legacy modem.
 13. A system according to claim1, wherein said legacy personal communication device comprises at leastone of: feature phones, smartphones, tablets, eReaders, netbooks,automotive navigation devices and gaming consoles.
 14. A systemaccording to claim 1, wherein said auxiliary modem communicates in atleast 3rd generation cellular standards.
 15. A system according to claim1, wherein and all of the wireless output channels of the legacypersonal communication device are neutralized, such that the onlypathway for wirelessly exporting data from the legacy personalcommunication device is via the auxiliary modem.
 16. A system accordingto claim 1, wherein the upgraded communication device is configured as ajacket.
 17. A method for ex post facto upgrading of at least one legacypersonal communication device including a legacy modem and lacking atleast one desired wireless communication feature, the method comprising:providing an upgraded communication device including providing anauxiliary cellular modem, e.g. a commercially available cellular modemphysically connected via an ex post facto physical connection to alegacy personal communication device having at least one legacy wirelessoutput channel which has been neutralized.
 18. A method according toclaim 17, wherein the output channel of the legacy personalcommunication device is neutralized using at least one of: hardware,operating system, kernel, software.