Apparatus and method of making a secure call

ABSTRACT

A system of operating a wireless handset capable of making clear and secure calls is claimed. A secure call may be made by pressing a key for a predetermined amount of time. The handset enters a secure mode if the key is held for a time period greater than the predetermined amount of time. The handset enters a clear mode if the key is held for a time period less than the predetermined amount of time.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional PatentApplication Ser. No. 60/254,462, filed Dec. 8, 2000, which applicationis incorporated herein by reference in its entirety.

BACKGROUND

1. Field of the Invention

The invention generally relates to wireless handsets. More particularly,the invention relates to operability of handsets in non-secure andsecure modes.

2. Background of the Invention

Security is a well-known problem in telecommunications, and inparticular, wireless communications. Accordingly, handsets capable ofsecure or encrypted communications have been developed. However, a userof a secure handset may not always need to communicate in a secure mode,or may need to communicate with a user who does not have securecapabilities. Accordingly, what is needed is the ability for a handsetto operate and smoothly transition between secure and non-secure modesof operations.

SUMMARY OF THE INVENTION

Embodiments of the invention have the ability to operate in secure andnon-secure modes, and the ability to smoothly transition between secureand non-secure states. In a system of operating a wireless handsetcapable of making clear and secure calls, a method of making a securecall comprises pressing a key for a predetermined amount of time;entering a secure mode if the key is held for a time period greater thanthe predetermined amount of time; and entering a clear mode if the keyis held for a time period less than the predetermined amount of time.

A wireless apparatus configurable to make clear and secure calls. Theapparatus comprises a user-interface key capable of being depressed; anda time-out circuit configured to measure the amount of time the userinterface key is depressed, wherein the apparatus is configured tooperate in a secure mode if the user-interface key is depressed forgreater than a predetermined amount of time, and wherein the apparatusis configured to operate in a clear mode if the user-interface key isdepressed for less than a predetermined amount of time.

The features, objects, and advantages of the present invention willbecome more apparent from the detailed description set forth below whentaken in conjunction with the drawings and wherein:

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 1 illustrates a typical wireless handset 100, they may optionallybe provisioned with a push-to-talk button 132 and a surveillance port136. The phone may be equipped with components such as antenna 102,earpiece 104, display icons 106, display screen 108, screen keys 110,left and right scroll keys 112, power or end key 114, down scroll key116, clear key 118, microphone 120, far field speaker 122, message key124, up scroll key 126, select key 128, send/talk key 130, thepush-to-talk key 132, volume key 134, the surveillance port 136 and thespeaker/mute button 138.

The handset is configured to operate in at least two modes:

-   -   Traditional: Both clear and secure calls may be made; however,        the default is preferably set for clear calls. In other words,        the phone operates like a commercial phone until the user wishes        to make a secure call. To place a secure call, the Send/Talk key        is depressed for a predetermined amount of time.    -   Autosecure: In autosecure mode, both clear and secure calls may        be made; however, the default is for secure calls. Thus,        autosecure is the opposite of traditional. While using the phone        in autosecure mode, one will generally make secure calls. Thus,        to make a clear call, the user depresses the Send/Talk key for a        predetermined period of time.

In an embodiment, a PIN is necessary for secure calls. The PIN is anaccess number that is typically distributed with the phone. If the usershas not previously logged on as a secure user, the user is prompted toenter the PIN when making or receiving a secure call.

Once logged on as a secure user, the user remains logged on until thephone powers down.

There are several ways to make calls:

-   -   1. Traditional, press the Send/Talk key for clear mode, press        and hold the Send/Talk key for secure mode;    -   2. Autosecure, press and hold the Send/Talk key for secure mode,        press the Send/Talk key for clear mode; and    -   3. Secure-Only, can only make emergency clear calls (enter 911,        *911, or #911 and press and hold the Send/Talk key) for secure        mode, press the Send/Talk key for clear mode.

FIG. 2 is a flow chart 200 illustrating determination of a clear,secure, or auto secure call. The handset first senses 204 if the SENDkey is pressed and held. If not, the next inquiry 208 is whether thehandset is a secure-only handset. This inquiry may not be necessary, butrather a default position setting in a secure only handset. If thehandset is a secure-only handset, a request 212 for a secure callorigination is sent. If the handset operates in both clear and securemodes, the next inquiry 216 is whether the handset is in auto securemode. If the handset is in auto secure mode, a request 220 for a securecall origination is sent. If the handset is not in auto secure mode, aclear call origination 224 is requested.

If the send key is pressed and held, the next inquiry 228 is whether thehandset is a secure-only handset. Again, this inquiry may not benecessary, but rather a default position setting in a secure onlyhandset. If the handset is a secure-only handset, a request 232 for asecure call origination is sent. If the handset operates in both clearand secure modes, the next inquiry 236 is whether the handset is in autosecure mode. If the handset is in auto secure mode, a requireconfirmation request 240 is sent to request clear call origination. Ifthe request 240 is not confirmed, the call may fall back into clearmode. If the handset is not in auto secure mode, a request secure callmessage 244 is sent.

Whenever a call is in secure mode, the call may fall back into clearmode if needed. This may occur either because the receiving party is nota secure handset, or if the parties decide to switch to clear mode.

If one is making a clear call, the phone behaves like a commercialphone, and the call is connected. If the person being called has asecure-only phone, the screen displays a message such as “GOINGSECURE/Exchanging secure dial/# . . . .” If the user has not previouslylogged on as a secure user, the user is prompted to enter your PIN.

FIG. 3 illustrates a flowchart 300 for determining whether a secure userhas logged in. First, a login prompt 304 is displayed, allowing the userto enter a PIN. If a valid PIN is entered, the user is returned to thecalling process 306. If not, the user begins the PIN entry process 308.The next determination 312 is whether the PIN entry was successful. Ifnot, the secure call request is aborted 316. A message 320 is presentedindicating that the call cannot be placed without a valid PIN. Themessage may remain on the screen either for a predetermined amount oftime, or until the user presses a key. If the PIN entry was successful,the user is returned to the calling process 324.

If the user is making a secure call and has not already entered yourPIN, a message appears on the handset screen asking the user to enterit. After the PIN is entered, the phone displays a message such as“GOING SECURE” followed by a series of messages. If the user is notprompted to enter your PIN, it means the user is already logged on as asecure user.

In a phone capable of both clear and secure modes, one can switch thetype of call connection during the call. For example, if a clear callconnection is established with another party, the call may be a secureconnection. The process of transitioning from a clear connection to asecure connection is illustrated in FIG. 2.

From the screen keys at the bottom of the display, select [GOSEC].

-   -   Press and hold the Send/Talk key depending on your phone's        strapping.    -   Enter the PIN if prompted to do so. The person being called        might also be prompted to enter a PIN. The type of messages that        appear and the length of the connection time depends on whether        the phone number has been previously recognized and stored as        secure in the other party's phone.

Transition from secure to clear connections may be accomplished in oneof the following ways:

-   -   From the screen keys at the bottom of the display, select        [GOCLR].    -   Press or press and hold the Send/Talk key. A message appears on        the phone display of the person called requesting confirmation        to transition from secure to clear.

During a secure voice or data call, depending on the securityclassification, either fingerprints or DAO descriptors appear on thescreen.

-   -   Fingerprint: contains security classification        (Protected=PROTEC), time, and a combination of a number of        letters, numbers, or punctuation marks, which can read to the        other party. The same combination may be displayed on all phones        on the call. If it is not the same or the line is blank, the        security of the call may be compromised. The following is a        non-limiting example of a screen with a fingerprint:        DAO descriptor: contains security classification (Top Secret=TS,        Secret=SEC, Confidential=CONF, and Unclassified=UNCLAS), time,        and identification. The DAO descriptor is similar to caller ID        and is not the same on both phones in the call.

In receiving secure calls, if one has not already entered your PIN sinceturning on the phone, the user is prompted to enter it. After enteringthe PIN, the phone displays “GOING SECURE” followed by a series ofmessages. The types of messages displayed and the length of theconnection time depends on whether the phone number has been previouslyrecognized and stored as secure in the calling party's phone book. Whenthe secure call is connected, a secure call screen appears.

In originating a Point-to-Point Voice Call, typically, a user requestsorigination of the call. If voice calls are disabled in the UPV, theoperator is alerted and call origination does not proceed. Otherwise,based on the method of call origination (long key press, short keypress, one touch dialing, or two-touch dialing) and the phone'sstrapping (traditional, secure-only, or auto-secure), the user interfacedetermines whether to attempt a clear or secure call. The user interfacethen determines the number to be dialed, in cases where both clear andsecure dial numbers are available. In an embodiment, a call to anemergency number is attempted as a clear call, and go-secure transitionsare not allowed.

There are at least nine ways in which a point-to-point voice call may beplaced from the user interface:

-   -   1. Manually entering the phone number and pressing [SEND] or        pressing and holding [SEND].    -   2. Selecting a number from the Call History List and pressing        [SEND] or pressing and holding [SEND].    -   3. Recalling a number from the Call History Detail Display and        pressing [SEND] or pressing and holding [SEND].    -   4. One Touch Dialing by pressing and holding the digit        corresponding to the desired phone memory location number.    -   5. Two Touch Dialing by pressing and holding the digits        corresponding to the desired phone memory location number. For        example, to dial memory location 25, press 2 then press and hold        5.    -   6. Speed dialing by entering 1 or 2 digits and pressing [SEND]        or pressing and holding [SEND].    -   7. Dialing from a phone book memory list by pressing [SEND] or        pressing and holding [SEND].    -   8. Dialing from a phone book memory display by pressing [SEND]        or pressing and holding [SEND].    -   9. Pressing [SEND] to redial from standby mode (if an outgoing        call has been made and the handset has not been power cycled).        The last outgoing number information is now stored in NV memory        when the handset is powered off (i.e., the handset can be        powered off and then powered on again and the [SEND] key will        still dial the last out going number).

The following logic may be used by the user interface to determinewhether the user has requested clear or secure point-to-point voice callorigination.

-   -   In any mode, an emergency call is treated as a clear call        origination request.    -   In traditional mode, one-touch dialing, two-touch dialing, and        short [SEND] key presses initiate clear voice calls. Extended        [SEND] key presses initiate secure voice calls.    -   In secure-only mode, requests for call initiation result in        secure calls, with no fall back to clear.    -   In auto-secure mode, one-touch dialing, two-touch dialing, and        short [SEND] key presses initiate secure voice calls. Extended        [SEND] key presses initiate clear voice calls, after user        confirmation.    -   In traditional and auto-secure mode, secure call initiation may        revert back to a clear call if the secure call cannot be        established.

If the “last outgoing number” is being dialed, the above rules stillapply, regardless of whether the last outgoing number was clear orsecure. The length of the key press, together with the mode of thephone, determine whether a clear or secure call has been requested.

FIG. 4 illustrates a flowchart 400 of placing a secure call. The firstinquiry 404 is whether the user selected number is available in thephone book. If not, a secure, or data, call is initiated 408 to the userselected number. If the number is available in the phone book, the nextinquiry 412 is whether the number is registered in the phone book as asecure number. If so, a secure call 416 is initiated to the userselected number. If not, a next inquiry 420 is made as to whether asecure number is listed in the phone book in association with the userselected number. If so, the secure number in association with the userselected number is used to initiate a call 424. If not, a clear voicecall to the user selected number is initiated. This may be followed by aclear to secure transition 428, if needed.

FIG. 5 illustrates an apparatus 500 for making clear and secure calls. Auser interface 504, such as a SEND button, is operable when depressed bythe user. A circuit 508 determines the length of time the user depressesinterface 504. If the user-interface 504 is activated for more than apredetermined amount of time, the apparatus is configured to operate insecure mode. If the user-interface 504 is activated for less than apredetermined amount of time, the apparatus is configured to operate inclear mode. In an embodiment, the predetermined amount of time isbetween 0.01 and 5 seconds. In another embodiment, the predeterminedamount of time is between 1 and 3 seconds. In another embodiment, thepredetermined amount of time is 2 seconds.

If the request for point-to-point voice call origination is for a securecall, a check may be made to determine whether the secure user haslogged in. If the secure user has not logged in, the login prompt ispresented. Successful login results in a continuation of the callorigination process. Unsuccessful login (whether aborted by the user orby too many failed logins) may result in a return to an Idle StandbyMode.

The following logic may be used to determine what number should bedialed for a point-to-point voice call origination request:

When a clear call has been requested:

-   -   If the number cannot be found in the phone book, initiate a        clear voice services call to the user-selected number.    -   If the number can be determined, from the phone book, to be a        voice (clear) number, then initiate a clear voice services call        to the user-selected number.    -   If the number can be determined, from the phone book, to be a        data (secure) number, and there is an associated voice number,        then initiate a clear voice services call to the associated        voice number.

If the number can be determined, from the phone book, to be a data(secure) number, and there is no associated voice number, then initiatea clear voice services call to the user-selected number (even though itis a data number).

When a secure call has been requested:

-   -   If the number cannot be found in the phone book, initiate secure        data services call to the user-selected number.    -   If the number can be determined, from the phone book, to be a        data (secure) number, then initiate a secure data services call        to the user-selected number.    -   If the number can be determined, from the phone book, to be a        voice (clear) number, and there is an associated data (secure)        number, then initiate a secure data services call to the        associated data number.    -   If the number can be determined, from the phone book, to be a        voice (clear) number, and there is no associated data (secure)        number, then initiate a clear voice services call to the        user-selected number, followed by an immediate clear-secure        transition.

If the secure call was successfully negotiated, and the security levelis commercial security (i.e., ‘Protected’), the fingerprint iscalculated and displayed during the call.

The fingerprint may be any number of bits. In an embodiment, thefingerprint is 48 bits, obtained from the DSP. These bits are brokendown into 8 6-bit chunks. Each chunk's bits correspond to a decimalvalue, which corresponds to a character using the following mapping:

-   -   0-25 map to A-Z    -   26-51 map to a-z    -   52-61 map to O-9    -   62 maps to +    -   63 maps to /

Both ends of the phone call should have calculated the same 48 bits, andshould have the same 8 characters on their display. One user can readout his display to the other user, and they can compare to verify thatthere is no “man in the middle” attack.

When a clear point-to-point non-emergency call is active, the user canrequest a transition to a secure voice call or to a secure data call byusing the appropriate soft key or by a long press of the [SEND] key. Ifthe user has not yet logged in as the secure user, he is prompted tologin before the transition request is sent (see PIN Entry Check). Whenthe other end receives the go-secure request, the user there is promptedto log in if he has not already done so.

If the user attempts a clear to secure transition when in an emergencycall, the following display may result.

When a secure point-to-point call is active, the user may requesttransition to a clear point-to-point call by using a soft key or by along press of the [SEND] key. FNBDT signals the go-clear request to theother end, and the user there is prompted to confirm the go-cleartransition.

If the user who is strapped for secure-only attempts a go-cleartransition, the following text may be displayed for a predeterminedperiod of time. In an embodiment, the text is displayed for about 4seconds (or until a key press). An audible beep will sound (unlessrestricted), and the secure call will continue.

Secure Dial is permitted when a secure voice call has been established.The user enters digits, *, and # and then presses the [SEND] key to sendthe digits as a secure dial stream. The user may also activate a softkey for access to additional secure dial characters (Autovon FLASH-OV,FLASH, IN4MEDIATE, and PRIORITY, as well as Go On Hook and Hookflash).The secure dial display is a multi-page display.

The secure application mode change allows the user to change from securevoice to secure data. (When in the data mode, the user has an option tochange from secure data to secure voice.) The mode change is typicallyvalid after secure voice has been established. The mode change isrequested by accessing the [DATA] soft key option from In Use Standby.

A clear data call is typically originated via a command from thecommunication software of a connected computing device. A clear datacall cannot be directly connected from the handset keypad. A secure datacall is originated by selecting the Secure Data option from the Featuresmenu and then dialing the number from the keypad. The user is alerted ifthe UPV prohibits the requested data call. Unless disabled, thebacklight is illuminated at initiation of a data call.

Additional notes for outgoing data calls:

Typically, no additions to the call history list will occur for outgoingclear data calls. The call history will be updated for outgoing securedata calls.

-   -   If the last outgoing call on the handset was a clear data call        (which is dialed from AT commands through the data port), then        the last number redial feature (user pressing [SEND] key) will        dial the last number that was dialed through the keypad.    -   If no redial number is available, the following display will be        shown, and the standard key beep tone will be played as        applicable.

The CST typically cannot receive clear data calls. The followingactivity occurs upon receipt of a data call:

-   -   Since the CST does not support unattended mode, data calls must        be answered from the keypad. The determination of whether the        call is for data or voice is not made until FNBDT negotiation.    -   Data calls cannot be answered from the external computing        device's communication software commands. A data call will be        answered when the user presses [SEND], even if the keypad is        locked and the keypad will remain locked through the duration of        the call and at the end of the call.    -   The ringer may be silenced in the standard manner.    -   Typically, the phone cannot distinguish incoming secure data        calls from incoming secure voice calls, since the determination        of voice or data application is not made until FNBDT        negotiation. Incoming secure data call behavior is therefore the        same as for incoming secure voice call (the CST does not support        incoming clear data calls).

The Key Management functionality requires that the user be offline. Ifthe user is in a call when this option is selected, the “Feature notavailable during a phone call” display is shown.

While in the key management functions, the user is not allowed to goonline (by initiating or receiving a call). While keys are being loaded,the Security Subsystem may, in addition, suspend communication with thebase station by taking the modem offline.

Key management supported by the user interface allows the secure user(when the secure user PIN has been entered) to selectively delete keymaterial, to delete all key material, and (if authorized through theUPV) to load key material.

The user will be prompted to logon (if not already logged on) when the“Load Keys” menu item is selected. The user's ability to load keys isenabled through the UPV. The implementation of this function isotherwise identical to the TA's ability to load keys.

The user will be prompted to logon (if not already logged on) when the“View Keys” menu item is selected. The user's ability to view and deletekeys is otherwise identical to the TA's ability to view and delete keys.

The user will be prompted to logon (if not already logged on) when the“Delete All Keys'menu item is selected. The user's ability to delete allkeys is otherwise identical to the TA's ability to delete all keys.

Those of skill in the art would understand that the various illustrativelogical blocks, modules, circuits, and algorithm steps described inconnection with the embodiments disclosed herein may be implemented aselectronic hardware, computer software, or combinations of both. Thevarious illustrative components, blocks, modules, circuits, and stepshave been described generally in terms of their functionality. Whetherthe functionality is implemented as hardware or software depends uponthe particular application and design constraints imposed on the overallsystem. Skilled artisans recognize the interchangeability of hardwareand software under these circumstances, and how best to implement thedescribed functionality for each particular application. As examples,the various illustrative logical blocks, flowcharts, windows, and stepsdescribed in connection with the embodiments disclosed herein may beimplemented or performed in hardware or software with anapplication-specific integrated circuit (ASIC), a programmable logicdevice, discrete gate or transistor logic, discrete hardware components,such as, e.g., registers in the FIFO, a processor executing a set offirmware instructions, any conventional programmable software and aprocessor, a field programmable gate array (FPGA) or other programmablelogic device, or any combination thereof. The processor mayadvantageously be a micro-controller, but in the alternative, theprocessor may be any conventional processor, controller,micro-controller, or state machine. The software may reside in RAMmemory, flash memory, ROM memory, EPROM memory, EEPROM memory, harddisk, removable disks, a CD-ROM, a DVD-ROM, registers, or any othermagnetic or optical storage media.

The previous description of the preferred embodiments is provided toenable any persons skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without the use of inventivefaculty. Thus, the present invention is not intended to be limited tothe embodiments shown herein, but is to be accorded the widest scopeconsistent with the principles and novel features disclosed herein.

1. In a system of operating a wireless handset capable of clear callsand secure calls, a method comprising: entering a personalidentification number (PIN) each time the wireless handset is activatedto register as a secure user to allow a secure call; pressing asend/talk key for a predetermined amount of time; determining whetherthe handset is in a traditional mode, in an autosecure mode, or in asecure-only mode; if the handset is currently in the traditional mode,originating a secure call if the send/talk key is held for a time periodgreater than the predetermined amount of time, and originating a clearcall if the send/talk key is held for a time period less than thepredetermined amount of time; if the handset is currently in theautosecure mode, originating a secure call if the send/talk key is heldfor a time period less than the predetermined amount of time, sending aconfirmation request to originate a clear call if the send/talk key isheld for a time period greater than the predetermined amount of time,and originating a clear call if the confirmation request is confirmed;and if the handset is currently in the secure mode, originating a securecall.
 2. The method as set forth in claim 1, wherein the predeterminedamount of time is two seconds.
 3. The method as set forth in claim 1,further comprising disabling the handset if the PIN number isincorrectly entered more than a predetermined number of times.
 4. Themethod as set forth in claim 3, wherein the predetermined number oftimes is
 7. 5. The method as set forth in claim 3, wherein thepredetermined number of times is
 3. 6. A wireless apparatus configurableto make clear calls and secure calls, the apparatus comprising: auser-interface having keys for entering a personal identification number(PIN) each time the wires handset is activated to register as a secureuser to allow a secure call, and having a send/talk key capable of beingdepressed; and a circuit configured to measure the amount of time thesend/talk key is depressed, wherein the apparatus is configured todetermine whether the wireless apparatus is in a traditional mode, in anautosecure mode, or in a secure-only mode, wherein: if the handset is inthe traditional mode, the wireless apparatus is configured to originatea secure call if the send/talk key is depressed for greater than apredetermined amount of time, and to originate a clear call if theuser-interface key is held for a time period less than the predeterminedamount of time, if the handset is in the autosecure mode, the apparatusis configured to originate a secure call if the send/talk key isdepressed for less than a predetermined amount of time, send aconfirmation request to originate a clear call if the send/talk key isdepressed for greater than a predetermined amount of time, and originatea clear call if the confirmation request is confirmed; and if thehandset is in the secure only mode, originating a secure call.
 7. Thewireless apparatus as set forth in claim 6, wherein the predeterminedamount of time is two seconds.
 8. A wireless handset capable of clearcalls and secure calls, comprising: means for entering a personalidentification number (PIN) each time the wireless handset is activatedto register as a secure user to allow a secure call; means for pressinga send/talk key for a predetermined amount of time; means fordetermining whether the handset is in a traditional mode, in anautosecure mode, or in a secure-only mode; means for originating, if thehandset is currently in the traditional mode, a secure call if thesend/talk key is held for a time period greater than the predeterminedamount of time and a clear call if the send/talk key is held for a timeperiod less than the predetermined amount of time, means fororiginating, if the handset is currently in the autosecure mode, asecure call if the send/talk key is held for a time period less than thepredetermined amount of time, sending a confirmation request tooriginate a clear call if the send/talk key is held for a time periodgreater than the predetermined amount of time, and originating a clearcall if the confirmation request is confirmed; and mean for originatinga secure call if the handset is currently in the secure mode.
 9. Thewireless handset as set forth in claim 8, wherein the predeterminedamount of time is two seconds.
 10. The wireless handset as set forth inclaim 8, further comprising means for disabling the handset if the PINnumber is incorrectly entered more than a predetermined number of times.11. A computer program product, comprising: computer-readable mediumhaving a stored computer program, comprising: instructions for causing acomputer to receive a personal identification number (PIN) each time thewireless handset is activated to register as a secure user to allow asecure call; instructions for causing a computer to determine if asend/talk key of a handset has been pressed for a predetermined amountof time, wherein the handset is capable of clear calls and secure calls;instructions for causing a computer to determine whether the handset isin a traditional mode, in an autosecure mode, or in a secure-only mode;instructions for causing a computer to originate, if the handset iscurrently in the traditional mode, a secure call if the send/talk key isheld for a time period greater than the predetermined amount of time anda clear call if the send/talk key is held for a time period less thanthe predetermined amount of time, instructions for causing a computer tooriginate, if the handset is currently in the autosecure mode, a securecall if the send/talk key is held for a time period less than thepredetermined amount of time, sending a confirmation request tooriginate a clear call if the send/talk key is held for a time periodgreater than the predetermined amount of time, and originating a clearcall if the confirmation request is confirmed; and instructions forcausing a computer to originate a secure call if the handset iscurrently in the secure mode.
 12. The computer program product as setforth in claim 11, wherein the predetermined amount of time is twoseconds.
 13. In a system of operating a wireless handset capable ofclear calls and secure calls, a method comprising: entering a personalidentification number (PIN) to register as a secure user to allow asecure call; disabling the handset if the PIN number is incorrectlyentered more than a predetermined number of times; pressing a send/talkkey for a predetermined amount of time; determining whether the handsetis in a traditional mode, in an autosecure mode, or in a secure-onlymode; if the handset is currently in the traditional mode, originating asecure call if the send/talk key is held for a time period greater thanthe predetermined amount of time, and originating a clear call if thesend/talk key is held for a time period less than the predeterminedamount of time; if the handset is currently in the autosecure mode,originating a secure call if the send/talk key is held for a time periodless than the predetermined amount of time, sending a confirmationrequest to originate a clear call if the send/talk key is held for atime period greater than the predetermined amount of time, andoriginating a clear call if the confirmation request is confirmed; andif the handset is currently in the secure mode, originating a securecall.
 14. The method as set forth in claim 13, wherein the predeterminedamount of time is two seconds.
 15. The method as set forth in claim 13,wherein the predetermined number of times is
 7. 16. The method as setforth in claim 13, wherein the predetermined number of times is
 3. 17. Awireless apparatus configurable to make clear calls and secure calls,the apparatus comprising: a user-interface having: keys for entering apersonal identification number (PIN) to register as a secure user toallow a secure call, wherein the handset is disabled if the PIN numberis incorrectly entered more than a predetermined number of times, and asend/talk key capable of being depressed; and a circuit configured tomeasure the amount of time the send/talk key is depressed, wherein theapparatus is configured to determine whether the wireless apparatus isin a traditional mode, in an autosecure mode, or in a secure-only mode,wherein: if the handset is in the traditional mode, the wirelessapparatus is configured to originate a secure call if the send/talk keyis depressed for greater than a predetermined amount of time, and tooriginate a clear call if the user-interface key is held for a timeperiod less than the predetermined amount of time, if the handset is inthe autosecure mode, the apparatus is configured to originate a securecall if the send/talk key is depressed for less than a predeterminedamount of time, send a confirmation request to originate a clear call ifthe send/talk key is depressed for greater than a predetermined amountof time, and originate a clear call if the confirmation request isconfirmed; and if the handset is in the secure only mode, originating asecure call.
 18. The wireless apparatus as set forth in claim 17,wherein the predetermined amount of time is two seconds.
 19. Thewireless apparatus as set forth in claim 17, wherein the predeterminednumber of times is
 7. 20. The wireless apparatus as set forth in claim17, wherein the predetermined number of times is
 3. 21. A wirelesshandset capable of clear calls and secure calls, comprising: means forentering a personal identification number (PIN) to register as a secureuser to allow a secure call; means for disabling the handset if the PINnumber is incorrectly entered more than a predetermined number of times;means for pressing a send/talk key for a predetermined amount of time;means for determining whether the handset is in a traditional mode, inan autosecure mode, or in a secure-only mode; means for originating, ifthe handset is currently in the traditional mode, a secure call if thesend/talk key is held for a time period greater than the predeterminedamount of time and a clear call if the send/talk key is held for a timeperiod less than the predetermined amount of time, means fororiginating, if the handset is currently in the autosecure mode, asecure call if the send/talk key is held for a time period less than thepredetermined amount of time, sending a confirmation request tooriginate a clear call if the send/talk key is held for a time periodgreater than the predetermined amount of time, and originating a clearcall if the confirmation request is confirmed; and mean for originatinga secure call if the handset is currently in the secure mode.
 22. Thewireless handset as set forth in claim 21, wherein the predeterminedamount of time is two seconds.
 23. The wireless handset as set forth inclaim 21, wherein the predetermined number of times is
 7. 24. Thewireless handset as set forth in claim 21, wherein the predeterminednumber of times is
 3. 25. A computer program product, comprising:computer-readable medium having a stored computer program, comprising:instructions for causing a computer to receive a personal identificationnumber (PIN) each time the wireless handset is activated to register asa secure user to allow a secure call; instructions for causing acomputer to disable the handset if the PIN number is incorrectly enteredmore than a predetermined number of times; instructions for causing acomputer to determine if a send/talk key of a handset has been pressedfor a predetermined amount of time, wherein the handset is capable ofclear calls and secure calls; instructions for causing a computer todetermine whether the handset is in a traditional mode, in an autosecuremode, or in a secure-only mode; instructions for causing a computer tooriginate, if the handset is currently in the traditional mode, a securecall if the send/talk key is held for a time period greater than thepredetermined amount of time and a clear call if the send/talk key isheld for a time period less than the predetermined amount of time,instructions for causing a computer to originate, if the handset iscurrently in the autosecure mode, a secure call if the send/talk key isheld for a time period less than the predetermined amount of time,sending a confirmation request to originate a clear call if thesend/talk key is held for a time period greater than the predeterminedamount of time, and originating a clear call if the confirmation requestis confirmed; and instructions for causing a computer to originate asecure call if the handset is currently in the secure mode.
 26. Thecomputer program product as set forth in claim 25, wherein thepredetermined amount of time is two seconds.
 27. The computer programproduct as set forth in claim 25, wherein the predetermined number oftimes is
 7. 28. The computer program product as set forth in claim 25,wherein the predetermined number of times is 3.