×

Systems and methods for enabling temporary, user-authorized cloning of mobile phone functionality on a secure server accessible via a remote client

  • US 10,313,435 B2
  • Filed: 08/07/2017
  • Issued: 06/04/2019
  • Est. Priority Date: 03/09/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method enabling temporary, user-authorized cloning of an authorized user'"'"'s physical mobile phone functionality and data via another remote client based on data stored in a secure server that can be accessed and controlled by the authorized user through another remote client to obtain and manage data and communicate with third parties as if communication were from the physical mobile phone, comprising:

  • setting up a cloned mobile phone service for a physical mobile phone on a secure server by registering a physical mobile phone associated with the authorized user with the secure server;

    maintaining synchronization of features, functionality and data between the secure server and the physical mobile phone when the physical mobile phone is in communication with the secure server and maintaining functionality with respect to incoming communications from third parties when the physical mobile phone is out of communication with the secure server;

    receiving and recording a communications and data file of communications and data associated with the physical mobile phone at said secure server simultaneously with receipt of communications and data by said physical mobile phone or when said physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server; and

    enabling the authorized user of the physical mobile phone to obtain secure communication with the secure server and access the communications and data file via the another remote client capable of supporting voice and text data communications, wherein the authorized user can access and manage cloned mobile phone data representing the physical mobile phone from the communications and data file including voice and text communications and the authorized user can engage in communication with third parties via coordination between the another remote client and the secure server using physical mobile phone identification information in place of the another remote client identification information, wherein access to the secure server and cloned mobile phone functionality and the data file using the another remote client is terminated with data related to communications and processed with the another remote client on behalf of the authorized user is recorded in the communications and data file once the another remote client terminates communication with the remote server.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×