Systems and methods for enabling temporary, user-authorized cloning of mobile phone functionality on a secure server accessible via a remote client
First Claim
1. A method enabling temporary, user-authorized cloning of an authorized user'"'"'s physical mobile phone functionality and data via another remote client based on data stored in a secure server that can be accessed and controlled by the authorized user through another remote client to obtain and manage data and communicate with third parties as if communication were from the physical mobile phone, comprising:
- setting up a cloned mobile phone service for a physical mobile phone on a secure server by registering a physical mobile phone associated with the authorized user with the secure server;
maintaining synchronization of features, functionality and data between the secure server and the physical mobile phone when the physical mobile phone is in communication with the secure server and maintaining functionality with respect to incoming communications from third parties when the physical mobile phone is out of communication with the secure server;
receiving and recording a communications and data file of communications and data associated with the physical mobile phone at said secure server simultaneously with receipt of communications and data by said physical mobile phone or when said physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server; and
enabling the authorized user of the physical mobile phone to obtain secure communication with the secure server and access the communications and data file via the another remote client capable of supporting voice and text data communications, wherein the authorized user can access and manage cloned mobile phone data representing the physical mobile phone from the communications and data file including voice and text communications and the authorized user can engage in communication with third parties via coordination between the another remote client and the secure server using physical mobile phone identification information in place of the another remote client identification information, wherein access to the secure server and cloned mobile phone functionality and the data file using the another remote client is terminated with data related to communications and processed with the another remote client on behalf of the authorized user is recorded in the communications and data file once the another remote client terminates communication with the remote server.
2 Assignments
0 Petitions
Accused Products
Abstract
Temporary, user-authorized cloning of physical mobile phone functionality via a secure server can enable physical mobile phone features to be accessed and controlled by a user from a remote client. A secure server can include mobile phone registration information, enable secure access by users via a remote client, maintain communication and synchronization with the mobile phone, receive data associated with the physical mobile phone when is not in communication with at least one of a supporting telecommunication network and the secure server, and enable the physical mobile phone user to obtain secure communication with the secure server via a remote client, access and manage cloned mobile phone data and communicate with third parties. Physical mobile phone user access to the secure server and cloned mobile phone functionality with the remote client can be terminated once the physical mobile phone user logs off of the secure server from the remote client.
34 Citations
17 Claims
-
1. A method enabling temporary, user-authorized cloning of an authorized user'"'"'s physical mobile phone functionality and data via another remote client based on data stored in a secure server that can be accessed and controlled by the authorized user through another remote client to obtain and manage data and communicate with third parties as if communication were from the physical mobile phone, comprising:
-
setting up a cloned mobile phone service for a physical mobile phone on a secure server by registering a physical mobile phone associated with the authorized user with the secure server; maintaining synchronization of features, functionality and data between the secure server and the physical mobile phone when the physical mobile phone is in communication with the secure server and maintaining functionality with respect to incoming communications from third parties when the physical mobile phone is out of communication with the secure server; receiving and recording a communications and data file of communications and data associated with the physical mobile phone at said secure server simultaneously with receipt of communications and data by said physical mobile phone or when said physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server; and enabling the authorized user of the physical mobile phone to obtain secure communication with the secure server and access the communications and data file via the another remote client capable of supporting voice and text data communications, wherein the authorized user can access and manage cloned mobile phone data representing the physical mobile phone from the communications and data file including voice and text communications and the authorized user can engage in communication with third parties via coordination between the another remote client and the secure server using physical mobile phone identification information in place of the another remote client identification information, wherein access to the secure server and cloned mobile phone functionality and the data file using the another remote client is terminated with data related to communications and processed with the another remote client on behalf of the authorized user is recorded in the communications and data file once the another remote client terminates communication with the remote server. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method enabling temporary, user-authorized cloning of an authorized user'"'"'s portable communications device'"'"'s functionality and associated data using another remote client based on data stored on a secure server that can be accessed and controlled by the authorized user through the another remote client to obtain and manage the data and communicate with third parties, comprising:
-
providing a secure server configured for continuously cloning mobile device functionality and data, wherein the authorized user sets up a cloned mobile phone service on the secure server by registering the portable communications device with the secure server; the secure server and the portable communications device maintain synchronization of functionality and data with the secure server when the portable communications device is in communication with the secure server; the secure server receives updates from the portable communications device and records a communication and data file of communication data including logs of voice calls and text data associated with the user'"'"'s smartphone when the portable communications device is not available to the authorized user or is otherwise not in communication with at least one of a supporting telecommunication network and the secure server; the user'"'"'s smartphone becomes unavailable to the user; the user selectively and securely accesses the remote server and the communication and data file via the another remote client capable of supporting voice and text data communications and manages cloned mobile phone functionality and data representing the portable communications device, accesses voice and text communications associated with the portable communications device, and selectively communicates in voice and text with third parties from the another remote client via the secure server using the portable communications device'"'"'s identification information during voice and text communication with third party devices as if the another remote client is the portable communications device associated with the authorized user while communicating in voice and text with third party devices from the another remote client via the secure server using the identification information for the portable communications device that normally represents the identity of the portable communications device and the authorized user for identification to the third party devices; and termination of authorized access to the secure server and cloned mobile phone functionality with the another remote client and data representing any voice logs and text communications during the authorized access is stored in the communications and data file at the secure server once communication with the secure server is terminated from the another remote client. - View Dependent Claims (7, 8, 9, 10)
-
- 11. A system enabling temporary, user-authorized cloning of an authorized user'"'"'s portable communications device'"'"'s data and communications functionality on a secure server that can be accessed and controlled by the authorized user via another remote client, comprising a secure server with data network access, said secure server configured to clone authorized user portable communications device data and their functionality including storage of portable communications device registration information, enabling secure access by the authorized users of portable communications devices registered with the secure server via other remote clients, maintaining communication and synchronization of the functionality and the data associated with the portable communications devices in a communications and data file associated with authorized users and their portable communications devices, receiving communication data associated with the portable communications devices when the portable communications devices are not available to their authorized users or are not in communication with at least one of a supporting telecommunication network and the secure server, and enabling authorized users of the portable communications devices registered with the secure server to obtain secure communication with the secure server via other remote clients, access and manage cloned mobile phone data stored in the communications and data file, and communicate with third parties wherein authorized user access to the secure server and cloned portable communications device functionality with the remote client is terminated by the secure server once communications terminates between the secure server and the remote clients.
Specification