SYSTEMS AND METHODS FOR ENABLING TEMPORARY, USER-AUTHORIZED CLONING OF MOBILE PHONE FUNCTIONALITY ON A SECURE SERVER ACCESSIBLE VIA A REMOTE CLIENT
First Claim
1. A method enabling temporary, user-authorized cloning of physical mobile phone functionality on a secure server that can be accessed and controlled by the user through a remote client, comprising:
- setting up a cloned mobile phone service for a physical mobile phone on a secure server by registering a physical mobile phone with the secure server;
maintaining data synchronization between the secure server and the physical bile phone when the physical mobile phone obtains communication with the secure server;
receiving communications and data associated with the physical mobile phone at said secure server simultaneously with receipt of communications and data by said physical mobile phone or when said physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server; and
enabling an authorized user of the physical mobile phone to obtain secure communication with the secure server via a remote client, wherein the authorized user can access and manage cloned mobile phone data and communicate with third parties from the remote client via the secure server.
3 Assignments
0 Petitions
Accused Products
Abstract
Temporary, user-authorized cloning of physical mobile phone functionality via a secure server can enable physical mobile phone features to be accessed and controlled by a user from a remote client. A secure server can include mobile phone registration information, enable secure access by users via a remote client, maintain communication and synchronization with the mobile phone, receive data associated with the physical mobile phone when is not in communication with at least one of a supporting telecommunication network and the secure server, and enable the physical mobile phone user to obtain secure communication with the secure server via a remote client, access and manage cloned mobile phone data and communicate with third parties. Physical mobile phone user access to the secure server and cloned mobile phone functionality with the remote client can be terminated once the physical mobile phone user logs off of the secure server from the remote client.
-
Citations
20 Claims
-
1. A method enabling temporary, user-authorized cloning of physical mobile phone functionality on a secure server that can be accessed and controlled by the user through a remote client, comprising:
-
setting up a cloned mobile phone service for a physical mobile phone on a secure server by registering a physical mobile phone with the secure server; maintaining data synchronization between the secure server and the physical bile phone when the physical mobile phone obtains communication with the secure server; receiving communications and data associated with the physical mobile phone at said secure server simultaneously with receipt of communications and data by said physical mobile phone or when said physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server; and enabling an authorized user of the physical mobile phone to obtain secure communication with the secure server via a remote client, wherein the authorized user can access and manage cloned mobile phone data and communicate with third parties from the remote client via the secure server. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method enabling temporary, user-authorized cloning of physical mobile phone functionality on a secure server that can be accessed and controlled by the user through a remote client, comprising:
-
a physical mobile phone user sets up a cloned mobile phone service on a secure server by registering a physical mobile phone with the secure server; the secure server and the physical mobile phone maintain synchronization when the physical mobile phone obtains communication with the secure server; the secure server receives communication data associated with the physical mobile phone when the physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server; the physical mobile phone user obtains secure communication with the secure server via a remote client; the physical mobile phone user can access and manage cloned mobile phone data and communicate with third parties from the secure server via the remote client; and access to the secure server and cloned mobile phone functionality with the remote client is terminated once the physical mobile phone user logs off of the secure server from the remote client. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system enabling temporary, user-authorized cloning of physical mobile phone functionality on a secure server that can be accessed and controlled by an authorized user of the physical mobile phone through a remote client, comprising:
-
a secure server with data network access, said secure server including physical mobile phone registration information, enabling secure access by the authorized user of the physical mobile phone via a remote client, maintaining communication and synchronization with the physical mobile phone, receiving communication data associated with the physical mobile phone when the physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server, enabling the authorized user of the physical mobile phone to obtain secure communication with the secure server via a remote client, access and manage cloned mobile phone data, and communicate with third parties; wherein authorized user access to the secure server and cloned mobile phone functionality with the remote client is terminated once the authorized user logs off of the secure server from the remote client. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification