Secure Cloud-Based Phonebook
First Claim
Patent Images
1. A secure phonebook system, comprising:
- a mobile device having a mobile application installed thereon that is programmed to require a user to enter session credentials and to transmit those session credentials when said mobile application is opened;
a remotely positioned server interconnected to a database, wherein said server is programmed to store data representing said at least one contact and user credentials associated with said stored data, and is further programmed to transmit said data to said mobile device when said mobile application provides session credentials that match stored user credentials;
wherein said mobile application is programmed to display said data representing at least one contact only after said mobile application is opened and has received said data representing at least one contact from said server and to delete said data representing at least one contact each time said mobile application is closed.
0 Assignments
0 Petitions
Accused Products
Abstract
A cloud-based system for securely maintaining phone numbers and contacts. A mobile application residing on a mobile computing device interfaces with a remotely positioned server to provide phonebook capabilities to a single user of the mobile application. Contact information is only maintained on the remote server and any local information is removed when the mobile application is exited or closed. The server only allows one registered user/device to access the remotely stored information at a time and will notify the authorized user of any attempts to access the remote server.
14 Citations
18 Claims
-
1. A secure phonebook system, comprising:
-
a mobile device having a mobile application installed thereon that is programmed to require a user to enter session credentials and to transmit those session credentials when said mobile application is opened; a remotely positioned server interconnected to a database, wherein said server is programmed to store data representing said at least one contact and user credentials associated with said stored data, and is further programmed to transmit said data to said mobile device when said mobile application provides session credentials that match stored user credentials; wherein said mobile application is programmed to display said data representing at least one contact only after said mobile application is opened and has received said data representing at least one contact from said server and to delete said data representing at least one contact each time said mobile application is closed. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of securing contact information used on a mobile device, comprising the steps of:
-
providing a mobile application for a mobile device that is programmed to require a user to enter session credentials and to transmit those session credentials when said mobile application is opened; providing a remotely positioned server interconnected to a database, wherein said server is programmed to store data representing said at least one contact and user credentials associated with said stored data, and is further programmed to transmit said data to said mobile device when said mobile application provides session credentials that match stored user credentials; using said mobile application to display said data representing at least one contact only after said mobile application is opened and has received said data representing at least one contact from said server; and deleting said data representing at least one contact each time said mobile application is closed. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method of securely providing contact information, comprising the steps of:
-
allowing a user to access a dedicated contact database stored on a remotely positioned server from a mobile device; providing the user with contact information stored on said remotely positioned server in said dedicated contact database; allowing said user to use said contact information to initiate a communication; and automatically deleting all copies of said contact information stored on said mobile device. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification