Method and system for secure mobile messaging
First Claim
Patent Images
1. A computer-implemented method for secure mobile messaging comprising the steps of:
- a remote computer receiving from a first computer an authentication request, the authentication request comprising a first computer serial number, a unique software license key, and a mobile device serial number, the unique software license key and the mobile device serial number associated with a mobile device in communication with the first computer;
the remote computer determining whether the mobile device is authorized for use with the first computer by determining a valid combination of the first computer serial number and at least one of the unique software license key and the mobile device serial number;
the remote computer transmitting to the first computer a validation message associated with the mobile device;
the remote computer receiving from the first computer a first detail message associated with a first file copied from a virtual container on the first computer to a virtual container on the mobile device, the first detail message comprising at least a name of the first file copied from the first computer to the mobile device;
the remote computer storing the first detail message in a meta-data log;
the remote computer receiving from a second computer an authentication request, the authentication request comprising a second computer serial number, the unique software license key, and the mobile device serial number, the unique software license key and the mobile device serial number associated with the mobile device, the mobile device in communication with the second computer;
the remote computer determining whether the mobile device is authorized for use with the second computer by determining a valid combination of the second computer serial number and at least one of the unique software license key and the mobile device serial number;
the remote computer transmitting to the second computer a validation message associated with the mobile device;
the remote computer receiving from the second computer a second detail message associated with the first file copied from the virtual container on the mobile device to a virtual container on the second computer, the second detail message comprising at least the name of the first file copied from the mobile device to the second computer; and
the remote computer storing the second detail message in the meta-data log.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
83 Citations
30 Claims
-
1. A computer-implemented method for secure mobile messaging comprising the steps of:
-
a remote computer receiving from a first computer an authentication request, the authentication request comprising a first computer serial number, a unique software license key, and a mobile device serial number, the unique software license key and the mobile device serial number associated with a mobile device in communication with the first computer; the remote computer determining whether the mobile device is authorized for use with the first computer by determining a valid combination of the first computer serial number and at least one of the unique software license key and the mobile device serial number; the remote computer transmitting to the first computer a validation message associated with the mobile device; the remote computer receiving from the first computer a first detail message associated with a first file copied from a virtual container on the first computer to a virtual container on the mobile device, the first detail message comprising at least a name of the first file copied from the first computer to the mobile device; the remote computer storing the first detail message in a meta-data log; the remote computer receiving from a second computer an authentication request, the authentication request comprising a second computer serial number, the unique software license key, and the mobile device serial number, the unique software license key and the mobile device serial number associated with the mobile device, the mobile device in communication with the second computer; the remote computer determining whether the mobile device is authorized for use with the second computer by determining a valid combination of the second computer serial number and at least one of the unique software license key and the mobile device serial number; the remote computer transmitting to the second computer a validation message associated with the mobile device; the remote computer receiving from the second computer a second detail message associated with the first file copied from the virtual container on the mobile device to a virtual container on the second computer, the second detail message comprising at least the name of the first file copied from the mobile device to the second computer; and the remote computer storing the second detail message in the meta-data log. - View Dependent Claims (2, 3, 4, 5, 6, 20, 21, 22, 28)
-
-
7. A computer-implemented method for secure mobile messaging comprising the steps of:
-
a remote computer receiving from a mobile device a first computer serial number, a unique software license key, and a mobile device serial number, the mobile device in communication with a first computer; the remote computer determining whether the mobile device is authorized for use with the first computer by determining a valid combination of the first computer serial number and at least one of the unique software license key and the mobile device serial number; the remote computer transmitting to the first computer a validation message associated with the mobile device; the remote computer receiving from the mobile device a first detail message associated with a first file copied from a virtual container on the first computer to a virtual container on the mobile device, the first detail message comprising at least a name of the first file copied from the first computer to the mobile device; the remote computer storing the first detail message in a meta-data log; the remote computer receiving from the mobile device a second computer serial number, the unique software license key, and the mobile device serial number, the mobile device in communication with a second computer; the remote computer determining whether the mobile device is authorized for use with the second computer by determining a valid combination of the second computer serial number and at least one of the unique software license key and the mobile device serial number; the remote computer transmitting to the second computer a validation message associated with the mobile device; the remote computer receiving from the mobile device a second detail message associated with the first file copied from the virtual container on the mobile device to a virtual container on the second computer, the second detail message comprising at least the name of the first file copied from the mobile device to the second computer; and the remote computer storing the second detail message in the meta-data log. - View Dependent Claims (8, 9, 10, 11, 12, 23, 24, 25, 29)
-
-
13. A computer-implemented method for secure mobile messaging, comprising the steps of:
-
a remote computer receiving from a first mobile device a first mobile device serial number and a first unique software license key, the first mobile device in communication with the remote computer; the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device serial number and the first unique software license key; upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device; the remote computer receiving from a virtual container on the first mobile device a first file copied from the first mobile device; the remote computer storing a first detail message in a meta-data log, the first detail message associated with the first file copied from the first mobile device to the remote computer, the first detail message comprising at least a name of the first file copied from the first mobile device to the remote computer; the remote computer receiving from a second mobile device a second mobile device serial number and a second unique software license key, the second mobile device in communication with the remote computer; the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device serial number and the second unique software license key; upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device; the remote computer transmitting to the second mobile device a copy of the first file copied from the virtual container on first mobile device to the remote computer, the first file stored in a virtual container on the second mobile device; and the remote computer storing in the meta-data log a second detail message associated with the first file transmitted from the remote computer to the second mobile device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 26, 27, 30)
-
Specification