Method and system for remote data access using a mobile device
First Claim
Patent Images
1. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
- a remote computer receiving from a first mobile device a first authentication request comprising a first mobile device unique identifier and a first software unique identifier, the first mobile device unique identifier comprising a first device serial number and the first software unique identifier comprising a first software license key, the first software license key associated with software stored on the first mobile device;
the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device unique identifier and the first software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier;
upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device;
the remote computer receiving from the first mobile device a first file copied from the first mobile device;
the remote computer storing a first detail message in a meta-data log, the first detail message associated with the first file copied from the first mobile device to the remote computer, the first detail message comprising at least a name of the first file copied from the first mobile device to the remote computer;
the remote computer receiving from a second mobile device a second authentication request comprising a second mobile device unique identifier and a second software unique identifier, the second mobile device unique identifier comprising a second device serial number and the second software unique identifier comprising a second software license key, the second software license key associated with software stored on the second mobile device;
the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device unique identifier and the second software unique identifier;
upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device;
the remote computer transmitting to the second mobile device a copy of the first file copied from the first mobile device to the remote computer; and
the remote computer storing in the meta-data log a second detail message associated with the first file transmitted from the remote computer to the second mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
96 Citations
18 Claims
-
1. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a first mobile device a first authentication request comprising a first mobile device unique identifier and a first software unique identifier, the first mobile device unique identifier comprising a first device serial number and the first software unique identifier comprising a first software license key, the first software license key associated with software stored on the first mobile device; the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device unique identifier and the first software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device; the remote computer receiving from the first mobile device a first file copied from the first mobile device; the remote computer storing a first detail message in a meta-data log, the first detail message associated with the first file copied from the first mobile device to the remote computer, the first detail message comprising at least a name of the first file copied from the first mobile device to the remote computer; the remote computer receiving from a second mobile device a second authentication request comprising a second mobile device unique identifier and a second software unique identifier, the second mobile device unique identifier comprising a second device serial number and the second software unique identifier comprising a second software license key, the second software license key associated with software stored on the second mobile device; the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device unique identifier and the second software unique identifier; upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device; the remote computer transmitting to the second mobile device a copy of the first file copied from the first mobile device to the remote computer; and the remote computer storing in the meta-data log a second detail message associated with the first file transmitted from the remote computer to the second mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a first mobile device a first authentication request comprising a first mobile device unique identifier and a first software unique identifier, the first mobile device unique identifier comprising a first device serial number and the first software unique identifier comprising a first software license key, the first software license key associated with software stored on the first mobile device; the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device unique identifier and the first software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device; the remote computer receiving from the first mobile device a first file copied from the first mobile device; and the remote computer storing a detail message in a meta-data log, the detail message associated with the first file copied from the first mobile device to the remote computer, the detail message comprising at least a name of the first file copied from the first mobile device to the remote computer. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a second mobile device a second authentication request comprising a second mobile device unique identifier and a second software unique identifier, the second mobile device unique identifier comprising a second device serial number and the second software unique identifier comprising a second software license key, the second software license key associated with software stored on the second mobile device; the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device unique identifier and the second software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device; the remote computer transmitting to the second mobile device a copy of a first file copied from a first mobile device to the remote computer; and the remote computer storing in a meta-data log a detail message associated with the first file transmitted from the remote computer to the second mobile device. - View Dependent Claims (15, 16, 17, 18)
-
Specification