×

Systems and methods for enabling temporary, user-authorized cloning of mobile phone functionality on a secure server accessible via a remote client

  • US 9,729,628 B2
  • Filed: 02/24/2012
  • Issued: 08/08/2017
  • Est. Priority Date: 03/09/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method enabling temporary, user-authorized cloning of physical mobile phone functionality and data via another user'"'"'s remote client based on data stored in a secure server that can be accessed and controlled by the user through the another user'"'"'s remote client to obtain and manage data and communicate with third parties as if communication were from the physical mobile phone, comprising:

  • setting up a cloned mobile phone service for a physical mobile phone on a secure server by registering a physical mobile phone with the secure server;

    maintaining synchronization of features, functionality and data between the secure server and the physical mobile phone when the physical mobile phone is in communication with the secure server and maintaining functionality with respect to incoming communications from third parties when the physical mobile phone is out of communication with the secure server;

    receiving and recording a communication and data file of communications and data associated with the physical mobile phone at said secure server simultaneously with receipt of communications including voice calls and text data by said physical mobile phone and when said physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server;

    enabling an authorized user of the physical mobile phone to conduct secure communication with the secure server and access the communications and data file via another user'"'"'s remote client capable of supporting voice and text data communications, wherein the authorized user can access and manage cloned mobile phone functionality and data representing the physical mobile phone from the communications and data file including voice and text communications and the authorized user can engage in communication with third parties via coordination between the other user'"'"'s remote client and the server using identification information associated with the physical mobile phone the identification information including caller identification information in the form of the physical mobile phone'"'"'s phone number normally representing the identity of the physical mobile phone during voice and text communication with third party devices and the identification information is used by another user'"'"'s remote client as if the other user'"'"'s remote client being used by the user is the physical mobile phone while communicating in voice and text with third party devices from the other user'"'"'s remote client, via the secure server thereby representing another user'"'"'s remote client as the physical client to third parties as if the user were using the physical mobile phone rather than the remote client to communicate with third party mobile devices; and

    access to the secure server and cloned mobile phone functionality with another user'"'"'s remote client is terminated and data related to communications and processed with another user'"'"'s remote client is recorded in the communications and data file once at least one of;

    the physical mobile phone user logs off of the secure server from the other user'"'"'s remote client or the other user'"'"'s remote client losses communication with the remote server.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×