Systems and methods for enabling temporary, user-authorized cloning of mobile phone functionality on a secure server accessible via a remote client
First Claim
1. A method enabling temporary, user-authorized cloning of physical mobile phone functionality and data via another user'"'"'s remote client based on data stored in a secure server that can be accessed and controlled by the user through the another user'"'"'s remote client to obtain and manage data and communicate with third parties as if communication were from the physical mobile phone, comprising:
- setting up a cloned mobile phone service for a physical mobile phone on a secure server by registering a physical mobile phone with the secure server;
maintaining synchronization of features, functionality and data between the secure server and the physical mobile phone when the physical mobile phone is in communication with the secure server and maintaining functionality with respect to incoming communications from third parties when the physical mobile phone is out of communication with the secure server;
receiving and recording a communication and data file of communications and data associated with the physical mobile phone at said secure server simultaneously with receipt of communications including voice calls and text data by said physical mobile phone and when said physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server;
enabling an authorized user of the physical mobile phone to conduct secure communication with the secure server and access the communications and data file via another user'"'"'s remote client capable of supporting voice and text data communications, wherein the authorized user can access and manage cloned mobile phone functionality and data representing the physical mobile phone from the communications and data file including voice and text communications and the authorized user can engage in communication with third parties via coordination between the other user'"'"'s remote client and the server using identification information associated with the physical mobile phone the identification information including caller identification information in the form of the physical mobile phone'"'"'s phone number normally representing the identity of the physical mobile phone during voice and text communication with third party devices and the identification information is used by another user'"'"'s remote client as if the other user'"'"'s remote client being used by the user is the physical mobile phone while communicating in voice and text with third party devices from the other user'"'"'s remote client, via the secure server thereby representing another user'"'"'s remote client as the physical client to third parties as if the user were using the physical mobile phone rather than the remote client to communicate with third party mobile devices; and
access to the secure server and cloned mobile phone functionality with another user'"'"'s remote client is terminated and data related to communications and processed with another user'"'"'s remote client is recorded in the communications and data file once at least one of;
the physical mobile phone user logs off of the secure server from the other user'"'"'s remote client or the other user'"'"'s remote client losses communication with the remote server.
3 Assignments
0 Petitions
Accused Products
Abstract
Temporary, user-authorized cloning of physical mobile phone functionality via a secure server can enable physical mobile phone features to be accessed and controlled by a user from a remote client. A secure server can include mobile phone registration information, enable secure access by users via a remote client, maintain communication and synchronization with the mobile phone, receive data associated with the physical mobile phone when is not in communication with at least one of a supporting telecommunication network and the secure server, and enable the physical mobile phone user to obtain secure communication with the secure server via a remote client, access and manage cloned mobile phone data and communicate with third parties. Physical mobile phone user access to the secure server and cloned mobile phone functionality with the remote client can be terminated once the physical mobile phone user logs off of the secure server from the remote client.
35 Citations
11 Claims
-
1. A method enabling temporary, user-authorized cloning of physical mobile phone functionality and data via another user'"'"'s remote client based on data stored in a secure server that can be accessed and controlled by the user through the another user'"'"'s remote client to obtain and manage data and communicate with third parties as if communication were from the physical mobile phone, comprising:
-
setting up a cloned mobile phone service for a physical mobile phone on a secure server by registering a physical mobile phone with the secure server; maintaining synchronization of features, functionality and data between the secure server and the physical mobile phone when the physical mobile phone is in communication with the secure server and maintaining functionality with respect to incoming communications from third parties when the physical mobile phone is out of communication with the secure server; receiving and recording a communication and data file of communications and data associated with the physical mobile phone at said secure server simultaneously with receipt of communications including voice calls and text data by said physical mobile phone and when said physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server; enabling an authorized user of the physical mobile phone to conduct secure communication with the secure server and access the communications and data file via another user'"'"'s remote client capable of supporting voice and text data communications, wherein the authorized user can access and manage cloned mobile phone functionality and data representing the physical mobile phone from the communications and data file including voice and text communications and the authorized user can engage in communication with third parties via coordination between the other user'"'"'s remote client and the server using identification information associated with the physical mobile phone the identification information including caller identification information in the form of the physical mobile phone'"'"'s phone number normally representing the identity of the physical mobile phone during voice and text communication with third party devices and the identification information is used by another user'"'"'s remote client as if the other user'"'"'s remote client being used by the user is the physical mobile phone while communicating in voice and text with third party devices from the other user'"'"'s remote client, via the secure server thereby representing another user'"'"'s remote client as the physical client to third parties as if the user were using the physical mobile phone rather than the remote client to communicate with third party mobile devices; and access to the secure server and cloned mobile phone functionality with another user'"'"'s remote client is terminated and data related to communications and processed with another user'"'"'s remote client is recorded in the communications and data file once at least one of;
the physical mobile phone user logs off of the secure server from the other user'"'"'s remote client or the other user'"'"'s remote client losses communication with the remote server. - View Dependent Claims (2, 3, 4)
-
-
5. A method enabling temporary, user-authorized cloning of the user'"'"'s smartphone functionality and data via another user'"'"'s remote client based on data stored in a secure server that can be accessed and controlled by the user through another user'"'"'s remote client to obtain and manage data and communicate with third parties, comprising:
-
providing a secure server configured for cloning mobile device functionality and data, wherein a smartphone user sets up a cloned mobile phone service on the secure server by registering the user'"'"'s smartphone with the secure server; the secure server and the user'"'"'s smartphone maintain synchronization of functionality and data between the secure server and the physical mobile phone when the user'"'"'s smartphone is in communication with the secure server; the secure server receives updates from the user'"'"'s smartphone and records a communication and data file of communication data including logs of voice calls and text data associated with the user'"'"'s smartphone when the user'"'"'s smartphone is not in communication with at least one of a supporting telecommunication network and the secure server; the user selectively and securely accesses the remote server and the communication and data file via another user'"'"'s remote client capable of supporting voice and text data communications and manages cloned mobile phone functionality and data representing the user'"'"'s smartphone, accesses voice and text communications associated with the user'"'"'s smartphone, and selectively communicates in voice and text with third parties from the other user'"'"'s remote client via the secure server using the user'"'"'s smartphone identification information including using caller identification information in the form of the the user'"'"'s smartphone phone number during voice and text communication with third party devices as if the other user'"'"'s remote client is the user'"'"'s smartphone while communicating in voice and text with third party devices from the other user'"'"'s remote client via the secure server using the the user'"'"'s smartphone phone number that normally represents the identity of the user'"'"'s smartphone for identification to the third party devices; and authorized access to the secure server and cloned mobile phone functionality with another user'"'"'s remote client is terminated and current data representing any voice logs and text communications during the authorized access is stored in the communication and data file at the secure server once the user logs off of the secure server from the other user'"'"'s remote client or the other user'"'"'s remote client losses communication with the remote server. - View Dependent Claims (6, 7, 8)
-
-
9. A system enabling temporary, user-authorized cloning of the user'"'"'s smartphone communications functionality and data via another user'"'"'s smartphone based on data stored in a secure server that can be accessed and controlled by the user of the user'"'"'s smartphone through another user'"'"'s smartphone, comprising a secure server with data network access, said secure server configured to clone smartphones and their functionality including:
-
storage of smartphone registration information, secure access to functionality and data associated with smartphones by the authorized user of the smartphones via smartphones owned by other users; maintaining communication and synchronization of the functionality and the data associated with the physical mobile phone in a communications and data file; receiving communication data including voice and text associated with the physical mobile phone when the physical mobile phone is not in communication with at least one of a supporting telecommunication network and the secure server and recording the communications data in a communications and data file; enabling the authorized user of the user'"'"'s smartphone to conduct voice and text communication with third party mobile devices through the secure server via another user'"'"'s smartphone and via access to the communications and data file and using physical mobile phone number information including caller identification information in the form of the user'"'"'s smartphone number during voice and text communication with third party devices as if another user'"'"'s smartphone is the user'"'"'s smartphone while communicating in voice and text with third party devices from another user'"'"'s smartphone;
via the secure serverfacilitating access of the user of the user'"'"'s smartphone to the remote server to engage in third party communications and to manage cloned mobile phone data using another user'"'"'s smartphone; and terminating authorized access to the secure server and cloned mobile phone functionality with another user'"'"'s smartphone and recording data related to communications and data processed with another user'"'"'s smartphone in the communications and data file once the user logs off of the secure server from another user'"'"'s smartphone or the other user'"'"'s smartphone losses communication with the remote server. - View Dependent Claims (10, 11)
-
Specification