Method and System for Remote Data Access Using a Mobile Device
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
2 Citations
27 Claims
-
1-9. -9. (canceled)
-
10. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a first mobile device a first authentication request comprising a first mobile device unique identifier and a first software unique identifier, the first mobile device unique identifier comprising a first device serial number and the first software unique identifier comprising a first software license key; the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device unique identifier and the first software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device; the remote computer receiving from the first mobile device a first file copied from the first mobile device; the remote computer storing a first detail message in a meta-data log, the first detail message associated with the first file copied from the first mobile device to the remote computer, the first detail message comprising at least a name of the first file copied from the first mobile device to the remote computer; the remote computer receiving from a second mobile device a second authentication request comprising a second mobile device unique identifier and a second software unique identifier, the second mobile device unique identifier comprising a second device serial number and the second software unique identifier comprising a second software license key; the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device unique identifier and the second software unique identifier; upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device; the remote computer transmitting to the second mobile device a copy of the first file copied from the first mobile device to the remote computer; and the remote computer storing in the meta-data log a second detail message associated with the first file transmitted from the remote computer to the second mobile device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a first mobile device a first authentication request comprising a first mobile device unique identifier and a first software unique identifier, the first mobile device unique identifier comprising a first device serial number and the first software unique identifier comprising a first software license key; the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device unique identifier and the first software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device; the remote computer receiving from the first mobile device a first file copied from the first mobile device; and the remote computer storing a detail message in a meta-data log, the detail message associated with the first file copied from the first mobile device to the remote computer, the detail message comprising at least a name of the first file copied from the first mobile device to the remote computer. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a second mobile device a second authentication request comprising a second mobile device unique identifier and a second software unique identifier, the second mobile device unique identifier comprising a second device serial number and the second software unique identifier comprising a second software license key; the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device unique identifier and the second software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device; the remote computer transmitting to the second mobile device a copy of a first file copied from a first mobile device to the remote computer; and the remote computer storing in a meta-data log a detail message associated with the first file transmitted from the remote computer to the second mobile device. - View Dependent Claims (24, 25, 26, 27)
-
Specification