BOSS LOGIC, LLC Patent applications |
Patent application number | Title | Published |
20140337933 | SYSTEM AND METHOD FOR SECURE RECIPROCAL EXCHANGE OF DATA - A system for transmission of data from a first device operated by a first user includes a wireless device and a database. The wireless device is used by a second user and includes a memory for storage of data. The database is in network communication with the first device and the wireless device. The database receives and stores data from the first device. The database can synchronize a portion of the data from the first device with the memory of the wireless device on a periodic basis that is determined by the second user. The wireless device can include a mobile phone. Data from the first device can include a current mode of access of the first user. The database can synchronize a portion of the data from the first device with the memory of the wireless device automatically according to a predetermined time determined by the second user. Further, the database can synchronize a portion of the data from the first device with the memory of the wireless device whenever the data received by the database from the first device changes. In certain embodiments, the portion of the data from the first device that is synchronized between the database and the memory of the wireless device can be determined by the second user using the second device. | 11-13-2014 |
20130185333 | System and Method for Secure Reciprocal Exchange of Data - A system for transmission of data between a first device operated by a first user and a second device operated by a second user comprises a database that is in network communication with the first device and the second device. The database receives a first set of data input by the first user and a second set of data input by the second user. Additionally, the database allows the second user to access a first portion of the first set of data only after the second user authorizes the first user via the database to access a first portion of the second set of data. The database can be configured so that the first user is authorized by the second user once the first user inputs a user-specific identifier of the second user into the database. | 07-18-2013 |