SYSTEMS AND METHODS FOR AUTHENTICATING MOBILE DEVICES AT AN INCIDENT VIA COLLABORATION
First Claim
1. A mobile device collaboration system, comprising:
- a first mobile device utilizing a first wireless network;
a second mobile device utilizing a second wireless network;
an external database communicatively coupled to the second mobile device;
wherein the first mobile device comprises software comprising instructions executable by the first mobile device and, in response to such execution, cause the first mobile device to;
store unique user identification related to a role and skill set of an associated user of the first mobile device;
detect the second mobile device responsive to an inability to connect to the first wireless network;
communicate the unique user identification to the second mobile device; and
establish a collaborative connection with the second mobile device responsive to the second mobile device successfully verifying the first mobile device using the unique user identification and the external database.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile device collaboration method includes provisioning a first mobile device with unique user identification related to a role and skill set of an associated user of the first mobile device, detecting a second mobile device responsive to a condition at the first mobile device, communicating the unique user identification to the second mobile device, authenticating the first mobile device through the second mobile device communicating the unique user identification to an external database, and providing access for the first mobile device through the second mobile device if the authenticating is successful. A mobile device collaboration system and a mobile device are also described.
-
Citations
6 Claims
-
1. A mobile device collaboration system, comprising:
-
a first mobile device utilizing a first wireless network; a second mobile device utilizing a second wireless network; an external database communicatively coupled to the second mobile device; wherein the first mobile device comprises software comprising instructions executable by the first mobile device and, in response to such execution, cause the first mobile device to; store unique user identification related to a role and skill set of an associated user of the first mobile device; detect the second mobile device responsive to an inability to connect to the first wireless network; communicate the unique user identification to the second mobile device; and establish a collaborative connection with the second mobile device responsive to the second mobile device successfully verifying the first mobile device using the unique user identification and the external database. - View Dependent Claims (2, 3, 4)
-
-
5. A mobile device, comprising:
-
a first radio configured to operate on a broadband wireless network; a second radio configured to operate a personal area network; a processor communicatively coupled to the first radio and the second radio; and software stored in memory and comprising instructions executable by the processor and, in response to such execution, cause the processor to; store unique user identification related to a role and skill set of an associated user of the mobile device; detect a second mobile device responsive to an inability to connect to the broadband wireless network; communicate the unique user identification to the second mobile device; and establish a collaborative connection with the second mobile device responsive to the second mobile device successfully verifying the mobile device using the unique user identification and an external database.
-
-
6. A method for authenticating mobile devices at an incident via collaboration, the method comprising:
-
storing unique user identification related to a role and skill set of an associated user of a first mobile device; detecting a second mobile device responsive to an inability of the first mobile device to connect to the broadband wireless network; communicating the unique user identification to the second mobile device; and establishing a collaborative connection between the first mobile device and the second mobile device responsive to the second mobile device successfully verifying the first mobile device using the unique user identification and an external database.
-
Specification