Systems and methods for authenticating mobile devices at an incident via collaboration
First Claim
1. A mobile device collaboration method, comprising:
- provisioning a first mobile device with unique user identification related to a role and skill set of an associated user of the first mobile device;
detecting a second mobile device responsive to a condition at the first mobile device;
communicating the unique user identification to the second mobile device;
authenticating the first mobile device by the second mobile device performing;
communicating the unique user identification to an external database;
receiving, from the external database, a verification of one or more of the role and the skill set of the associated user; and
providing access for the first mobile device through the second mobile device if the authenticating is successful.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile device collaboration method includes provisioning a first mobile device with unique user identification related to a role and skill set of an associated user of the first mobile device, detecting a second mobile device responsive to a condition at the first mobile device, communicating the unique user identification to the second mobile device, authenticating the first mobile device through the second mobile device communicating the unique user identification to an external database, and providing access for the first mobile device through the second mobile device if the authenticating is successful. A mobile device collaboration system and a mobile device are also described.
-
Citations
16 Claims
-
1. A mobile device collaboration method, comprising:
-
provisioning a first mobile device with unique user identification related to a role and skill set of an associated user of the first mobile device; detecting a second mobile device responsive to a condition at the first mobile device; communicating the unique user identification to the second mobile device; authenticating the first mobile device by the second mobile device performing; communicating the unique user identification to an external database; receiving, from the external database, a verification of one or more of the role and the skill set of the associated user; and providing access for the first mobile device through the second mobile device if the authenticating is successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A mobile device capable of device collaboration, the mobile device comprising:
-
a processor; a memory that is configured to store a set of instructions that, when executed by the processor, perform the following functions; receive a unique user identification from another mobile device, wherein the unique user identification is related to a role and skill set of an associated user of the another mobile device wherein the another mobile device detects the mobile device, responsive to a condition at the another mobile device; authenticate the another mobile device by communicating the unique user identification to an external database; authenticating the another mobile device by; communicating the unique user identification to an external database; receiving, from the external database, a verification of one or more of the role and the skill set of the associated user; and if the authenticating is successful, provide access for the another mobile device, through the mobile device, to a network.
-
-
16. A system for device collaboration, the system comprising:
-
a first mobile device configured to; maintain a unique user identification related to a role and skill set of an associated user of the first mobile device; detect a second mobile device responsive to a condition at the first mobile device; communicate the unique user identification to the second mobile device; the second mobile device, wherein the second mobile device is configured to; authenticate the first mobile device by; communicating the unique user identification to an external database; receiving, from the external database, a verification of one or more of the role and the skill set of the associated user; and provide access for the first mobile device, through the second mobile device, to a network if the authenticating is successful.
-
Specification