Systems and methods for authenticating mobile devices at an incident via collaboration

ABSTRACT

A mobile device collaboration method includes provisioning a first mobile device with unique user identification related to a role and skill set of an associated user of the first mobile device, detecting a second mobile device responsive to a condition at the first mobile device, communicating the unique user identification to the second mobile device, authenticating the first mobile device through the second mobile device communicating the unique user identification to an external database, and providing access for the first mobile device through the second mobile device if the authenticating is successful. A mobile device collaboration system and a mobile device are also described.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to wireless communications andmore particularly to systems and methods for authenticating mobiledevices at an incident via collaboration and for finding non-publicsafety personnel who meet certain criteria at the incident.

BACKGROUND

Wireless communication systems and methods are ubiquitous. In general,devices such as mobile devices are configured to operate on wirelessnetworks. Wireless networks can be generally classified as publicnetworks or private networks. Exemplary public wireless networks includebroadband networks, cellular networks, Wireless Local Area Networks(WLANs), etc. Generally, the public wireless networks include thenetworks that offer smart phone, tablet, cell phone, etc. subscriberconnectivity. Private networks, on the other hand, can include LandMobile Radio (LMR) and other mission critical networks. Further,wireless networks have defined wireless coverage, and wireless devicesoutside of such wireless coverage cannot communicate. Due to differentwireless coverage of public and private networks, a user of one type ofnetwork such as a broadband user on a public network could be at a sceneof an incident without wireless coverage. Assume further that there is aprivate network accessible by one or more users at the incident.Conventionally, the broadband user without coverage would not havenetwork access while the private network users would. Further, thebroadband user could have an urgent need for network access due to theincident such as the broadband user being a doctor, emergency medicaltechnician, or other type of critical personnel. Accordingly, there is aneed for a systems and methods for authenticating mobile devices at anincident allowing the broadband user network access via collaborationand finding non-public safety personnel who meet certain criteria in thearea.

BRIEF DESCRIPTION OF THE FIGURES

The accompanying figures, where like reference numerals refer toidentical or functionally similar elements throughout the separateviews, together with the detailed description below, are incorporated inand form part of the specification, and serve to further illustrateembodiments of concepts that include the claimed invention, and explainvarious principles and advantages of those embodiments.

FIG. 1 is a network diagram of a mobile device collaboration system inaccordance with some embodiments.

FIG. 2 is a network diagram of another mobile device collaborationsystem in accordance with some embodiments.

FIG. 3 is a flowchart of a mobile device collaboration method inaccordance with some embodiments.

FIG. 4 is a flowchart of a mobile device application method inaccordance with some embodiments.

FIG. 5 is a flowchart of a second mobile device beaconing method inaccordance with some embodiments.

FIG. 6 is a flowchart of a mobile device authentication method inaccordance with some embodiments.

FIG. 7 is a flowchart of a post authentication method in accordance withsome embodiments.

FIG. 8 is a flowchart of an exemplary collaboration method between abroadband (BB) device and an LMR device in accordance with someembodiments.

FIG. 9 is a flow diagram of an exemplary collaboration operation on thesystem of FIGS. 1-2 in accordance with some embodiments.

FIG. 10 is a block diagram of a server in accordance with someembodiments.

FIG. 11 is a block diagram of a mobile device in accordance with someembodiments.

Skilled artisans will appreciate that elements in the figures areillustrated for simplicity and clarity and have not necessarily beendrawn to scale. For example, the dimensions of some of the elements inthe figures may be exaggerated relative to other elements to help toimprove understanding of embodiments of the present invention.

The apparatus and method components have been represented whereappropriate by conventional symbols in the drawings, showing only thosespecific details that are pertinent to understanding the embodiments ofthe present invention so as not to obscure the disclosure with detailsthat will be readily apparent to those of ordinary skill in the arthaving the benefit of the description herein.

DETAILED DESCRIPTION

In an exemplary embodiment, a mobile device collaboration methodincludes provisioning a first mobile device with unique useridentification related to a role and skill set of an associated user ofthe first mobile device, detecting a second mobile device responsive toa condition at the first mobile device, communicating the unique useridentification to the second mobile device, authenticating the firstmobile device through the second mobile device communicating the uniqueuser identification to an external database, and providing access forthe first mobile device through the second mobile device if theauthenticating is successful.

In another exemplary embodiment, a mobile device collaboration systemincludes a first mobile device utilizing a first wireless network, asecond mobile device utilizing a second wireless network, an externaldatabase communicatively coupled to the second mobile device, whereinthe first mobile device includes software including instructionsexecutable by the first mobile device and, in response to suchexecution, cause the first mobile device to: store unique useridentification related to a role and skill set of an associated user ofthe first mobile device, detect the second mobile device responsive toan inability to connect to the first wireless network, communicate theunique user identification to the second mobile device, and establish acollaborative connection with the second mobile device responsive to thesecond mobile device successfully verifying the first mobile deviceusing the unique user identification and the external database.

In yet another exemplary embodiment, a mobile device includes a firstradio configured to operate on a broadband wireless network, a secondradio configured to operate a personal area network, a processorcommunicatively coupled to the first radio and the second radio, andsoftware stored in memory and including instructions executable by theprocessor and, in response to such execution, cause the processor to:store unique user identification related to a role and skill set of anassociated user of the mobile device, detect a second mobile deviceresponsive to an inability to connect to the broadband wireless network,communicate the unique user identification to the second mobile device,and establish a collaborative connection with the second mobile deviceresponsive to the second mobile device successfully verifying the mobiledevice using the unique user identification and the external database.

Referring to FIGS. 1 and 2, in an exemplary embodiment, a networkdiagram illustrates a mobile device collaboration system 10. The system10 includes a broadband device 12A and LMR devices 12B, 12C, 12D. Eachof the devices 12A, 12B, 12C, 13D is a mobile device such as the mobiledevice 12 depicted in FIG. 11. The system 10 provides systems andmethods for collaboration between the devices 12A, 12B, 12C, 12D. Thebroadband device 12A can be referred to as a first mobile device that isconfigured to communicate on a network 14. For example, the network 14can be a 3G network, 4G network, Long Term Evolution (LTE) network,Wireless Local Area Network (WLAN) network such as IEEE 802.11 andvariations thereof, WiMAX such as IEEE 802.16 and variations thereof,and the like. In an exemplary embodiment, the network 14 can be a publicnetwork. In the context of the mobile device collaboration system 10,the broadband device 12A is unable to communicate on the network 14 atthe scene of an incident. However, the system 10 also includes thedevices 12B, 12C, 12D at the incident as well. The devices 12B, 12C, 12Dcan be referred to as second, third, and fourth mobile devices that areconfigured to communicate on a network 16. For example, the network 16can be an LMR system or the like. In an exemplary embodiment, thenetwork 16 can be a private network. Note, in these examples, LMR andbroadband are used as exemplary systems, and those of ordinary skill inthe art will recognize other types of systems are also contemplatedherein.

Generally, the mobile device collaboration system 10 contemplates usersof the devices 12A, 12B, 12C, 12D, etc. from different networks sharingresources via ad hoc linking there between. As described herein, onecontext of the system 10 can be on scene of an incident with the usersbeing public safety members. For example, assume the devices 12B, 12C,12D are associated with public safety users, and assume the network 16is a mission critical network. In an exemplary embodiment, a user of thedevice 12A can be a non-public safety member, non-active public safetymember, etc. However, the user of the device 12A can be someone whosepresence is needed or required at the incident such as, for example, adoctor, paramedic, or someone else involved in the incident. Theassumption is the user of device 12A does not have connectivity to thenetwork 14, but requires network connectivity in context of the incidentsuch as, for example, to communicate with a hospital. In an exemplaryembodiment, the user of device 12A is an identifiable individual througha database 18, an incident commander 20 connected to a base station 22,or the like. In the system 10, the devices 12B, 12C, 12D are configuredto implement a sharing procedure with the device 12A and to useinformation to identify the user of the device 12A, such as through thedatabase, the incident commander 20, etc., and to provide networkaccess. In an exemplary embodiment, the system 10 can also include a PTTserver/gateway 25 for PTT hosting. Note, this functionality can also bein the LMR system 16.

The broadband device 12A can be preconfigured by the user, anadministrator, etc. to contain identification data associated with theuser's role. Further, this information can be contained in the database,with the incident commander 20, etc. For example, the user could be adoctor, paramedic, firefighter, a National Guard member, a member of themilitary, or other Federal/State/local public safety member. Generally,the user of the device 12A can be anyone that 1) is identifiable throughthe database 18, the incident commander 20, etc., 2) is not configuredto communicate on the network 16, 3) is configured to communicate via adhoc connections, and 4) needs but does not have network connectivity atthe incident. Thus, the user of the device 12 wants to be authorized tobe part of the system 10 on scene to talk directly with law enforcementor other public safety agents, but is out of coverage or in a poorcoverage zone on the network 14 such as due to lack of coverage ornatural/man-made disaster, and the user need access to private systemresources such as through the devices 12B, 12C, 12D. For example, theuser of the device 12A may need access for voice or non-voiceapplications in conjunction with the incident.

In operation of the system 10, the broadband device 12A is configured toconnect with one of the devices 12B, 12C, 12D. That is, a public networkdevice such as the device 12A is configured to connect to a publicsafety based LMR device (or combination LMR/broadband, etc.). Thisconnection is used for authenticating the device 12A and for networkaccess by the device 12A. The connection can be via near field pairing,wireless local area network (WLAN) advertising, or Bluetooth sniffingfor special purpose devices. Further, the device 12A and/or the devices12B, 12C, 12D can include an application that is preloaded thereon.Coordination between the devices 12A and the devices 12B, 12C, 12D canutilize existing protocols, techniques, and methods. The application ismerely a special purpose application to support this identificationsharing operation, authentication, and ad hoc communication.

For example, assume the device 12A is going to collaborate with an LMRsubscriber using the device 12B. The LMR subscriber with the device 12Band the device 12A arbitrate the connection and the device 12B accessesidentification details of the user of the device 12A. Once thisarbitration is complete, the device 12B can validate and authenticatethe credentials/identity of the user of the device 12A with anation/state/local database (e.g., NPR doctor ID national database forexample). Once validated and the device 12B accepts the credentials, thebroadband device 12A can have access to appropriate system resources.These system resources can be managed as local operation only, LMRsystem/talkgroup limited operation, or full operation including datathroughput access. If the system resources are utilized via an LMRproxy, it can be done as the primary or secondary user of thoseresources. If using the LMR device 12B as a proxy (perhaps the broadbanddevice 12A is connected to a “donor” radio) the LMR device 12B can sharetalkgroup details or local tactical channel information to the broadbanddevice 12A device to operate similar to a traditional LMR device. If thesharing of resources is more about granting access, the LMR device 12B(or dispatch center via the incident commander 20) can grant limited(time, data throughput, etc) access to the broadband device 12A on aprivate Public Safety BB system, e.g. the network 16. This approachallows the user of the device 12A who is not authorized to be on thenetwork 16 to leverage an LMR solution via an ad hoc local network toget access to these limited resources under thesupervision/authorization of a local on scene authorized LMR user.

The mobile device collaboration system 10 leverages the fact thatsmartphone and general smart device usage is ever increasing. That is,public network providers offer smartphone, tablet, hotspot, etc.connectivity using 4G data rates. As these devices proliferate, it isexpected that there will be significant presence of such devices andtheir associated users at incidents. Without network connectivity, theseassociated users cannot communicate. As major incidents continue tooccur, the public service response can be hampered by lack of resources.In an exemplary embodiment, an objective of the system 10 is ease ofidentification of support resources as well as providing a mechanism forthem to communicate over the network 16 despite being configured tocommunicate on the network 14. In an exemplary embodiment, the system 10includes the application on the device 12A and/or the devices 12B, 12C,12D. On the device 12A, the application is configured for common smartphone platforms to share credentials that allow the users of the devices12B, 12C, 12D working the incident to verify the user of the device12A's credentials.

The ability to identify someone's skill sets better allow the publicservice personnel on scene to engage assistance as soon as possible.Additional verification of identity allows them to utilize standardpractices on how much access a given person (i.e., based on their role)should have on the system 10. The system 10 is a solution that leveragesthe LMR pipeline (or private broadband) for non-authorized users whileshowing an end-to-end solution linking back to verification databases inthe back office (e.g., federal, state or local based). For example,about 80% of firefighters are volunteer and this is an easy and costeffective way for them to identify themselves in a reliable manner. Thatis, the system 10 leverages the assumption that most users carry a smartphone or device. The addition of the application enables variousexemplary functionality described herein. This concept can be extendedto military people. More smart phones are being deployed and this is away to a soldier to be added into an ad hoc network on the battlefieldin a simple manner with back end verification. If no backend ispossible, this solution can also be used for simple resource managementwhen people come onto a fire scene. Their smart phones link in and arelogged. But instead of using them in the fire, they are handed a radiothat they can then preprogram with their user information. In thefuture, when bio monitoring information is captured in the data, theuser can then re-synch after the incident to keep track of their ownhealth and safety information.

Referring to FIG. 3, in an exemplary embodiment, a flowchart illustratesa mobile device collaboration method 30. The method 30 can beimplemented in the system 10, and the method 30 includes a first mobiledevice, a second mobile device, and a database. For example, the firstmobile device can be the broadband device 12A, the second mobile devicecan be any of the devices 12B, 12C, 12D, and the database can be thedatabase 18, the incident commander 20, or the like. Generally, themethod 30 enables devices with different users on different networks toestablish peer-to-peer connections (e.g., via WLAN, Bluetooth, etc.)allowing the first user to have network access through the second user.The first mobile device is provisioned with unique user identificationrelated to a role and skill set of an associated user of the firstmobile device (step 31). The unique user identification can serve twopurposes, for example, including authentication/authorization andon-scene notification. First, disparate devices can share the uniqueuser identification for authentication/authorization to verify who thefirst user is and that the first user needs connectivity via apeer-to-peer connection.

The unique user identification can include any information that can beused to uniquely identify the user of the first device such as, forexample, name, an identification number, a Media Access Control (MAC)address, name and role, etc. This information may be in the database 18with additional information. For example, the unique user identificationcan uniquely identify the user and can be used in a database look up tofind that user's role and/or skill set. The unique user identificationcan be input into the application on the first device. Also, the firstdevice can have a setup procedure, such as through a graphical userinterface, for inputting the unique user identification. In addition tobeing used for authorization/authentication, another feature can be touse the unique user identification to identify individuals on scene atthe incident. This can be useful if a certain skill set is needed, e.g.medical, and on scene personnel can detect this through theadvertisements of the unique user identification.

In an exemplary embodiment, the unique user identification can beconveyed between the first device and the second device use PANtechniques, e.g. beacons, etc. The PAN technology can include, forexample, WiFi, WLAN, Bluetooth, Wireless Universal Serial Bus (USB),Ultra Wide Band, and the like. In various exemplary embodimentsdescribed herein, the PAN technology is illustrated as WiFi (or WLAN orany IEEE 802.11 variant), and those of ordinary skill in the art willrecognize any type of PAN technology or equivalent is contemplated forthe ad hoc communication systems and methods. Specifically, the firstmobile device and the second mobile device each are configured toconnect to public or private networks, such as using 3G, 4G, LTE, WiMAX,LMR, or any other protocol. Of note, most mobile devices are equippedwith secondary wireless protocols such as the PAN technologies. Thesystems and methods described herein leverage this to use the PANtechnology for access in an ad-hoc or peer-to-peer connection when theprimary network is unavailable.

The second mobile device is detected responsive to a condition at thefirst mobile device (step 32). The condition can include a lack ofwireless coverage at the first mobile device, unreliable wirelesscoverage at the first mobile device, inability to get adequatebandwidth, etc. The second mobile device is configured to advertise itspresence to the first mobile device via PAN techniques for possiblepeer-to-peer collaboration. The first mobile device is configured tolook for such advertisements responsive to the condition. For example,the second device can be an LMR device with proxy capabilities enabledand advertising such capabilities (e.g., via WLAN Service SetIdentification (SSID) advertising). The first device, e.g. a broadbanddevice, can see this advertised information before connecting to the LMRradio with the best uplink and/or collaborative Radio Frequency (RF)signal (if included in advertised info). In response to detecting thesecond mobile device, the unique user identification is communicated tothe second mobile device (step 33). For example, the first deviceadvertises the unique user identification to the second mobile deviceusing a PAN technique.

The first mobile device is authenticated through the second mobiledevice communicating the unique user identification to an externaldatabase (step 34). This is performed upon the second mobile devicereceiving the unique user identification. The second mobile device canalso include an application or other configuration details enabling thesecond mobile device to understand the unique user identification forpurposes of a peer-to-peer collaboration session. The second mobiledevice uses an external authorization process taking the unique useridentification and processing it against stored methods for thatparticular type of identification data. For example, the second mobiledevice is configured to receive a plurality of different types of uniqueuser identification such as names, identification numbers, roles,departments, MAC addresses, etc. The unique user identification couldsay “John Doe, doctor,” “Jane Doe, paramedic,” “Jack Doe, FEMAresponder,” etc. That is, the unique user identification can point thesecond device to an appropriate database for the external database.

In an exemplary embodiment, the second device can utilize a two factor(or greater) authentication to external databases for verification ofthe user. For example, the verification can include the unique useridentification, direct visual verification by a user of the secondmobile device, look up information from the unique user identification,etc. In the case of visual verification, the user of the second mobiledevice would have to affirmatively authorize the first user. Forexample, the second user, via the application, could be presented with aaudible and/or vibration plus an on-screen notification. The look up ofinformation can come from any number of databases that the second devicecan access for confirmation.

If the authenticating is successful, access is provided for the firstmobile device through the second mobile device (step 35). That is, uponsuccess of the authentication/authorization, the first mobile device canhave an active peer-to-peer connection such as via a PAN technique withthe second mobile device. The first mobile device can utilize thisconnection for network access using the second mobile device as a proxy.Once authorized, the devices can exchange application access levelpolicy from the second mobile device's viewpoint (i.e., the secondmobile device can be viewed as a master). For example, assume the firstmobile device is a broadband device and the second mobile device is anLMR device. The broadband device now can utilize the LMR device as aproxy for allowed features (e.g., a push-to-talk (PTT) operation). TheLMR device forwards PTT calls to/from the broadband device as defined byagreed upon application access level policy. If the LMR device assignsthe broadband device a lower priority, it would be broker the proxyingwith the broadband device.

In some exemplary embodiments, it can be assumed the broadband devicewould not be on the same channel/Talkgroup as LMR device. That is,typically LMR device belong to public safety users and it is assumed thebroadband device belongs to non-public safety users. For example, theLMR devices belong to first responders whereas the broadband devicebelongs to a doctor and the doctor would need to communicate with ahospital or other rescue services and not public safety elements.However, using the systems and methods described herein, the doctor cangain network access as well as notify the public safety users of thedoctor's presence. The specific base protocol of peer-to-peer PTTinterworking can vary (e.g., Open Mobile Alliance (OMA) Push-to-Talkover Cellular (PoC), ISSI, or other broadband PTT protocols).

Referring to FIG. 4, in an exemplary embodiment, a flowchart illustratesa mobile device application method 40. The method 40 can be implementedin the system 10, and the method 40 includes a first mobile device, asecond mobile device, a database, and a location server. For example,the first mobile device can be the broadband device 12A, the secondmobile device can be any of the devices 12B, 12C, 12D, and the databasecan be the database 18, the incident commander 20, or the like.Generally, the method 40 enables devices with different users ondifferent networks to establish peer-to-peer connections through use ofan application, location information, beaconing, etc. First, anapplication is installed on the first mobile device and the secondmobile device (step 41). The application can be the same or differentbetween the first mobile device and the second mobile device. Generally,the application is configured to implement the various methods describedherein. That is, the application can control the various functionalityon the first mobile device and the second mobile device.

For the first mobile device, the application is configured to enable thefirst mobile device to contain and advertise the unique useridentification, to enable the first mobile device to look for a peerdevice including the second mobile device when there is lack of wirelesscoverage, etc. For the second mobile device, the application isconfigured to enable the second mobile device to advertise its presenceor to communicate with a location server, to receive the unique useridentification, to authorize/authenticate the unique user identificationwith the external database, etc. The application can be installed on thefirst and second mobile device using various methods including beingpre-installed, being downloaded from an external site, being integratedwithin an operating system and settings of the device, being installedvia a cable connected to a server, etc.

The unique user identification is provided to one or more databasesincluding the external database (step 42). As described herein, theunique user identification enables identification of the user of thefirst mobile device as well as providing a method communicating to theexternal database for authorizing/authenticating. There can be multipledifferent databases and these databases can already exist for otherpurposes. For example, the databases can include the National Plan &Provider Enumeration System Database or Registries (available online atnppes.cms.hhs.gov/NPPES/NPIRegistryHome.do), a Paramedic/EMT RegistryDatabase (available online atnremt.org/nremt/about/researchPresentations.asp), etc. FEMA or otherofficiating agencies can supply database, etc. In general, the secondmobile device via the application will receive the unique useridentification, parse this information, and determine which database touse from the one or more databases.

A location of the first mobile device is reported via the application toa location server (step 43). In an exemplary embodiment, the firstmobile device can periodically upload its position/location to thelocation server. This location server can also be in communication withthe second mobile device (or any other mobile device including devicesproximate to the first mobile device). If the first mobile device losescoverage (step 44), the second mobile device is notified of the locationof the first mobile device (step 45). Note, the second mobile device canalso periodically upload its position/location to the location server.Thus, the location server can know that both the first and second mobiledevices are at the incident, and determine based on a lack of updatesfrom the first mobile device that the first mobile device has thecondition.

Beaconing is turned on at the second mobile device allowing the firstmobile device to detect the second mobile device (step 46). In thisexemplary embodiment, the second mobile device only provides the PANadvertisements responsive to the location server thereby limitingdraining of the battery with constant beaconing and limiting thepotential for outsiders to intercept the beaconing. Here, theapplication, on both the first and second mobile devices, is configuredto period report the locations such as to a UNS service. The triggeringevent (step 44) can be lack of coverage by the first device, but couldalso be an affirmative request from the first device. This request ordetection that the first mobile device has not checked in goes throughthe location server. The location server will also know nearby usersthrough the application reporting location, and the location server cannotify these users (e.g., the devices 12B, 12C, 12D in FIGS. 1-2) thatthere is a need for collaboration as well as providing locationinformation and possibly the unique user identification. The applicationcan use mapping and location services to direct the nearby users, andcan also provide information on any relevant conditions the user mayneed to be aware of If the second mobile device accepts the request fromthe location server, unique security keys can be sent to both devices(if possible to communicate to the first device), and the PAN/WLANbeaconing can begin. Once in range, local communication can start.

Referring to FIG. 5, in an exemplary embodiment, a flowchart illustratesa second mobile device beaconing method 50. The method 50 can beimplemented in the system 10, and the method 50 includes the secondmobile device (e.g., any of the devices 12B, 12C, 12D in FIGS. 1-2) andthe location server. Generally, the method 50 enables the second deviceto collaborate at an incident with the first mobile device through useof the application, location information, beaconing, etc. The secondmobile device arrives at an incident (step 51). As described herein, thesecond device includes the application which allows for advertisement.That is, the second device advertises for collaboration at the incident(step 52). The collaboration can include allowing the first mobiledevice an ad hoc or peer-to-peer connection for providing networkconnectivity to the first mobile device. The collaboration can alsoinclude taking role of the personnel present at the scene of theincident. For example, the second mobile device can request the uniqueuser identification for all proximate in range users (e.g., devices withthe appropriate application/configuration). This could be useful indetermining roles and skills on personnel on scene.

The beaconing from the second mobile device can be on demand orcontinuous (step 53). Continuous beaconing can be turned on/off, butgenerally operates continuously akin to an Access Point. For the ondemand beaconing, the second device communicates with the locationserver (step 54). The second device receives notification from thelocation server that the first mobile device is at the incident with thecondition (step 55). Alternatively, the location server can simplyinstruct the second mobile device to turn on beaconing for any reason.Beacons are transmitted utilizing one of a PAN or WLAN system toidentify the second mobile device to the first mobile device (step 56).If the beaconing is continuous (step 53), then the method 50 proceedsdirectly to step 56.

The beacons are used by the second mobile device to alert the firstmobile device (and any other devices) of the presence of the secondmobile device for collaboration. In an exemplary embodiment, the beaconcan be a LMR collaborative link beacon. In another exemplary embodiment,the beacon can be a WLAN beacon. The WLAN beacon can include theadvertisements in Vendor-Specific tags thereby preserving the IEEE802.11 standard and treating the second mobile device like an AccessPoint. In yet another exemplary embodiment, the beacon can be aproprietary wireless beacon solely used in the system 10 between thedevices 12 for the purposes of advertising system attributes toproximate peers, i.e. something proprietary to the application, forexample. In Ultra Wide Band, system attributes can be advertised using aprivate reservation process used to include vendor specific data duringbroadcasts. In wireless USB, beaconing can be accomplished via thevendor specific Base Class FFh reserved for inclusion of specific vendordata without violation of the standard. The advertisements could alsoextend to newly developed PAN technologies as well as near-me areanetwork (NAN) concepts being developed.

Referring to FIG. 6, in an exemplary embodiment, a flowchart illustratesa mobile device authentication method 60. The method 60 can beimplemented in the system 10, and the method 60 includes the firstmobile device (e.g., the device 12A of FIGS. 1-2), the second mobiledevice (e.g., any of the devices 12B, 12C, 12D in FIGS. 1-2), and theexternal database. Generally, the method 60 enables the second device tocollaborate at an incident with the first mobile device through use ofthe authentication/authorization of the user for the first mobiledevice, etc. The second mobile device receives the unique useridentification from the first mobile device via one of the PAN or WLANsystem (step 61). The second mobile device selects the external databasefrom one or more databases (step 62). Note, as described herein, thesecond mobile device parses the unique user identification anddetermines therefrom which database to use. The second mobile devicesends the unique user identification to the external database (step 63).Here, the second mobile device can perform a look up. For example, theunique user identification may identify the role and/or skill of theuser for the first device. In step 63, the second mobile device isperforming a verification that the user is who they say they are.

The second mobile device receives an authentication from the externaldatabase for the first mobile device (step 64). For example, the usercould be a doctor, and the authentication can confirm that this isindeed a doctor that is on scene at the incident. Alternatively, theuser could be a paramedic not on the public safety network, but carryingthe broadband device 12A, and the authentication can confirm that theparamedic is indeed a paramedic needing access to the network. Ofcourse, any scenario is contemplated herein with the generalized purposeof the method 60 being a confirmation that the user of the first deviceis indeed who they purport to be. The second mobile device providesaccess for the first mobile device through the second mobile device ifthe authentication is successful via one of the PAN or WLAN system (step65). As described herein, the authentication can use multiple factors.For example, the unique user identification could properly identify theuser (e.g., as a doctor, EMT, etc.), but the authentication could stillfail if the user of the second mobile device overrides the access or ifthere is not enough bandwidth for the second mobile device.

Referring to FIG. 7, in an exemplary embodiment, a flowchart illustratesa post authentication method 70. The method 70 can be implemented in thesystem 10, and the method 70 includes the first mobile device (e.g., thedevice 12A of FIGS. 1-2), the second mobile device (e.g., any of thedevices 12B, 12C, 12D in FIGS. 1-2), and potentially other mobiledevices. Generally, the method 70 enables the second device tocollaborate at an incident with the first mobile device following theauthentication/authorization. The second device receives authenticationfrom the external database (step 71). If the authentication is notsuccessful (step 72), an alert is provided through the second mobiledevice identifying the first mobile device. If the authentication issuccessful (step 72), a connection is established between the secondmobile device and the first mobile device (step 74). The connection canbe an ad hoc connection, a peer-to-peer connection, etc. via PAN, WLAN,etc. Data is communicated from the first mobile device through theconnection (step 75).

The connection is arbitrated between the first mobile device and thesecond mobile device to provide higher priority to the first mobiledevice (step 76). For example, the first mobile device may need higherpriority, more bandwidth, etc., and the first mobile device can beconfigured to communicate such a request to the second mobile device. Ifthe arbitrating fails, the first device attempts to detect anothermobile device for collaboration at a higher priority level (step 77).For example, the first mobile device can be the device 12A and thesecond mobile device can be the device 12B. The device 12A couldcontinue to look for a more appropriate LMR device (i.e. differentrole/priority details or other attributes), e.g. the devices 12C, 12D.When the second mobile device recognizes a weak collaboration signal orwhen it is either turning off and shutting down due to powerconservation (e.g., WiFi disabled) the second mobile device would informthe first mobile device.

Referring to FIG. 8, in an exemplary embodiment, a flowchart illustratesan exemplary collaboration method 80 between a broadband (BB) device andan LMR device. A broadband device is provisioned with an application(app) containing a unique user identification related to the role/skillset of the user (step 81). At the scene of an incident, LMR device asadvertising their capabilities (step 82). The broadband user via thebroadband device initiates a communication request and the broadbanduser responds to the LMR device's advertising with an alert and uniqueuser identification information (step 83). The LMR device receives theunique user identification information and context details (i.e., thetype associated with the unique user identification) that can beverified for authorization with an external authorization solution (step84). Specifically, the LMR device parses the alert and/or unique useridentification information to obtain the context details. The contextdetails can include what type of user is associated with the unique useridentification, where the LMR device should authorize (i.e., whichdatabase), etc. In an exemplary embodiment, the external authorizationsolution can be the database 18. Also, the external authorizationsolution can include a two or more factor authentication for searching,so the LMR user may have to engage prior to identification. The externalauthorization solution can be a third-party external data sourceaccessible by the LMR device and with a multi-factor authenticationmethod.

The LMR device utilizes capabilities to verify the identification of thebroadband device with an appropriate search database (step 85). Forexample, the LMR device can use images, name, key words, etc. forverification of the user of the broadband device. If the LMRverification is not successful (step 86), the radio validation fails(step 87) and the LMR user can receive an alert and an event could berecorded (step 88). For example, the MAC address, identification, methodor request, etc. of the broadband device can be recorded. If the LMRverification is successful (step 87), the LMR device establishes aconnection with the broadband device (step 89). The radio of the LMRdevice communicates priority level/method of request brokerage to thebroadband device (step 90). The broadband device and the LMR devicearbitrate the connection and each understands levels of access andpriority (step 91).

If the broadband device needs to be assigned a higher priority level andthe LMR device is able to provide (step 92), the broadband device caninitiate an application (e.g., PTT) which will route through the LMRdevice (step 93). The application can request and receive the higherpriority level. If the broadband device needs to be assigned a higherpriority level and the LMR device is not able to provide (step 92), thebroadband device listens to an LMR device, and a brokerage applicationblocks the broadband device because LMR activity is occurring (step 94).When the brokerage application allows, the broadband device can use theLMR device as a proxy (step 95). If pre-programmed, the broadband devicecan continue to advertise and optionally disconnect from the LMR deviceand establish a collaborative link with a new LMR device at a higherpriority level so the broadband device is not blocked by LMR useractivity (step 96).

Referring to FIG. 9, in an exemplary embodiment, a flow diagramillustrates an exemplary collaboration operation on the system 10. Inparticular, the operation is illustrated with the device 12A being abroadband device and the network 14 is a broadband radio access network(RAN). The devices 12B, 12C, 12D are LMR devices and the network 16 isan LMR system. Further, the operation includes PTT as an exemplaryapplication with a broadband PTT server/gateway 25 communicativelycoupled to the devices 12A, 12B, 12C, 12D such as through the networks14, 16. The flow diagram is shown from steps 110-122 in order showingactivities between the various devices. First the broadband device losescoverage (step 110). For example, the broadband device could lose 3G/4Gcoverage due to an event or traffic flow. The broadband device monitorslayer 2 beacons and decodes any for current open capabilities (step111). Here, the broadband device detects the device 12B. In response,the broadband device transmits its user identification details to thedevice 12B (step 112).

The device 12B receives the user identification details and performsauthentication/authorization/verification (step 113). Here, the device12B can communicate the user identification details to the appropriatedatabase for verification. Upon successful verification, the devices canarbitrate a connection and roles/policy sharing there between (step114). The device 12A processes the arbitrated access level andconfigured itself for the connection (step 115). With the connectionestablished, the device 12A can operate an application such as providinga PTT request through the connection (step 116). The device 12B receivesthe PTT request and performs collaboration scheduling and sends the PTTrequest through the LMR system (step 117). The LMR system returns a PTTgrant to the device 12B (step 118). The LMR system also sends a PTTgrant to the device 12D (which is the end device in the PTT request)(step 119). The device 12B provides the PTT grant to the device 12A(step 120). Now, the device 12A can provide PTT audio through the device12B (step 121). The device 12B provides the PTT audio to the LMR system(step 122) which provides the PTT audio to the device 12D (step 123). Inan exemplary embodiment, the operation could allow a doctor on scene tocommunicate directly with a hospital to coordinate an emergencyresponse.

Referring to FIG. 10, in an exemplary embodiment, a block diagramillustrates a server 25 for the system 10, the operation, and the like.The server 25 can be a digital computer that, in terms of hardwarearchitecture, generally includes a processor 302, input/output (I/O)interfaces 304, a network interface 306, a data store 308, and memory310. It should be appreciated by those of ordinary skill in the art thatFIG. 10 depicts the server 25 in an oversimplified manner, and apractical embodiment may include additional components and suitablyconfigured processing logic to support known or conventional operatingfeatures that are not described in detail herein. The components (302,304, 306, 308, and 310) are communicatively coupled via a localinterface 312. The local interface 312 can be, for example but notlimited to, one or more buses or other wired or wireless connections, asis known in the art. The local interface 312 can have additionalelements, which are omitted for simplicity, such as controllers, buffers(caches), drivers, repeaters, and receivers, among many others, toenable communications. Further, the local interface 312 can includeaddress, control, and/or data connections to enable appropriatecommunications among the aforementioned components.

The processor 302 is a hardware device for executing softwareinstructions. The processor 302 can be any custom made or commerciallyavailable processor, a central processing unit (CPU), an auxiliaryprocessor among several processors associated with the server 25, asemiconductor-based microprocessor (in the form of a microchip or chipset), or generally any device for executing software instructions. Whenthe server 5 is in operation, the processor 302 is configured to executesoftware stored within the memory 310, to communicate data to and fromthe memory 310, and to generally control operations of the server 25pursuant to the software instructions. The I/O interfaces 304 can beused to receive user input from and/or for providing system output toone or more devices or components. User input can be provided via, forexample, a keyboard, touch pad, and/or a mouse. System output can beprovided via a display device and a printer (not shown). I/O interfaces304 can include, for example, a serial port, a parallel port, a smallcomputer system interface (SCSI), a serial ATA (SATA), a fibre channel,Infiniband, iSCSI, a PCI Express interface (PCI-x), an infrared (IR)interface, a radio frequency (RF) interface, and/or a universal serialbus (USB) interface.

The network interface 306 can be used to enable the server 25 tocommunicate on a network, such as the network 16. The network interface306 can include, for example, an Ethernet card or adapter (e.g., 10BaseT, Fast Ethernet, Gigabit Ethernet, 10 GbE) or a wireless local areanetwork (WLAN) card or adapter (e.g., 802.11a/b/g/n). The networkinterface 306 can include address, control, and/or data connections toenable appropriate communications on the network. A data store 308 canbe used to store data. The data store 308 can include any of volatilememory elements (e.g., random access memory (RAM, such as DRAM, SRAM,SDRAM, and the like)), nonvolatile memory elements (e.g., ROM, harddrive, tape, CDROM, and the like), and combinations thereof. Moreover,the data store 308 can incorporate electronic, magnetic, optical, and/orother types of storage media. In one example, the data store 308 can belocated internal to the server 25 such as, for example, an internal harddrive connected to the local interface 312 in the server 25.Additionally in another embodiment, the data store 308 can be locatedexternal to the server 25 such as, for example, an external hard driveconnected to the I/O interfaces 304 (e.g., SCSI or USB connection). In afurther embodiment, the data store 308 can be connected to the server 25through a network, such as, for example, a network attached file server.

The memory 310 can include any of volatile memory elements (e.g., randomaccess memory (RAM, such as DRAM, SRAM, SDRAM, etc.)), nonvolatilememory elements (e.g., ROM, hard drive, tape, CDROM, etc.), andcombinations thereof Moreover, the memory 310 can incorporateelectronic, magnetic, optical, and/or other types of storage media. Notethat the memory 310 can have a distributed architecture, where variouscomponents are situated remotely from one another, but can be accessedby the processor 302. The software in memory 310 can include one or moresoftware programs, each of which includes an ordered listing ofexecutable instructions for implementing logical functions. The softwarein the memory 310 includes a suitable operating system (O/S) 314 and oneor more programs 316. The operating system 314 essentially controls theexecution of other computer programs, such as the one or more programs316, and provides scheduling, input-output control, file and datamanagement, memory management, and communication control and relatedservices. The one or more programs 316 may be configured to implementthe various processes, algorithms, methods, techniques, etc. describedherein. For example, the programs 316 can be configured to enable themethods described herein.

Referring to FIG. 11, in an exemplary embodiment, a block diagramillustrates a mobile device 12 for use in a wireless collaborationsystem and method. The mobile device 12 can be a digital device that, interms of hardware architecture, generally includes a processor 412,input/output (I/O) interfaces 414, a radio 416, a data store 418, andmemory 422. It should be appreciated by those of ordinary skill in theart that FIG. 11 depicts the mobile device 12 in an oversimplifiedmanner, and a practical embodiment can include additional components andsuitably configured processing logic to support known or conventionaloperating features that are not described in detail herein. Thecomponents (412, 414, 416, 418, and 422) are communicatively coupled viaa local interface 424. The local interface 424 can be, for example butnot limited to, one or more buses or other wired or wirelessconnections, as is known in the art. The local interface 424 can haveadditional elements, which are omitted for simplicity, such ascontrollers, buffers (caches), drivers, repeaters, and receivers, amongmany others, to enable communications. Further, the local interface 424may include address, control, and/or data connections to enableappropriate communications among the aforementioned components.

The processor 412 is a hardware device for executing softwareinstructions. The processor 412 can be any custom made or commerciallyavailable processor, a central processing unit (CPU), an auxiliaryprocessor among several processors associated with the mobile device 12,a semiconductor-based microprocessor (in the form of a microchip or chipset), or generally any device for executing software instructions. Whenthe mobile device 12 is in operation, the processor 412 is configured toexecute software stored within the memory 422, to communicate data toand from the memory 422, and to generally control operations of themobile device 12 pursuant to the software instructions. In an exemplaryembodiment, the processor 412 may include a mobile optimized processorsuch as optimized for power consumption and mobile applications. The I/Ointerfaces 414 can be used to receive user input from and/or forproviding system output. User input can be provided via, for example, akeypad, a touch screen, a scroll ball, a scroll bar, buttons, bar codescanner, and the like. System output can be provided via a displaydevice such as a liquid crystal display (LCD), touch screen, and thelike. The I/O interfaces 414 can also include, for example, a serialport, a parallel port, a small computer system interface (SCSI), aninfrared (IR) interface, a radio frequency (RF) interface, a universalserial bus (USB) interface, and the like. The I/O interfaces 414 caninclude a graphical user interface (GUI) that enables a user to interactwith the mobile device 12. Additionally, the I/O interfaces 414 mayfurther include an imaging device, i.e. camera, video camera, etc.

The radio 416 enables wireless communication to an external accessdevice or network. Any number of suitable wireless data communicationprotocols, techniques, or methodologies can be supported by the radio416, including, without limitation: RF; LMR; IrDA (infrared); Bluetooth;ZigBee (and other variants of the IEEE 802.15 protocol); IEEE 802.11(any variation); IEEE 802.16 (WiMAX or any other variation); DirectSequence Spread Spectrum; Frequency Hopping Spread Spectrum; Long TermEvolution (LTE); cellular/wireless/cordless telecommunication protocols(e.g. 3G/4G, etc.); wireless home network communication protocols;paging network protocols; magnetic induction; satellite datacommunication protocols; wireless hospital or health care facilitynetwork protocols such as those operating in the WMTS bands; GPRS;proprietary wireless data communication protocols such as variants ofWireless USB; and any other protocols for wireless communication. Thedata store 418 can be used to store data. The data store 418 can includeany of volatile memory elements (e.g., random access memory (RAM, suchas DRAM, SRAM, SDRAM, and the like)), nonvolatile memory elements (e.g.,ROM, hard drive, tape, CDROM, and the like), and combinations thereof.Moreover, the data store 418 can incorporate electronic, magnetic,optical, and/or other types of storage media.

The memory 422 can include any of volatile memory elements (e.g., randomaccess memory (RAM, such as DRAM, SRAM, SDRAM, etc.)), nonvolatilememory elements (e.g., ROM, hard drive, etc.), and combinations thereof.Moreover, the memory 422 may incorporate electronic, magnetic, optical,and/or other types of storage media. Note that the memory 422 can have adistributed architecture, where various components are situated remotelyfrom one another, but can be accessed by the processor 412. The softwarein memory 422 can include one or more software programs, each of whichincludes an ordered listing of executable instructions for implementinglogical functions. In the example of FIG. 11, the software in the memorysystem 422 includes a suitable operating system (O/S) 426 and programs428. The operating system 426 essentially controls the execution ofother computer programs, and provides scheduling, input-output control,file and data management, memory management, and communication controland related services. The programs 428 can include various applications,add-ons, etc. configured to provide end user functionality with themobile device 12. For example, exemplary programs 428 can include, butnot limited to, a web browser, social networking applications, streamingmedia applications, games, mapping and location applications, electronicmail applications, financial applications, and the like.

The devices 12A, 12B, 12C, 12D can each be similar to the device 12 ofFIG. 11. Of course, the radio 416 and other components include differingconfigurations for different access technologies (e.g., 3G/4G vs. LMR).Also, the devices 12A, 12B, 12C, 12D can include multiple radios. Forexample, the device 12A could include a radio for access to thebroadband network 16 and a radio for WiFi or other PAN technologies. Thedevices 12B, 12C, 12D could include a radio for access to the LMR systemand a radio for WiFi, etc. The programs 428 can also includefunctionality for each of the devices 12A, 12B, 12C, 12D to implementthe methods described herein. In an exemplary embodiment, the seconddevice or the devices 12B, 12C, 12D could include user interfaceenhancements which show currently paired devices.

In the foregoing specification, specific embodiments have beendescribed. However, one of ordinary skill in the art appreciates thatvarious modifications and changes can be made without departing from thescope of the invention as set forth in the claims below. Accordingly,the specification and figures are to be regarded in an illustrativerather than a restrictive sense, and all such modifications are intendedto be included within the scope of present teachings.

The benefits, advantages, solutions to problems, and any element(s) thatmay cause any benefit, advantage, or solution to occur or become morepronounced are not to be construed as a critical, required, or essentialfeatures or elements of any or all the claims. The invention is definedsolely by the appended claims including any amendments made during thependency of this application and all equivalents of those claims asissued.

Moreover in this document, relational terms such as first and second,top and bottom, and the like may be used solely to distinguish oneentity or action from another entity or action without necessarilyrequiring or implying any actual such relationship or order between suchentities or actions. The terms “comprises,” “comprising,” “has”,“having,” “includes”, “including,” “contains”, “containing” or any othervariation thereof, are intended to cover a non-exclusive inclusion, suchthat a process, method, article, or apparatus that comprises, has,includes, contains a list of elements does not include only thoseelements but may include other elements not expressly listed or inherentto such process, method, article, or apparatus. An element proceeded by“comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . .a” does not, without more constraints, preclude the existence ofadditional identical elements in the process, method, article, orapparatus that comprises, has, includes, contains the element. The terms“a” and “an” are defined as one or more unless explicitly statedotherwise herein. The terms “substantially”, “essentially”,“approximately”, “about” or any other version thereof, are defined asbeing close to as understood by one of ordinary skill in the art, and inone non-limiting embodiment the term is defined to be within 10%, inanother embodiment within 5%, in another embodiment within 1% and inanother embodiment within 0.5%. The term “coupled” as used herein isdefined as connected, although not necessarily directly and notnecessarily mechanically. A device or structure that is “configured” ina certain way is configured in at least that way, but may also beconfigured in ways that are not listed.

It will be appreciated that some embodiments may be comprised of one ormore generic or specialized processors (or “processing devices”) such asmicroprocessors, digital signal processors, customized processors andfield programmable gate arrays (FPGAs) and unique stored programinstructions (including both software and firmware) that control the oneor more processors to implement, in conjunction with certainnon-processor circuits, some, most, or all of the functions of themethod and/or apparatus described herein. Alternatively, some or allfunctions could be implemented by a state machine that has no storedprogram instructions, or in one or more application specific integratedcircuits (ASICs), in which each function or some combinations of certainof the functions are implemented as custom logic. Of course, acombination of the two approaches could be used.

Moreover, an embodiment can be implemented as a computer-readablestorage medium having computer readable code stored thereon forprogramming a computer (e.g., comprising a processor) to perform amethod as described and claimed herein. Examples of suchcomputer-readable storage mediums include, but are not limited to, ahard disk, a CD-ROM, an optical storage device, a magnetic storagedevice, a ROM (Read Only Memory), a PROM (Programmable Read OnlyMemory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM(Electrically Erasable Programmable Read Only Memory) and a Flashmemory. Further, it is expected that one of ordinary skill,notwithstanding possibly significant effort and many design choicesmotivated by, for example, available time, current technology, andeconomic considerations, when guided by the concepts and principlesdisclosed herein will be readily capable of generating such softwareinstructions and programs and ICs with minimal experimentation.

The Abstract of the Disclosure is provided to allow the reader toquickly ascertain the nature of the technical disclosure. It issubmitted with the understanding that it will not be used to interpretor limit the scope or meaning of the claims. In addition, in theforegoing Detailed Description, it can be seen that various features aregrouped together in various embodiments for the purpose of streamliningthe disclosure. This method of disclosure is not to be interpreted asreflecting an intention that the claimed embodiments require morefeatures than are expressly recited in each claim. Rather, as thefollowing claims reflect, inventive subject matter lies in less than allfeatures of a single disclosed embodiment. Thus the following claims arehereby incorporated into the Detailed Description, with each claimstanding on its own as a separately claimed subject matter.

What is claimed is:
 1. A mobile device collaboration method, comprising:provisioning a first mobile device with unique user identificationrelated to a role and skill set of an associated user of the firstmobile device; detecting a second mobile device responsive to acondition at the first mobile device; communicating the unique useridentification to the second mobile device; authenticating the firstmobile device by the second mobile device performing: communicating theunique user identification to an external database; receiving, from theexternal database, a verification of one or more of the role and theskill set of the associated user; and providing access for the firstmobile device through the second mobile device if the authenticating issuccessful.
 2. The method of claim 1, further comprising: installing anapplication on the first mobile device, wherein the applicationcomprises the unique user identification and wherein the application isconfigured to implement the detecting the second mobile device and thecommunicating the unique user identification to the second mobile deviceresponsive to the condition.
 3. The method of claim 2, furthercomprising: providing the unique user identification to one or moredatabases comprising the external database.
 4. The method of claim 3,wherein the plurality of databases comprises any of public safetyregistries, national databases, and agency supplied databases.
 5. Themethod of claim 2, further comprising: reporting a location of the firstmobile device via the application to a location server; following thecondition, notifying the second mobile device of the location of thefirst mobile device, wherein the location server detects the secondmobile device is within range of the first mobile device; and turning onbeaconing at the second mobile device allowing the first mobile deviceto detect the second mobile device.
 6. The method of claim 1, furthercomprising: arriving with the second mobile device at an incident,wherein the second mobile device has wireless coverage at the incident;advertising the second mobile device for collaboration at the incident.7. The method of claim 6, where the advertising comprises: transmittingbeacons utilizing one of a personal area networking system and awireless local area networking system to identify the second mobiledevice to the first mobile device.
 8. The method of claim 6, where theadvertising comprises: communicating by the second mobile device with alocation server; receiving notification from the location server thatthe first mobile device is at the incident with the condition; andtransmitting beacons responsive to the notification utilizing one of apersonal area networking system and a wireless local area networkingsystem to identify the second mobile device to the first mobile device.9. The method of claim 6, further comprising: receiving, at the secondmobile device, the unique user identification from the first mobiledevice via one of the personal area networking system and the wirelesslocal area networking system; selecting the external database from oneor more databases, wherein the external database is selected based onthe unique user identification; sending the unique user identificationto the external database; and receiving an authentication from theexternal database for the first mobile device.
 10. The method of claim9, further comprising: providing the access for the first mobile devicethrough the second mobile device if the authenticating is successful viaone of the personal area networking system and the wireless local areanetworking system.
 11. The method of claim 1, wherein the first mobiledevice comprises a broadband mobile device and the second mobile devicecomprises a Land Mobile Radio device.
 12. The method of claim 1, whereinthe first mobile device comprises a mobile device configured to operateon a public network and the second mobile device comprises a mobiledevice configured to operate on a private network.
 13. The method ofclaim 1, further comprising: receiving authentication from the externaldatabase; if the authentication fails, providing an alert through thesecond mobile device identifying the first mobile device; if theauthentication succeeds, establishing a connection between the secondmobile device and the first mobile device; and communicating data fromthe first mobile device through the connection.
 14. The method of claim13, further comprising: arbitrating the connection between the firstmobile device and the second mobile device to provide higher priority tothe first mobile device; and if the arbitrating fails, attempting todetect another mobile device by the first mobile device forcollaboration at a higher priority level.
 15. A mobile device capable ofdevice collaboration, the mobile device comprising: a processor: amemory that is configured to store a set of instructions that, whenexecuted by the processor, perform the following functions: receive aunique user identification from another mobile device, wherein theunique user identification is related to a role and skill set of anassociated user of the another mobile device wherein the another mobiledevice detects the mobile device, responsive to a condition at theanother mobile device; authenticate the another mobile device bycommunicating the unique user identification to an external database;authenticating the another mobile device by: communicating the uniqueuser identification to an external database; receiving, from theexternal database, a verification of one or more of the role and theskill set of the associated user; and if the authenticating issuccessful, provide access for the another mobile device, through themobile device, to a network.
 16. A system for device collaboration, thesystem comprising: a first mobile device configured to: maintain aunique user identification related to a role and skill set of anassociated user of the first mobile device; detect a second mobiledevice responsive to a condition at the first mobile device; communicatethe unique user identification to the second mobile device; the secondmobile device, wherein the second mobile device is configured to:authenticate the first mobile device by: communicating the unique useridentification to an external database; receiving, from the externaldatabase, a verification of one or more of the role and the skill set ofthe associated user; and provide access for the first mobile device,through the second mobile device, to a network if the authenticating issuccessful.