DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets, Verifiers

DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets, Verifiers

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced a new solicitation to create, improve and implement a new set of tools that protect the privacy of individuals when using digital credentials that can be used for a variety of purposes including travel, immigration and citizenship status, employment, residency status and more. The solicitation, called the Privacy Preserving Digital Credential Wallets & Verifiers topic call, is administered by S&T’s Silicon Valley Innovation Program (SVIP) and seeks cutting-edge solutions that can support a privacy-preserving digital credentialing ecosystem for DHS components and offices such as U.S. Citizenship and Immigration Services (USCIS), U.S. Customs and Border Protection (CBP) and the DHS Privacy Office (PRIV).

“Preserving the privacy of individuals as they use digital wallets to store their credentials is deeply important in ensuring the secure, confidential nature of their digital interactions in an increasingly interconnected world,” said Melissa Oh, SVIP managing director.

This solicitation builds on the success and global adoption of the open, standards-based digital credentialing solutions developed under SVIP’s previous ‘Preventing Forgery & Counterfeiting of Certificates and Licenses’ topic call. It seeks privacy-preserving components that can be directly integrated into credentialing systems enabled by the World-Wide Web Consortium (W3C) Verifiable Credential Data Model (VCDM) and W3C Decentralized Identifiers (DIDs) standards utilized by DHS digital credentialing systems. Applications for the solicitation must focus on at least one of the following technical topic areas:

Digital Wallet: DHS is seeking digital wallets that are useful across contexts and jurisdictions, can support the broad range of credentials possible with World Wide Web Consortium (W3C) Verifiable Credential Data Model (VCDM) and W3C Decentralized Identifiers (DID) standards that include verified support for DHS issued credentials, and are portable, highly secure, privacy-preserving, standards-based, interoperable, and multi-functional.

Mobile Verifier: DHS is seeking software-based verifier implementations that can be deployed on mobile devices, including on iOS and Android based devices, that can support the broad range of credentials possible with W3C VCDM/DID standards to include verified support for DHS issued credentials.

“The Privacy Office is proud to partner with our colleagues to identify, develop, and implement privacy enhancing technologies to meet Homeland Security mission needs,” said Mason Clutter, DHS Chief Privacy Officer. “This investment in the building blocks of a privacy protective digital credentialing system further demonstrates the Department’s commitment to privacy and serves as a model for the global community.”

Companies participating in this SVIP Topic Call are eligible for up to $1.7 million of non-dilutive funding over four phases to develop and adapt commercial technologies for homeland security use cases.

Featured

  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.