DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets, Verifiers

DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets, Verifiers

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced a new solicitation to create, improve and implement a new set of tools that protect the privacy of individuals when using digital credentials that can be used for a variety of purposes including travel, immigration and citizenship status, employment, residency status and more. The solicitation, called the Privacy Preserving Digital Credential Wallets & Verifiers topic call, is administered by S&T’s Silicon Valley Innovation Program (SVIP) and seeks cutting-edge solutions that can support a privacy-preserving digital credentialing ecosystem for DHS components and offices such as U.S. Citizenship and Immigration Services (USCIS), U.S. Customs and Border Protection (CBP) and the DHS Privacy Office (PRIV).

“Preserving the privacy of individuals as they use digital wallets to store their credentials is deeply important in ensuring the secure, confidential nature of their digital interactions in an increasingly interconnected world,” said Melissa Oh, SVIP managing director.

This solicitation builds on the success and global adoption of the open, standards-based digital credentialing solutions developed under SVIP’s previous ‘Preventing Forgery & Counterfeiting of Certificates and Licenses’ topic call. It seeks privacy-preserving components that can be directly integrated into credentialing systems enabled by the World-Wide Web Consortium (W3C) Verifiable Credential Data Model (VCDM) and W3C Decentralized Identifiers (DIDs) standards utilized by DHS digital credentialing systems. Applications for the solicitation must focus on at least one of the following technical topic areas:

Digital Wallet: DHS is seeking digital wallets that are useful across contexts and jurisdictions, can support the broad range of credentials possible with World Wide Web Consortium (W3C) Verifiable Credential Data Model (VCDM) and W3C Decentralized Identifiers (DID) standards that include verified support for DHS issued credentials, and are portable, highly secure, privacy-preserving, standards-based, interoperable, and multi-functional.

Mobile Verifier: DHS is seeking software-based verifier implementations that can be deployed on mobile devices, including on iOS and Android based devices, that can support the broad range of credentials possible with W3C VCDM/DID standards to include verified support for DHS issued credentials.

“The Privacy Office is proud to partner with our colleagues to identify, develop, and implement privacy enhancing technologies to meet Homeland Security mission needs,” said Mason Clutter, DHS Chief Privacy Officer. “This investment in the building blocks of a privacy protective digital credentialing system further demonstrates the Department’s commitment to privacy and serves as a model for the global community.”

Companies participating in this SVIP Topic Call are eligible for up to $1.7 million of non-dilutive funding over four phases to develop and adapt commercial technologies for homeland security use cases.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West: Day 2

    What a great show ISC West 2024 has been so far. The second day on Thursday was as busy or even more hectic than the first. Remember to keep tabs on our Live From ISC West page for news and updates from the show floor at the Sands Expo, because there’s more news coming out than anyone could be expected to keep track of. Read Now

    • Industry Events
    • ISC West
  • A Unique Perspective on ISC West 2024

    Navigating a tradeshow post-knee surgery can be quite the endeavor, but utilizing an electric scooter adds an interesting twist to the experience. While it may initially feel like a limitation, it actually provides a unique perspective on traversing through the bustling crowds and expansive exhibition halls. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3