HID Global and Consortium Partners Receive US Cyber Security Grant

HID Global and Consortium Partners Receive US Cyber Security Grant

HID Global today announced that the company and two consortium partners have received one of four U.S. cyber security grants that were recently awarded through President Obama’s National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative. HID Global and Consortium Partners Receive US Cyber Security GrantThe grants build on the successful launch of five NSTIC pilots awarded in 2012 and will be used to develop systems that enable mobile phones and wearable mobile devices to carry credentials for identification and verification that improve consumer privacy, security and convenience online.

“We are excited to be chosen to help fulfill the NSTIC guiding principles for creating the next generation of identity protection and verification solutions that enable consumers to transact securely and easily over the Internet,” said Jerome Becquart, vice president of product marketing, identity assurance with HID Global.  “Our proposal was selected from a competitive field of more than 70 team- and consortium-based submissions, and we look forward to working alongside Exponent and Gemalto to enable important new solutions that allow mobile phones and wearable devices to be used for online consumer identity and attribute verification.”

The consortium has been named the NSTIC Key Team, and the team’s pilot will be focused on enabling mobile phones and secure wearable devices, such as rings or bracelets, to be used like smart cards to secure applications and networks for a leading social media company, a health care organization and the U.S. Department of Defense. Using these mobile device platforms in government applications will also require the ability to produce and store a token associated with a previously-used, government credential (known as a derived credential) in the device’s secure element so as not to leverage the previous face-to-face, identity-proofing process.

Exponent will provide overall project management leadership for the Key Team, and HID Global will contribute its expertise in mobile and wearable device authentication, credential provisioning and client middleware. The company’s broad portfolio includes authentication and threat detection services; software for smart cards and tokens for strong authentication in both commercial and military applications; and systems for the secure management of smart cards and smart tokens, including credentials provisioned in a mobile secure element.

The NSTIC Key Team’s solutions derive from existing and emerging open standards designed to yield an interoperable system that is widely deployable and conducive to participation by a wide variety of solution providers and relying parties.  The team will be supported by the computer science department of one of the nation’s leading universities, and Experian Corp, a global information services company.

Featured

  • A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

Featured Cybersecurity

New Products

  • ABLOY IP54-rated Integrated Dust Cover

    ABLOY IP54-rated Integrated Dust Cover

    One of the things that keep security managers on high alert is the real possibility the security locks used to safeguard their properties may unexpectedly fail due to environmental conditions. 3

  • ComNet NW1 Gen 4

    ComNet NW1 Gen 4

    ComNet, Communication Networks, is announcing the introduction of its Generation 4 line of NetWave® wireless products that offer greater performance and increased stability in applications where throughput and increased bandwidth is increasingly important. 3

  • BIO-key MobileAuth

    BIO-key MobileAuth

    BIO-key International has introduced its new mobile app, BIO-key MobileAuth™ with PalmPositive™ the latest among over sixteen strong authentication factors available for BIO-key's PortalGuard® Identity-as-a-Service (IDaaS) platform. 3