Risk
9/21/2012
02:26 PM
Connect Directly
RSS
E-Mail
50%
50%

NIST Funds Trusted Identity Pilot Programs

National Institute of Standards and Technology programs are intended to create a trustworthy online environment for consumers and businesses, and for institutional transactions.

The National Institute of Standards and Technology has announced plans to award $9 million to five pilot programs as part of its National Strategy for Trusted Identities in Cyberspace.

NSTIC seeks to create a secure "identity ecosystem" for online transactions. The newly funded programs aim to improve consumer confidence in online transactions, prevent identity theft, and give people more control over their personal information.

The investments "will help protect our citizens from identity theft and other types of fraud, while helping our businesses, especially small businesses, reduce their costs," said NIST director Patrick Gallagher in statement on the grants.

The American Association of Motor Vehicle Administrators will implement a program, called the Cross Sector Digital Identity Initiative, to establish a secure online identity ecosystem. Its partners include AT&T, Biometric Signature ID, CA Technologies, Microsoft, and the Virginia Department of Motor Vehicles.

[ Federal intelligence agencies' venture investment firm In-Q-Tel looks to 10gen for data analysis. Read more at Intelligence Agency Invests In Big Data Management. ]

A team of companies led by Criterion Systems will let consumers share shopping and other online preferences and information. The pilot will pull together Web services from identity service providers, online auction services, financial services from Broadridge, supply chain management capabilities from General Electric, and first-response management at government agencies and health care service providers.

Grant recipient Daon will develop an identity ecosystem for senior citizens and other consumers that supports trusted interactions among multiple parties online. The pilot will include "user-friendly" identity technologies for smartphones and tablets. AARP is a partner in the program.

Resilient Network Systems plans to show how an encrypted "trust network" can be used for health and education transactions. On the education side, the pilot will demonstrate secure access to online learning for children that is compliant with the Family Educational Rights and Privacy Act and the Children's Online Privacy Protection Act.

Another grant recipient, the University Corporation for Advanced Internet Development, known as Internet2, will spearhead a program to build a privacy infrastructure that can serve communities. Brown University, Carnegie Mellon, Massachusetts Institute of Technology, University of Texas, and University of Utah are participating.

Cybersecurity, continuity planning, and data records management top the list in our latest Federal IT Priorities Survey. Also in the new, all-digital Focus On The Foundation issue of InformationWeek Government: The FBI's next-gen digital case management system, Sentinel, is finally up and running. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.