Risk
9/21/2012
02:26 PM
50%
50%

NIST Funds Trusted Identity Pilot Programs

National Institute of Standards and Technology programs are intended to create a trustworthy online environment for consumers and businesses, and for institutional transactions.

The National Institute of Standards and Technology has announced plans to award $9 million to five pilot programs as part of its National Strategy for Trusted Identities in Cyberspace.

NSTIC seeks to create a secure "identity ecosystem" for online transactions. The newly funded programs aim to improve consumer confidence in online transactions, prevent identity theft, and give people more control over their personal information.

The investments "will help protect our citizens from identity theft and other types of fraud, while helping our businesses, especially small businesses, reduce their costs," said NIST director Patrick Gallagher in statement on the grants.

The American Association of Motor Vehicle Administrators will implement a program, called the Cross Sector Digital Identity Initiative, to establish a secure online identity ecosystem. Its partners include AT&T, Biometric Signature ID, CA Technologies, Microsoft, and the Virginia Department of Motor Vehicles.

[ Federal intelligence agencies' venture investment firm In-Q-Tel looks to 10gen for data analysis. Read more at Intelligence Agency Invests In Big Data Management. ]

A team of companies led by Criterion Systems will let consumers share shopping and other online preferences and information. The pilot will pull together Web services from identity service providers, online auction services, financial services from Broadridge, supply chain management capabilities from General Electric, and first-response management at government agencies and health care service providers.

Grant recipient Daon will develop an identity ecosystem for senior citizens and other consumers that supports trusted interactions among multiple parties online. The pilot will include "user-friendly" identity technologies for smartphones and tablets. AARP is a partner in the program.

Resilient Network Systems plans to show how an encrypted "trust network" can be used for health and education transactions. On the education side, the pilot will demonstrate secure access to online learning for children that is compliant with the Family Educational Rights and Privacy Act and the Children's Online Privacy Protection Act.

Another grant recipient, the University Corporation for Advanced Internet Development, known as Internet2, will spearhead a program to build a privacy infrastructure that can serve communities. Brown University, Carnegie Mellon, Massachusetts Institute of Technology, University of Texas, and University of Utah are participating.

Cybersecurity, continuity planning, and data records management top the list in our latest Federal IT Priorities Survey. Also in the new, all-digital Focus On The Foundation issue of InformationWeek Government: The FBI's next-gen digital case management system, Sentinel, is finally up and running. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

CVE-2015-0528
Published: 2015-03-29
The RPC daemon in EMC Isilon OneFS 6.5.x and 7.0.x before 7.0.2.13, 7.1.0 before 7.1.0.6, 7.1.1 before 7.1.1.2, and 7.2.0 before 7.2.0.1 allows local users to gain privileges by leveraging an ability to modify system files.

CVE-2015-0996
Published: 2015-03-29
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files, which makes it easier for local users to obtain sensitive info...

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.