HID and consortium partners receive US cyber security grant

1 November 2013 News & Events

HID Global has announced that the company and two consortium partners have received one of four US cyber security grants that were recently awarded through President Obama’s National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative. The grants build on the successful launch of five NSTIC pilots awarded in 2012, and will be used to develop systems that enable mobile phones and wearable mobile devices to carry credentials for identification and verification that improve consumer privacy, security and convenience online.

“We are excited to be chosen to help fulfil the NSTIC guiding principles for creating the next generation of identity protection and verification solutions that enable consumers to transact securely and easily over the Internet,” said Jerome Becquart, vice president of product marketing, identity assurance with HID Global. “Our proposal was selected from a competitive field of more than 70 team- and consortium-based submissions, and we look forward to working alongside Exponent and Gemalto to enable important new solutions that allow mobile phones and wearable devices to be used for online consumer identity and attribute verification.”

The consortium has been named the NSTIC Key Team, and the team’s pilot will be focused on enabling mobile phones and secure wearable devices such as rings or bracelets to be used like smart cards to secure applications and networks for a leading social media company, a health care organisation, and the US Department of Defense. Using these mobile device platforms in government applications will also require the ability to produce and store a token associated with a previously used government credential (known as a derived credential) in the device’s secure element, so as not to leverage the previous face-to-face identity-proofing process.

Exponent will provide overall project management leadership for the Key Team, and HID Global will contribute its expertise in mobile and wearable device authentication, credential provisioning and client middleware. The company’s broad portfolio includes authentication and threat detection services; software for smart cards and tokens for strong authentication in both commercial and military applications, and systems for the secure management of smart cards and smart tokens including credentials provisioned in a mobile secure element.

The NSTIC Key Team’s solutions derive from existing and emerging open standards designed to yield an interoperable system that is widely deployable and conducive to participation by a wide variety of solution providers and relying parties. The team will be supported by the Computer Science Department of one of the Nation’s Leading Universities, and Experian Corp, the leading global information services company.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Securex gears up for Cape Town
News & Events
Four industry expos debut in Cape Town from 21–23 October, providing access to Africa’s tech hub and a rapidly expanding local market, through a platform covering security, OSH, facilities management, and fire safety solutions in one venue.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.