The NIST National Cybersecurity Center of Excellence (NCCoE) released a second draft of its Cybersecurity Practice Guide SP 1800-12 detailing use cases for Derived Personal Identity Verification (PIV) Credentials. They are soliciting public feedback through October, 1, 2018.
White Papers & Webinars
HID Global launches new mobile credentials to secure logical access via handsets
Developing countries pose unique challenges for identity services, but they also hold incredible opportunities to improve service delivery and the overall human condition. A European digital identity company implemented research projects in Africa and Asia to explore the issues and opportunities for digital ID in the region. The preliminary results were shared in a series of blog posts.
The next generation of the subscriber identity modules – or SIM cards – is the embedded version known as the eSIM. Understanding the benefits and challenges of this newer technology is important because the eSIM has a play in industries beyond mobile communications, potentially extending to all secure connected devices and the IOT.
TISA, the UK savings and investments membership organization, launched the pilot phase of its project to develop a UK digital ID system for citizens to use in financial dealings. The pilot phase builds on the prior consumer research and emulation phases of the project. TISA believes digital identity will make it easier for people to […]
While others have piloted the technology, the state of Louisiana became the first jurisdiction to launch a mobile driver license for statewide use. The digital version of the physical drivers license is now accepted for all law enforcement interactions across the state. Other use cases are said to be on the way.
The Electronic Frontier Foundation has filed a letter with the Illinois Supreme Court asking it to maintain the current right of citizens to sue companies based on the simple collection of their biometrics without consent. The court is considering whether such suits should require the plaintiff to show actual damages from the biometric capture.
Spoof Accept Rate (SAR) and Imposter Accept Rate (IAR) join FAR and FRR in biometric toolkit
More devices are incorporating biometric authentication to safeguard data and access, and the Android team is working to strengthen the use of biometrics in Android P release. Android P will include a new model to measure biometric security and use the model to limit the functions that can be conducted if weaker biometric methods are […]