Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • Subscribe
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Trends
  • Supplier Listings
  • Advertise
  • Subscribe

Verizon sees opportunity with online ID service

By atesmeh | December 5, 2011

Verizon has achieved a certification for a digital credentials program that in the short term will give the company a big advantage competing for work with the federal government, and in the long term might point the way toward the establishment of secure digital IDs in the consumer market.

Verizon is the first service provider to achieve Level 3 certification under the Identity, Credential and Access Management (ICAM) program.

ICAM is a federal program created to develop a method for establishing and safeguarding the identities of government employees and contractors working with the federal government that is consistent across all federal agencies.

Private sector groups likely to benefit include not only suppliers of equipment and services to the federal government, but also private sector businesses subject to federal oversight. An example is medical professionals issuing e-prescriptions that require verification under FDA rules.

Level 3 defines digital identification with some level of online screening; it is the highest level of security short of conducting a personal interview to establish identity (part of the definition of Level 4 ICAM security).

Verizon’s chief identity strategist Tracy Hulver told CED that achieving the certification is an end unto itself, inasmuch as it will help Verizon compete for federal contracts providing identification services, but Verizon certainly expects that the effort might be a step toward establishing some sort of identity standards in the private sector.

One path toward moving ICAM-compliant identification services into the private sector might be through an Obama administration program called the National Strategy for Trusted Identities in Cyberspace.

NSTIC is aimed at creating an Internet identity ecosystem that uses interoperable technology standards and policies to authenticate not only consumers, but also organizations and IT infrastructure.

Security in the private sector is already believed to be a huge problem. The House of Representatives is considering a cyber security bill, co-authored by Rep. Mike Rogers, who noted, “There are two types of companies in this country: those who know they’ve been hacked, and those who don’t know they’ve been hacked.” A week after the introduction of that bill, Cablevision announced it had just fended off a DDoS attack.

NSTIC hopes to help encourage a coordinated response. It does not mention ICAM, Hulver said, but those involved with NSTIC see ICAM as an obvious possible starting point.

Ultimately, it would be beneficial to have a common credential, or set of credentials, that would both provide higher levels of security, but would also work in the consumer market.

“Why not be able to use that credential to log in to Amazon?” Hulver noted. That same ID security system would be just as applicable to FiOS and competing services, as well as for digital credit, he agreed.

Delivered via the cloud, Verizon Enterprise Identity Services are aimed at helping reduce the costs and complexity traditionally associated with identity rollouts. With this solution, users do not need to purchase additional hardware or software. If users lose a device, they can easily leverage a mechanism they already have – such as a mobile or home phone – or add an additional mechanism to retrieve their dynamic code for authentication, Verizon explained.

Verizon is leveraging two acquisitions to provide the security services: Cybertrust in 2007 and cloud services specialist TerreMark early this year.

You Might Also Like


Filed Under: Industry regulations + certifications

 

LEARNING CENTER

Design World Learning Center
“dw
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for Design Engineering Professionals.
Motor University

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Sustainability, Innovation and Safety, Central to Our Approach
  • Why off-highway is the sweet spot for AC electrification technology
  • Looking to 2025: Past Success Guides Future Achievements
  • North American Companies Seek Stronger Ties with Italian OEMs
  • Adapt and Evolve
  • Sustainable Practices for a Sustainable World
View More >>
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Control Engineering
  • Consulting-Specifying Engineer
  • Plant Engineering
  • Engineering White Papers
  • Leap Awards

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • Subscribe
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Trends
  • Supplier Listings
  • Advertise
  • Subscribe
We use cookies to personalize content and ads, to provide social media features, and to analyze our traffic. We share information about your use of our site with our social media, advertising, and analytics partners who may combine it with other information you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use this website.OkNoRead more