Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings

Verizon sees opportunity with online ID service

By atesmeh | December 5, 2011

Share

Verizon has achieved a certification for a digital credentials program that in the short term will give the company a big advantage competing for work with the federal government, and in the long term might point the way toward the establishment of secure digital IDs in the consumer market.

Verizon is the first service provider to achieve Level 3 certification under the Identity, Credential and Access Management (ICAM) program.

ICAM is a federal program created to develop a method for establishing and safeguarding the identities of government employees and contractors working with the federal government that is consistent across all federal agencies.

Private sector groups likely to benefit include not only suppliers of equipment and services to the federal government, but also private sector businesses subject to federal oversight. An example is medical professionals issuing e-prescriptions that require verification under FDA rules.

Level 3 defines digital identification with some level of online screening; it is the highest level of security short of conducting a personal interview to establish identity (part of the definition of Level 4 ICAM security).

Verizon’s chief identity strategist Tracy Hulver told CED that achieving the certification is an end unto itself, inasmuch as it will help Verizon compete for federal contracts providing identification services, but Verizon certainly expects that the effort might be a step toward establishing some sort of identity standards in the private sector.

One path toward moving ICAM-compliant identification services into the private sector might be through an Obama administration program called the National Strategy for Trusted Identities in Cyberspace.

NSTIC is aimed at creating an Internet identity ecosystem that uses interoperable technology standards and policies to authenticate not only consumers, but also organizations and IT infrastructure.

Security in the private sector is already believed to be a huge problem. The House of Representatives is considering a cyber security bill, co-authored by Rep. Mike Rogers, who noted, “There are two types of companies in this country: those who know they’ve been hacked, and those who don’t know they’ve been hacked.” A week after the introduction of that bill, Cablevision announced it had just fended off a DDoS attack.

NSTIC hopes to help encourage a coordinated response. It does not mention ICAM, Hulver said, but those involved with NSTIC see ICAM as an obvious possible starting point.

Ultimately, it would be beneficial to have a common credential, or set of credentials, that would both provide higher levels of security, but would also work in the consumer market.

“Why not be able to use that credential to log in to Amazon?” Hulver noted. That same ID security system would be just as applicable to FiOS and competing services, as well as for digital credit, he agreed.

Delivered via the cloud, Verizon Enterprise Identity Services are aimed at helping reduce the costs and complexity traditionally associated with identity rollouts. With this solution, users do not need to purchase additional hardware or software. If users lose a device, they can easily leverage a mechanism they already have – such as a mobile or home phone – or add an additional mechanism to retrieve their dynamic code for authentication, Verizon explained.

Verizon is leveraging two acquisitions to provide the security services: Cybertrust in 2007 and cloud services specialist TerreMark early this year.


Filed Under: Industry regulations

 

Related Articles Read More >

ids-industrial-camera-manufacturer.sustainability-3
IDS focuses on sustainability in shipping
Part 5: Motion control + MQTT, OPC-UA, and other protocols for cloud services
Facebook CEO Zuckerberg Calls for More Outside Regulation
Musk’s Boring Company Calls it Quits on LA Tunnel, Instead Focuses on Hyperloop

DESIGN GUIDE LIBRARY

“motion

Enews Sign Up

Motion Control Classroom

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Global supply needs drive increased manufacturing footprint development
  • How to Increase Rotational Capacity for a Retaining Ring
  • Cordis high resolution electronic proportional pressure controls
  • WAGO’s custom designed interface wiring system making industrial applications easier
  • 10 Reasons to Specify Valve Manifolds
  • Case study: How a 3D-printed tool saved thousands of hours and dollars

Design World Podcasts

May 17, 2022
Another view on additive and the aerospace industry
See More >
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • Advertising
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Engineering White Papers
  • LEAP AWARDS

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings