InvestorsHub Logo
Followers 4
Posts 710
Boards Moderated 0
Alias Born 07/14/2006

Re: Tsunami07 post# 195601

Tuesday, 07/20/2010 5:19:35 PM

Tuesday, July 20, 2010 5:19:35 PM

Post# of 249904
Smart Card Alliance endorses presidential strategy for trusted identities in cyberspace

"To achieve high levels of security, the card must include smart card technology to carry PKI credentials, biometrics and other security features"

July 20, 2010

http://www.finextra.com/News/Announcement.aspx?pressreleaseid=34854

The Smart Card Alliance endorses the Obama Administration's National Strategy for Trusted Identities in Cyberspace (NSTIC), developed under the auspices of the President's Cyberspace Policy Review by the National Security Staff and an interagency writing team.

The NSTIC initiative correctly recognizes that there are very real problems of identity management, privacy and security in our society today, and brings a much needed focus on solving the problems. Although its scope is limited to cyberspace, the Framework it outlines would also establish essential foundational elements that can help to strengthen identity, privacy and security in healthcare, social security administration, immigration reform and other programs in the physical world.

The NSTIC Framework draft is well conceived and written. It is intentionally broad in scope, providing a wide range of trusted identity constructs and identity protection technologies. The Framework is very pragmatic and practical in its approach, because it limits its role to being an enabler, facilitator and accelerator of the Identity Ecosystem development. There is a clear recognition that many different public and private stakeholders will be involved in working out the specifics of the Framework and ultimately, using it.

The Healthcare and Identity Councils of the Smart Card Alliance, a non-profit public/private partnership organization whose members include healthcare providers, financial institutions, payment brands, enterprises, government users and technology providers, prepared specific comments on the NSTIC Framework draft. Some top-level points are:

* The Alliance strongly agrees with the ideas of using federal, state and local government and academia programs to accelerate development of the Identity Ecosystem, while leveraging existing procedures, standards and technologies such as FIPS 201 and the Federal Identity, Credentialing and Access Management Roadmap used to achieve Personal Identity Verification (PIV) and interoperability (PIV-I) in Homeland Security Presidential Directive (HSPD)-12.
* The highest priority should be first defining the Identity Ecosystem for the most trusted digital transactions based on an identity medium, because this part of thee of thee this part of the Identity Ecosystem can have the greatest positive impact on identity, security and privacy and it is also the least developed commercially and therefore needs the greatest attention and leadership.
* A suggested idea to make high-value identity transactions both secure and easy to use is the familiar approach of a card and PIN as an identity medium; however, to achieve high levels of security, the card must include smart card technology to carry PKI credentials, biometrics and other security features; other important advantages are that this would create a portable identity medium, and it provides a secure environment that is independent from the PC, thereby side-stepping issues involved with PC, website and service provider hacker threats.

The NSTIC document explains that the need for such a strategy is due to the rising tide of identity theft, online fraud and cyber intrusions, the proliferation of usernames and passwords that individuals must remember, and the need to deliver online services more securely and efficiently. The Framework mentions smart card technology as the kind of technology appropriate for an identity medium, or a personal security device to protect identities in online transactions, and prevent others from stealing or misusing identities.

An Identity Ecosystem that includes smart card technology as an identity medium for high-assurance online identity transactions will provide a very strong and proven foundation for protecting identities in cyberspace in a secure, privacy sensitive way. This foundation can be put in place without reinventing the wheel. The federal government has already established a set of best practices, standards and technology solutions for smart card-based identity management and authentication that can be adapted to this initiative.

What is the advantage of using smart card technology?

A smart card is a card with a small computer in it. Unlike magnetic stripe or RFID cards, the smart card's computer provides high levels of security and privacy protection. Unlike PCs and other open systems, smart cards are designed for security and are virtually impervious to malware, forgery and other fraudulent efforts to extract information.

Smart cards can provide a secure tamperproof container for PKI digital identity credentials and biometric identifiers. In addition, they can be delivered in a familiar card format, making them both portable and easy for broad public distribution and use.

These capabilities make smart card technology ideal for protecting identities and privacy, and for preventing fraud. Smart cards are readily used online and across networks and deliver very high levels of security over the Internet.

Many readers of the NSTIC Framework may not be aware that all U.S. federal government employees have a smart card-based ID card, the Personal Identity Verification (PIV) card, which can be used to access government facilities and information systems, and to digitally sign documents or online transactions. The new electronic passports in the U.S. and many other countries are based on smart card technology. The SIM cards used in 80 percent of the world's cell phones are smart cards. Nearly one billion credit and debit cards worldwide are smart cards, based on an interoperable global standard called EMV, named for its original sponsors Europay, MasterCard and Visa.

More information is available at http://www.smartcardalliance.org/pages/activities-councils-identity including the following white papers:

* Healthcare Identity Management: The Foundation for a Secure and Trusted National Health Information Network
* Assurance Levels Overview and Recommendations
* Identifiers and Authentication -- Smart Credential Choices to Protect Digital Identity
* Identity Management Systems, Smart Cards and Privacy
* Privacy and Secure Identification Systems: The Role of Smart Cards as a Privacy-Enabling Technology
* Secure Identification Systems: Building a Chain of Trust

The current final draft is posted on www.nstic.ideascale.com for public review and input. The Department of Homeland Security is supporting the NSS in this public review period and is providing NSS with the use of an Open Government tool called IdeaScale to collect and prioritize comments. The document will be posted until July 19th, 2010.

===========================================================================

Federation for Identity and Cross-Credentialing Systems (FiXs)

Gemalto and Vodafone

http://fixs.publishpath.com/news

"Using either public key infrastructure (PKI) or a one-time password (OTP)"

Gemalto and Vodafone Group R&D have won an IDDY in the POC category for the development of a solution that adds strong authentication capabilities to OpenID using a Universal Integrated Circuit Card (UICC, typically a SIM card) inserted in a handset or inside a USB token, and is using either public key infrastructure (PKI) or a one-time password (OTP) as the underlying authentication technology. The application allows the use of distinct devices to access the service and to authenticate. The UICC (SIM) is used as a networked cryptographic computer exposing authentication services accessible via IP protocols. This provides users with new and convenient options for securely accessing OpenID-enabled sites from devices such as a PC, handset or game station. Mobile network operators could offer a service to allow end users to leverage UICC-based OpenID single-sign-on to secure access to Web applications.

===========================================================================

Verizon Wireless Selects Gemalto To Provide LTE OTA Platform And Universal Integrated Circuit Card For LTE Network Launch

HISTORY: May 13, 2009

http://news.vzw.com/news/2009/05/pr2009-05-12b.html

BASKING RIDGE, NJ, and AUSTIN, TX — Verizon Wireless announced today it has selected Gemalto, the world leader in digital security, to provide an over-the-air (OTA) platform and LTE Universal Integrated Circuit Card (UICC) for the industry’s first Long Term Evolution (LTE) mobile broadband network. The OTA platform and UICC will help Verizon Wireless deliver a secure and reliable multimedia data connection, provide global roaming and remotely add new UICC card applications and services on its 4G LTE wireless broadband network.

Verizon Wireless selected Gemalto for its OTA platform, which will help the wireless leader manage LTE devices on its 4G LTE network, as well as its UICC, a new innovative microprocessor smart card. The UICC will be used inside mobile devices to manage subscriber information exchange – such as transferring contacts and preferences from one device to another – while providing secure access to Verizon Wireless’ LTE network.

Kyle Malady, vice president of product development for Verizon Wireless, said, “As we build the global LTE ecosystem, we are bringing in partners who are best in their class and who have demonstrated the ability to bring products to market quickly. Gemalto fits the bill for its OTA platform and its UICC.”

Philippe Vallée, executive vice president of telecommunications for Gemalto, said, “We are very pleased Verizon Wireless chose us as a technology partner in the LTE OTA and UICC implementation, a significant industry milestone in the migration to all IP networks.”

By leveraging its 700 MHz spectrum for LTE deployment, Verizon Wireless is deploying a high quality wireless broadband network with excellent coverage and in-building penetration, all at a cost structure significantly below current levels.

For more information about Verizon Wireless, visit www.verizonwireless.com. For more information about Gemalto’s wireless telecom solutions, visit www.gemalto.com/telecom.

About Verizon Wireless

Verizon Wireless operates the nation’s most reliable and largest wireless voice and data network, serving more than 86.6 million customers. Headquartered in Basking Ridge, N.J., with more than 86,000 employees nationwide, Verizon Wireless is a joint venture of Verizon Communications (NYSE: VZ) and Vodafone (NYSE and LSE: VOD). For more information, visit www.verizonwireless.com. To preview and request broadcast-quality video footage and high-resolution stills of Verizon Wireless operations, log on to the Verizon Wireless Multimedia Library at www.verizonwireless.com/multimedia.

About Gemalto

Gemalto is the world leader in digital security with 2008 annual revenues of €1.68 billion, and 10,000 employees operating out of 75 offices, research and service centers in 40 countries.

Gemalto is at the heart of our evolving digital society. The freedom to communicate, travel, shop, bank, entertain, and work – anytime, anywhere – has become an integral part of what people want and expect, in ways that are convenient, enjoyable and secure.

Gemalto delivers on the growing demands of billions of people worldwide for mobile connectivity, identity and data protection, credit card safety, health and transportation services, e-government and national security. We do this by supplying to governments, wireless operators, banks and enterprises a wide range of secure personal devices, such as subscriber identification modules (SIM) in mobile phones, smart banking cards, smart card access badges, electronic passports, and USB tokens for online identity protection. To complete the solution we also provide software, systems and services to help our customers achieve their goals.

As the use of Gemalto’s software and secure devices increases with the number of people interacting in the digital and wireless world, the company is poised to thrive over the coming years.

===========================================================================

Wave Systems Collaborates on Open Identity Initiative for Federal Government

Government Unveiling Pilot Program to Encourage Federal Agencies to Utilize Open Identity Technologies in Response to President Obama's Mandate for Greater Citizen Participation

HISTORY: September 9, 2009

http://cloudcomputing.sys-con.com/node/1099152

LEE, MA -- (Marketwire) -- 09/09/09 -- Wave Systems Corp. (NASDAQ: WAVX) (www.wave.com) announced today its support of the first open identity pilot program aimed at enabling members of the public and businesses to register and participate in government websites without creating new user names and passwords. Wave joins Yahoo!, PayPal, Google, Equifax, AOL, VeriSign, Acxiom, Citi and Privo in supporting this new pilot program as digital identity providers offering solutions based on OpenID and Information Card technologies.

The Center for Information Technology, National Institutes of Health, U.S. Department of Health and Human Services and related agencies will participate in the pilot program. Wave and the other participating companies are being certified under the open trust frameworks developed by the OpenID Foundation and the Information Card Foundation and reviewed by the federal government. A joint announcement by both foundations was issued earlier today to coincide with the first day of the Gov 2.0 Summit in Washington, D.C.

"The Open Identity for Open Government Initiative, a joint mission of the Information Card Foundation and OpenID Foundation with the U.S. government, is one of the most significant steps in making government more transparent and participatory," said Drummond Reed, Executive Director of the Information Card Foundation. "But with open access comes the need for greater security and privacy. Wave Systems is developing the ability to tie open identity technology into the trusted computing infrastructure. This will provide the basis for stronger security and privacy, and would pave the way for a whole new class of trusted applications."

Wave has been developing a service which combines hardware security and open identities for secure, single sign-on for accessing Web services. It utilizes OpenID and SAML, open standards that allow the use of an existing identity to sign into multiple websites without creating new passwords. With OpenID, a visited website (relying party) communicates with an identity provider and that provider then confirms the visitor's identity to the website. To date many sites including Google, FaceBook and SalesForce participate in OpenID as an identity provider, relying party or both.

===========================================================================

Wave Systems Corp. Patents and Patent Applications

http://www.wavxdd.com/Patents.htm

Current Patent Applications:

The following patent applications are thought to have been made in the name of Wave Systems Corp. However, this is not possible to confirm until the patents are officially approved, granted and registered.

Cryptographic data security system and method

US Patent Application Number 20020087860 of July 4, 2002

A method for communicating between a computer device and a trusted server is disclosed. According to the method of the invention, a one-time password for use in communication from the device to the server is generated. The device generates at least one one-time request-authentication datum that includes a function of at least a portion of a previous response from the server to a previous message from the device. The server then generates at least one one-time response authentication datum that includes a function of at least a portion of at least one one-time password.

===========================================================================

PKI security for embedded systems

"A Machine-to-Machine (M2M) authentication strategy based on PKI can form the backbone of a secure embedded system"

May 2010

http://embedded-computing.com/pki-security-embedded-systems

Public Key Infrastructure (PKI) isn’t just for enterprise applications – a Machine-to-Machine (M2M) authentication strategy based on PKI can form the backbone of a secure embedded system.

===========================================================================

Dick Lynch, Verizon CTO, is Inaugural Recipient of Qualcomm's 25th Anniversary Technology Innovation Partner Award

Qualcomm Honors Verizon's Lynch for his Role in Driving Wireless Industry's Success --

"This underscores Verizon's commitment and vision to accelerate an environment that will offer consumers greater data services and applications at higher speeds. Verizon Wireless' Get It Now(R) application download service was the first commercial implementation of Qualcomm's Brew(R) technology in the United States. In addition, Verizon's V CAST Mobile TV offering uses Qualcomm's MediaFLO(TM) services platform to broadcast high-quality mobile entertainment and information to subscribers nationwide. In July 2009, Qualcomm and Verizon Wireless formed a strategic alliance to launch nPhase, a joint venture aimed at accelerating the adoption of machine-to-machine (M2M) wireless communications and advancing the evolution of smart services worldwide",..

"We expect to launch our 4G LTE network in 25-30 markets by the end of 2010, covering approximately 100 million Americans. We’ve also noted the first devices that will be available to access the new network are likely to be PC cards and USB dongles, for high-speed laptop connectivity. Other types of devices, including those designed for individual consumers, are slated for the middle of next year"

July 1, 2010

http://www.marketwatch.com/story/dick-lynch-verizon-cto-is-inaugural-recipient-of-qualcomms-25th-anniversary-technology-innovation-partner-award-2010-07-01?reflink=MW_news_stmp

http://gigaom.com/2010/06/30/verizon-to-launch-lte-nov-15/

SAN DIEGO, Qualcomm Incorporated today introduced its 25th Anniversary Technology Innovation Partner Award Program. The award's first recipient, Dick Lynch, chief technology officer of Verizon Communications, was honored today at Qualcomm's 2010 Uplinq Conference in San Diego. In conjunction with the award, Qualcomm will make a financial donation in Lynch's name to fund the advancement of wireless education.

"Since its founding, Qualcomm has consistently focused on innovation, entrepreneurship and collaboration," said Dr. Irwin M. Jacobs, co-founder and former chairman and CEO of Qualcomm. "Over the next 12 months, Qualcomm will recognize certain individuals who exemplify these shared principles, have played a key role in the success of the wireless industry, and have furthered adoption of Qualcomm technologies. I am especially pleased to present the first 25th Anniversary Technology Innovation Partner Award to Dick Lynch in recognition of his long career of leadership in the evolution of mobile wireless, now the largest technology platform in human history."

An acknowledged leader in the mobile services industry, Lynch has a long history of collaborating with Qualcomm to promote the proliferation of advanced mobile technologies. His strong advocacy inspired several industry-leading wireless companies to adopt CDMA and other innovative technology solutions and platforms pioneered by Qualcomm. In addition, he played an influential role in promoting the adoption of CDMA by the Telecommunications Industry Association as a North American digital cellular standard.

Lynch was an early champion of data services and recognized the role those services would play in people's lives. Among his many notable accomplishments at Verizon Communications, Lynch was instrumental in driving the adoption of CDMA IS-95A and CDMA2000(R) 1xEV-DO technology, which earned Verizon distinction as the first U.S. network to offer consumers access to mobile data services at broadband speeds. In a similarly groundbreaking move, Lynch announced Verizon's plans to be first in the United States to launch a next-generation Long Term Evolution (LTE) network.

Under Lynch's leadership, Verizon has frequently been the first to implement Qualcomm's technology innovations. This underscores Verizon's commitment and vision to accelerate an environment that will offer consumers greater data services and applications at higher speeds. Verizon Wireless' Get It Now(R) application download service was the first commercial implementation of Qualcomm's Brew(R) technology in the United States. In addition, Verizon's V CAST Mobile TV offering uses Qualcomm's MediaFLO(TM) services platform to broadcast high-quality mobile entertainment and information to subscribers nationwide. In July 2009, Qualcomm and Verizon Wireless formed a strategic alliance to launch nPhase, a joint venture aimed at accelerating the adoption of machine-to-machine (M2M) wireless communications and advancing the evolution of smart services worldwide.

About Qualcomm

Qualcomm Incorporated is the world leader in next-generation mobile technologies. For 25 years, Qualcomm ideas and inventions have driven the evolution of wireless communications, connecting people more closely to information, entertainment and each other. Today, Qualcomm technologies are powering the convergence of mobile communications and consumer electronics, making wireless devices and services more personal, affordable and accessible to people everywhere. For more information, visit Qualcomm around the Web:

===========================================================================

Gemalto:

The role of the UICC (sim card) in Long Term Evolution (LTE)

The value the UICC can bring to Long Term Evolution (LTE)

The UICC (Universal Integrated Circuit Card) is the smart card used in mobile terminals for GSM and UMTS/3G networks. It authenticates the subscriber to the network while ensuring the integrity and security of their personal data. It also stores applications for both operator and end-user use for the correct deployment of mobile services. Now in the pipeline for LTE, the UICC brings a whole host of fundamental features, tried and tested within GSM and now perfected for LTE. This technical focus will talk about its role as a secure device for authentication and the storage of personal data, as well as the value it can bring in terms of revenue generation and new service deployment.

http://www.gemalto.com/uicc_role/

"The inclusion of the UICC mandatory for accessing Long Term Evolution core networks"

A few key points:

Ready to deploy - LTE networks do not need a specific LTE USIM (Universal Subscriber Identity Module) function.

Fully integrated into IP networks - The UICC, as per existing standards, has become an IP connected processor with its own IP layers and IP stack (USB IC). This means that it is ready for deployment in all IP networks such as LTE.

Works with all 3G handsets - This means a wider park of cell phones to propose to your customer base.

Compliant with all distribution models - The UICC’s portability encourages the widest possible distribution model for the wireless business – UICC built in, subsidized handsets, or even generic, non subsidized phones.

Makes personalization easy - Carriers can use the UICC for plug and play personalization of the handset, both pre and post issuance on the field, offering a more tailored service for their subscribers.

Multi-device and convergence ready - The UICC comes in different form factors to suit your business model – standard USIM card, USB dongle, SIM in 3G laptops and Smart modem.

Secure storage of personal content - The UICC now stores up to 2GB of personal content for your user’s pleasure

All of the above has made the inclusion of the UICC mandatory for accessing Long Term Evolution core networks. So what does this mean for your business?

Long Term Evolution – The role of UICC technology
The value of the UICC in LTE networks
Business opportunities
Different Form Factors
A vision of the future
Conclusion

http://www.cdg.org/news/events/cdmaseminar/080430_InterTech/10-Gemalto%20Interworking.pdf

===========================================================================

Gemalto acquires Trusted Logic, a leading provider of secure software platforms

HISTORY: Sept 8, 2009

http://www.gemalto.com/php/pr_view.php?id=613

===========================================================================

Wave Systems & Trusted Logic History, endless,...

===========================================================================

>><<


Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.