Date Published: December 2014
Author(s)
Hildegard Ferraiolo (NIST), Larry Feldman (G2), Gregory Witte (G2)
NIST has recently released Special Publication (SP) 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials. Itto provide the technical details for a system by which mobile devices such as smart phones and tables are provisioned with PIV credentials, allowing the mobile device to take the place of the smart card for remote authentication to federal systems. This publication describes how a user with a valid PIV card could obtain a derived, integrated PIV token with associated credential using either hardware or software cryptographic modules. This approach is in response to the mobile device authentication credential outlined in Federal Information Processing Standard (FIPS) 201-2, Personal Identity Verification (PIV) of Federal Employees and Contractors, published in August 2013.
NIST has recently released Special Publication (SP) 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials. Itto provide the technical details for a system by which mobile devices such as smart phones and tables are provisioned with PIV credentials, allowing the mobile...
See full abstract
NIST has recently released Special Publication (SP) 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials. Itto provide the technical details for a system by which mobile devices such as smart phones and tables are provisioned with PIV credentials, allowing the mobile device to take the place of the smart card for remote authentication to federal systems. This publication describes how a user with a valid PIV card could obtain a derived, integrated PIV token with associated credential using either hardware or software cryptographic modules. This approach is in response to the mobile device authentication credential outlined in Federal Information Processing Standard (FIPS) 201-2, Personal Identity Verification (PIV) of Federal Employees and Contractors, published in August 2013.
Hide full abstract
Keywords
authentication; credentials; derived PIV credentials; electronic authentication; electronic credentials; mobile devices; personal identity verification; PIV
Control Families
Identification and Authentication