Derived PIV Credentials

Current Status

We are no longer accepting Letters of Interest from technology vendors as part of this project. Companies that have been selected to participate have signed a Cooperative Research and Development Agreement (CRADA; see an example) with NIST. We are now moving into the build phase of our project lifecycle. 

Read our two-page fact sheet, or download the Derived Personal Identity Verification (PIV) Credentials Project Description (PDF) for more detailed information. If you have questions or suggestions, please email us at piv-nccoe@nist.gov. To receive announcements about additional milestones, sign up for our email alerts.

Summary

In 2005, personal identity verification (PIV) credentialing focused on authentication through traditional computing devices, such as desktops and laptops, where a PIV card would provide a common authentication through integrated smart card readers. Today, the proliferation of mobile devices that do not have integrated smart card readers complicates PIV credentials and authentication.

“Derived Personal Identity Verification (PIV) Credentials” will help businesses authenticate individuals who use mobile devices and need access to controlled facilities, information systems, and applications.

The goal of the building block effort is to demonstrate a feasible security platform based on federal PIV standards that can support operations in federal (PIV), non-federal critical infrastructure (PIV-interoperable or PIV-I), and general business (PIV-compatible or PIV-C) environments.

This project will result in a NIST Cybersecurity Practice Guide, a publicly available description of the practical steps needed to implement a cybersecurity reference design.

Questions? Comments? Reach us at piv-nccoe@nist.gov.

 

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

Entrust Datacard logo
Mobile Iron logo