Centrelink takes in-house security tech to US

Powered by SC Magazine
 

Centrelink is to hold workshops in the United States and Australia in an attempt to have its in-house developed smartcard technology adopted as a world standard.

Two-day workshops are planned in Canberra in late June and Washington in July to introduce authentication technology specialists to Centrelink's PLAID protocol.

PLAID stands for 'Protocol for Lightweight Authentication of ID'.

Put simply, it is a smartcard authentication protocol that "specifies how components of a card-based ID authentication system 'talk' to each other".

Centrelink envisions the protocol may one day enable a user to have a single card for access to both buildings and machines (computers) in the workplace.

Developed in-house at Centrelink, the agency has made the protocol available free to the public in the hope a manufacturer will use it to build an off-the-shelf production system.

Centrelink's 27,000 staff currently use random number generators for access control, but the agency is migrating to a PKI certificate-based smart card system later this year.

In 2010, the agency is hoping it will be able to buy a commercial iteration of the PLAID application should one be developed.

The workshops are being held in conjunction with the US National Institute of Standards and Technology (NIST).

Security techies with experience in the ISO/IEC 14443 and ISO/IEC 7816 smartcard standards are welcome to attend.

The Canberra session will take place on June 23 and 24 in Centrelink's Symonston office.


Centrelink takes in-house security tech to US
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 736

Vote