Software Helps Developers Get Started with PIV Cards

Jul 10, 2008
Software Helps Developers Get Started with PIV Cards
The NIST demonstration software provides examples of incorporating Personal Identity Verification cards to control access to government computers. As shown, an employee will have to swipe her PIV card that holds her unique identifying information before she can access her computer. Credit: Department of Defense

The National Institute of Standards and Technology has developed two demonstration software packages that show how Personal Identity Verification (PIV) cards can be used with Windows and Linux systems to perform logon, digital signing and verification, and other services. The demonstration software, written in C++, will assist software developers, system integrators and computer security professionals as they develop products and solutions in response to Homeland Security Presidential Directive 12 and the FIPS 201-1 standard.

"We wanted to provide IT professionals with a model of one way that PIV cards can be used to support authentication to federal information systems," explains Donna Dodson, deputy director of the NIST Computer Security Division. "Our objective was not to say 'do the steps this way,' but to show an example of how you might proceed."

Homeland Security Presidential Directive 12 calls for government employees and contractors to use secure identity credentials to access federal facilities and computers. NIST worked with industry to develop the standards for the PIV cards that will be used for those purposes. Each card contains a unique number, two of the employee's biometric fingerprint templates, and cryptographic keys stored on an electronic chip embedded in the card's plastic body.

While each federal agency will implement the use of PIV cards on its own schedule, NIST computer scientists developed the software to demonstrate that PIV cards can work with common computer activities such as system logon. The typical process of keying in user name and password will be replaced with the user inserting his/her PIV card in a reader and entering a personal identification number (PIN). This secure logon could eliminate the need for passwords for other applications and could provide access to secure databases to which the user is authorized.

The PIV Crypto Service Provider (CSP) demonstrates Windows XP Logon with PIV cards. The Public Key Cryptography Standard #11 module was developed to operate in the Fedora Core 5 environment and to implement Linux Logon, signing and encrypting email (following the S/MIME standard) and Web site authentication (following the SSL/TLS standard), configured in Linux OS, Thunderbird and Firefox applications.

The software is available at csrc.nist.gov/groups/SNS/piv/download.html

Source: National Institute of Standards and Technology

Explore further: Protecting personal data in the cloud

add to favorites email to friend print save as pdf

Related Stories

Space agency says Philae completes primary mission

16 hours ago

The pioneering lander Philae completed its primary mission of exploring the comet's surface and returned plenty of data before depleted batteries forced it to go silent, the European Space Agency said Saturday.

Watson-powered app to answer wellness-related questions

19 hours ago

A clinical laboratory that offers genetic testing services globally has received an investment from the IBM Watson Group. The bioinformatics market, which includes genetics, is expected to grow to $12.86 ...

Obama pushes for world climate pact after China deal

19 hours ago

A Sino-US breakthrough on reducing carbon emissions proves a global deal on climate change is achievable, US President Barack Obama said Saturday, as campaigners hailed new momentum in long-stalled talks.

Recommended for you

Protecting personal data in the cloud

11 hours ago

IBM today announced it has patented the design for a data privacy engine that can more efficiently and affordably help businesses protect personal data as it is transferred between countries, including across private clouds.

Gift Guide: Dragons, aliens, heroes for the gamer

Nov 19, 2014

Sony's PlayStation 4 video-game console has built an impressive lead over its competitors. That's good news for holiday shoppers because it has driven Microsoft and Nintendo to offer more budget-friendly ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.