Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Trusted Identity Platform Introduction From HID Global

HID Global : 26 March, 2010  (Company News)
Access control and identity management company introduces framework for providing unified security on one platform
HID Global has announced the establishment of a new Trusted Identity Platform or TIP, which the company has deployed within its internal production facilities as a precursor to using it as the framework for future HID Global security identity products and solutions.

"The ideal secure identity system is based on a chain of custody, in which all end points in a system or network are validated so that identity transactions between them can be trusted at anytime, on demand," said Dr Tam Hulusi, senior vice president, Strategic Innovation and Intellectual Property at HID. "This is the concept behind our new Trusted Identity Platform, a simple but protected identity transaction system that will provide a secure delivery infrastructure and the unifying framework for all future security identity products from HID Global."

At the heart of the TIP framework is a central secure vault that serves known endpoints, such as credentials, readers and printers, on a secure internet connection, within a published security policy. Data security, privacy and reliability is ensured using symmetric-key cryptography, so that all endpoints can execute trustworthy transactions. This approach delivers security beyond the hardware level, extending trust boundaries to other third party platforms supporting TIP protocols.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo