Feeds

Home Office details early ID vendors

Put 3M and nCipher on your Christmas list

Beginner's guide to SSL certificates

The Home Office has listed 3M and nCipher as providers to the early stage of the National Identity Scheme.

Home secretary Jacqui Smith said that as well as Thales' £18m contract for development of technology and processes – which was publicised last year – nCipher will be paid about £1.3m for a contract to provide "public key infrastructure and security related work".

nCipher, formerly a UK based security firm, is now a part of Thales, having been bought in October 2008.

The other vendors are 3M SP&SL, which will receive about £700,000 plus a fee for each card to design and produce the cards, which will be issued initially to staff at two airports later this year. Secure Mail Services has a deal to deliver the cards under which it will be paid per item.

The information appears in a letter (pdf) to Liberal Democrat shadow home secretary Chris Huhne. It is dated 15 December 2008, but has only just been released online by the House of Commons library, along with several others of the same date.

In another December letter (pdf), to Dominic Grieve, the Conservative's shadow justice secretary, Smith said that a web based service allowing people to check their "core identity information" on the National Identity Register will require secure remote authentication of that person.

However, she added that although the Home Office is investigating possible alternatives, "no final method has been decided", and no cost can be indicated at the moment.

In another letter (pdf) to Grieve released through the library, Smith provided spending figures for branding and marketing of the Identity and Passport Service. These show that it spent £1.7m on marketing in 2007-08, up from £239,000 in 2006-07.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.