

Objective
To supplement the DoD’s Identity Credential and Access Management (ICAM) strategy, and to enable alignment with Zero Trust principles, the Army needs innovative approaches and solutions to use biometrics as one of several factors in multi-factor authentication (MFA).
Description
The use of biometrics, such as fingerprint and facial recognition, is popular in commercial applications because of its ease of use for the end user. While these technologies continue to gain popularity in the commercial space, the use of biometrics in Army tactical remains a significant challenge due to the environment and constraints under which the Army must operate.
Depending on the constraints, a Soldier may not be able to expose their fingers, face, eyes, or voice for recognition. This device should encrypt an authentication token or password that is only exposed when end users meet one of several biometric criteria.
A hardened, small form-factor biometric authentication device would reduce authentication latency and resolve common issues associated with single-factor authentication, such as password reuse and shared credentials. This solution should support multiple biometric authentication mechanisms, including fingerprints, facial, retina and voice recognition.
It should also support common authentication protocols and standards. Firms must design the authentication method to operate under the following conditions: Denied, Disrupted, Intermittent or Limited. Current authentication methods require the end user to have a token or key and to remember specific information, such as a complex password.
Phase I
The Army seeks a proof of concept, in the form of a whitepaper, detailing the feasibility of developing a small form factor device, or using existing hardware capabilities (i.e., camera on laptop) in the current Program Executive Office Command, Control and Communications-Tactical (PEO C3T) portfolio, which utilizes a single biometric factor such as, but not limited to, fingerprint or facial recognition.
The proof of concept must consider the limiting factors of a tactical Denied, Degraded, Intermittent, or Limited (DDIL) environment where the device cannot reach enterprise/centralized services to perform the authentication verification.
Phase II
The prototype can be a vendor-developed device or utilize a PEO C3T system like the Mounted Family of Computer Systems (MFOCS). The device must demonstrate the ability to authenticate to both a centrally managed service and in a disconnected state. If feasible, the vendor will demonstrate the solution in a government facility lab. If that is not possible, the firm can demonstration the technology in a vendor provided facility.
Phase III
Submission Information
Objective
To supplement the DoD’s Identity Credential and Access Management (ICAM) strategy, and to enable alignment with Zero Trust principles, the Army needs innovative approaches and solutions to use biometrics as one of several factors in multi-factor authentication (MFA).
Description
The use of biometrics, such as fingerprint and facial recognition, is popular in commercial applications because of its ease of use for the end user. While these technologies continue to gain popularity in the commercial space, the use of biometrics in Army tactical remains a significant challenge due to the environment and constraints under which the Army must operate.
Depending on the constraints, a Soldier may not be able to expose their fingers, face, eyes, or voice for recognition. This device should encrypt an authentication token or password that is only exposed when end users meet one of several biometric criteria.
A hardened, small form-factor biometric authentication device would reduce authentication latency and resolve common issues associated with single-factor authentication, such as password reuse and shared credentials. This solution should support multiple biometric authentication mechanisms, including fingerprints, facial, retina and voice recognition.
It should also support common authentication protocols and standards. Firms must design the authentication method to operate under the following conditions: Denied, Disrupted, Intermittent or Limited. Current authentication methods require the end user to have a token or key and to remember specific information, such as a complex password.
Phase I
The Army seeks a proof of concept, in the form of a whitepaper, detailing the feasibility of developing a small form factor device, or using existing hardware capabilities (i.e., camera on laptop) in the current Program Executive Office Command, Control and Communications-Tactical (PEO C3T) portfolio, which utilizes a single biometric factor such as, but not limited to, fingerprint or facial recognition.
The proof of concept must consider the limiting factors of a tactical Denied, Degraded, Intermittent, or Limited (DDIL) environment where the device cannot reach enterprise/centralized services to perform the authentication verification.
Phase II
The prototype can be a vendor-developed device or utilize a PEO C3T system like the Mounted Family of Computer Systems (MFOCS). The device must demonstrate the ability to authenticate to both a centrally managed service and in a disconnected state. If feasible, the vendor will demonstrate the solution in a government facility lab. If that is not possible, the firm can demonstration the technology in a vendor provided facility.
Phase III
Submission Information