Police place confidence in PKI

The Metropolitan Police is implementing new encryption technology on its network in a bid to improve the security of access to...

The Metropolitan Police is implementing new encryption technology on its network in a bid to improve the security of access to sensitive information such as criminal records.

The Met, the largest police force in the UK, will use Baltimore Technologies' Unicert public key infrastructure (PKI) system to secure and authenticate the 50,000 members of the force, to ensure that only trusted users have access to information on police databases. It will be used alongside existing security systems.

The initial application is being rolled out to 3,000 users who will all be issued with digital certificates on smartcards. They will be able to access the application remotely over a virtual private network.

Baltimore expects that future applications such as secure e-mail and other database applications will be rolled out to the entire force.

PKI is a set of tools that secure a network by providing each user with a digital identity, through a smartcard, which is authenticated by a central digital certificate authority. Research group Datamonitor this week predicted that global investment in PKI products and services will grow from £300m in last year to £2.35bn in 2006.

"Digital certificates give our members the confidence and security necessary to enable secure access to vital information," said Royston Barker, head of the Met's infrastructure programme.

"They help to ensure that transaction information remains secure and confidential and that only authorised parties can access specific databases," he added.

Daniel Thomas




Enjoy the benefits of CW+ membership, learn more and join.

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...