TECHNOLOGY AREA(S): Information Systems
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, firstname.lastname@example.org.
OBJECTIVE: Develop innovative tools & techniques to secure operation of mobile devices & systems: enable security in real-time systems; establish security in disadvantaged, intermittent, & low-bandwidth environments. Must provide military-grade techniques.
DESCRIPTION: The warfighter needs access to and the ability to dynamically share data in a variety of formats. In addition, they need access to this data no matter where they find themselves in the world; be in the office, a hotel room or in an austere area with suspect communications infrastructure. As such, there exists the need to secure commercial mobile devices for information sharing for multiple levels of classification up to the highest classification levels. These solutions must provide data-at-rest, data-in-transit, tamper mitigation, secure OS and device attestation, dual-factor authentication & authorization, and efficient power consumption.
PHASE I: Describe and develop creative methods, techniques and tools for establishing, guaranteeing and conveying the integrity and authenticity of data via commercial mobile environment. The methodologies should in particular address the issue of how to ensure sensitive data remains isolated according to published NSA guidelines (CSfC and MCP Protection Profiles).
PHASE II: Develop, implement and validate a prototype system that utilizes the tools and methods from Phase I. The prototypes should be sufficiently detailed to evaluate scalability, usability, and resistance to malicious attack. Also should show evidence of efficient power consumption. Efficiency is less critical than overall scalability and security.
PHASE III DUAL USE APPLICATIONS: Provide at least 3 secure containers where applications can execute assurance that will not cross over into other containers resident on the device; show limited performance degradation. This will enable users to utilize commercial mobile apps as well as those specific to government agencies.
KEYWORDS: Security, Mobile, Data-at-Rest, Data-In-Transit, dynamic mobile device management