authenticated document/data exchange

23
1 May 22-24, 2007 Washington Dulles Hilton The Business Transformation Conference Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc Session Title: Authenticated Document Workflow Welcom e Welcome to Transformation and Innovation 2007 The Business Transformation Conference

Upload: nathaniel-palmer

Post on 18-Jan-2015

3.646 views

Category:

Business


0 download

DESCRIPTION

Exchange of documents and data in commercial organizations is normally accomplished using traditional workflow methodologies. Successful implementation of workflow in these organizations is encouraging agencies that did not look at these workflow methodologies favorably because data and documents exchanged were considered confidential and restricted and for use only by authorized users. The workflow in these organizations requires that user be authenticated before accessing the document/data as well as obtain their signatures at each step due to legal requirements associated with these processes. In addition retaining the confidentiality of the document/data based on user authentication is of utmost concern. Recent advances in digital signature technology and its use in replacing traditional signature have opened the possibility of creating a successful document/data exchange workflow for authenticated documents and data. Further this approach could be extended to authenticate each user and their role to meet confidentiality and security requirement. Some of the processes that can be identified for authenticated document/data exchange are: • Document/data exchange associated with healthcare document requiring HIPAA compliance. • Judicial transactions like TRO’s (Temporary Restraining Order) etc.

TRANSCRIPT

Page 1: Authenticated Document/Data Exchange

1 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Dr. Mohammed ShaikhChairmanIMAGE-X Enterprises, Inc

Session Title:Authenticated Document Workflow

WelcomeWelcome

to Transformation and Innovation 2007 The Business Transformation Conference

Page 2: Authenticated Document/Data Exchange

2 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Agenda• Authenticated Document Workflow

– Digital Certificates – How it Works?– Benefits

• Advance Healthcare Directives (AHCD)– Electronic AHCD– What is MEDePass– How it Works?– Benefits

• Online Probation Investigation Reporting– What is it?– How It Works?

Page 3: Authenticated Document/Data Exchange

3 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Public Key - A Public Key is (1) the key of a signature key pair used to validate a digital

signature or (2) the key of an encryption key pair used to encrypt confidential information.

In both cases, this key is made publicly available.

Private Key - A Private Key is (1) the key of a signature key pair used to create a digital

signature or (2) the key of an encryption key pair used to decrypt confidential information.

In both cases, this key must be kept secret.

Digital Certificate - A Digital Certificate is a special message signed by a certificate

authority that contains the name of some user and their public key in such a way that

anyone can "verify" that the message was signed by no one other than the certification

authority and thereby develop trust in the user's public key.

Digital Signature - A Digital Signature is an electronic rather than a written signature that

can be used by someone to authenticate the identity of the sender of a message or of the

signer of a document.

TerminologiesTerminologies

Page 4: Authenticated Document/Data Exchange

4 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Authenticated Document WorkflowAdopting Digital Signatures to meet Legal & Workflow Requirements

Page 5: Authenticated Document/Data Exchange

5 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Digital CertificatesDigital certificates contain name, serial number, expiration date and a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify the authenticity of the certificate.

Page 6: Authenticated Document/Data Exchange

6 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

How it Works?

(Attorney)

(Judge)

Page 7: Authenticated Document/Data Exchange

7 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

An individual wishing to send an encrypted message applies for a digital certificate. The Certificate Authority (CA) issues a Certificatecontaining the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. The most widely used standard for digital certificates is X.509.

How it Works Continued..

Page 8: Authenticated Document/Data Exchange

8 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Benefits

Original Message Original

Message

Public Key Private Key

EncryptionDecryptionEncrypted Message

• It provides intuitive UI for end users (encryption, decryption, and digital signatures)

• In the event that information is intercepted, encryption ensures privacy that prevents third parties from reading and or using the information to their own advantage.

• It ensures that your transactions are not altered.

• It eliminates paper and, as a consequence, reduces handling, and storage costs.

• The digital certificates verify ones identity when trying to log on to computer systems.

• It prevents from unauthorized users.

Page 9: Authenticated Document/Data Exchange

9 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Advanced Healthcare Directive, AHCD

An Advance Health Care Directive is a legal document that provides directions for your health care if you are not able to speak for yourself or make decisions. The AHCD form is prepared well in advance to make sure that healthcare wishes of a person who is in a persistent vegetative state and is not able to make his or her healthcare decisions will be respected.

Page 10: Authenticated Document/Data Exchange

10 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Electronic AHCDCalifornia Governor Schwarzenegger signed the Assembly Bill 2805 (AB 2805) that permits Advanced HealthCare Directives to be digitally signed and notarized using the California digital signature standards which were established in law in 1995. CMA (California Medical Association) and Image-X collaborated to create Electronic AHCD that can be digitally signed both by patient and the notary and stored electronically for easy authenticated access when needed by authenticated authorities e.g. physician or patient and other related parties.

Page 11: Authenticated Document/Data Exchange

11 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

What is MEDePass

As a trusted third party, MEDePass, Inc. authenticates the identities of licensed healthcare professionals and their staff. These identities are expressed electronically as digital certificates (PKI) that you and your organization can rely upon to conduct secure, confidential healthcare business on the Internet.

Page 12: Authenticated Document/Data Exchange

12 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

How it Works?

Patient installs the MEDePass client certificate

Patient fills and submits the AHCD form

Notary verifies and approves the AHCD form

Physicians retrieve the AHCD

Page 13: Authenticated Document/Data Exchange

13 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

AHCD Homepage

Page 14: Authenticated Document/Data Exchange

14 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Creating AHCD

Page 15: Authenticated Document/Data Exchange

15 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Patient signing (before)

Page 16: Authenticated Document/Data Exchange

16 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Patient signing (after)

Page 17: Authenticated Document/Data Exchange

17 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Accessing AHCD

Page 18: Authenticated Document/Data Exchange

18 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Acknowledgement of Notary Public

Page 19: Authenticated Document/Data Exchange

19 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Benefits

• Electronically stores the Advanced Healthcare Directive (AHCD).

• Allows secure retrieval by physicians 24/7 in case of emergency.

• Can be filled online while maintaining privacy and confidentiality.

• Ensures that the will of the patient is being met.

Page 20: Authenticated Document/Data Exchange

20 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Online Probation Investigation Reporting

Page 21: Authenticated Document/Data Exchange

21 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

What is it?

Online Probation Investigation Reporting helps the Courts to move from paper-based to electronic ways of working, bringing environmental benefits and cost savings.Forms related to Probation Investigation Reporting can be completed and submitted electronically using this website. Later Courts can view, print, save these submitted forms.

Page 22: Authenticated Document/Data Exchange

22 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

How it Works?

Probation Investigator fills out the Probation Investigation

Reporting Form containing information such as Filing date, Case number, Location filing etc.

County Clerk will review the pending report and validate the form that has been submitted by the probation investigator.

Judge and Attorney can view the Investigation

reports submitted by the probation investigator.

Court clerk views the Audit trial of Probation Investigation reports.

Page 23: Authenticated Document/Data Exchange

23 May 22-24, 2007

Washington Dulles HiltonThe Business Transformation Conference

Thank YouThank YDr. Mohammed ShaikhChairmanIMAGE-X Enterprises, Inc

Contact Information:(805) 964-3535 [email protected]

ou