Authenticated Document/Data Exchange


Published on

Exchange of documents and data in commercial organizations is normally accomplished using traditional workflow methodologies. Successful implementation of workflow in these organizations is encouraging agencies that did not look at these workflow methodologies favorably because data and documents exchanged were considered confidential and restricted and for use only by authorized users. The workflow in these organizations requires that user be authenticated before accessing the document/data as well as
obtain their signatures at each step due to legal requirements associated with these processes. In addition retaining the confidentiality of the document/data based on user authentication is of utmost concern. Recent advances in digital signature technology and its use in replacing traditional signature have opened
the possibility of creating a successful document/data exchange workflow for authenticated documents and data. Further this approach could be extended to authenticate each user and their role to meet confidentiality and security requirement. Some of the processes that can be identified for authenticated document/data exchange are:
• Document/data exchange associated with healthcare document requiring HIPAA compliance.
• Judicial transactions like TRO’s (Temporary Restraining Order) etc.

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Authenticated Document/Data Exchange

  1. 1. <ul><li>Dr. Mohammed Shaikh </li></ul><ul><li>Chairman </li></ul><ul><li>IMAGE-X Enterprises, Inc </li></ul><ul><li>Session Title: </li></ul><ul><li>Authenticated Document Workflow </li></ul>Welcome to Transformation and Innovation 2007 The Business Transformation Conference Welcome
  2. 2. Agenda <ul><li>Authenticated Document Workflow </li></ul><ul><ul><li>Digital Certificates </li></ul></ul><ul><ul><li>How it Works? </li></ul></ul><ul><ul><li>Benefits </li></ul></ul><ul><li>Advance Healthcare Directives (AHCD) </li></ul><ul><ul><li>Electronic AHCD </li></ul></ul><ul><ul><li>What is MEDePass </li></ul></ul><ul><ul><li>How it Works? </li></ul></ul><ul><ul><li>Benefits </li></ul></ul><ul><li>Online Probation Investigation Reporting </li></ul><ul><ul><li>What is it? </li></ul></ul><ul><ul><li>How It Works? </li></ul></ul>
  3. 3. <ul><li>Public Key - A Public Key is (1) the key of a signature key pair used to validate a digital </li></ul><ul><li>signature or (2) the key of an encryption key pair used to encrypt confidential information. </li></ul><ul><li>In both cases, this key is made publicly available. </li></ul><ul><li>Private Key - A Private Key is (1) the key of a signature key pair used to create a digital </li></ul><ul><li>signature or (2) the key of an encryption key pair used to decrypt confidential information. </li></ul><ul><li>In both cases, this key must be kept secret. </li></ul><ul><li>Digital Certificate - A Digital Certificate is a special message signed by a certificate </li></ul><ul><li>authority that contains the name of some user and their public key in such a way that </li></ul><ul><li>anyone can &quot;verify&quot; that the message was signed by no one other than the certification </li></ul><ul><li>authority and thereby develop trust in the user's public key. </li></ul><ul><li>Digital Signature - A Digital Signature is an electronic rather than a written signature that </li></ul><ul><li>can be used by someone to authenticate the identity of the sender of a message or of the </li></ul><ul><li>signer of a document. </li></ul>Terminologies
  4. 4. <ul><li>Authenticated Document Workflow </li></ul>Adopting Digital Signatures to meet Legal & Workflow Requirements
  5. 5. Digital Certificates <ul><li>Digital certificates contain name, serial number, expiration </li></ul><ul><li>date and a copy of the certificate holder's public key (used for </li></ul><ul><li>encrypting messages and digital signatures), and the digital </li></ul><ul><li>signature of the certificate-issuing authority so that a recipient </li></ul><ul><li>can verify the authenticity of the certificate. </li></ul>
  6. 6. How it Works? (Attorney) (Judge)
  7. 7. How it Works Continued.. An individual wishing to send an encrypted message applies for a digital certificate. The Certificate Authority (CA) issues a Certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. The most widely used standard for digital certificates is X.509 .
  8. 8. Benefits Original Message Original Message Public Key Private Key Encryption Decryption Encrypted Message <ul><li>It provides intuitive UI for end users (encryption, decryption, and digital signatures) </li></ul><ul><li>In the event that information is intercepted, encryption ensures privacy that </li></ul><ul><li>prevents third parties from reading and or using the information to their own </li></ul><ul><li>advantage. </li></ul><ul><li>It ensures that your transactions are not altered. </li></ul><ul><li>It eliminates paper and, as a consequence, reduces handling, and storage costs. </li></ul><ul><li>The digital certificates verify ones identity when trying to log on to computer systems. </li></ul><ul><li>It prevents from unauthorized users. </li></ul>
  9. 9. Advanced Healthcare Directive, AHCD An Advance Health Care Directive is a legal document that provides directions for your health care if you are not able to speak for yourself or make decisions. The AHCD form is prepared well in advance to make sure that healthcare wishes of a person who is in a persistent vegetative state and is not able to make his or her healthcare decisions will be respected.
  10. 10. Electronic AHCD <ul><li>California Governor Schwarzenegger signed the Assembly Bill </li></ul><ul><li>2805 (AB 2805) that permits Advanced HealthCare Directives </li></ul><ul><li>to be digitally signed and notarized using the California digital </li></ul><ul><li>signature standards which were established in law in 1995. </li></ul><ul><li>CMA (California Medical Association) and Image-X </li></ul><ul><li>collaborated to create Electronic AHCD that can be digitally </li></ul><ul><li>signed both by patient and the notary and stored electronically </li></ul><ul><li>for easy authenticated access when needed by authenticated </li></ul><ul><li>authorities e.g. physician or patient and other related parties. </li></ul>
  11. 11. What is MEDePass <ul><li>As a trusted third party, MEDePass, Inc. authenticates the </li></ul><ul><li>identities of licensed healthcare professionals and their </li></ul><ul><li>staff. These identities are expressed electronically as </li></ul><ul><li>digital certificates (PKI) that you and your organization can </li></ul><ul><li>rely upon to conduct secure, confidential healthcare </li></ul><ul><li>business on the Internet. </li></ul>
  12. 12. How it Works? Patient installs the MEDePass client certificate Patient fills and submits the AHCD form Notary verifies and approves the AHCD form Physicians retrieve the AHCD
  13. 13. AHCD Homepage
  14. 14. Creating AHCD
  15. 15. Patient signing (before)
  16. 16. Patient signing (after)
  17. 17. Accessing AHCD
  18. 18. Acknowledgement of Notary Public
  19. 19. Benefits <ul><li>Electronically stores the Advanced Healthcare Directive (AHCD). </li></ul><ul><li>Allows secure retrieval by physicians 24/7 in case of emergency. </li></ul><ul><li>Can be filled online while maintaining privacy and confidentiality. </li></ul><ul><li>Ensures that the will of the patient is being met. </li></ul>
  20. 20. Online Probation Investigation Reporting
  21. 21. What is it? <ul><li>Online Probation Investigation Reporting helps the Courts </li></ul><ul><li>to move from paper-based to electronic ways of working, </li></ul><ul><li>bringing environmental benefits and cost savings. </li></ul><ul><li>Forms related to Probation Investigation Reporting can be </li></ul><ul><li>completed and submitted electronically using this website. </li></ul><ul><li>Later Courts can view, print, save these submitted forms. </li></ul>
  22. 22. How it Works? Probation Investigator fills out the Probation Investigation Reporting Form containing information such as Filing date, Case number, Location filing etc. County Clerk will review the pending report and validate the form that has been submitted by the probation investigator. Judge and Attorney can view the Investigation reports submitted by the probation investigator. Court clerk views the Audit trial of Probation Investigation reports.
  23. 23. Thank Y <ul><li>Dr. Mohammed Shaikh </li></ul><ul><li>Chairman </li></ul><ul><li>IMAGE-X Enterprises, Inc </li></ul><ul><li>Contact Information: </li></ul><ul><li>(805) 964-3535 [email_address] </li></ul>ou Thank Y ou