Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

HIPAA compliance statement

476 views

Published on

Published in: Health & Medicine
  • Login to see the comments

  • Be the first to like this

HIPAA compliance statement

  1. 1. HOW qliq TECHNOLOGY WORKS DATA FLOW OF MESSAGES THROUGH THE QLIQ NETWORK:1 Sender submits message. 5a If the recipient’s IP address is associated with a network address, the network router 7 Recipient receives message. 2a If sender has a WiFi connection, the phone will preferentially transmit the message to the wireless access 3a Network router forwards message to qliqServer. will receive the message and forward it to the WAP. point (WAP), which will then forward the message to the network router. [The WAP and router may or may not be integrated into a single 6a The WAP processes the message and transmits it to the recipient’s device piece of hardware.] over WiFi. INTERNET WIRELESS WIRELESS ACCESS ROUTER ROUTER ACCESS POINT POINT SERVER BASE CELLULAR DATA CELLULAR DATA BASE STATION NETWORK NETWORK STATION 2b If sender has a 3G/4G data connection with no active WiFi connection, the 4 qliqServer determines availability of recipient, including current IP address. If the recipient is available, the qliqServer 6b The BS processes the message and transmits it via the cell tower to the message is transmitted to the cell tower will forward the message. If the recipient and processed by the base station (BS), is not available, qliqServer will send a recipient’s device and then sent to the cellular data notice to the recipient’s device via push over 3G or 4G. network (CDN). notification, letting the recipient know that they have received a new qliqCon- 3b Packet Router GGSN/PDSN forwards the nect message. Once the recipient opens the application and becomes available, qliqServer will send the message to the 5b If the recipient’s IP address is associated with an CDN, the CDN will receive the message and forward it to the correct message to recipient’s IP address. base station (BS). qliqServer.
  2. 2. HOW qliq TECHNOLOGY WORKS 2048-BIT PUBLIC KEY 1024-BIT PRIVATE KEY PUBLIC KEY REPOSITORY INTERNET WIRELESS WIRELESS ACCESS ROUTER ROUTER ACCESS POINT POINT SERVER BASE CELLULAR DATA CELLULAR DATA BASE STATION NETWORK NETWORK STATION STOR STOR SECURITY FEATURESA PHYSICAL SECURITY C qliqSERVER ACCOUNT MANAGEMENT Through the qliqWeb console, the group administrator can: through the qliq network. Rather, storage is distributed and in using authorized credentials. information is controlled by end-users and their organizations. access is available. the cloud only long enough to complete message delivery. timeout, and other security settings When delivery occurs, user information is deleted from the strength requirements. qliq servers. stolen device (group and individual management to provide BYOD support)B TRANSMISSION SECURITY D qliqSTOR With the optional qliqStor feature, organizations can store all message traffic exchanged between users of a qliq group across port 443). on group-controlled virtual server that can be queried by the group administrator, or authorized designees, for (image, audio, and various document formats). auditing purposes. decrypted by the receiving device, using a combination of public and private keys. Only the intended recipient can decrypt the message. then stored on end-user devices in an encrypted file. No unencrypted messages are stored in the cloud.

×