1 May 22-24, 2007 Washington Dulles Hilton The Business Transformation Conference Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc Session Title: Authenticated Document Workflow Welcom e Welcome to Transformation and Innovation 2007 The Business Transformation Conference
Exchange of documents and data in commercial organizations is normally accomplished using traditional workflow methodologies. Successful implementation of workflow in these organizations is encouraging agencies that did not look at these workflow methodologies favorably because data and documents exchanged were considered confidential and restricted and for use only by authorized users. The workflow in these organizations requires that user be authenticated before accessing the document/data as well as obtain their signatures at each step due to legal requirements associated with these processes. In addition retaining the confidentiality of the document/data based on user authentication is of utmost concern. Recent advances in digital signature technology and its use in replacing traditional signature have opened the possibility of creating a successful document/data exchange workflow for authenticated documents and data. Further this approach could be extended to authenticate each user and their role to meet confidentiality and security requirement. Some of the processes that can be identified for authenticated document/data exchange are: • Document/data exchange associated with healthcare document requiring HIPAA compliance. • Judicial transactions like TRO’s (Temporary Restraining Order) etc.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Dr. Mohammed ShaikhChairmanIMAGE-X Enterprises, Inc
Session Title:Authenticated Document Workflow
WelcomeWelcome
to Transformation and Innovation 2007 The Business Transformation Conference
2 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Agenda• Authenticated Document Workflow
– Digital Certificates – How it Works?– Benefits
• Advance Healthcare Directives (AHCD)– Electronic AHCD– What is MEDePass– How it Works?– Benefits
• Online Probation Investigation Reporting– What is it?– How It Works?
3 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Public Key - A Public Key is (1) the key of a signature key pair used to validate a digital
signature or (2) the key of an encryption key pair used to encrypt confidential information.
In both cases, this key is made publicly available.
Private Key - A Private Key is (1) the key of a signature key pair used to create a digital
signature or (2) the key of an encryption key pair used to decrypt confidential information.
In both cases, this key must be kept secret.
Digital Certificate - A Digital Certificate is a special message signed by a certificate
authority that contains the name of some user and their public key in such a way that
anyone can "verify" that the message was signed by no one other than the certification
authority and thereby develop trust in the user's public key.
Digital Signature - A Digital Signature is an electronic rather than a written signature that
can be used by someone to authenticate the identity of the sender of a message or of the
signer of a document.
TerminologiesTerminologies
4 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Authenticated Document WorkflowAdopting Digital Signatures to meet Legal & Workflow Requirements
5 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Digital CertificatesDigital certificates contain name, serial number, expiration date and a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify the authenticity of the certificate.
6 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
How it Works?
(Attorney)
(Judge)
7 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
An individual wishing to send an encrypted message applies for a digital certificate. The Certificate Authority (CA) issues a Certificatecontaining the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. The most widely used standard for digital certificates is X.509.
How it Works Continued..
8 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Benefits
Original Message Original
Message
Public Key Private Key
EncryptionDecryptionEncrypted Message
• It provides intuitive UI for end users (encryption, decryption, and digital signatures)
• In the event that information is intercepted, encryption ensures privacy that prevents third parties from reading and or using the information to their own advantage.
• It ensures that your transactions are not altered.
• It eliminates paper and, as a consequence, reduces handling, and storage costs.
• The digital certificates verify ones identity when trying to log on to computer systems.
• It prevents from unauthorized users.
9 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Advanced Healthcare Directive, AHCD
An Advance Health Care Directive is a legal document that provides directions for your health care if you are not able to speak for yourself or make decisions. The AHCD form is prepared well in advance to make sure that healthcare wishes of a person who is in a persistent vegetative state and is not able to make his or her healthcare decisions will be respected.
10 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Electronic AHCDCalifornia Governor Schwarzenegger signed the Assembly Bill 2805 (AB 2805) that permits Advanced HealthCare Directives to be digitally signed and notarized using the California digital signature standards which were established in law in 1995. CMA (California Medical Association) and Image-X collaborated to create Electronic AHCD that can be digitally signed both by patient and the notary and stored electronically for easy authenticated access when needed by authenticated authorities e.g. physician or patient and other related parties.
11 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
What is MEDePass
As a trusted third party, MEDePass, Inc. authenticates the identities of licensed healthcare professionals and their staff. These identities are expressed electronically as digital certificates (PKI) that you and your organization can rely upon to conduct secure, confidential healthcare business on the Internet.
12 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
How it Works?
Patient installs the MEDePass client certificate
Patient fills and submits the AHCD form
Notary verifies and approves the AHCD form
Physicians retrieve the AHCD
13 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
AHCD Homepage
14 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Creating AHCD
15 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Patient signing (before)
16 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Patient signing (after)
17 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Accessing AHCD
18 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Acknowledgement of Notary Public
19 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Benefits
• Electronically stores the Advanced Healthcare Directive (AHCD).
• Allows secure retrieval by physicians 24/7 in case of emergency.
• Can be filled online while maintaining privacy and confidentiality.
• Ensures that the will of the patient is being met.
20 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Online Probation Investigation Reporting
21 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
What is it?
Online Probation Investigation Reporting helps the Courts to move from paper-based to electronic ways of working, bringing environmental benefits and cost savings.Forms related to Probation Investigation Reporting can be completed and submitted electronically using this website. Later Courts can view, print, save these submitted forms.
22 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
How it Works?
Probation Investigator fills out the Probation Investigation
Reporting Form containing information such as Filing date, Case number, Location filing etc.
County Clerk will review the pending report and validate the form that has been submitted by the probation investigator.
Judge and Attorney can view the Investigation
reports submitted by the probation investigator.
Court clerk views the Audit trial of Probation Investigation reports.
23 May 22-24, 2007
Washington Dulles HiltonThe Business Transformation Conference
Thank YouThank YDr. Mohammed ShaikhChairmanIMAGE-X Enterprises, Inc