1 / 9

Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup

Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup. John Hall Coordinator, Direct Project. June 13, 2012. What is the Direct Project?.

bishop
Download Presentation

Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Proofing, Signatures, & Encryption in DirectesMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012

  2. What is the Direct Project? A project to create the set ofstandards andservicesthat, with apolicyframework, enable simple, directed, routed, scalable transport over the Internet to be used for secure and meaningful exchange between known participants in support ofmeaningful use.

  3. Key Concepts in Direct • Direct enables push-based transport – a sender pushes information to one or more recipients • Direct Messages act as containers of health information • Direct Addresses are used to route Direct Messages • Digital certificates are used to protect Direct Messages in transit and to express trust relationships • SMTP is used to transport Direct Messages • Security/Trust Agents (STAs) such as Health Information Service Providers (HISPs) are responsible for providing the services necessary for exchange using Direct

  4. Direct Addresses • Direct Addresses are used to route information • Look like email addresses • Used only for health information exchange b.wells@direct.aclinic.org • Direct Addresses may route to an inbox of a person, a task or workflow queue handled by one or more people, a data repository or registry, or other types of endpoints • A person may have multiple Direct Addresses, one or more for each organizational affiliation Domain Endpoint Direct Address

  5. Direct & Digital Certificates • Each Direct Address musthave at least one X.509v3 digital certificate associated with it • Address-bound certificate – certificate tied to a specific Direct Address • Domain-bound certificate – certificate tied to the Domain that is part of a Direct Address (also known as organizationally-bound certificate) • Digital certificates are used within Direct to secure Direct Messages in transit and to express trust relationships

  6. Direct, Certificates, Encryption, & Signing • Certificates in Direct are not intended to be used to protect data at rest or to provide legal non-repudiation through signing of content. • STAs employ S/MIME and certificates to secure health information in transit • Certificates in Direct are used for both encryption and signing • Encryption protects data from access by attackers and restricts access to data to receiving STA • Signing provides integrity protection and “good enough” non-repudiation for transport (signature ties sending STA to transaction)

  7. Direct, Certificates, & Trust • Communication using Direct can only occur between trusted parties. • Sender and recipient may each individually manage trust relationships. • STAs/HISPs may manage trust relationships on behalf of their participants. • Both of the above may be true in a given environment. • Trust relationships are expressed using digital certificates. A party may choose to trust a specific certificate, as well as any certificate that cryptographically chains to a trust anchor. • Certificates are issued only to parties that agree to abide by specified trust policies. These policies often cover: • Certificate applicability (i.e., purposes for which certificates are issued) • Identity verification of parties • Security requirements of parties • Setting trust policy is outside the domain of the Direct Project. • For health information exchange, policy originates with the HITPC and ONC • Communities may further build upon those policies

  8. Identity Proofing • Direct Project does not require particular policies or processes for identity proofing • Matter of policy that is outside scope of Direct Project • All states, implementing communities, and national HISPs do require entities seeking to enroll to provide identifying information. Information required is based on: • What is needed to obtain a certificate • What is needed to establish a foundation of trust between exchange participants

  9. Questions?

More Related