SlideShare une entreprise Scribd logo
1  sur  18
Direct Trust Infrastructure :
                                                                  The Technical Details
                                                                                                                          Presented by: Scott Rea




                                                                                                                                                 02/23/2012


DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of HIMSS.
Contents


Slide   Title
   3    Direct Trust Framework
   4    Public Key Infrastructure (PKI)
   7    Public & Private Keys
   9    Digital Certificates
  10    Encryption
  11    Digital Signatures
  12    Authentication
  13    Certification Authority
  14    Registration Authority
  15    Issuance Process
  16    CA – RA Relationship
  17    Transactions
Direct Trust Framework

• The Direct Trust Framework is built on a
  set of standards that combines technology
  with policies on how and when the
  technology is utilized/applied, who the
  participants are, and what their roles and
  responsibilities are in the system
• Technology by itself is not sufficient to
  solve “Trust” issues
• The technology utilized in this case is
  Public Key Infrastructure (PKI)
What is PKI?
• Public Key Infrastructure

• Comprehensive security technology and policies using
  cryptography and standards to enable users to:
   – Identify (authenticate) themselves to network services, access
     policies, and each other to prove source of origin and destination.
   – Digitally sign electronic documents, email and other data to provide
     authorization and prove integrity.
   – Encrypt email, data, and other documents to prevent unauthorized
     access.
Why PKI?
• Uniform way to address securing many different
  types of applications
• Enables reliable authentication, digital signing
  and encryption
• Overcomes many weaknesses of using password
  based protocols on open networks
• Facilitates easy setup of shared secrets between
  previously unknown parties
• Strong and proven underlying security technology
• Widely included in technology products
Underlying Key Technology
• A pair of asymmetric keys is used, one to encrypt, the other
  to decrypt.
• Each key can only decrypt data encrypted with the other.
       • Invented in 1976 by Whit Diffie and Martin Hellman
       • Commercialized by RSA Security
       • Recently other more efficient schemes emerging e.g. ECC



                                 Encrypt
                        (anyone with public key)
      Plain Text                                        Encrypted Text
                                 Decrypt
                      (possessor of private key only)
Public and Private Keys

• PKI is based on the use of a pair of related numbers called
  “keys”
• They are generated in such a way that knowing one, does
  not give you any knowledge of the other, but using one
  requires the other to complete a transaction
• The "public" key is placed into a certificate which
  published far and wide for all to use.
• The "private" key is only used by its owner and MUST be
  kept a secret.
• No need to exchange a secret "key" ahead of time by some
  other channel.
Applications of PKI
• Authentication and Authorization of end points in an internet
  transaction
   – e.g. users and servers, server to server, user to user
   – This is the basis for the SSL protocol used to secure web connections
     using https.
• Secure Messaging
   – e-mail (signed and encrypted)
   – Secure instant messaging
• Electronic signatures
   – Documents, data, agreements
   – Prescriptions, Insurance authorizations, case notes
• Data encryption
   – Medical records, Diagnostic datasets, Business documents, Financial
     data, databases, executable code
• Network data protection (VPN, wireless)
What is a certificate?
• Signed data structure (x.509 standard) binds some
  information to a public key.
• Trusted entity, called a Certification Authority (CA) asserts
  validity of information in the certificate, enforces policies
  for issuing certificates.
• Certificate information is usually a personal identity, a
  server name, or a service identifier, with authorizations for
  how the keys should be used.
• Think of a certificate with its keys as an electronic:
   – ID card,
   – encoder/decoder device, and
   – official seal or notary-style stamp.
Encryption
• Asymmetric encryption prevents need for shared secrets.
• Anyone encrypts with public key of recipient.
• Requires some mechanism for discovering intended recipient’s
  public key
• Only the recipient can decrypt with their private key.
• Private key is secret, so “bad guys” can’t read encrypted data.


                                   Encrypt
                          (anyone with public key)
           Plain Text                                     Encrypted Text
                                   Decrypt
                        (possessor of private key only)
Digital Signatures
• Compute message digest, encrypt with your private key.
• Reader decrypts with your public key.
• Re-compute the digest and verify match with original – guarantees
  no one has modified signed data.
• Only signer has private key, so no one else can spoof their digital
  signature.

                          Compute digest, sign & date,
                                   encrypt
                         (possessor of private key only)
            Plain Text                                     Encrypted Text
                         Verify signature, check digest
                             (anyone with public key)
Authentication
•   A CA - Certification Authority, signs a certificate attesting that the public key
    belongs to the entity named in the certificate
•   Certificate Policy indicates what steps are taken to verify identity and how the
    CA systems operate to ensure security and integrity
•   CA is a Trusted Third Party providing a seal of authenticity
•   Use of certificate provides reliability and non-repudiation in the identity of the
    source or destination of a transaction


                         public

                                                                  p
                                                                  u
                                                                  bl
                                                                  ic
What is a certificate authority?

• An organization that creates, publishes, and
  revokes certificates.
• Verifies the information in the certificate.
• Protects general security and policies of the
  system and its records.
• Allows you to check certificates so you can decide
  whether to use them in business transactions.
• Has one or more trusted Roots, called a trust
  anchor embedded in applications
What is a Registration Authority?

• An organization that collects and verifies the
  identity information that will be used in a
  certificate based on published standards.
• Represents a Certification Authority for any face-
  to-face validation of identity
• Must be authorized by the relevant Certification
  Authority for this purpose
   – Audit of processes required
   – Archival of evidence data required
Issuance Process
                                                                Certificate Authority (CA)
                                                                  Identity/Trust             Certificate
                                                                   Verification          Validation Service

                                                               Certificate Signing           Revocation
                                                                    Services                  Services


                                                                                                                                    The CA and RA enforce
                                                           6. Certificate Signing            7. Direct Organization
                                                              Request                           Certificate
                                                                                                                                  the policies specified in the
                                                                                                                                   DirectTrust.org and FBCA
                                    2. Request Direct                                                                              Certificate Policies (CPs).
                                       Organization
 Assume has
Digital Identity
                                       Certificate
                                                               Registration Authority (RA)
  Certificate
                                    3. Credentials and
                                       Documentation               Compile/Validate Identity and Trust
                       HCO                                                  Documentation
                   Representative     Representative
                                       FBCA Credentials
                                      Representative
    Healthcare                         Authorization
Organization (HCO)                    Legal Entity         4. Direct
                                                                                                 8. Direct Organization
                                       Documents               Organization          5. Public
                                                               Domain                   Key         Certificate
                                      Membership/Trust
                                       Agreement
                                      HIPAA status                                                                                    Domain Name System
                                                                                                                                              (DNS)
                                    1. Enroll with HISP                                                           9. Direct Address/
                                                                                                                     Org Certificate
                                                                  Health Information Service
                                                                       Provider (HISP)                                                 LDAP Name System



                                                                                                     Source: DirectTrust.org February, 2012
CA – RA Relationship
                                                                                       DirectTrust.org
                                                  FBCA Certificate Policy
                                                                                      Certificate Policy
Certificate Authority (CA)
                                                                                                 Audit
  Identity/Trust          Certificate
   Verification       Validation Service                               Certification Practices
                                                                              Statement
Certificate Signing      Revocation
     Services             Services

                                                                                                 Audit
                                                                        Registration Practices
                               Audit                                         Statement

          RA Agreement

                                           Registration Authority (RA)
                                             Compile/Validate Identity and Trust
                                                      Documentation




                                                                            Source: DirectTrust.org February, 2012
Transactions
Certificates vetted to FBCA                                               HIPAA Covered Entity
  Medium LoA standard                                                     Assertion governed by
ensures strongest binding                                                    DirectTrust CP
  between PKI keys and
 identity listed in the cert




                                          PKI Encryption ensures confidentiality in messages
                                   PKI Digital Signatures ensures integrity and reliability of messages
                                     PKI Authentication provides authenticity and trust of message
                                                     reaching intended recipients
Questions?

• Scott Rea, CISSP
  VP GOV/EDU Relations and Sr. PKI Architect
  DigiCert, Inc. Lindon UT 84042

• Scott@DigiCert.com
• (801) 701-9636
• http://www.digicert.com/news/bios-scott-rea.htm


• http://www.directtrust.wikispaces.com
• http://www.DigiCert.com/

Contenu connexe

Tendances

Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signatureNetri Chowdhary
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Editor IJARCET
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business Jinhwan Shin
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2Lucas Gritziotis
 

Tendances (20)

Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Pki and OpenSSL
Pki and OpenSSLPki and OpenSSL
Pki and OpenSSL
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
PKI in Korea
PKI in KoreaPKI in Korea
PKI in Korea
 
Digital signature
Digital signatureDigital signature
Digital signature
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 

En vedette

David Kibbe of DirectTrust.org at 2012 eCollaboration Forum
David Kibbe of DirectTrust.org at 2012 eCollaboration ForumDavid Kibbe of DirectTrust.org at 2012 eCollaboration Forum
David Kibbe of DirectTrust.org at 2012 eCollaboration ForumCollaborative Health Consortium
 
Direct Scalable Trust Forum
Direct Scalable Trust ForumDirect Scalable Trust Forum
Direct Scalable Trust ForumBrian Ahier
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...NetwayClub
 
Direct20: Modular Specifications - Provider Directories
Direct20: Modular Specifications - Provider DirectoriesDirect20: Modular Specifications - Provider Directories
Direct20: Modular Specifications - Provider DirectoriesBrian Ahier
 
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...Brian Ahier
 

En vedette (7)

Aws jvaria e_collaborationforum
Aws jvaria e_collaborationforumAws jvaria e_collaborationforum
Aws jvaria e_collaborationforum
 
David Kibbe of DirectTrust.org at 2012 eCollaboration Forum
David Kibbe of DirectTrust.org at 2012 eCollaboration ForumDavid Kibbe of DirectTrust.org at 2012 eCollaboration Forum
David Kibbe of DirectTrust.org at 2012 eCollaboration Forum
 
Direct Scalable Trust Forum
Direct Scalable Trust ForumDirect Scalable Trust Forum
Direct Scalable Trust Forum
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
Direct20: Modular Specifications - Provider Directories
Direct20: Modular Specifications - Provider DirectoriesDirect20: Modular Specifications - Provider Directories
Direct20: Modular Specifications - Provider Directories
 
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
 

Similaire à E collaborationscottrea

Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructureAditya Nama
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
Explain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfExplain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfashokarians
 
Cryptography in user authentication
Cryptography in user authenticationCryptography in user authentication
Cryptography in user authenticationRishikesh Jha
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxRAMESHMRA21130030110
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization ModelsCSCJournals
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Editor IJARCET
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accuratelyDavid Kelts, CIPT
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeDigiCert, Inc.
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a ServicePT Datacomm Diangraha
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteKeynectis
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?Keynectis
 

Similaire à E collaborationscottrea (20)

Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
Explain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfExplain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdf
 
Cryptography in user authentication
Cryptography in user authenticationCryptography in user authentication
Cryptography in user authentication
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptx
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accurately
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?
 

Plus de Collaborative Health Consortium

John Freedman - All-payer claims databases - CHC Pilots & Collaborations
John Freedman - All-payer claims databases - CHC Pilots & CollaborationsJohn Freedman - All-payer claims databases - CHC Pilots & Collaborations
John Freedman - All-payer claims databases - CHC Pilots & CollaborationsCollaborative Health Consortium
 
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012Collaborative Health Consortium
 
Himss e collaboration forum closing session (kuraitis, shah) final
Himss e collaboration forum closing session (kuraitis, shah) finalHimss e collaboration forum closing session (kuraitis, shah) final
Himss e collaboration forum closing session (kuraitis, shah) finalCollaborative Health Consortium
 
Dave Whitlinger - NYeHC - eCollaborationForum 2012 - 02/23/12
Dave Whitlinger - NYeHC - eCollaborationForum 2012 - 02/23/12Dave Whitlinger - NYeHC - eCollaborationForum 2012 - 02/23/12
Dave Whitlinger - NYeHC - eCollaborationForum 2012 - 02/23/12Collaborative Health Consortium
 

Plus de Collaborative Health Consortium (15)

John Freedman - All-payer claims databases - CHC Pilots & Collaborations
John Freedman - All-payer claims databases - CHC Pilots & CollaborationsJohn Freedman - All-payer claims databases - CHC Pilots & Collaborations
John Freedman - All-payer claims databases - CHC Pilots & Collaborations
 
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
 
Dave Chase, Avado CEO, presents to CHC
Dave Chase, Avado CEO, presents to CHCDave Chase, Avado CEO, presents to CHC
Dave Chase, Avado CEO, presents to CHC
 
E-Innovations to Support Primary Care
E-Innovations to Support Primary CareE-Innovations to Support Primary Care
E-Innovations to Support Primary Care
 
From Silo's to Legos
From Silo's to LegosFrom Silo's to Legos
From Silo's to Legos
 
Ahier himss 2012 - direct project overview presentation
Ahier   himss 2012 - direct project overview presentationAhier   himss 2012 - direct project overview presentation
Ahier himss 2012 - direct project overview presentation
 
Salesforce ecollab himss2 copy
Salesforce ecollab himss2 copySalesforce ecollab himss2 copy
Salesforce ecollab himss2 copy
 
Nobel payer panel e collaborationforum 2.23.12
Nobel payer panel e collaborationforum 2.23.12Nobel payer panel e collaborationforum 2.23.12
Nobel payer panel e collaborationforum 2.23.12
 
E collaborationforumjoemiller (jmiller v1)
E collaborationforumjoemiller (jmiller v1)E collaborationforumjoemiller (jmiller v1)
E collaborationforumjoemiller (jmiller v1)
 
120223 e collaborationforum ppt_migliori
120223 e collaborationforum ppt_migliori120223 e collaborationforum ppt_migliori
120223 e collaborationforum ppt_migliori
 
Kolodner2 e collaborationforum
Kolodner2 e collaborationforumKolodner2 e collaborationforum
Kolodner2 e collaborationforum
 
E collaborationforum ppt_jmandel
E collaborationforum ppt_jmandelE collaborationforum ppt_jmandel
E collaborationforum ppt_jmandel
 
Blatt e collaborative himss 2012 final
Blatt   e collaborative himss 2012 finalBlatt   e collaborative himss 2012 final
Blatt e collaborative himss 2012 final
 
Himss e collaboration forum closing session (kuraitis, shah) final
Himss e collaboration forum closing session (kuraitis, shah) finalHimss e collaboration forum closing session (kuraitis, shah) final
Himss e collaboration forum closing session (kuraitis, shah) final
 
Dave Whitlinger - NYeHC - eCollaborationForum 2012 - 02/23/12
Dave Whitlinger - NYeHC - eCollaborationForum 2012 - 02/23/12Dave Whitlinger - NYeHC - eCollaborationForum 2012 - 02/23/12
Dave Whitlinger - NYeHC - eCollaborationForum 2012 - 02/23/12
 

Dernier

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Dernier (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

E collaborationscottrea

  • 1. Direct Trust Infrastructure : The Technical Details Presented by: Scott Rea 02/23/2012 DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of HIMSS.
  • 2. Contents Slide Title 3 Direct Trust Framework 4 Public Key Infrastructure (PKI) 7 Public & Private Keys 9 Digital Certificates 10 Encryption 11 Digital Signatures 12 Authentication 13 Certification Authority 14 Registration Authority 15 Issuance Process 16 CA – RA Relationship 17 Transactions
  • 3. Direct Trust Framework • The Direct Trust Framework is built on a set of standards that combines technology with policies on how and when the technology is utilized/applied, who the participants are, and what their roles and responsibilities are in the system • Technology by itself is not sufficient to solve “Trust” issues • The technology utilized in this case is Public Key Infrastructure (PKI)
  • 4. What is PKI? • Public Key Infrastructure • Comprehensive security technology and policies using cryptography and standards to enable users to: – Identify (authenticate) themselves to network services, access policies, and each other to prove source of origin and destination. – Digitally sign electronic documents, email and other data to provide authorization and prove integrity. – Encrypt email, data, and other documents to prevent unauthorized access.
  • 5. Why PKI? • Uniform way to address securing many different types of applications • Enables reliable authentication, digital signing and encryption • Overcomes many weaknesses of using password based protocols on open networks • Facilitates easy setup of shared secrets between previously unknown parties • Strong and proven underlying security technology • Widely included in technology products
  • 6. Underlying Key Technology • A pair of asymmetric keys is used, one to encrypt, the other to decrypt. • Each key can only decrypt data encrypted with the other. • Invented in 1976 by Whit Diffie and Martin Hellman • Commercialized by RSA Security • Recently other more efficient schemes emerging e.g. ECC Encrypt (anyone with public key) Plain Text Encrypted Text Decrypt (possessor of private key only)
  • 7. Public and Private Keys • PKI is based on the use of a pair of related numbers called “keys” • They are generated in such a way that knowing one, does not give you any knowledge of the other, but using one requires the other to complete a transaction • The "public" key is placed into a certificate which published far and wide for all to use. • The "private" key is only used by its owner and MUST be kept a secret. • No need to exchange a secret "key" ahead of time by some other channel.
  • 8. Applications of PKI • Authentication and Authorization of end points in an internet transaction – e.g. users and servers, server to server, user to user – This is the basis for the SSL protocol used to secure web connections using https. • Secure Messaging – e-mail (signed and encrypted) – Secure instant messaging • Electronic signatures – Documents, data, agreements – Prescriptions, Insurance authorizations, case notes • Data encryption – Medical records, Diagnostic datasets, Business documents, Financial data, databases, executable code • Network data protection (VPN, wireless)
  • 9. What is a certificate? • Signed data structure (x.509 standard) binds some information to a public key. • Trusted entity, called a Certification Authority (CA) asserts validity of information in the certificate, enforces policies for issuing certificates. • Certificate information is usually a personal identity, a server name, or a service identifier, with authorizations for how the keys should be used. • Think of a certificate with its keys as an electronic: – ID card, – encoder/decoder device, and – official seal or notary-style stamp.
  • 10. Encryption • Asymmetric encryption prevents need for shared secrets. • Anyone encrypts with public key of recipient. • Requires some mechanism for discovering intended recipient’s public key • Only the recipient can decrypt with their private key. • Private key is secret, so “bad guys” can’t read encrypted data. Encrypt (anyone with public key) Plain Text Encrypted Text Decrypt (possessor of private key only)
  • 11. Digital Signatures • Compute message digest, encrypt with your private key. • Reader decrypts with your public key. • Re-compute the digest and verify match with original – guarantees no one has modified signed data. • Only signer has private key, so no one else can spoof their digital signature. Compute digest, sign & date, encrypt (possessor of private key only) Plain Text Encrypted Text Verify signature, check digest (anyone with public key)
  • 12. Authentication • A CA - Certification Authority, signs a certificate attesting that the public key belongs to the entity named in the certificate • Certificate Policy indicates what steps are taken to verify identity and how the CA systems operate to ensure security and integrity • CA is a Trusted Third Party providing a seal of authenticity • Use of certificate provides reliability and non-repudiation in the identity of the source or destination of a transaction public p u bl ic
  • 13. What is a certificate authority? • An organization that creates, publishes, and revokes certificates. • Verifies the information in the certificate. • Protects general security and policies of the system and its records. • Allows you to check certificates so you can decide whether to use them in business transactions. • Has one or more trusted Roots, called a trust anchor embedded in applications
  • 14. What is a Registration Authority? • An organization that collects and verifies the identity information that will be used in a certificate based on published standards. • Represents a Certification Authority for any face- to-face validation of identity • Must be authorized by the relevant Certification Authority for this purpose – Audit of processes required – Archival of evidence data required
  • 15. Issuance Process Certificate Authority (CA) Identity/Trust Certificate Verification Validation Service Certificate Signing Revocation Services Services The CA and RA enforce 6. Certificate Signing 7. Direct Organization Request Certificate the policies specified in the DirectTrust.org and FBCA 2. Request Direct Certificate Policies (CPs). Organization Assume has Digital Identity Certificate Registration Authority (RA) Certificate 3. Credentials and Documentation Compile/Validate Identity and Trust HCO Documentation Representative  Representative FBCA Credentials  Representative Healthcare Authorization Organization (HCO)  Legal Entity 4. Direct 8. Direct Organization Documents Organization 5. Public Domain Key Certificate  Membership/Trust Agreement  HIPAA status Domain Name System (DNS) 1. Enroll with HISP 9. Direct Address/ Org Certificate Health Information Service Provider (HISP) LDAP Name System Source: DirectTrust.org February, 2012
  • 16. CA – RA Relationship DirectTrust.org FBCA Certificate Policy Certificate Policy Certificate Authority (CA) Audit Identity/Trust Certificate Verification Validation Service Certification Practices Statement Certificate Signing Revocation Services Services Audit Registration Practices Audit Statement RA Agreement Registration Authority (RA) Compile/Validate Identity and Trust Documentation Source: DirectTrust.org February, 2012
  • 17. Transactions Certificates vetted to FBCA HIPAA Covered Entity Medium LoA standard Assertion governed by ensures strongest binding DirectTrust CP between PKI keys and identity listed in the cert PKI Encryption ensures confidentiality in messages PKI Digital Signatures ensures integrity and reliability of messages PKI Authentication provides authenticity and trust of message reaching intended recipients
  • 18. Questions? • Scott Rea, CISSP VP GOV/EDU Relations and Sr. PKI Architect DigiCert, Inc. Lindon UT 84042 • Scott@DigiCert.com • (801) 701-9636 • http://www.digicert.com/news/bios-scott-rea.htm • http://www.directtrust.wikispaces.com • http://www.DigiCert.com/

Notes de l'éditeur

  1. Why use PKI? Effective security has become crucial to extend electronic communication and business processes beyond the current state of the art. Legislative mandates.