SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
PIDS
        Patient ID Service
http://design.patientidservice.us/
Thank You
• Kantara Initiative
  oHealthcare Identity Assurance Work
   Group, Chairs: John Fraser, Pete
   Palmer, Rick Moore
• Open ID Foundation of Japan,
  Nat Sakimura
• My Partners at eCitizen
  oDazza Greenwood
  oDaniel Bennett
http://design.patientidservice.us/
Patient ID Service (PIDS)
         Phase 1 -- Design
•   Research
•   Survey
•   Iterate Design
•   Final Presentation (we are here)
    o November 10, 2011 during HIAWG Conference Call 1:00 to 2:00 EST;
      http://kantarainitiative.org/confluence/display/healthidassurance/Home

• Lay ground work for future phases
Patient ID Service (PIDS)
      Phase 1.5 -- Design
• Engage Participants
• Raise Funding
• Develop project plan to address Policy, Operating
  Rules/Agreements, Technology
• Publish work under open source license
PIDS Phase 2.0
• Develop implementations
• Write code, documentation, etc.
• Certification
• Promote project, develop
  community
• Develop future roadmap
Kickoff Announcement
                                           SAVE THE DATE
                                PATIENT IDENTITY SERVICE
                                         PROJECT LAUNCH


                                      MARCH 3, 2011
                        1:00PM - 2:00PM Eastern Time
                               Phone Conference Call

            A Key to Meaningful Use: Patient Identity and Authentication

Building on Current Technology to Enable "Meaningful Use" Transactions

                       Open Architecture for Citizen-Centered Solutions
Background
• SAFE BioPharma: http://www.safe-biopharma.org/
• eAuthentication Initiative/eAuthentication
  Partnership
• HSPD-12/OMB 11-11/FIPS 201/NIST SP 800-63/FICAM,
  etc.
• Liberty Alliance – Kantara Initiative Identity
  Assurance Framework
• HIMSS/GSA National eAuthentication White Paper:
  http://www.himss.org/content/files/GSAwhitepaper.
  pdf
Background
• The Markle Foundation calls it, “A Critical Problem of
  the Digital Age.” CT2: Authentication of Consumers
  http://www.markle.org/sites/default/files/CT2.pdf
• Health IT Standards Panel: Identity Credentials
  Management (ICM) subcommittee of Security,
  Privacy and Infrastructure Committee,
  http://www.hitsp.org/
• National Strategy for Trusted Identities in
  Cyberspace, http://www.nist.gov/nstic/,
  http://www.nstic.us/
PIDS Overview
• Leverage the work of the Kantara Initiative to solve
  national (international?) problem
• Healthcare Identity Assurance Work Group &
  eCitizen Foundation, OpenID of Japan
  collaboration
• Design, Implement, Publish, Share an Open
  Architecture for Patient Identity addressing Business,
  Legal, and Technical requirements
• Develop at least three implementations of PIDS to
  demonstrate interoperability and obtain
  certification
PIDS Overview
• Architecture to allow flexibility in choice of components that
  meet functional requirements.
• Focus on use of existing business, legal and technology
  components to address immediate and short-term needs for
  patient identity functions.
• Leverage existing credentials by providing functionality to
  attain Asusrance Level 3
• Facilitate healthcare providers' meeting of "Meaningful Use"
  requirements and in the implementation of Health Information
  Exchanges, Electronic Health Record (EHR) or Personal Health
  Record (PHR) systems.
• Deliver capabilities to patients to participate significantly in
  their own healthcare, access, and to the extent appropriate,
  control their personal health information.
• Identify gaps are identified and new applications for the
  architecture and develop further efforts to address these
  needs.
Context
Use Case
• A student attending college out of state requires
  medical treatment. Information and records of prior
  treatment from her home state doctor will be
  helpful in the new case. The student chooses to
  request the prior records, receiving a copy, storing
  these in a personal health record and forwarding a
  copy to the new doctor.
Survey and Research
• Project Materials
• The PIDS Design Phase included research and inquiry as part
  of the discovery process to develop and define the needs,
  requirements and constraints to pass forward to the
  implementation phase.
• The PIDS project commenced with an Online Launch Event, at
  which the principals described the overview and intentions for
  the project.
• Much of the information related to this research and other
  project materials are available at the eCitizen Foundation's
  Patient Identity Page. This research included a field survey. In
  addition, the following eCitizen Research Paper on URL’s for
  Electronic Health Records provides a description of the
  technical approach to using the architecture of the web as
  part of the design assumptions for this identity
  service: http://ecitizenproject.org/ideafactory/urls-for-
  electronic-health-records
Solution -- Overview
• Overview of Solution Design:
• The design principles for the Patient ID Service are to
  create an open architecture, leveraging open
  standards, for a citizen-centered solution. As such, the
  proposed design puts the user - in this case a patient - in
  the driver’s seat. The PIDS design 1) empowers the user
  to configure important aspects of a personal identity
  account, 2) enables relying parties such as providers of
  patient portals, to accept the PIDS as a log- in for the
  patient, and 3) can be used by the patient to both
  organize their many health related identifiers and
  permissions as well as to access many different
  applications and services.
Solution – PIDS
                 Enrollment
• Outline of PIDS Sign-Up and Usage Process
• Patient Creates a voluntary PIDS Account
   o Patient is issued PIDS OpenID Identifier, or External OpenID is bound to PIDS
     account
   o Patient inputs additional healthcare relevant identifiers into PIDS "wallet"
   o External Authentication Tokens are bound to PIDS account
• Patient configures permissions for PIDS account
• Patient logs in to Relying Party systems with PIDS
  credential
• Relying Party challenges for a higher level of
  authentication (optional)
• Patient generates reports from PIDS system (activity
  logs, linked accounts)
Solution – Technical
         Components
• Technical Components
• A simple account system with identity information
  from each account holding patient information,
  including first, last name, phone, address, etc.
• A URI/URL for each Patient Account
• SAML Service, such as Shibboleth, capable of
  sending and receiving assertions according to the
  NwHIN standards
Solution – Technical
            Components
• PIDS Credential, Identifier and Token Capability
   o   An OpenID service
   o   An Advanced Credentialing and Token issuance or adoption service (enabling a
       patient to use, bind and/or link different identity tokens to their PIDS account), for
       example:
         • X.509v3 digital certificate
         • Registered Mobile Phone for voice and/or text and/or keypad-based
            verification
         • Registered Smart Phone for Mobile Phone functions plus application functions
         • RSA Data Security Key Fob
         • PIV, PIV-I or other variations of these Cards
         • Authentication as a Service account linkage, enabling the account credentials
            to be linked to KBA, crypto-based and other methods
         • Authorization as a Service account linkage, enabling the account credential to
            be linked to UACS/RBAC and XACML types of services
         • eSignature Service, enabling the use of credential to assent to or otherwise
            approve a document, signify consent or perform other related transactions
   o   Credential Suspension/De-linking/De-binding and Termination Service
   o   (option) Time Stamp Service and other real-time audit-friendly tools (e.g. GIS, HTTP
       logs, etc)
• OpenID Connect and Oauth Services (as they come
  available)
• Audit and Logging Service
OASIS TC
• PIDS work will Identify Gaps
• One such is Step Up Authentication
• Working with OASIS “Trust Elevation Technical
  Committee”
• Open Identity Attribute Exchange Summit
   o http://www.eventbrite.com/event/2266130056
http://design.patientidservice.us/
Identity in Healthcare--
          MIT
MIT New Media
            Medicine



MIT Interim Session
Coding sprint for
development of function
components of use in PIDS
PIDS Phase 1.5 & 2.0
Patient ID Service (PIDS)
      Phase 1.5 -- Design
• Engage Participants
• Raise Funding
• Develop project plan to address Policy, Operating
  Rules/Agreements, Technology
• Publish work under open source license
PIDS Phase 2.0
• Develop implementations
• Write code, documentation, etc.
• Certification
• Promote project, develop
  community
• Develop future roadmap
ONC Demonstration @
     HIMSS
University of Texas
University of Texas –
          ID360
• UT, Austin - Center for Identity,
  http://identity.utexas.edu/
• ID360, ID360.us
• Conference - Late April
Dan Combs
• CEO, eCitizen Foundation,
  o http://www.ecitizenfoundation.org/

• dancombs@ecitizenfoundation.org
• dancombs1@gmail.com

Contenu connexe

Tendances

Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For EducationSanjeev Raman
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceThodoris Bais
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGBjorn Hjelm
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using BlockchainIRJET Journal
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGBjorn Hjelm
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringTowards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringMd Jobair Hossain Faruk
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
 
OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017Bjorn Hjelm
 
Modex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex
 
20110706 PIDSプロジェクト中間報告
20110706 PIDSプロジェクト中間報告20110706 PIDSプロジェクト中間報告
20110706 PIDSプロジェクト中間報告Nat Sakimura
 
Mobile identity in network
Mobile identity in networkMobile identity in network
Mobile identity in networkloan
 
Evaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemEvaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemMd Jobair Hossain Faruk
 
Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docxAnbuShare
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Andrew Hughes
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accuratelyDavid Kelts, CIPT
 
Customer identity and kyc trends
Customer identity and kyc trendsCustomer identity and kyc trends
Customer identity and kyc trendsSatish Bhatia
 

Tendances (20)

Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
EXACTO BY HCL
EXACTO BY HCLEXACTO BY HCL
EXACTO BY HCL
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringTowards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017
 
Modex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in Banking
 
20110706 PIDSプロジェクト中間報告
20110706 PIDSプロジェクト中間報告20110706 PIDSプロジェクト中間報告
20110706 PIDSプロジェクト中間報告
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
Mobile identity in network
Mobile identity in networkMobile identity in network
Mobile identity in network
 
Evaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemEvaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health System
 
Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docx
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accurately
 
Customer identity and kyc trends
Customer identity and kyc trendsCustomer identity and kyc trends
Customer identity and kyc trends
 

En vedette

Thiamine (vitamin b1) and riboflavin (vitamin b2) actions as co-enzyme
Thiamine (vitamin b1) and riboflavin (vitamin b2) actions as co-enzymeThiamine (vitamin b1) and riboflavin (vitamin b2) actions as co-enzyme
Thiamine (vitamin b1) and riboflavin (vitamin b2) actions as co-enzymeautumnpianist
 
‫ Jaundice
‫  Jaundice‫  Jaundice
‫ JaundiceafrahDH
 
NIACIN AND PANTOTHENICACID
NIACIN AND PANTOTHENICACIDNIACIN AND PANTOTHENICACID
NIACIN AND PANTOTHENICACIDDr Havilah.P
 
HEME DEGRADATION - JAUNDICE
HEME DEGRADATION - JAUNDICE HEME DEGRADATION - JAUNDICE
HEME DEGRADATION - JAUNDICE YESANNA
 

En vedette (9)

Biochemstry of niacin
Biochemstry of niacinBiochemstry of niacin
Biochemstry of niacin
 
Jaundice
JaundiceJaundice
Jaundice
 
Jaundice
JaundiceJaundice
Jaundice
 
Jaundice
JaundiceJaundice
Jaundice
 
Thiamine (vitamin b1) and riboflavin (vitamin b2) actions as co-enzyme
Thiamine (vitamin b1) and riboflavin (vitamin b2) actions as co-enzymeThiamine (vitamin b1) and riboflavin (vitamin b2) actions as co-enzyme
Thiamine (vitamin b1) and riboflavin (vitamin b2) actions as co-enzyme
 
‫ Jaundice
‫  Jaundice‫  Jaundice
‫ Jaundice
 
NIACIN AND PANTOTHENICACID
NIACIN AND PANTOTHENICACIDNIACIN AND PANTOTHENICACID
NIACIN AND PANTOTHENICACID
 
HEME DEGRADATION - JAUNDICE
HEME DEGRADATION - JAUNDICE HEME DEGRADATION - JAUNDICE
HEME DEGRADATION - JAUNDICE
 
Porphyrins
PorphyrinsPorphyrins
Porphyrins
 

Similaire à Smart card kantara pids presentation grey

Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
CMS Blue Button API - Developer Preview from Health 2.0 #h20devday, 2017
CMS Blue Button API - Developer Preview from Health 2.0 #h20devday, 2017CMS Blue Button API - Developer Preview from Health 2.0 #h20devday, 2017
CMS Blue Button API - Developer Preview from Health 2.0 #h20devday, 2017Mark Scrimshire
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceRightPatient®
 
DataArt Healthcare & Life Sciences
DataArt Healthcare & Life SciencesDataArt Healthcare & Life Sciences
DataArt Healthcare & Life SciencesDataArt
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008Denny Lee
 
APIdays Helsinki 2019 - API’s in Public Healthcare with Aki Puustja, HUS IT M...
APIdays Helsinki 2019 - API’s in Public Healthcare with Aki Puustja, HUS IT M...APIdays Helsinki 2019 - API’s in Public Healthcare with Aki Puustja, HUS IT M...
APIdays Helsinki 2019 - API’s in Public Healthcare with Aki Puustja, HUS IT M...apidays
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...WSO2
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets Revealed
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets RevealedZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets Revealed
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets RevealedINSZoom
 
Electronic credential authentication_standard
Electronic credential authentication_standardElectronic credential authentication_standard
Electronic credential authentication_standardHai Nguyen
 
Week sleek portfolio
Week sleek portfolioWeek sleek portfolio
Week sleek portfolioAkhil Kurup
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Ndhm presentation-for-stakeholder-consultation-hospitals-diagnostic-centres-i...
Ndhm presentation-for-stakeholder-consultation-hospitals-diagnostic-centres-i...Ndhm presentation-for-stakeholder-consultation-hospitals-diagnostic-centres-i...
Ndhm presentation-for-stakeholder-consultation-hospitals-diagnostic-centres-i...Manish Nachnani
 

Similaire à Smart card kantara pids presentation grey (20)

Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
CMS Blue Button API - Developer Preview from Health 2.0 #h20devday, 2017
CMS Blue Button API - Developer Preview from Health 2.0 #h20devday, 2017CMS Blue Button API - Developer Preview from Health 2.0 #h20devday, 2017
CMS Blue Button API - Developer Preview from Health 2.0 #h20devday, 2017
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
Health Analytics
Health AnalyticsHealth Analytics
Health Analytics
 
Ba health
Ba healthBa health
Ba health
 
DataArt Healthcare & Life Sciences
DataArt Healthcare & Life SciencesDataArt Healthcare & Life Sciences
DataArt Healthcare & Life Sciences
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
APIdays Helsinki 2019 - API’s in Public Healthcare with Aki Puustja, HUS IT M...
APIdays Helsinki 2019 - API’s in Public Healthcare with Aki Puustja, HUS IT M...APIdays Helsinki 2019 - API’s in Public Healthcare with Aki Puustja, HUS IT M...
APIdays Helsinki 2019 - API’s in Public Healthcare with Aki Puustja, HUS IT M...
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets Revealed
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets RevealedZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets Revealed
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets Revealed
 
Electronic credential authentication_standard
Electronic credential authentication_standardElectronic credential authentication_standard
Electronic credential authentication_standard
 
Week sleek portfolio
Week sleek portfolioWeek sleek portfolio
Week sleek portfolio
 
#soteSlush: Jaakko Korhonen - ODA
#soteSlush: Jaakko Korhonen - ODA#soteSlush: Jaakko Korhonen - ODA
#soteSlush: Jaakko Korhonen - ODA
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Ndhm presentation-for-stakeholder-consultation-hospitals-diagnostic-centres-i...
Ndhm presentation-for-stakeholder-consultation-hospitals-diagnostic-centres-i...Ndhm presentation-for-stakeholder-consultation-hospitals-diagnostic-centres-i...
Ndhm presentation-for-stakeholder-consultation-hospitals-diagnostic-centres-i...
 

Dernier

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 

Dernier (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 

Smart card kantara pids presentation grey

  • 1. PIDS Patient ID Service http://design.patientidservice.us/
  • 2. Thank You • Kantara Initiative oHealthcare Identity Assurance Work Group, Chairs: John Fraser, Pete Palmer, Rick Moore • Open ID Foundation of Japan, Nat Sakimura • My Partners at eCitizen oDazza Greenwood oDaniel Bennett
  • 4. Patient ID Service (PIDS) Phase 1 -- Design • Research • Survey • Iterate Design • Final Presentation (we are here) o November 10, 2011 during HIAWG Conference Call 1:00 to 2:00 EST; http://kantarainitiative.org/confluence/display/healthidassurance/Home • Lay ground work for future phases
  • 5. Patient ID Service (PIDS) Phase 1.5 -- Design • Engage Participants • Raise Funding • Develop project plan to address Policy, Operating Rules/Agreements, Technology • Publish work under open source license
  • 6. PIDS Phase 2.0 • Develop implementations • Write code, documentation, etc. • Certification • Promote project, develop community • Develop future roadmap
  • 7. Kickoff Announcement SAVE THE DATE PATIENT IDENTITY SERVICE PROJECT LAUNCH MARCH 3, 2011 1:00PM - 2:00PM Eastern Time Phone Conference Call A Key to Meaningful Use: Patient Identity and Authentication Building on Current Technology to Enable "Meaningful Use" Transactions Open Architecture for Citizen-Centered Solutions
  • 8.
  • 9. Background • SAFE BioPharma: http://www.safe-biopharma.org/ • eAuthentication Initiative/eAuthentication Partnership • HSPD-12/OMB 11-11/FIPS 201/NIST SP 800-63/FICAM, etc. • Liberty Alliance – Kantara Initiative Identity Assurance Framework • HIMSS/GSA National eAuthentication White Paper: http://www.himss.org/content/files/GSAwhitepaper. pdf
  • 10. Background • The Markle Foundation calls it, “A Critical Problem of the Digital Age.” CT2: Authentication of Consumers http://www.markle.org/sites/default/files/CT2.pdf • Health IT Standards Panel: Identity Credentials Management (ICM) subcommittee of Security, Privacy and Infrastructure Committee, http://www.hitsp.org/ • National Strategy for Trusted Identities in Cyberspace, http://www.nist.gov/nstic/, http://www.nstic.us/
  • 11.
  • 12. PIDS Overview • Leverage the work of the Kantara Initiative to solve national (international?) problem • Healthcare Identity Assurance Work Group & eCitizen Foundation, OpenID of Japan collaboration • Design, Implement, Publish, Share an Open Architecture for Patient Identity addressing Business, Legal, and Technical requirements • Develop at least three implementations of PIDS to demonstrate interoperability and obtain certification
  • 13. PIDS Overview • Architecture to allow flexibility in choice of components that meet functional requirements. • Focus on use of existing business, legal and technology components to address immediate and short-term needs for patient identity functions. • Leverage existing credentials by providing functionality to attain Asusrance Level 3 • Facilitate healthcare providers' meeting of "Meaningful Use" requirements and in the implementation of Health Information Exchanges, Electronic Health Record (EHR) or Personal Health Record (PHR) systems. • Deliver capabilities to patients to participate significantly in their own healthcare, access, and to the extent appropriate, control their personal health information. • Identify gaps are identified and new applications for the architecture and develop further efforts to address these needs.
  • 15. Use Case • A student attending college out of state requires medical treatment. Information and records of prior treatment from her home state doctor will be helpful in the new case. The student chooses to request the prior records, receiving a copy, storing these in a personal health record and forwarding a copy to the new doctor.
  • 16.
  • 17. Survey and Research • Project Materials • The PIDS Design Phase included research and inquiry as part of the discovery process to develop and define the needs, requirements and constraints to pass forward to the implementation phase. • The PIDS project commenced with an Online Launch Event, at which the principals described the overview and intentions for the project. • Much of the information related to this research and other project materials are available at the eCitizen Foundation's Patient Identity Page. This research included a field survey. In addition, the following eCitizen Research Paper on URL’s for Electronic Health Records provides a description of the technical approach to using the architecture of the web as part of the design assumptions for this identity service: http://ecitizenproject.org/ideafactory/urls-for- electronic-health-records
  • 18.
  • 19. Solution -- Overview • Overview of Solution Design: • The design principles for the Patient ID Service are to create an open architecture, leveraging open standards, for a citizen-centered solution. As such, the proposed design puts the user - in this case a patient - in the driver’s seat. The PIDS design 1) empowers the user to configure important aspects of a personal identity account, 2) enables relying parties such as providers of patient portals, to accept the PIDS as a log- in for the patient, and 3) can be used by the patient to both organize their many health related identifiers and permissions as well as to access many different applications and services.
  • 20. Solution – PIDS Enrollment • Outline of PIDS Sign-Up and Usage Process • Patient Creates a voluntary PIDS Account o Patient is issued PIDS OpenID Identifier, or External OpenID is bound to PIDS account o Patient inputs additional healthcare relevant identifiers into PIDS "wallet" o External Authentication Tokens are bound to PIDS account • Patient configures permissions for PIDS account • Patient logs in to Relying Party systems with PIDS credential • Relying Party challenges for a higher level of authentication (optional) • Patient generates reports from PIDS system (activity logs, linked accounts)
  • 21. Solution – Technical Components • Technical Components • A simple account system with identity information from each account holding patient information, including first, last name, phone, address, etc. • A URI/URL for each Patient Account • SAML Service, such as Shibboleth, capable of sending and receiving assertions according to the NwHIN standards
  • 22. Solution – Technical Components • PIDS Credential, Identifier and Token Capability o An OpenID service o An Advanced Credentialing and Token issuance or adoption service (enabling a patient to use, bind and/or link different identity tokens to their PIDS account), for example: • X.509v3 digital certificate • Registered Mobile Phone for voice and/or text and/or keypad-based verification • Registered Smart Phone for Mobile Phone functions plus application functions • RSA Data Security Key Fob • PIV, PIV-I or other variations of these Cards • Authentication as a Service account linkage, enabling the account credentials to be linked to KBA, crypto-based and other methods • Authorization as a Service account linkage, enabling the account credential to be linked to UACS/RBAC and XACML types of services • eSignature Service, enabling the use of credential to assent to or otherwise approve a document, signify consent or perform other related transactions o Credential Suspension/De-linking/De-binding and Termination Service o (option) Time Stamp Service and other real-time audit-friendly tools (e.g. GIS, HTTP logs, etc) • OpenID Connect and Oauth Services (as they come available) • Audit and Logging Service
  • 23. OASIS TC • PIDS work will Identify Gaps • One such is Step Up Authentication • Working with OASIS “Trust Elevation Technical Committee” • Open Identity Attribute Exchange Summit o http://www.eventbrite.com/event/2266130056
  • 26. MIT New Media Medicine MIT Interim Session Coding sprint for development of function components of use in PIDS
  • 27. PIDS Phase 1.5 & 2.0
  • 28. Patient ID Service (PIDS) Phase 1.5 -- Design • Engage Participants • Raise Funding • Develop project plan to address Policy, Operating Rules/Agreements, Technology • Publish work under open source license
  • 29. PIDS Phase 2.0 • Develop implementations • Write code, documentation, etc. • Certification • Promote project, develop community • Develop future roadmap
  • 32. University of Texas – ID360 • UT, Austin - Center for Identity, http://identity.utexas.edu/ • ID360, ID360.us • Conference - Late April
  • 33. Dan Combs • CEO, eCitizen Foundation, o http://www.ecitizenfoundation.org/ • dancombs@ecitizenfoundation.org • dancombs1@gmail.com